123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309 |
- # Copyright 2022 Matrix.org Federation C.I.C
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from unittest import mock
- import twisted.web.client
- from twisted.internet import defer
- from twisted.test.proto_helpers import MemoryReactor
- from synapse.api.room_versions import RoomVersions
- from synapse.events import EventBase
- from synapse.rest import admin
- from synapse.rest.client import login, room
- from synapse.server import HomeServer
- from synapse.util import Clock
- from tests.test_utils import FakeResponse, event_injection
- from tests.unittest import FederatingHomeserverTestCase
- class FederationClientTest(FederatingHomeserverTestCase):
- servlets = [
- admin.register_servlets,
- room.register_servlets,
- login.register_servlets,
- ]
- def prepare(
- self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
- ) -> None:
- super().prepare(reactor, clock, homeserver)
- # mock out the Agent used by the federation client, which is easier than
- # catching the HTTPS connection and do the TLS stuff.
- self._mock_agent = mock.create_autospec(twisted.web.client.Agent, spec_set=True)
- homeserver.get_federation_http_client().agent = self._mock_agent
- # Move clock up to somewhat realistic time so the PDU destination retry
- # works (`now` needs to be larger than `0 + PDU_RETRY_TIME_MS`).
- self.reactor.advance(1000000000)
- self.creator = f"@creator:{self.OTHER_SERVER_NAME}"
- self.test_room_id = "!room_id"
- def test_get_room_state(self) -> None:
- # mock up some events to use in the response.
- # In real life, these would have things in `prev_events` and `auth_events`, but that's
- # a bit annoying to mock up, and the code under test doesn't care, so we don't bother.
- create_event_dict = self.add_hashes_and_signatures_from_other_server(
- {
- "room_id": self.test_room_id,
- "type": "m.room.create",
- "state_key": "",
- "sender": self.creator,
- "content": {"creator": self.creator},
- "prev_events": [],
- "auth_events": [],
- "origin_server_ts": 500,
- }
- )
- member_event_dict = self.add_hashes_and_signatures_from_other_server(
- {
- "room_id": self.test_room_id,
- "type": "m.room.member",
- "sender": self.creator,
- "state_key": self.creator,
- "content": {"membership": "join"},
- "prev_events": [],
- "auth_events": [],
- "origin_server_ts": 600,
- }
- )
- pl_event_dict = self.add_hashes_and_signatures_from_other_server(
- {
- "room_id": self.test_room_id,
- "type": "m.room.power_levels",
- "sender": self.creator,
- "state_key": "",
- "content": {},
- "prev_events": [],
- "auth_events": [],
- "origin_server_ts": 700,
- }
- )
- # mock up the response, and have the agent return it
- self._mock_agent.request.side_effect = lambda *args, **kwargs: defer.succeed(
- FakeResponse.json(
- payload={
- "pdus": [
- create_event_dict,
- member_event_dict,
- pl_event_dict,
- ],
- "auth_chain": [
- create_event_dict,
- member_event_dict,
- ],
- }
- )
- )
- # now fire off the request
- state_resp, auth_resp = self.get_success(
- self.hs.get_federation_client().get_room_state(
- "yet.another.server",
- self.test_room_id,
- "event_id",
- RoomVersions.V9,
- )
- )
- # check the right call got made to the agent
- self._mock_agent.request.assert_called_once_with(
- b"GET",
- b"matrix://yet.another.server/_matrix/federation/v1/state/%21room_id?event_id=event_id",
- headers=mock.ANY,
- bodyProducer=None,
- )
- # ... and that the response is correct.
- # the auth_resp should be empty because all the events are also in state
- self.assertEqual(auth_resp, [])
- # all of the events should be returned in state_resp, though not necessarily
- # in the same order. We just check the type on the assumption that if the type
- # is right, so is the rest of the event.
- self.assertCountEqual(
- [e.type for e in state_resp],
- ["m.room.create", "m.room.member", "m.room.power_levels"],
- )
- def test_get_pdu_returns_nothing_when_event_does_not_exist(self) -> None:
- """No event should be returned when the event does not exist"""
- pulled_pdu_info = self.get_success(
- self.hs.get_federation_client().get_pdu(
- ["yet.another.server"],
- "event_should_not_exist",
- RoomVersions.V9,
- )
- )
- self.assertEqual(pulled_pdu_info, None)
- def test_get_pdu(self) -> None:
- """Test to make sure an event is returned by `get_pdu()`"""
- self._get_pdu_once()
- def test_get_pdu_event_from_cache_is_pristine(self) -> None:
- """Test that modifications made to events returned by `get_pdu()`
- do not propagate back to to the internal cache (events returned should
- be a copy).
- """
- # Get the PDU in the cache
- remote_pdu = self._get_pdu_once()
- # Modify the the event reference.
- # This change should not make it back to the `_get_pdu_cache`.
- remote_pdu.internal_metadata.outlier = True
- # Get the event again. This time it should read it from cache.
- pulled_pdu_info2 = self.get_success(
- self.hs.get_federation_client().get_pdu(
- ["yet.another.server"],
- remote_pdu.event_id,
- RoomVersions.V9,
- )
- )
- assert pulled_pdu_info2 is not None
- remote_pdu2 = pulled_pdu_info2.pdu
- # Sanity check that we are working against the same event
- self.assertEqual(remote_pdu.event_id, remote_pdu2.event_id)
- # Make sure the event does not include modification from earlier
- self.assertIsNotNone(remote_pdu2)
- self.assertEqual(remote_pdu2.internal_metadata.outlier, False)
- def _get_pdu_once(self) -> EventBase:
- """Retrieve an event via `get_pdu()` and assert that an event was returned.
- Also used to prime the cache for subsequent test logic.
- """
- message_event_dict = self.add_hashes_and_signatures_from_other_server(
- {
- "room_id": self.test_room_id,
- "type": "m.room.message",
- "sender": self.creator,
- "state_key": "",
- "content": {},
- "prev_events": [],
- "auth_events": [],
- "origin_server_ts": 700,
- "depth": 10,
- }
- )
- # mock up the response, and have the agent return it
- self._mock_agent.request.side_effect = lambda *args, **kwargs: defer.succeed(
- FakeResponse.json(
- payload={
- "origin": "yet.another.server",
- "origin_server_ts": 900,
- "pdus": [
- message_event_dict,
- ],
- }
- )
- )
- pulled_pdu_info = self.get_success(
- self.hs.get_federation_client().get_pdu(
- ["yet.another.server"],
- "event_id",
- RoomVersions.V9,
- )
- )
- assert pulled_pdu_info is not None
- remote_pdu = pulled_pdu_info.pdu
- # check the right call got made to the agent
- self._mock_agent.request.assert_called_once_with(
- b"GET",
- b"matrix://yet.another.server/_matrix/federation/v1/event/event_id",
- headers=mock.ANY,
- bodyProducer=None,
- )
- self.assertIsNotNone(remote_pdu)
- self.assertEqual(remote_pdu.internal_metadata.outlier, False)
- return remote_pdu
- def test_backfill_invalid_signature_records_failed_pull_attempts(
- self,
- ) -> None:
- """
- Test to make sure that events from /backfill with invalid signatures get
- recorded as failed pull attempts.
- """
- OTHER_USER = f"@user:{self.OTHER_SERVER_NAME}"
- main_store = self.hs.get_datastores().main
- # Create the room
- user_id = self.register_user("kermit", "test")
- tok = self.login("kermit", "test")
- room_id = self.helper.create_room_as(room_creator=user_id, tok=tok)
- # We purposely don't run `add_hashes_and_signatures_from_other_server`
- # over this because we want the signature check to fail.
- pulled_event, _ = self.get_success(
- event_injection.create_event(
- self.hs,
- room_id=room_id,
- sender=OTHER_USER,
- type="test_event_type",
- content={"body": "garply"},
- )
- )
- # We expect an outbound request to /backfill, so stub that out
- self._mock_agent.request.side_effect = lambda *args, **kwargs: defer.succeed(
- FakeResponse.json(
- payload={
- "origin": "yet.another.server",
- "origin_server_ts": 900,
- # Mimic the other server returning our new `pulled_event`
- "pdus": [pulled_event.get_pdu_json()],
- }
- )
- )
- self.get_success(
- self.hs.get_federation_client().backfill(
- # We use "yet.another.server" instead of
- # `self.OTHER_SERVER_NAME` because we want to see the behavior
- # from `_check_sigs_and_hash_and_fetch_one` where it tries to
- # fetch the PDU again from the origin server if the signature
- # fails. Just want to make sure that the failure is counted from
- # both code paths.
- dest="yet.another.server",
- room_id=room_id,
- limit=1,
- extremities=[pulled_event.event_id],
- ),
- )
- # Make sure our failed pull attempt was recorded
- backfill_num_attempts = self.get_success(
- main_store.db_pool.simple_select_one_onecol(
- table="event_failed_pull_attempts",
- keyvalues={"event_id": pulled_event.event_id},
- retcol="num_attempts",
- )
- )
- # This is 2 because it failed once from `self.OTHER_SERVER_NAME` and the
- # other from "yet.another.server"
- self.assertEqual(backfill_num_attempts, 2)
|