Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
synapse
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Monitor
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Maunium
synapse
Commits
13e9cad5
Unverified
Commit
13e9cad5
authored
1 year ago
by
Marcel
Committed by
GitHub
1 year ago
Browse files
Options
Downloads
Patches
Plain Diff
Send the opentracing span information to appservices (#16227)
parent
fe69e7f6
No related branches found
No related tags found
No related merge requests found
Changes
3
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
changelog.d/16227.feature
+1
-0
1 addition, 0 deletions
changelog.d/16227.feature
synapse/appservice/api.py
+24
-8
24 additions, 8 deletions
synapse/appservice/api.py
tests/appservice/test_api.py
+12
-6
12 additions, 6 deletions
tests/appservice/test_api.py
with
37 additions
and
14 deletions
changelog.d/16227.feature
0 → 100644
+
1
−
0
View file @
13e9cad5
Add
sp
an
information to requests sent to appservices. Contributed by MTRNord.
\ No newline at end of file
This diff is collapsed.
Click to expand it.
synapse/appservice/api.py
+
24
−
8
View file @
13e9cad5
...
@@ -40,6 +40,7 @@ from synapse.appservice import (
...
@@ -40,6 +40,7 @@ from synapse.appservice import (
from
synapse.events
import
EventBase
from
synapse.events
import
EventBase
from
synapse.events.utils
import
SerializeEventConfig
,
serialize_event
from
synapse.events.utils
import
SerializeEventConfig
,
serialize_event
from
synapse.http.client
import
SimpleHttpClient
,
is_unknown_endpoint
from
synapse.http.client
import
SimpleHttpClient
,
is_unknown_endpoint
from
synapse.logging
import
opentracing
from
synapse.types
import
DeviceListUpdates
,
JsonDict
,
ThirdPartyInstanceID
from
synapse.types
import
DeviceListUpdates
,
JsonDict
,
ThirdPartyInstanceID
from
synapse.util.caches.response_cache
import
ResponseCache
from
synapse.util.caches.response_cache
import
ResponseCache
...
@@ -125,6 +126,17 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -125,6 +126,17 @@ class ApplicationServiceApi(SimpleHttpClient):
hs
.
get_clock
(),
"
as_protocol_meta
"
,
timeout_ms
=
HOUR_IN_MS
hs
.
get_clock
(),
"
as_protocol_meta
"
,
timeout_ms
=
HOUR_IN_MS
)
)
def
_get_headers
(
self
,
service
:
"
ApplicationService
"
)
->
Dict
[
bytes
,
List
[
bytes
]]:
"""
This makes sure we have always the auth header and opentracing headers set.
"""
# This is also ensured before in the functions. However this is needed to please
# the typechecks.
assert
service
.
hs_token
is
not
None
headers
=
{
b
"
Authorization
"
:
[
b
"
Bearer
"
+
service
.
hs_token
.
encode
(
"
ascii
"
)]}
opentracing
.
inject_header_dict
(
headers
,
check_destination
=
False
)
return
headers
async
def
query_user
(
self
,
service
:
"
ApplicationService
"
,
user_id
:
str
)
->
bool
:
async
def
query_user
(
self
,
service
:
"
ApplicationService
"
,
user_id
:
str
)
->
bool
:
if
service
.
url
is
None
:
if
service
.
url
is
None
:
return
False
return
False
...
@@ -136,10 +148,11 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -136,10 +148,11 @@ class ApplicationServiceApi(SimpleHttpClient):
args
=
None
args
=
None
if
self
.
config
.
use_appservice_legacy_authorization
:
if
self
.
config
.
use_appservice_legacy_authorization
:
args
=
{
"
access_token
"
:
service
.
hs_token
}
args
=
{
"
access_token
"
:
service
.
hs_token
}
response
=
await
self
.
get_json
(
response
=
await
self
.
get_json
(
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/users/
{
urllib
.
parse
.
quote
(
user_id
)
}
"
,
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/users/
{
urllib
.
parse
.
quote
(
user_id
)
}
"
,
args
,
args
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
if
response
is
not
None
:
# just an empty json object
if
response
is
not
None
:
# just an empty json object
return
True
return
True
...
@@ -162,10 +175,11 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -162,10 +175,11 @@ class ApplicationServiceApi(SimpleHttpClient):
args
=
None
args
=
None
if
self
.
config
.
use_appservice_legacy_authorization
:
if
self
.
config
.
use_appservice_legacy_authorization
:
args
=
{
"
access_token
"
:
service
.
hs_token
}
args
=
{
"
access_token
"
:
service
.
hs_token
}
response
=
await
self
.
get_json
(
response
=
await
self
.
get_json
(
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/rooms/
{
urllib
.
parse
.
quote
(
alias
)
}
"
,
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/rooms/
{
urllib
.
parse
.
quote
(
alias
)
}
"
,
args
,
args
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
if
response
is
not
None
:
# just an empty json object
if
response
is
not
None
:
# just an empty json object
return
True
return
True
...
@@ -203,10 +217,11 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -203,10 +217,11 @@ class ApplicationServiceApi(SimpleHttpClient):
**
fields
,
**
fields
,
b
"
access_token
"
:
service
.
hs_token
,
b
"
access_token
"
:
service
.
hs_token
,
}
}
response
=
await
self
.
get_json
(
response
=
await
self
.
get_json
(
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/thirdparty/
{
kind
}
/
{
urllib
.
parse
.
quote
(
protocol
)
}
"
,
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/thirdparty/
{
kind
}
/
{
urllib
.
parse
.
quote
(
protocol
)
}
"
,
args
=
args
,
args
=
args
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
if
not
isinstance
(
response
,
list
):
if
not
isinstance
(
response
,
list
):
logger
.
warning
(
logger
.
warning
(
...
@@ -243,10 +258,11 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -243,10 +258,11 @@ class ApplicationServiceApi(SimpleHttpClient):
args
=
None
args
=
None
if
self
.
config
.
use_appservice_legacy_authorization
:
if
self
.
config
.
use_appservice_legacy_authorization
:
args
=
{
"
access_token
"
:
service
.
hs_token
}
args
=
{
"
access_token
"
:
service
.
hs_token
}
info
=
await
self
.
get_json
(
info
=
await
self
.
get_json
(
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/thirdparty/protocol/
{
urllib
.
parse
.
quote
(
protocol
)
}
"
,
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/thirdparty/protocol/
{
urllib
.
parse
.
quote
(
protocol
)
}
"
,
args
,
args
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
if
not
_is_valid_3pe_metadata
(
info
):
if
not
_is_valid_3pe_metadata
(
info
):
...
@@ -283,7 +299,7 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -283,7 +299,7 @@ class ApplicationServiceApi(SimpleHttpClient):
await
self
.
post_json_get_json
(
await
self
.
post_json_get_json
(
uri
=
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/ping
"
,
uri
=
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/ping
"
,
post_json
=
{
"
transaction_id
"
:
txn_id
},
post_json
=
{
"
transaction_id
"
:
txn_id
},
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
async
def
push_bulk
(
async
def
push_bulk
(
...
@@ -364,7 +380,7 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -364,7 +380,7 @@ class ApplicationServiceApi(SimpleHttpClient):
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/transactions/
{
urllib
.
parse
.
quote
(
str
(
txn_id
))
}
"
,
f
"
{
service
.
url
}{
APP_SERVICE_PREFIX
}
/transactions/
{
urllib
.
parse
.
quote
(
str
(
txn_id
))
}
"
,
json_body
=
body
,
json_body
=
body
,
args
=
args
,
args
=
args
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
if
logger
.
isEnabledFor
(
logging
.
DEBUG
):
if
logger
.
isEnabledFor
(
logging
.
DEBUG
):
logger
.
debug
(
logger
.
debug
(
...
@@ -437,7 +453,7 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -437,7 +453,7 @@ class ApplicationServiceApi(SimpleHttpClient):
response
=
await
self
.
post_json_get_json
(
response
=
await
self
.
post_json_get_json
(
uri
,
uri
,
body
,
body
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
except
HttpResponseException
as
e
:
except
HttpResponseException
as
e
:
# The appservice doesn't support this endpoint.
# The appservice doesn't support this endpoint.
...
@@ -498,7 +514,7 @@ class ApplicationServiceApi(SimpleHttpClient):
...
@@ -498,7 +514,7 @@ class ApplicationServiceApi(SimpleHttpClient):
response
=
await
self
.
post_json_get_json
(
response
=
await
self
.
post_json_get_json
(
uri
,
uri
,
query
,
query
,
headers
=
{
"
Authorization
"
:
[
f
"
B
ea
r
er
{
service
.
hs_token
}
"
]}
,
headers
=
self
.
_get_h
ea
d
er
s
(
service
)
,
)
)
except
HttpResponseException
as
e
:
except
HttpResponseException
as
e
:
# The appservice doesn't support this endpoint.
# The appservice doesn't support this endpoint.
...
...
This diff is collapsed.
Click to expand it.
tests/appservice/test_api.py
+
12
−
6
View file @
13e9cad5
...
@@ -76,7 +76,7 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
...
@@ -76,7 +76,7 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
headers
:
Mapping
[
Union
[
str
,
bytes
],
Sequence
[
Union
[
str
,
bytes
]]],
headers
:
Mapping
[
Union
[
str
,
bytes
],
Sequence
[
Union
[
str
,
bytes
]]],
)
->
List
[
JsonDict
]:
)
->
List
[
JsonDict
]:
# Ensure the access token is passed as a header.
# Ensure the access token is passed as a header.
if
not
headers
or
not
headers
.
get
(
"
Authorization
"
):
if
not
headers
or
not
headers
.
get
(
b
"
Authorization
"
):
raise
RuntimeError
(
"
Access token not provided
"
)
raise
RuntimeError
(
"
Access token not provided
"
)
# ... and not as a query param
# ... and not as a query param
if
b
"
access_token
"
in
args
:
if
b
"
access_token
"
in
args
:
...
@@ -84,7 +84,9 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
...
@@ -84,7 +84,9 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
"
Access token should not be passed as a query param.
"
"
Access token should not be passed as a query param.
"
)
)
self
.
assertEqual
(
headers
.
get
(
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
])
self
.
assertEqual
(
headers
.
get
(
b
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
.
encode
()]
)
self
.
request_url
=
url
self
.
request_url
=
url
if
url
==
URL_USER
:
if
url
==
URL_USER
:
return
SUCCESS_RESULT_USER
return
SUCCESS_RESULT_USER
...
@@ -152,11 +154,13 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
...
@@ -152,11 +154,13 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
# Ensure the access token is passed as a both a query param and in the headers.
# Ensure the access token is passed as a both a query param and in the headers.
if
not
args
.
get
(
b
"
access_token
"
):
if
not
args
.
get
(
b
"
access_token
"
):
raise
RuntimeError
(
"
Access token should be provided in query params.
"
)
raise
RuntimeError
(
"
Access token should be provided in query params.
"
)
if
not
headers
or
not
headers
.
get
(
"
Authorization
"
):
if
not
headers
or
not
headers
.
get
(
b
"
Authorization
"
):
raise
RuntimeError
(
"
Access token should be provided in auth headers.
"
)
raise
RuntimeError
(
"
Access token should be provided in auth headers.
"
)
self
.
assertEqual
(
args
.
get
(
b
"
access_token
"
),
TOKEN
)
self
.
assertEqual
(
args
.
get
(
b
"
access_token
"
),
TOKEN
)
self
.
assertEqual
(
headers
.
get
(
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
])
self
.
assertEqual
(
headers
.
get
(
b
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
.
encode
()]
)
self
.
request_url
=
url
self
.
request_url
=
url
if
url
==
URL_USER
:
if
url
==
URL_USER
:
return
SUCCESS_RESULT_USER
return
SUCCESS_RESULT_USER
...
@@ -208,10 +212,12 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
...
@@ -208,10 +212,12 @@ class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
headers
:
Mapping
[
Union
[
str
,
bytes
],
Sequence
[
Union
[
str
,
bytes
]]],
headers
:
Mapping
[
Union
[
str
,
bytes
],
Sequence
[
Union
[
str
,
bytes
]]],
)
->
JsonDict
:
)
->
JsonDict
:
# Ensure the access token is passed as both a header and query arg.
# Ensure the access token is passed as both a header and query arg.
if
not
headers
.
get
(
"
Authorization
"
):
if
not
headers
.
get
(
b
"
Authorization
"
):
raise
RuntimeError
(
"
Access token not provided
"
)
raise
RuntimeError
(
"
Access token not provided
"
)
self
.
assertEqual
(
headers
.
get
(
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
])
self
.
assertEqual
(
headers
.
get
(
b
"
Authorization
"
),
[
f
"
Bearer
{
TOKEN
}
"
.
encode
()]
)
return
RESPONSE
return
RESPONSE
# We assign to a method, which mypy doesn't like.
# We assign to a method, which mypy doesn't like.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment