Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
synapse
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Monitor
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Maunium
synapse
Commits
d02c4532
Commit
d02c4532
authored
6 years ago
by
Richard van der Hoff
Browse files
Options
Downloads
Patches
Plain Diff
Add a test for MatrixFederationAgent
parent
7021784d
No related branches found
No related tags found
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
tests/http/federation/test_matrix_federation_agent.py
+183
-0
183 additions, 0 deletions
tests/http/federation/test_matrix_federation_agent.py
tests/server.py
+12
-1
12 additions, 1 deletion
tests/server.py
with
195 additions
and
1 deletion
tests/http/federation/test_matrix_federation_agent.py
0 → 100644
+
183
−
0
View file @
d02c4532
# -*- coding: utf-8 -*-
# Copyright 2019 New Vector Ltd
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import
logging
from
mock
import
Mock
import
treq
from
twisted.internet
import
defer
from
twisted.internet.protocol
import
Factory
from
twisted.protocols.tls
import
TLSMemoryBIOFactory
from
twisted.test.ssl_helpers
import
ServerTLSContext
from
twisted.web.http
import
HTTPChannel
from
synapse.crypto.context_factory
import
ClientTLSOptionsFactory
from
synapse.http.federation.matrix_federation_agent
import
MatrixFederationAgent
from
synapse.util.logcontext
import
LoggingContext
from
tests.server
import
FakeTransport
,
ThreadedMemoryReactorClock
from
tests.unittest
import
TestCase
logger
=
logging
.
getLogger
(
__name__
)
class
MatrixFederationAgentTests
(
TestCase
):
def
setUp
(
self
):
self
.
reactor
=
ThreadedMemoryReactorClock
()
self
.
mock_resolver
=
Mock
()
self
.
agent
=
MatrixFederationAgent
(
reactor
=
self
.
reactor
,
tls_client_options_factory
=
ClientTLSOptionsFactory
(
None
),
_srv_resolver
=
self
.
mock_resolver
,
)
def
_make_connection
(
self
,
client_factory
):
"""
Builds a test server, and completes the outgoing client connection
Returns:
HTTPChannel: the test server
"""
# build the test server
server_tls_protocol
=
_build_test_server
()
# now, tell the client protocol factory to build the client protocol (it will be a
# _WrappingProtocol, around a TLSMemoryBIOProtocol, around an
# HTTP11ClientProtocol) and wire the output of said protocol up to the server via
# a FakeTransport.
#
# Normally this would be done by the TCP socket code in Twisted, but we are
# stubbing that out here.
client_protocol
=
client_factory
.
buildProtocol
(
None
)
client_protocol
.
makeConnection
(
FakeTransport
(
server_tls_protocol
,
self
.
reactor
))
# tell the server tls protocol to send its stuff back to the client, too
server_tls_protocol
.
makeConnection
(
FakeTransport
(
client_protocol
,
self
.
reactor
))
# finally, give the reactor a pump to get the TLS juices flowing.
self
.
reactor
.
pump
((
0.1
,))
# fish the test server back out of the server-side TLS protocol.
return
server_tls_protocol
.
wrappedProtocol
@defer.inlineCallbacks
def
_make_get_request
(
self
,
uri
):
"""
Sends a simple GET request via the agent, and checks its logcontext management
"""
with
LoggingContext
(
"
one
"
)
as
context
:
fetch_d
=
self
.
agent
.
request
(
b
'
GET
'
,
uri
)
# Nothing happened yet
self
.
assertNoResult
(
fetch_d
)
# should have reset logcontext to the sentinel
_check_logcontext
(
LoggingContext
.
sentinel
)
try
:
fetch_res
=
yield
fetch_d
defer
.
returnValue
(
fetch_res
)
finally
:
_check_logcontext
(
context
)
def
test_get
(
self
):
"""
happy-path test of a GET request
"""
self
.
reactor
.
lookups
[
"
testserv
"
]
=
"
1.2.3.4
"
test_d
=
self
.
_make_get_request
(
b
"
matrix://testserv:8448/foo/bar
"
)
# Nothing happened yet
self
.
assertNoResult
(
test_d
)
# Make sure treq is trying to connect
clients
=
self
.
reactor
.
tcpClients
self
.
assertEqual
(
len
(
clients
),
1
)
(
host
,
port
,
client_factory
,
_timeout
,
_bindAddress
)
=
clients
[
0
]
self
.
assertEqual
(
host
,
'
1.2.3.4
'
)
self
.
assertEqual
(
port
,
8448
)
# make a test server, and wire up the client
http_server
=
self
.
_make_connection
(
client_factory
)
self
.
assertEqual
(
len
(
http_server
.
requests
),
1
)
request
=
http_server
.
requests
[
0
]
self
.
assertEqual
(
request
.
method
,
b
'
GET
'
)
self
.
assertEqual
(
request
.
path
,
b
'
/foo/bar
'
)
self
.
assertEqual
(
request
.
requestHeaders
.
getRawHeaders
(
b
'
host
'
),
[
b
'
testserv:8448
'
]
)
content
=
request
.
content
.
read
()
self
.
assertEqual
(
content
,
b
''
)
# Deferred is still without a result
self
.
assertNoResult
(
test_d
)
# send the headers
request
.
responseHeaders
.
setRawHeaders
(
b
'
Content-Type
'
,
[
b
'
application/json
'
])
request
.
write
(
''
)
self
.
reactor
.
pump
((
0.1
,))
response
=
self
.
successResultOf
(
test_d
)
# that should give us a Response object
self
.
assertEqual
(
response
.
code
,
200
)
# Send the body
request
.
write
(
'
{
"
a
"
: 1 }
'
.
encode
(
'
ascii
'
))
request
.
finish
()
self
.
reactor
.
pump
((
0.1
,))
# check it can be read
json
=
self
.
successResultOf
(
treq
.
json_content
(
response
))
self
.
assertEqual
(
json
,
{
"
a
"
:
1
})
def
_check_logcontext
(
context
):
current
=
LoggingContext
.
current_context
()
if
current
is
not
context
:
raise
AssertionError
(
"
Expected logcontext %s but was %s
"
%
(
context
,
current
),
)
def
_build_test_server
():
"""
Construct a test server
This builds an HTTP channel, wrapped with a TLSMemoryBIOProtocol
Returns:
TLSMemoryBIOProtocol
"""
server_factory
=
Factory
.
forProtocol
(
HTTPChannel
)
# Request.finish expects the factory to have a 'log' method.
server_factory
.
log
=
_log_request
server_tls_factory
=
TLSMemoryBIOFactory
(
ServerTLSContext
(),
isClient
=
False
,
wrappedFactory
=
server_factory
,
)
return
server_tls_factory
.
buildProtocol
(
None
)
def
_log_request
(
request
):
"""
Implements Factory.log, which is expected by Request.finish
"""
logger
.
info
(
"
Completed request %s
"
,
request
)
This diff is collapsed.
Click to expand it.
tests/server.py
+
12
−
1
View file @
d02c4532
import
json
import
logging
from
io
import
BytesIO
from
six
import
text_type
...
...
@@ -22,6 +23,8 @@ from synapse.util import Clock
from
tests.utils
import
setup_test_homeserver
as
_sth
logger
=
logging
.
getLogger
(
__name__
)
class
TimedOutException
(
Exception
):
"""
...
...
@@ -414,6 +417,11 @@ class FakeTransport(object):
self
.
buffer
=
self
.
buffer
+
byt
def
_write
():
if
not
self
.
buffer
:
# nothing to do. Don't write empty buffers: it upsets the
# TLSMemoryBIOProtocol
return
if
getattr
(
self
.
other
,
"
transport
"
)
is
not
None
:
self
.
other
.
dataReceived
(
self
.
buffer
)
self
.
buffer
=
b
""
...
...
@@ -421,7 +429,10 @@ class FakeTransport(object):
self
.
_reactor
.
callLater
(
0.0
,
_write
)
_write
()
# always actually do the write asynchronously. Some protocols (notably the
# TLSMemoryBIOProtocol) get very confused if a read comes back while they are
# still doing a write. Doing a callLater here breaks the cycle.
self
.
_reactor
.
callLater
(
0.0
,
_write
)
def
writeSequence
(
self
,
seq
):
for
x
in
seq
:
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment