mirror of
https://github.com/matrix-org/dendrite
synced 2024-12-14 15:22:50 +00:00
7863a405a5
Use `IsBlacklistedOrBackingOff` from the federation API to check if we should fetch devices. To reduce back pressure, we now only queue retrying servers if there's space in the channel.
166 lines
5 KiB
Go
166 lines
5 KiB
Go
package routing
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"net/http"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/statistics"
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
|
|
|
"github.com/matrix-org/dendrite/appservice"
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
"github.com/matrix-org/dendrite/test"
|
|
"github.com/matrix-org/dendrite/test/testrig"
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
uapi "github.com/matrix-org/dendrite/userapi/api"
|
|
)
|
|
|
|
var testIsBlacklistedOrBackingOff = func(s spec.ServerName) (*statistics.ServerStatistics, error) {
|
|
return &statistics.ServerStatistics{}, nil
|
|
}
|
|
|
|
func TestJoinRoomByIDOrAlias(t *testing.T) {
|
|
alice := test.NewUser(t)
|
|
bob := test.NewUser(t)
|
|
charlie := test.NewUser(t, test.WithAccountType(uapi.AccountTypeGuest))
|
|
|
|
ctx := context.Background()
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
cfg, processCtx, close := testrig.CreateConfig(t, dbType)
|
|
defer close()
|
|
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
|
|
natsInstance := jetstream.NATSInstance{}
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
|
|
rsAPI.SetFederationAPI(nil, nil) // creates the rs.Inputer etc
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil, caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
|
asAPI := appservice.NewInternalAPI(processCtx, cfg, &natsInstance, userAPI, rsAPI)
|
|
|
|
// Create the users in the userapi
|
|
for _, u := range []*test.User{alice, bob, charlie} {
|
|
localpart, serverName, _ := gomatrixserverlib.SplitID('@', u.ID)
|
|
userRes := &uapi.PerformAccountCreationResponse{}
|
|
if err := userAPI.PerformAccountCreation(ctx, &uapi.PerformAccountCreationRequest{
|
|
AccountType: u.AccountType,
|
|
Localpart: localpart,
|
|
ServerName: serverName,
|
|
Password: "someRandomPassword",
|
|
}, userRes); err != nil {
|
|
t.Errorf("failed to create account: %s", err)
|
|
}
|
|
|
|
}
|
|
|
|
aliceDev := &uapi.Device{UserID: alice.ID}
|
|
bobDev := &uapi.Device{UserID: bob.ID}
|
|
charlieDev := &uapi.Device{UserID: charlie.ID, AccountType: uapi.AccountTypeGuest}
|
|
|
|
// create a room with disabled guest access and invite Bob
|
|
resp := createRoom(ctx, createRoomRequest{
|
|
Name: "testing",
|
|
IsDirect: true,
|
|
Topic: "testing",
|
|
Visibility: "public",
|
|
Preset: spec.PresetPublicChat,
|
|
RoomAliasName: "alias",
|
|
Invite: []string{bob.ID},
|
|
}, aliceDev, &cfg.ClientAPI, userAPI, rsAPI, asAPI, time.Now())
|
|
crResp, ok := resp.JSON.(createRoomResponse)
|
|
if !ok {
|
|
t.Fatalf("response is not a createRoomResponse: %+v", resp)
|
|
}
|
|
|
|
// create a room with guest access enabled and invite Charlie
|
|
resp = createRoom(ctx, createRoomRequest{
|
|
Name: "testing",
|
|
IsDirect: true,
|
|
Topic: "testing",
|
|
Visibility: "public",
|
|
Preset: spec.PresetPublicChat,
|
|
Invite: []string{charlie.ID},
|
|
}, aliceDev, &cfg.ClientAPI, userAPI, rsAPI, asAPI, time.Now())
|
|
crRespWithGuestAccess, ok := resp.JSON.(createRoomResponse)
|
|
if !ok {
|
|
t.Fatalf("response is not a createRoomResponse: %+v", resp)
|
|
}
|
|
|
|
// Dummy request
|
|
body := &bytes.Buffer{}
|
|
req, err := http.NewRequest(http.MethodPost, "/?server_name=test", body)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
testCases := []struct {
|
|
name string
|
|
device *uapi.Device
|
|
roomID string
|
|
wantHTTP200 bool
|
|
}{
|
|
{
|
|
name: "User can join successfully by alias",
|
|
device: bobDev,
|
|
roomID: crResp.RoomAlias,
|
|
wantHTTP200: true,
|
|
},
|
|
{
|
|
name: "User can join successfully by roomID",
|
|
device: bobDev,
|
|
roomID: crResp.RoomID,
|
|
wantHTTP200: true,
|
|
},
|
|
{
|
|
name: "join is forbidden if user is guest",
|
|
device: charlieDev,
|
|
roomID: crResp.RoomID,
|
|
},
|
|
{
|
|
name: "room does not exist",
|
|
device: aliceDev,
|
|
roomID: "!doesnotexist:test",
|
|
},
|
|
{
|
|
name: "user from different server",
|
|
device: &uapi.Device{UserID: "@wrong:server"},
|
|
roomID: crResp.RoomAlias,
|
|
},
|
|
{
|
|
name: "user doesn't exist locally",
|
|
device: &uapi.Device{UserID: "@doesnotexist:test"},
|
|
roomID: crResp.RoomAlias,
|
|
},
|
|
{
|
|
name: "invalid room ID",
|
|
device: aliceDev,
|
|
roomID: "invalidRoomID",
|
|
},
|
|
{
|
|
name: "roomAlias does not exist",
|
|
device: aliceDev,
|
|
roomID: "#doesnotexist:test",
|
|
},
|
|
{
|
|
name: "room with guest_access event",
|
|
device: charlieDev,
|
|
roomID: crRespWithGuestAccess.RoomID,
|
|
},
|
|
}
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
joinResp := JoinRoomByIDOrAlias(req, tc.device, rsAPI, userAPI, tc.roomID)
|
|
if tc.wantHTTP200 && !joinResp.Is2xx() {
|
|
t.Fatalf("expected join room to succeed, but didn't: %+v", joinResp)
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|