Skip to content
This repository was archived by the owner on Apr 26, 2024. It is now read-only.

Commit 0f87b91

Browse files
authored
Implementation of MSC2314 (#6176)
1 parent 0d27aba commit 0f87b91

File tree

13 files changed

+174
-65
lines changed

13 files changed

+174
-65
lines changed

changelog.d/6176.feature

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
Implement the `/_matrix/federation/unstable/net.atleastfornow/state/<context>` API as drafted in MSC2314.

synapse/federation/federation_server.py

Lines changed: 17 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
# -*- coding: utf-8 -*-
22
# Copyright 2015, 2016 OpenMarket Ltd
33
# Copyright 2018 New Vector Ltd
4+
# Copyright 2019 Matrix.org Federation C.I.C
45
#
56
# Licensed under the Apache License, Version 2.0 (the "License");
67
# you may not use this file except in compliance with the License.
@@ -73,6 +74,7 @@ def __init__(self, hs):
7374

7475
self.auth = hs.get_auth()
7576
self.handler = hs.get_handlers().federation_handler
77+
self.state = hs.get_state_handler()
7678

7779
self._server_linearizer = Linearizer("fed_server")
7880
self._transaction_linearizer = Linearizer("fed_txn_handler")
@@ -264,9 +266,6 @@ async def received_edu(self, origin, edu_type, content):
264266
await self.registry.on_edu(edu_type, origin, content)
265267

266268
async def on_context_state_request(self, origin, room_id, event_id):
267-
if not event_id:
268-
raise NotImplementedError("Specify an event")
269-
270269
origin_host, _ = parse_server_name(origin)
271270
await self.check_server_matches_acl(origin_host, room_id)
272271

@@ -280,13 +279,18 @@ async def on_context_state_request(self, origin, room_id, event_id):
280279
# - but that's non-trivial to get right, and anyway somewhat defeats
281280
# the point of the linearizer.
282281
with (await self._server_linearizer.queue((origin, room_id))):
283-
resp = await self._state_resp_cache.wrap(
284-
(room_id, event_id),
285-
self._on_context_state_request_compute,
286-
room_id,
287-
event_id,
282+
resp = dict(
283+
await self._state_resp_cache.wrap(
284+
(room_id, event_id),
285+
self._on_context_state_request_compute,
286+
room_id,
287+
event_id,
288+
)
288289
)
289290

291+
room_version = await self.store.get_room_version(room_id)
292+
resp["room_version"] = room_version
293+
290294
return 200, resp
291295

292296
async def on_state_ids_request(self, origin, room_id, event_id):
@@ -306,7 +310,11 @@ async def on_state_ids_request(self, origin, room_id, event_id):
306310
return 200, {"pdu_ids": state_ids, "auth_chain_ids": auth_chain_ids}
307311

308312
async def _on_context_state_request_compute(self, room_id, event_id):
309-
pdus = await self.handler.get_state_for_pdu(room_id, event_id)
313+
if event_id:
314+
pdus = await self.handler.get_state_for_pdu(room_id, event_id)
315+
else:
316+
pdus = (await self.state.get_current_state(room_id)).values()
317+
310318
auth_chain = await self.store.get_auth_chain([pdu.event_id for pdu in pdus])
311319

312320
return {

synapse/federation/transport/server.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -421,15 +421,15 @@ async def on_GET(self, origin, content, query, event_id):
421421
return await self.handler.on_pdu_request(origin, event_id)
422422

423423

424-
class FederationStateServlet(BaseFederationServlet):
424+
class FederationStateV1Servlet(BaseFederationServlet):
425425
PATH = "/state/(?P<context>[^/]*)/?"
426426

427427
# This is when someone asks for all data for a given context.
428428
async def on_GET(self, origin, content, query, context):
429429
return await self.handler.on_context_state_request(
430430
origin,
431431
context,
432-
parse_string_from_args(query, "event_id", None, required=True),
432+
parse_string_from_args(query, "event_id", None, required=False),
433433
)
434434

435435

@@ -1360,7 +1360,7 @@ async def on_GET(self, origin, content, query, room_id):
13601360
FEDERATION_SERVLET_CLASSES = (
13611361
FederationSendServlet,
13621362
FederationEventServlet,
1363-
FederationStateServlet,
1363+
FederationStateV1Servlet,
13641364
FederationStateIdsServlet,
13651365
FederationBackfillServlet,
13661366
FederationQueryServlet,

sytest-blacklist

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# This file serves as a blacklist for SyTest tests that we expect will fail in
22
# Synapse.
3-
#
3+
#
44
# Each line of this file is scanned by sytest during a run and if the line
55
# exactly matches the name of a test, it will be marked as "expected fail",
66
# meaning the test will still run, but failure will not mark the entire test
@@ -29,3 +29,7 @@ Enabling an unknown default rule fails with 404
2929

3030
# Blacklisted due to https://github.com/matrix-org/synapse/issues/1663
3131
New federated private chats get full presence information (SYN-115)
32+
33+
# Blacklisted due to https://github.com/matrix-org/matrix-doc/pull/2314 removing
34+
# this requirement from the spec
35+
Inbound federation of state requires event_id as a mandatory paramater

tests/federation/test_complexity.py

Lines changed: 3 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -18,17 +18,14 @@
1818
from twisted.internet import defer
1919

2020
from synapse.api.errors import Codes, SynapseError
21-
from synapse.config.ratelimiting import FederationRateLimitConfig
22-
from synapse.federation.transport import server
2321
from synapse.rest import admin
2422
from synapse.rest.client.v1 import login, room
2523
from synapse.types import UserID
26-
from synapse.util.ratelimitutils import FederationRateLimiter
2724

2825
from tests import unittest
2926

3027

31-
class RoomComplexityTests(unittest.HomeserverTestCase):
28+
class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
3229

3330
servlets = [
3431
admin.register_servlets,
@@ -41,25 +38,6 @@ def default_config(self, name="test"):
4138
config["limit_remote_rooms"] = {"enabled": True, "complexity": 0.05}
4239
return config
4340

44-
def prepare(self, reactor, clock, homeserver):
45-
class Authenticator(object):
46-
def authenticate_request(self, request, content):
47-
return defer.succeed("otherserver.nottld")
48-
49-
ratelimiter = FederationRateLimiter(
50-
clock,
51-
FederationRateLimitConfig(
52-
window_size=1,
53-
sleep_limit=1,
54-
sleep_msec=1,
55-
reject_limit=1000,
56-
concurrent_requests=1000,
57-
),
58-
)
59-
server.register_servlets(
60-
homeserver, self.resource, Authenticator(), ratelimiter
61-
)
62-
6341
def test_complexity_simple(self):
6442

6543
u1 = self.register_user("u1", "pass")
@@ -105,7 +83,7 @@ def test_join_too_large(self):
10583

10684
d = handler._remote_join(
10785
None,
108-
["otherserver.example"],
86+
["other.example.com"],
10987
"roomid",
11088
UserID.from_string(u1),
11189
{"membership": "join"},
@@ -146,7 +124,7 @@ def test_join_too_large_once_joined(self):
146124

147125
d = handler._remote_join(
148126
None,
149-
["otherserver.example"],
127+
["other.example.com"],
150128
room_1,
151129
UserID.from_string(u1),
152130
{"membership": "join"},

tests/federation/test_federation_sender.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919

2020
from synapse.types import ReadReceipt
2121

22-
from tests.unittest import HomeserverTestCase
22+
from tests.unittest import HomeserverTestCase, override_config
2323

2424

2525
class FederationSenderTestCases(HomeserverTestCase):
@@ -29,6 +29,7 @@ def make_homeserver(self, reactor, clock):
2929
federation_transport_client=Mock(spec=["send_transaction"]),
3030
)
3131

32+
@override_config({"send_federation": True})
3233
def test_send_receipts(self):
3334
mock_state_handler = self.hs.get_state_handler()
3435
mock_state_handler.get_current_hosts_in_room.return_value = ["test", "host2"]
@@ -69,6 +70,7 @@ def test_send_receipts(self):
6970
],
7071
)
7172

73+
@override_config({"send_federation": True})
7274
def test_send_receipts_with_backoff(self):
7375
"""Send two receipts in quick succession; the second should be flushed, but
7476
only after 20ms"""

tests/federation/test_federation_server.py

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# -*- coding: utf-8 -*-
22
# Copyright 2018 New Vector Ltd
3+
# Copyright 2019 Matrix.org Federation C.I.C
34
#
45
# Licensed under the Apache License, Version 2.0 (the "License");
56
# you may not use this file except in compliance with the License.
@@ -16,6 +17,8 @@
1617

1718
from synapse.events import FrozenEvent
1819
from synapse.federation.federation_server import server_matches_acl_event
20+
from synapse.rest import admin
21+
from synapse.rest.client.v1 import login, room
1922

2023
from tests import unittest
2124

@@ -41,6 +44,66 @@ def test_block_ip_literals(self):
4144
self.assertTrue(server_matches_acl_event("1:2:3:4", e))
4245

4346

47+
class StateQueryTests(unittest.FederatingHomeserverTestCase):
48+
49+
servlets = [
50+
admin.register_servlets,
51+
room.register_servlets,
52+
login.register_servlets,
53+
]
54+
55+
def test_without_event_id(self):
56+
"""
57+
Querying v1/state/<room_id> without an event ID will return the current
58+
known state.
59+
"""
60+
u1 = self.register_user("u1", "pass")
61+
u1_token = self.login("u1", "pass")
62+
63+
room_1 = self.helper.create_room_as(u1, tok=u1_token)
64+
self.inject_room_member(room_1, "@user:other.example.com", "join")
65+
66+
request, channel = self.make_request(
67+
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
68+
)
69+
self.render(request)
70+
self.assertEquals(200, channel.code, channel.result)
71+
72+
self.assertEqual(
73+
channel.json_body["room_version"],
74+
self.hs.config.default_room_version.identifier,
75+
)
76+
77+
members = set(
78+
map(
79+
lambda x: x["state_key"],
80+
filter(
81+
lambda x: x["type"] == "m.room.member", channel.json_body["pdus"]
82+
),
83+
)
84+
)
85+
86+
self.assertEqual(members, set(["@user:other.example.com", u1]))
87+
self.assertEqual(len(channel.json_body["pdus"]), 6)
88+
89+
def test_needs_to_be_in_room(self):
90+
"""
91+
Querying v1/state/<room_id> requires the server
92+
be in the room to provide data.
93+
"""
94+
u1 = self.register_user("u1", "pass")
95+
u1_token = self.login("u1", "pass")
96+
97+
room_1 = self.helper.create_room_as(u1, tok=u1_token)
98+
99+
request, channel = self.make_request(
100+
"GET", "/_matrix/federation/v1/state/%s" % (room_1,)
101+
)
102+
self.render(request)
103+
self.assertEquals(403, channel.code, channel.result)
104+
self.assertEqual(channel.json_body["errcode"], "M_FORBIDDEN")
105+
106+
44107
def _create_acl_event(content):
45108
return FrozenEvent(
46109
{

tests/handlers/test_typing.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@
2424
from synapse.types import UserID
2525

2626
from tests import unittest
27+
from tests.unittest import override_config
2728
from tests.utils import register_federation_servlets
2829

2930
# Some local users to test with
@@ -174,6 +175,7 @@ def test_started_typing_local(self):
174175
],
175176
)
176177

178+
@override_config({"send_federation": True})
177179
def test_started_typing_remote_send(self):
178180
self.room_members = [U_APPLE, U_ONION]
179181

@@ -237,6 +239,7 @@ def test_started_typing_remote_recv(self):
237239
],
238240
)
239241

242+
@override_config({"send_federation": True})
240243
def test_stopped_typing(self):
241244
self.room_members = [U_APPLE, U_BANANA, U_ONION]
242245

tests/replication/slave/storage/_base.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,10 @@ def prepare(self, reactor, clock, hs):
4848
server_factory = ReplicationStreamProtocolFactory(self.hs)
4949
self.streamer = server_factory.streamer
5050

51+
handler_factory = Mock()
5152
self.replication_handler = ReplicationClientHandler(self.slaved_store)
53+
self.replication_handler.factory = handler_factory
54+
5255
client_factory = ReplicationClientFactory(
5356
self.hs, "client_name", self.replication_handler
5457
)

tests/replication/tcp/streams/_base.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@
1212
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
1313
# See the License for the specific language governing permissions and
1414
# limitations under the License.
15+
from mock import Mock
16+
1517
from synapse.replication.tcp.commands import ReplicateCommand
1618
from synapse.replication.tcp.protocol import ClientReplicationStreamProtocol
1719
from synapse.replication.tcp.resource import ReplicationStreamProtocolFactory
@@ -30,7 +32,9 @@ def prepare(self, reactor, clock, hs):
3032
server = server_factory.buildProtocol(None)
3133

3234
# build a replication client, with a dummy handler
35+
handler_factory = Mock()
3336
self.test_handler = TestReplicationClientHandler()
37+
self.test_handler.factory = handler_factory
3438
self.client = ClientReplicationStreamProtocol(
3539
"client", "test", clock, self.test_handler
3640
)

0 commit comments

Comments
 (0)