Skip to content
Snippets Groups Projects
test_load.py 7.63 KiB
Newer Older
  • Learn to ignore specific revisions
  • Patrick Cloke's avatar
    Patrick Cloke committed
    # This file is licensed under the Affero General Public License (AGPL) version 3.
    #
    
    # Copyright 2021 The Matrix.org Foundation C.I.C.
    # Copyright 2016 OpenMarket Ltd
    
    Patrick Cloke's avatar
    Patrick Cloke committed
    # Copyright (C) 2023 New Vector, Ltd
    #
    # This program is free software: you can redistribute it and/or modify
    # it under the terms of the GNU Affero General Public License as
    # published by the Free Software Foundation, either version 3 of the
    # License, or (at your option) any later version.
    #
    # See the GNU Affero General Public License for more details:
    # <https://www.gnu.org/licenses/agpl-3.0.html>.
    #
    # Originally licensed under the Apache License, Version 2.0:
    # <http://www.apache.org/licenses/LICENSE-2.0>.
    #
    # [This file includes modifications made by New Vector Limited]
    
    import tempfile
    from typing import Callable
    
    
    from parameterized import parameterized
    
    Amber Brown's avatar
    Amber Brown committed
    
    
    from synapse.config import ConfigError
    
    from synapse.config._base import RootConfig
    
    from synapse.config.homeserver import HomeServerConfig
    
    Amber Brown's avatar
    Amber Brown committed
    
    
    from tests.config.utils import ConfigFileTestCase
    
    try:
        import hiredis
    except ImportError:
        hiredis = None  # type: ignore
    
    
    class ConfigLoadingFileTestCase(ConfigFileTestCase):
    
        def test_load_fails_if_server_name_missing(self) -> None:
    
            self.generate_config_and_remove_lines_containing(["server_name"])
    
            with self.assertRaises(ConfigError):
    
                HomeServerConfig.load_config("", ["-c", self.config_file])
    
            with self.assertRaises(ConfigError):
    
                HomeServerConfig.load_or_generate_config("", ["-c", self.config_file])
    
        def test_generates_and_loads_macaroon_secret_key(self) -> None:
    
            with open(self.config_file) as f:
    
    Erik Johnston's avatar
    Erik Johnston committed
                raw = yaml.safe_load(f)
    
            self.assertIn("macaroon_secret_key", raw)
    
    
            config = HomeServerConfig.load_config("", ["-c", self.config_file])
    
                hasattr(config.key, "macaroon_secret_key"),
    
    black's avatar
    black committed
                "Want config to have attr macaroon_secret_key",
    
            if len(config.key.macaroon_secret_key) < 5:
    
                self.fail(
                    "Want macaroon secret key to be string of at least length 5,"
    
                    "was: %r" % (config.key.macaroon_secret_key,)
    
            config2 = HomeServerConfig.load_or_generate_config("", ["-c", self.config_file])
            assert config2 is not None
    
                hasattr(config2.key, "macaroon_secret_key"),
    
    black's avatar
    black committed
                "Want config to have attr macaroon_secret_key",
    
            if len(config2.key.macaroon_secret_key) < 5:
    
                self.fail(
                    "Want macaroon secret key to be string of at least length 5,"
    
                    "was: %r" % (config2.key.macaroon_secret_key,)
    
        def test_load_succeeds_if_macaroon_secret_key_missing(self) -> None:
    
            self.generate_config_and_remove_lines_containing(["macaroon"])
    
            config1 = HomeServerConfig.load_config("", ["-c", self.config_file])
            config2 = HomeServerConfig.load_config("", ["-c", self.config_file])
            config3 = HomeServerConfig.load_or_generate_config("", ["-c", self.config_file])
    
            assert config1 is not None
            assert config2 is not None
            assert config3 is not None
    
            self.assertEqual(
                config1.key.macaroon_secret_key, config2.key.macaroon_secret_key
            )
            self.assertEqual(
                config1.key.macaroon_secret_key, config3.key.macaroon_secret_key
            )
    
        def test_disable_registration(self) -> None:
    
    black's avatar
    black committed
            self.add_lines_to_config(
                ["enable_registration: true", "disable_registration: true"]
            )
    
            # Check that disable_registration clobbers enable_registration.
    
            config = HomeServerConfig.load_config("", ["-c", self.config_file])
    
            self.assertFalse(config.registration.enable_registration)
    
            config2 = HomeServerConfig.load_or_generate_config("", ["-c", self.config_file])
            assert config2 is not None
            self.assertFalse(config2.registration.enable_registration)
    
            # Check that either config value is clobbered by the command line.
    
            config3 = HomeServerConfig.load_or_generate_config(
    
                "", ["-c", self.config_file, "--enable-registration"]
    
    black's avatar
    black committed
            )
    
            assert config3 is not None
            self.assertTrue(config3.registration.enable_registration)
    
        def test_stats_enabled(self) -> None:
    
            self.generate_config_and_remove_lines_containing(["enable_metrics"])
    
            self.add_lines_to_config(["enable_metrics: true"])
    
            # The default Metrics Flags are off by default.
    
            config = HomeServerConfig.load_config("", ["-c", self.config_file])
    
            self.assertFalse(config.metrics.metrics_flags.known_servers)
    
        def test_depreciated_identity_server_flag_throws_error(self) -> None:
    
            self.generate_config()
            # Needed to ensure that actual key/value pair added below don't end up on a line with a comment
            self.add_lines_to_config([" "])
            # Check that presence of "trust_identity_server_for_password" throws config error
            self.add_lines_to_config(["trust_identity_server_for_password_resets: true"])
            with self.assertRaises(ConfigError):
                HomeServerConfig.load_config("", ["-c", self.config_file])
    
    
        @parameterized.expand(
            [
                "turn_shared_secret_path: /does/not/exist",
                "registration_shared_secret_path: /does/not/exist",
    
                "macaroon_secret_key_path: /does/not/exist",
    
                "experimental_features:\n  msc3861:\n    client_secret_path: /does/not/exist",
                "experimental_features:\n  msc3861:\n    admin_token_path: /does/not/exist",
    
                *["redis:\n  enabled: true\n  password_path: /does/not/exist"]
                * (hiredis is not None),
            ]
        )
        def test_secret_files_missing(self, config_str: str) -> None:
            self.generate_config()
            self.add_lines_to_config(["", config_str])
    
            with self.assertRaises(ConfigError):
                HomeServerConfig.load_config("", ["-c", self.config_file])
    
        @parameterized.expand(
            [
                (
                    "turn_shared_secret_path: {}",
    
                    lambda c: c.voip.turn_shared_secret.encode("utf-8"),
    
                ),
                (
                    "registration_shared_secret_path: {}",
    
                    lambda c: c.registration.registration_shared_secret.encode("utf-8"),
                ),
                (
                    "macaroon_secret_key_path: {}",
                    lambda c: c.key.macaroon_secret_key,
    
                (
                    "experimental_features:\n  msc3861:\n    client_secret_path: {}",
                    lambda c: c.experimental.msc3861.client_secret().encode("utf-8"),
                ),
                (
                    "experimental_features:\n  msc3861:\n    admin_token_path: {}",
                    lambda c: c.experimental.msc3861.admin_token().encode("utf-8"),
                ),
    
                *[
                    (
                        "redis:\n  enabled: true\n  password_path: {}",
    
                        lambda c: c.redis.redis_password.encode("utf-8"),
    
                    )
                ]
                * (hiredis is not None),
            ]
        )
        def test_secret_files_existing(
            self, config_line: str, get_secret: Callable[[RootConfig], str]
        ) -> None:
    
            self.generate_config_and_remove_lines_containing(
                ["registration_shared_secret", "macaroon_secret_key"]
            )
    
            with tempfile.NamedTemporaryFile(buffering=0) as secret_file:
                secret_file.write(b"53C237")
    
                self.add_lines_to_config(["", config_line.format(secret_file.name)])
                config = HomeServerConfig.load_config("", ["-c", self.config_file])
    
    
                self.assertEqual(get_secret(config), b"53C237")