mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-22 11:41:38 +00:00
7863a405a5
Use `IsBlacklistedOrBackingOff` from the federation API to check if we should fetch devices. To reduce back pressure, we now only queue retrying servers if there's space in the channel.
167 lines
5.0 KiB
Go
167 lines
5.0 KiB
Go
package routing
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"net/http"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/statistics"
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
|
|
|
"github.com/matrix-org/dendrite/appservice"
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
"github.com/matrix-org/dendrite/test"
|
|
"github.com/matrix-org/dendrite/test/testrig"
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
uapi "github.com/matrix-org/dendrite/userapi/api"
|
|
)
|
|
|
|
var testIsBlacklistedOrBackingOff = func(s spec.ServerName) (*statistics.ServerStatistics, error) {
|
|
return &statistics.ServerStatistics{}, nil
|
|
}
|
|
|
|
func TestJoinRoomByIDOrAlias(t *testing.T) {
|
|
alice := test.NewUser(t)
|
|
bob := test.NewUser(t)
|
|
charlie := test.NewUser(t, test.WithAccountType(uapi.AccountTypeGuest))
|
|
|
|
ctx := context.Background()
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
cfg, processCtx, close := testrig.CreateConfig(t, dbType)
|
|
defer close()
|
|
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
|
|
natsInstance := jetstream.NATSInstance{}
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
|
|
rsAPI.SetFederationAPI(nil, nil) // creates the rs.Inputer etc
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil, caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
|
asAPI := appservice.NewInternalAPI(processCtx, cfg, &natsInstance, userAPI, rsAPI)
|
|
|
|
// Create the users in the userapi
|
|
for _, u := range []*test.User{alice, bob, charlie} {
|
|
localpart, serverName, _ := gomatrixserverlib.SplitID('@', u.ID)
|
|
userRes := &uapi.PerformAccountCreationResponse{}
|
|
if err := userAPI.PerformAccountCreation(ctx, &uapi.PerformAccountCreationRequest{
|
|
AccountType: u.AccountType,
|
|
Localpart: localpart,
|
|
ServerName: serverName,
|
|
Password: "someRandomPassword",
|
|
}, userRes); err != nil {
|
|
t.Errorf("failed to create account: %s", err)
|
|
}
|
|
|
|
}
|
|
|
|
aliceDev := &uapi.Device{UserID: alice.ID}
|
|
bobDev := &uapi.Device{UserID: bob.ID}
|
|
charlieDev := &uapi.Device{UserID: charlie.ID, AccountType: uapi.AccountTypeGuest}
|
|
|
|
// create a room with disabled guest access and invite Bob
|
|
resp := createRoom(ctx, createRoomRequest{
|
|
Name: "testing",
|
|
IsDirect: true,
|
|
Topic: "testing",
|
|
Visibility: "public",
|
|
Preset: spec.PresetPublicChat,
|
|
RoomAliasName: "alias",
|
|
Invite: []string{bob.ID},
|
|
}, aliceDev, &cfg.ClientAPI, userAPI, rsAPI, asAPI, time.Now())
|
|
crResp, ok := resp.JSON.(createRoomResponse)
|
|
if !ok {
|
|
t.Fatalf("response is not a createRoomResponse: %+v", resp)
|
|
}
|
|
|
|
// create a room with guest access enabled and invite Charlie
|
|
resp = createRoom(ctx, createRoomRequest{
|
|
Name: "testing",
|
|
IsDirect: true,
|
|
Topic: "testing",
|
|
Visibility: "public",
|
|
Preset: spec.PresetPublicChat,
|
|
Invite: []string{charlie.ID},
|
|
}, aliceDev, &cfg.ClientAPI, userAPI, rsAPI, asAPI, time.Now())
|
|
crRespWithGuestAccess, ok := resp.JSON.(createRoomResponse)
|
|
if !ok {
|
|
t.Fatalf("response is not a createRoomResponse: %+v", resp)
|
|
}
|
|
|
|
// Dummy request
|
|
body := &bytes.Buffer{}
|
|
req, err := http.NewRequest(http.MethodPost, "/?server_name=test", body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
testCases := []struct {
|
|
name string
|
|
device *uapi.Device
|
|
roomID string
|
|
wantHTTP200 bool
|
|
}{
|
|
{
|
|
name: "User can join successfully by alias",
|
|
device: bobDev,
|
|
roomID: crResp.RoomAlias,
|
|
wantHTTP200: true,
|
|
},
|
|
{
|
|
name: "User can join successfully by roomID",
|
|
device: bobDev,
|
|
roomID: crResp.RoomID,
|
|
wantHTTP200: true,
|
|
},
|
|
{
|
|
name: "join is forbidden if user is guest",
|
|
device: charlieDev,
|
|
roomID: crResp.RoomID,
|
|
},
|
|
{
|
|
name: "room does not exist",
|
|
device: aliceDev,
|
|
roomID: "!doesnotexist:test",
|
|
},
|
|
{
|
|
name: "user from different server",
|
|
device: &uapi.Device{UserID: "@wrong:server"},
|
|
roomID: crResp.RoomAlias,
|
|
},
|
|
{
|
|
name: "user doesn't exist locally",
|
|
device: &uapi.Device{UserID: "@doesnotexist:test"},
|
|
roomID: crResp.RoomAlias,
|
|
},
|
|
{
|
|
name: "invalid room ID",
|
|
device: aliceDev,
|
|
roomID: "invalidRoomID",
|
|
},
|
|
{
|
|
name: "roomAlias does not exist",
|
|
device: aliceDev,
|
|
roomID: "#doesnotexist:test",
|
|
},
|
|
{
|
|
name: "room with guest_access event",
|
|
device: charlieDev,
|
|
roomID: crRespWithGuestAccess.RoomID,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
joinResp := JoinRoomByIDOrAlias(req, tc.device, rsAPI, userAPI, tc.roomID)
|
|
if tc.wantHTTP200 && !joinResp.Is2xx() {
|
|
t.Fatalf("expected join room to succeed, but didn't: %+v", joinResp)
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|