123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279 |
- # Copyright 2020-2021 The Matrix.org Foundation C.I.C.
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- import logging
- import os
- from typing import Any, Optional, Tuple
- from twisted.internet.interfaces import IOpenSSLServerConnectionCreator
- from twisted.internet.protocol import Factory
- from twisted.protocols.tls import TLSMemoryBIOFactory, TLSMemoryBIOProtocol
- from twisted.test.proto_helpers import MemoryReactor
- from twisted.web.http import HTTPChannel
- from twisted.web.server import Request
- from synapse.rest import admin
- from synapse.rest.client import login
- from synapse.server import HomeServer
- from synapse.util import Clock
- from tests.http import TestServerTLSConnectionFactory, get_test_ca_cert_file
- from tests.replication._base import BaseMultiWorkerStreamTestCase
- from tests.server import FakeChannel, FakeTransport, make_request
- from tests.test_utils import SMALL_PNG
- logger = logging.getLogger(__name__)
- test_server_connection_factory: Optional[TestServerTLSConnectionFactory] = None
- class MediaRepoShardTestCase(BaseMultiWorkerStreamTestCase):
- """Checks running multiple media repos work correctly."""
- servlets = [
- admin.register_servlets_for_client_rest_resource,
- login.register_servlets,
- ]
- def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
- self.user_id = self.register_user("user", "pass")
- self.access_token = self.login("user", "pass")
- self.reactor.lookups["example.com"] = "1.2.3.4"
- def default_config(self) -> dict:
- conf = super().default_config()
- conf["federation_custom_ca_list"] = [get_test_ca_cert_file()]
- return conf
- def make_worker_hs(
- self, worker_app: str, extra_config: Optional[dict] = None, **kwargs: Any
- ) -> HomeServer:
- worker_hs = super().make_worker_hs(worker_app, extra_config, **kwargs)
- # Force the media paths onto the replication resource.
- worker_hs.get_media_repository_resource().register_servlets(
- self._hs_to_site[worker_hs].resource, worker_hs
- )
- return worker_hs
- def _get_media_req(
- self, hs: HomeServer, target: str, media_id: str
- ) -> Tuple[FakeChannel, Request]:
- """Request some remote media from the given HS by calling the download
- API.
- This then triggers an outbound request from the HS to the target.
- Returns:
- The channel for the *client* request and the *outbound* request for
- the media which the caller should respond to.
- """
- channel = make_request(
- self.reactor,
- self._hs_to_site[hs],
- "GET",
- f"/_matrix/media/r0/download/{target}/{media_id}",
- shorthand=False,
- access_token=self.access_token,
- await_result=False,
- )
- self.pump()
- clients = self.reactor.tcpClients
- self.assertGreaterEqual(len(clients), 1)
- (host, port, client_factory, _timeout, _bindAddress) = clients.pop()
- # build the test server
- server_tls_protocol = _build_test_server(get_connection_factory())
- # now, tell the client protocol factory to build the client protocol (it will be a
- # _WrappingProtocol, around a TLSMemoryBIOProtocol, around an
- # HTTP11ClientProtocol) and wire the output of said protocol up to the server via
- # a FakeTransport.
- #
- # Normally this would be done by the TCP socket code in Twisted, but we are
- # stubbing that out here.
- client_protocol = client_factory.buildProtocol(None)
- client_protocol.makeConnection(
- FakeTransport(server_tls_protocol, self.reactor, client_protocol)
- )
- # tell the server tls protocol to send its stuff back to the client, too
- server_tls_protocol.makeConnection(
- FakeTransport(client_protocol, self.reactor, server_tls_protocol)
- )
- # fish the test server back out of the server-side TLS protocol.
- http_server: HTTPChannel = server_tls_protocol.wrappedProtocol # type: ignore[assignment]
- # give the reactor a pump to get the TLS juices flowing.
- self.reactor.pump((0.1,))
- self.assertEqual(len(http_server.requests), 1)
- request = http_server.requests[0]
- self.assertEqual(request.method, b"GET")
- self.assertEqual(
- request.path,
- f"/_matrix/media/r0/download/{target}/{media_id}".encode(),
- )
- self.assertEqual(
- request.requestHeaders.getRawHeaders(b"host"), [target.encode("utf-8")]
- )
- return channel, request
- def test_basic(self) -> None:
- """Test basic fetching of remote media from a single worker."""
- hs1 = self.make_worker_hs("synapse.app.generic_worker")
- channel, request = self._get_media_req(hs1, "example.com:443", "ABC123")
- request.setResponseCode(200)
- request.responseHeaders.setRawHeaders(b"Content-Type", [b"text/plain"])
- request.write(b"Hello!")
- request.finish()
- self.pump(0.1)
- self.assertEqual(channel.code, 200)
- self.assertEqual(channel.result["body"], b"Hello!")
- def test_download_simple_file_race(self) -> None:
- """Test that fetching remote media from two different processes at the
- same time works.
- """
- hs1 = self.make_worker_hs("synapse.app.generic_worker")
- hs2 = self.make_worker_hs("synapse.app.generic_worker")
- start_count = self._count_remote_media()
- # Make two requests without responding to the outbound media requests.
- channel1, request1 = self._get_media_req(hs1, "example.com:443", "ABC123")
- channel2, request2 = self._get_media_req(hs2, "example.com:443", "ABC123")
- # Respond to the first outbound media request and check that the client
- # request is successful
- request1.setResponseCode(200)
- request1.responseHeaders.setRawHeaders(b"Content-Type", [b"text/plain"])
- request1.write(b"Hello!")
- request1.finish()
- self.pump(0.1)
- self.assertEqual(channel1.code, 200, channel1.result["body"])
- self.assertEqual(channel1.result["body"], b"Hello!")
- # Now respond to the second with the same content.
- request2.setResponseCode(200)
- request2.responseHeaders.setRawHeaders(b"Content-Type", [b"text/plain"])
- request2.write(b"Hello!")
- request2.finish()
- self.pump(0.1)
- self.assertEqual(channel2.code, 200, channel2.result["body"])
- self.assertEqual(channel2.result["body"], b"Hello!")
- # We expect only one new file to have been persisted.
- self.assertEqual(start_count + 1, self._count_remote_media())
- def test_download_image_race(self) -> None:
- """Test that fetching remote *images* from two different processes at
- the same time works.
- This checks that races generating thumbnails are handled correctly.
- """
- hs1 = self.make_worker_hs("synapse.app.generic_worker")
- hs2 = self.make_worker_hs("synapse.app.generic_worker")
- start_count = self._count_remote_thumbnails()
- channel1, request1 = self._get_media_req(hs1, "example.com:443", "PIC1")
- channel2, request2 = self._get_media_req(hs2, "example.com:443", "PIC1")
- request1.setResponseCode(200)
- request1.responseHeaders.setRawHeaders(b"Content-Type", [b"image/png"])
- request1.write(SMALL_PNG)
- request1.finish()
- self.pump(0.1)
- self.assertEqual(channel1.code, 200, channel1.result["body"])
- self.assertEqual(channel1.result["body"], SMALL_PNG)
- request2.setResponseCode(200)
- request2.responseHeaders.setRawHeaders(b"Content-Type", [b"image/png"])
- request2.write(SMALL_PNG)
- request2.finish()
- self.pump(0.1)
- self.assertEqual(channel2.code, 200, channel2.result["body"])
- self.assertEqual(channel2.result["body"], SMALL_PNG)
- # We expect only three new thumbnails to have been persisted.
- self.assertEqual(start_count + 3, self._count_remote_thumbnails())
- def _count_remote_media(self) -> int:
- """Count the number of files in our remote media directory."""
- path = os.path.join(
- self.hs.get_media_repository().primary_base_path, "remote_content"
- )
- return sum(len(files) for _, _, files in os.walk(path))
- def _count_remote_thumbnails(self) -> int:
- """Count the number of files in our remote thumbnails directory."""
- path = os.path.join(
- self.hs.get_media_repository().primary_base_path, "remote_thumbnail"
- )
- return sum(len(files) for _, _, files in os.walk(path))
- def get_connection_factory() -> TestServerTLSConnectionFactory:
- # this needs to happen once, but not until we are ready to run the first test
- global test_server_connection_factory
- if test_server_connection_factory is None:
- test_server_connection_factory = TestServerTLSConnectionFactory(
- sanlist=[b"DNS:example.com"]
- )
- return test_server_connection_factory
- def _build_test_server(
- connection_creator: IOpenSSLServerConnectionCreator,
- ) -> TLSMemoryBIOProtocol:
- """Construct a test server
- This builds an HTTP channel, wrapped with a TLSMemoryBIOProtocol
- Args:
- connection_creator: thing to build SSL connections
- Returns:
- TLSMemoryBIOProtocol
- """
- server_factory = Factory.forProtocol(HTTPChannel)
- # Request.finish expects the factory to have a 'log' method.
- server_factory.log = _log_request
- server_tls_factory = TLSMemoryBIOFactory(
- connection_creator, isClient=False, wrappedFactory=server_factory
- )
- return server_tls_factory.buildProtocol(None)
- def _log_request(request: Request) -> None:
- """Implements Factory.log, which is expected by Request.finish"""
- logger.info("Completed request %s", request)
|