123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964 |
- # Copyright 2018 New Vector
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from typing import Any, List, Tuple
- from unittest.mock import Mock
- from twisted.internet.defer import Deferred
- from twisted.test.proto_helpers import MemoryReactor
- import synapse.rest.admin
- from synapse.logging.context import make_deferred_yieldable
- from synapse.push import PusherConfig, PusherConfigException
- from synapse.rest.client import login, push_rule, pusher, receipts, room
- from synapse.server import HomeServer
- from synapse.types import JsonDict
- from synapse.util import Clock
- from tests.unittest import HomeserverTestCase, override_config
- class HTTPPusherTests(HomeserverTestCase):
- servlets = [
- synapse.rest.admin.register_servlets_for_client_rest_resource,
- room.register_servlets,
- login.register_servlets,
- receipts.register_servlets,
- push_rule.register_servlets,
- pusher.register_servlets,
- ]
- user_id = True
- hijack_auth = False
- def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
- self.push_attempts: List[Tuple[Deferred, str, dict]] = []
- m = Mock()
- def post_json_get_json(url: str, body: JsonDict) -> Deferred:
- d: Deferred = Deferred()
- self.push_attempts.append((d, url, body))
- return make_deferred_yieldable(d)
- m.post_json_get_json = post_json_get_json
- hs = self.setup_test_homeserver(proxied_blacklisted_http_client=m)
- return hs
- def test_invalid_configuration(self) -> None:
- """Invalid push configurations should be rejected."""
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- def test_data(data: Any) -> None:
- self.get_failure(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data=data,
- ),
- PusherConfigException,
- )
- # Data must be provided with a URL.
- test_data(None)
- test_data({})
- test_data({"url": 1})
- # A bare domain name isn't accepted.
- test_data({"url": "example.com"})
- # A URL without a path isn't accepted.
- test_data({"url": "http://example.com"})
- # A url with an incorrect path isn't accepted.
- test_data({"url": "http://example.com/foo"})
- def test_sends_http(self) -> None:
- """
- The HTTP pusher will send pushes for each message to a HTTP endpoint
- when configured to do so.
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("otheruser", "pass")
- other_access_token = self.login("otheruser", "pass")
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Create a room
- room = self.helper.create_room_as(user_id, tok=access_token)
- # The other user joins
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # The other user sends some messages
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.helper.send(room, body="There!", tok=other_access_token)
- # Get the stream ordering before it gets sent
- pushers = list(
- self.get_success(
- self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
- )
- )
- self.assertEqual(len(pushers), 1)
- last_stream_ordering = pushers[0].last_stream_ordering
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- # It hasn't succeeded yet, so the stream ordering shouldn't have moved
- pushers = list(
- self.get_success(
- self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
- )
- )
- self.assertEqual(len(pushers), 1)
- self.assertEqual(last_stream_ordering, pushers[0].last_stream_ordering)
- # One push was attempted to be sent -- it'll be the first message
- self.assertEqual(len(self.push_attempts), 1)
- self.assertEqual(
- self.push_attempts[0][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(
- self.push_attempts[0][2]["notification"]["content"]["body"], "Hi!"
- )
- # Make the push succeed
- self.push_attempts[0][0].callback({})
- self.pump()
- # The stream ordering has increased
- pushers = list(
- self.get_success(
- self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
- )
- )
- self.assertEqual(len(pushers), 1)
- self.assertTrue(pushers[0].last_stream_ordering > last_stream_ordering)
- last_stream_ordering = pushers[0].last_stream_ordering
- # Now it'll try and send the second push message, which will be the second one
- self.assertEqual(len(self.push_attempts), 2)
- self.assertEqual(
- self.push_attempts[1][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(
- self.push_attempts[1][2]["notification"]["content"]["body"], "There!"
- )
- # Make the second push succeed
- self.push_attempts[1][0].callback({})
- self.pump()
- # The stream ordering has increased, again
- pushers = list(
- self.get_success(
- self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
- )
- )
- self.assertEqual(len(pushers), 1)
- self.assertTrue(pushers[0].last_stream_ordering > last_stream_ordering)
- def test_sends_high_priority_for_encrypted(self) -> None:
- """
- The HTTP pusher will send pushes at high priority if they correspond
- to an encrypted message.
- This will happen both in 1:1 rooms and larger rooms.
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("otheruser", "pass")
- other_access_token = self.login("otheruser", "pass")
- # Register a third user
- yet_another_user_id = self.register_user("yetanotheruser", "pass")
- yet_another_access_token = self.login("yetanotheruser", "pass")
- # Create a room
- room = self.helper.create_room_as(user_id, tok=access_token)
- # The other user joins
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Send an encrypted event
- # I know there'd normally be set-up of an encrypted room first
- # but this will do for our purposes
- self.helper.send_event(
- room,
- "m.room.encrypted",
- content={
- "algorithm": "m.megolm.v1.aes-sha2",
- "sender_key": "6lImKbzK51MzWLwHh8tUM3UBBSBrLlgup/OOCGTvumM",
- "ciphertext": "AwgAErABoRxwpMipdgiwXgu46rHiWQ0DmRj0qUlPrMraBUDk"
- "leTnJRljpuc7IOhsYbLY3uo2WI0ab/ob41sV+3JEIhODJPqH"
- "TK7cEZaIL+/up9e+dT9VGF5kRTWinzjkeqO8FU5kfdRjm+3w"
- "0sy3o1OCpXXCfO+faPhbV/0HuK4ndx1G+myNfK1Nk/CxfMcT"
- "BT+zDS/Df/QePAHVbrr9uuGB7fW8ogW/ulnydgZPRluusFGv"
- "J3+cg9LoPpZPAmv5Me3ec7NtdlfN0oDZ0gk3TiNkkhsxDG9Y"
- "YcNzl78USI0q8+kOV26Bu5dOBpU4WOuojXZHJlP5lMgdzLLl"
- "EQ0",
- "session_id": "IigqfNWLL+ez/Is+Duwp2s4HuCZhFG9b9CZKTYHtQ4A",
- "device_id": "AHQDUSTAAA",
- },
- tok=other_access_token,
- )
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- # Make the push succeed
- self.push_attempts[0][0].callback({})
- self.pump()
- # Check our push made it with high priority
- self.assertEqual(len(self.push_attempts), 1)
- self.assertEqual(
- self.push_attempts[0][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(self.push_attempts[0][2]["notification"]["prio"], "high")
- # Add yet another person — we want to make this room not a 1:1
- # (as encrypted messages in a 1:1 currently have tweaks applied
- # so it doesn't properly exercise the condition of all encrypted
- # messages need to be high).
- self.helper.join(
- room=room, user=yet_another_user_id, tok=yet_another_access_token
- )
- # Check no push notifications are sent regarding the membership changes
- # (that would confuse the test)
- self.pump()
- self.assertEqual(len(self.push_attempts), 1)
- # Send another encrypted event
- self.helper.send_event(
- room,
- "m.room.encrypted",
- content={
- "ciphertext": "AwgAEoABtEuic/2DF6oIpNH+q/PonzlhXOVho8dTv0tzFr5m"
- "9vTo50yabx3nxsRlP2WxSqa8I07YftP+EKWCWJvTkg6o7zXq"
- "6CK+GVvLQOVgK50SfvjHqJXN+z1VEqj+5mkZVN/cAgJzoxcH"
- "zFHkwDPJC8kQs47IHd8EO9KBUK4v6+NQ1uE/BIak4qAf9aS/"
- "kI+f0gjn9IY9K6LXlah82A/iRyrIrxkCkE/n0VfvLhaWFecC"
- "sAWTcMLoF6fh1Jpke95mljbmFSpsSd/eEQw",
- "device_id": "SRCFTWTHXO",
- "session_id": "eMA+bhGczuTz1C5cJR1YbmrnnC6Goni4lbvS5vJ1nG4",
- "algorithm": "m.megolm.v1.aes-sha2",
- "sender_key": "rC/XSIAiYrVGSuaHMop8/pTZbku4sQKBZwRwukgnN1c",
- },
- tok=other_access_token,
- )
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- self.assertEqual(len(self.push_attempts), 2)
- self.assertEqual(
- self.push_attempts[1][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(self.push_attempts[1][2]["notification"]["prio"], "high")
- def test_sends_high_priority_for_one_to_one_only(self) -> None:
- """
- The HTTP pusher will send pushes at high priority if they correspond
- to a message in a one-to-one room.
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("otheruser", "pass")
- other_access_token = self.login("otheruser", "pass")
- # Register a third user
- yet_another_user_id = self.register_user("yetanotheruser", "pass")
- yet_another_access_token = self.login("yetanotheruser", "pass")
- # Create a room
- room = self.helper.create_room_as(user_id, tok=access_token)
- # The other user joins
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Send a message
- self.helper.send(room, body="Hi!", tok=other_access_token)
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- # Make the push succeed
- self.push_attempts[0][0].callback({})
- self.pump()
- # Check our push made it with high priority — this is a one-to-one room
- self.assertEqual(len(self.push_attempts), 1)
- self.assertEqual(
- self.push_attempts[0][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(self.push_attempts[0][2]["notification"]["prio"], "high")
- # Yet another user joins
- self.helper.join(
- room=room, user=yet_another_user_id, tok=yet_another_access_token
- )
- # Check no push notifications are sent regarding the membership changes
- # (that would confuse the test)
- self.pump()
- self.assertEqual(len(self.push_attempts), 1)
- # Send another event
- self.helper.send(room, body="Welcome!", tok=other_access_token)
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- self.assertEqual(len(self.push_attempts), 2)
- self.assertEqual(
- self.push_attempts[1][1], "http://example.com/_matrix/push/v1/notify"
- )
- # check that this is low-priority
- self.assertEqual(self.push_attempts[1][2]["notification"]["prio"], "low")
- def test_sends_high_priority_for_mention(self) -> None:
- """
- The HTTP pusher will send pushes at high priority if they correspond
- to a message containing the user's display name.
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("otheruser", "pass")
- other_access_token = self.login("otheruser", "pass")
- # Register a third user
- yet_another_user_id = self.register_user("yetanotheruser", "pass")
- yet_another_access_token = self.login("yetanotheruser", "pass")
- # Create a room
- room = self.helper.create_room_as(user_id, tok=access_token)
- # The other users join
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- self.helper.join(
- room=room, user=yet_another_user_id, tok=yet_another_access_token
- )
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Send a message
- self.helper.send(room, body="Oh, user, hello!", tok=other_access_token)
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- # Make the push succeed
- self.push_attempts[0][0].callback({})
- self.pump()
- # Check our push made it with high priority
- self.assertEqual(len(self.push_attempts), 1)
- self.assertEqual(
- self.push_attempts[0][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(self.push_attempts[0][2]["notification"]["prio"], "high")
- # Send another event, this time with no mention
- self.helper.send(room, body="Are you there?", tok=other_access_token)
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- self.assertEqual(len(self.push_attempts), 2)
- self.assertEqual(
- self.push_attempts[1][1], "http://example.com/_matrix/push/v1/notify"
- )
- # check that this is low-priority
- self.assertEqual(self.push_attempts[1][2]["notification"]["prio"], "low")
- def test_sends_high_priority_for_atroom(self) -> None:
- """
- The HTTP pusher will send pushes at high priority if they correspond
- to a message that contains @room.
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("otheruser", "pass")
- other_access_token = self.login("otheruser", "pass")
- # Register a third user
- yet_another_user_id = self.register_user("yetanotheruser", "pass")
- yet_another_access_token = self.login("yetanotheruser", "pass")
- # Create a room (as other_user so the power levels are compatible with
- # other_user sending @room).
- room = self.helper.create_room_as(other_user_id, tok=other_access_token)
- # The other users join
- self.helper.join(room=room, user=user_id, tok=access_token)
- self.helper.join(
- room=room, user=yet_another_user_id, tok=yet_another_access_token
- )
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Send a message
- self.helper.send(
- room,
- body="@room eeek! There's a spider on the table!",
- tok=other_access_token,
- )
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- # Make the push succeed
- self.push_attempts[0][0].callback({})
- self.pump()
- # Check our push made it with high priority
- self.assertEqual(len(self.push_attempts), 1)
- self.assertEqual(
- self.push_attempts[0][1], "http://example.com/_matrix/push/v1/notify"
- )
- self.assertEqual(self.push_attempts[0][2]["notification"]["prio"], "high")
- # Send another event, this time as someone without the power of @room
- self.helper.send(
- room, body="@room the spider is gone", tok=yet_another_access_token
- )
- # Advance time a bit, so the pusher will register something has happened
- self.pump()
- self.assertEqual(len(self.push_attempts), 2)
- self.assertEqual(
- self.push_attempts[1][1], "http://example.com/_matrix/push/v1/notify"
- )
- # check that this is low-priority
- self.assertEqual(self.push_attempts[1][2]["notification"]["prio"], "low")
- def test_push_unread_count_group_by_room(self) -> None:
- """
- The HTTP pusher will group unread count by number of unread rooms.
- """
- # Carry out common push count tests and setup
- self._test_push_unread_count()
- # Carry out our option-value specific test
- #
- # This push should still only contain an unread count of 1 (for 1 unread room)
- self._check_push_attempt(7, 1)
- @override_config({"push": {"group_unread_count_by_room": False}})
- def test_push_unread_count_message_count(self) -> None:
- """
- The HTTP pusher will send the total unread message count.
- """
- # Carry out common push count tests and setup
- self._test_push_unread_count()
- # Carry out our option-value specific test
- #
- # We're counting every unread message, so there should now be 3 since the
- # last read receipt
- self._check_push_attempt(7, 3)
- def _test_push_unread_count(self) -> None:
- """
- Tests that the correct unread count appears in sent push notifications
- Note that:
- * Sending messages will cause push notifications to go out to relevant users
- * Sending a read receipt will cause the HTTP pusher to check whether the unread
- count has changed since the last push notification. If so, a "badge update"
- notification goes out to the user that sent the receipt
- """
- # Register the user who gets notified
- user_id = self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # Register the user who sends the message
- other_user_id = self.register_user("other_user", "pass")
- other_access_token = self.login("other_user", "pass")
- # Create a room (as other_user)
- room_id = self.helper.create_room_as(other_user_id, tok=other_access_token)
- # The user to get notified joins
- self.helper.join(room=room_id, user=user_id, tok=access_token)
- # Register the pusher
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- )
- )
- # Send a message
- response = self.helper.send(
- room_id, body="Hello there!", tok=other_access_token
- )
- first_message_event_id = response["event_id"]
- expected_push_attempts = 1
- self._check_push_attempt(expected_push_attempts, 1)
- self._send_read_request(access_token, first_message_event_id, room_id)
- # Unread count has changed. Therefore, ensure that read request triggers
- # a push notification.
- expected_push_attempts += 1
- self.assertEqual(len(self.push_attempts), expected_push_attempts)
- # Send another message
- response2 = self.helper.send(
- room_id, body="How's the weather today?", tok=other_access_token
- )
- second_message_event_id = response2["event_id"]
- expected_push_attempts += 1
- self._check_push_attempt(expected_push_attempts, 1)
- self._send_read_request(access_token, second_message_event_id, room_id)
- expected_push_attempts += 1
- self._check_push_attempt(expected_push_attempts, 0)
- # If we're grouping by room, sending more messages shouldn't increase the
- # unread count, as they're all being sent in the same room. Otherwise, it
- # should. Therefore, the last call to _check_push_attempt is done in the
- # caller method.
- self.helper.send(room_id, body="Hello?", tok=other_access_token)
- expected_push_attempts += 1
- self._advance_time_and_make_push_succeed(expected_push_attempts)
- self.helper.send(room_id, body="Hello??", tok=other_access_token)
- expected_push_attempts += 1
- self._advance_time_and_make_push_succeed(expected_push_attempts)
- self.helper.send(room_id, body="HELLO???", tok=other_access_token)
- def _advance_time_and_make_push_succeed(self, expected_push_attempts: int) -> None:
- self.pump()
- self.push_attempts[expected_push_attempts - 1][0].callback({})
- def _check_push_attempt(
- self, expected_push_attempts: int, expected_unread_count_last_push: int
- ) -> None:
- """
- Makes sure that the last expected push attempt succeeds and checks whether
- it contains the expected unread count.
- """
- self._advance_time_and_make_push_succeed(expected_push_attempts)
- # Check our push made it
- self.assertEqual(len(self.push_attempts), expected_push_attempts)
- _, push_url, push_body = self.push_attempts[expected_push_attempts - 1]
- self.assertEqual(
- push_url,
- "http://example.com/_matrix/push/v1/notify",
- )
- # Check that the unread count for the room is 0
- #
- # The unread count is zero as the user has no read receipt in the room yet
- self.assertEqual(
- push_body["notification"]["counts"]["unread"],
- expected_unread_count_last_push,
- )
- def _send_read_request(
- self, access_token: str, message_event_id: str, room_id: str
- ) -> None:
- # Now set the user's read receipt position to the first event
- #
- # This will actually trigger a new notification to be sent out so that
- # even if the user does not receive another message, their unread
- # count goes down
- channel = self.make_request(
- "POST",
- "/rooms/%s/receipt/m.read/%s" % (room_id, message_event_id),
- {},
- access_token=access_token,
- )
- self.assertEqual(channel.code, 200, channel.json_body)
- def _make_user_with_pusher(
- self, username: str, enabled: bool = True
- ) -> Tuple[str, str]:
- """Registers a user and creates a pusher for them.
- Args:
- username: the localpart of the new user's Matrix ID.
- enabled: whether to create the pusher in an enabled or disabled state.
- """
- user_id = self.register_user(username, "pass")
- access_token = self.login(username, "pass")
- # Register the pusher
- self._set_pusher(user_id, access_token, enabled)
- return user_id, access_token
- def _set_pusher(self, user_id: str, access_token: str, enabled: bool) -> None:
- """Creates or updates the pusher for the given user.
- Args:
- user_id: the user's Matrix ID.
- access_token: the access token associated with the pusher.
- enabled: whether to enable or disable the pusher.
- """
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- self.get_success(
- self.hs.get_pusherpool().add_or_update_pusher(
- user_id=user_id,
- device_id=device_id,
- kind="http",
- app_id="m.http",
- app_display_name="HTTP Push Notifications",
- device_display_name="pushy push",
- pushkey="a@example.com",
- lang=None,
- data={"url": "http://example.com/_matrix/push/v1/notify"},
- enabled=enabled,
- )
- )
- def test_dont_notify_rule_overrides_message(self) -> None:
- """
- The override push rule will suppress notification
- """
- user_id, access_token = self._make_user_with_pusher("user")
- other_user_id, other_access_token = self._make_user_with_pusher("otheruser")
- # Create a room
- room = self.helper.create_room_as(user_id, tok=access_token)
- # Disable user notifications for this room -> user
- body = {
- "conditions": [{"kind": "event_match", "key": "room_id", "pattern": room}],
- "actions": ["dont_notify"],
- }
- channel = self.make_request(
- "PUT",
- "/pushrules/global/override/best.friend",
- body,
- access_token=access_token,
- )
- self.assertEqual(channel.code, 200)
- # Check we start with no pushes
- self.assertEqual(len(self.push_attempts), 0)
- # The other user joins
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # The other user sends a message (ignored by dont_notify push rule set above)
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.assertEqual(len(self.push_attempts), 0)
- # The user sends a message back (sends a notification)
- self.helper.send(room, body="Hello", tok=access_token)
- self.assertEqual(len(self.push_attempts), 1)
- @override_config({"experimental_features": {"msc3881_enabled": True}})
- def test_disable(self) -> None:
- """Tests that disabling a pusher means it's not pushed to anymore."""
- user_id, access_token = self._make_user_with_pusher("user")
- other_user_id, other_access_token = self._make_user_with_pusher("otheruser")
- room = self.helper.create_room_as(user_id, tok=access_token)
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # Send a message and check that it generated a push.
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.assertEqual(len(self.push_attempts), 1)
- # Disable the pusher.
- self._set_pusher(user_id, access_token, enabled=False)
- # Send another message and check that it did not generate a push.
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.assertEqual(len(self.push_attempts), 1)
- # Get the pushers for the user and check that it is marked as disabled.
- channel = self.make_request("GET", "/pushers", access_token=access_token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(len(channel.json_body["pushers"]), 1)
- enabled = channel.json_body["pushers"][0]["org.matrix.msc3881.enabled"]
- self.assertFalse(enabled)
- self.assertTrue(isinstance(enabled, bool))
- @override_config({"experimental_features": {"msc3881_enabled": True}})
- def test_enable(self) -> None:
- """Tests that enabling a disabled pusher means it gets pushed to."""
- # Create the user with the pusher already disabled.
- user_id, access_token = self._make_user_with_pusher("user", enabled=False)
- other_user_id, other_access_token = self._make_user_with_pusher("otheruser")
- room = self.helper.create_room_as(user_id, tok=access_token)
- self.helper.join(room=room, user=other_user_id, tok=other_access_token)
- # Send a message and check that it did not generate a push.
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.assertEqual(len(self.push_attempts), 0)
- # Enable the pusher.
- self._set_pusher(user_id, access_token, enabled=True)
- # Send another message and check that it did generate a push.
- self.helper.send(room, body="Hi!", tok=other_access_token)
- self.assertEqual(len(self.push_attempts), 1)
- # Get the pushers for the user and check that it is marked as enabled.
- channel = self.make_request("GET", "/pushers", access_token=access_token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(len(channel.json_body["pushers"]), 1)
- enabled = channel.json_body["pushers"][0]["org.matrix.msc3881.enabled"]
- self.assertTrue(enabled)
- self.assertTrue(isinstance(enabled, bool))
- @override_config({"experimental_features": {"msc3881_enabled": True}})
- def test_null_enabled(self) -> None:
- """Tests that a pusher that has an 'enabled' column set to NULL (eg pushers
- created before the column was introduced) is considered enabled.
- """
- # We intentionally set 'enabled' to None so that it's stored as NULL in the
- # database.
- user_id, access_token = self._make_user_with_pusher("user", enabled=None) # type: ignore[arg-type]
- channel = self.make_request("GET", "/pushers", access_token=access_token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(len(channel.json_body["pushers"]), 1)
- self.assertTrue(channel.json_body["pushers"][0]["org.matrix.msc3881.enabled"])
- def test_update_different_device_access_token_device_id(self) -> None:
- """Tests that if we create a pusher from one device, the update it from another
- device, the device ID associated with the pusher stays the same.
- """
- # Create a user with a pusher.
- user_id, access_token = self._make_user_with_pusher("user")
- # Get the device ID for the current access token, since that's what we store in
- # the pushers table.
- user_tuple = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert user_tuple is not None
- device_id = user_tuple.device_id
- # Generate a new access token, and update the pusher with it.
- new_token = self.login("user", "pass")
- self._set_pusher(user_id, new_token, enabled=False)
- # Get the current list of pushers for the user.
- ret = self.get_success(
- self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
- )
- pushers: List[PusherConfig] = list(ret)
- # Check that we still have one pusher, and that the device ID associated with
- # it didn't change.
- self.assertEqual(len(pushers), 1)
- self.assertEqual(pushers[0].device_id, device_id)
- @override_config({"experimental_features": {"msc3881_enabled": True}})
- def test_device_id(self) -> None:
- """Tests that a pusher created with a given device ID shows that device ID in
- GET /pushers requests.
- """
- self.register_user("user", "pass")
- access_token = self.login("user", "pass")
- # We create the pusher with an HTTP request rather than with
- # _make_user_with_pusher so that we can test the device ID is correctly set when
- # creating a pusher via an API call.
- self.make_request(
- method="POST",
- path="/pushers/set",
- content={
- "kind": "http",
- "app_id": "m.http",
- "app_display_name": "HTTP Push Notifications",
- "device_display_name": "pushy push",
- "pushkey": "a@example.com",
- "lang": "en",
- "data": {"url": "http://example.com/_matrix/push/v1/notify"},
- },
- access_token=access_token,
- )
- # Look up the user info for the access token so we can compare the device ID.
- lookup_result = self.get_success(
- self.hs.get_datastores().main.get_user_by_access_token(access_token)
- )
- assert lookup_result is not None
- # Get the user's devices and check it has the correct device ID.
- channel = self.make_request("GET", "/pushers", access_token=access_token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(len(channel.json_body["pushers"]), 1)
- self.assertEqual(
- channel.json_body["pushers"][0]["org.matrix.msc3881.device_id"],
- lookup_result.device_id,
- )
|