2020-08-07 18:32:13 +02:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package internal
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"crypto/ed25519"
|
|
|
|
"fmt"
|
2022-08-05 11:26:59 +02:00
|
|
|
"io"
|
2020-08-07 18:32:13 +02:00
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"reflect"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2023-11-09 08:43:27 +01:00
|
|
|
api2 "github.com/matrix-org/dendrite/federationapi/api"
|
|
|
|
"github.com/matrix-org/dendrite/federationapi/statistics"
|
2023-10-31 16:39:45 +01:00
|
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
2023-03-17 12:09:45 +01:00
|
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
2020-08-07 18:32:13 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-06 10:55:01 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
2023-04-19 16:50:33 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2022-08-05 11:12:41 +02:00
|
|
|
|
2022-12-12 08:20:59 +01:00
|
|
|
roomserver "github.com/matrix-org/dendrite/roomserver/api"
|
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2022-09-30 10:41:16 +02:00
|
|
|
"github.com/matrix-org/dendrite/setup/process"
|
2022-12-12 08:20:59 +01:00
|
|
|
"github.com/matrix-org/dendrite/test"
|
2023-02-20 14:58:03 +01:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
|
|
|
"github.com/matrix-org/dendrite/userapi/storage"
|
2020-08-07 18:32:13 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
ctx = context.Background()
|
|
|
|
)
|
|
|
|
|
|
|
|
type mockKeyChangeProducer struct {
|
|
|
|
events []api.DeviceMessage
|
|
|
|
}
|
|
|
|
|
|
|
|
func (p *mockKeyChangeProducer) ProduceKeyChanges(keys []api.DeviceMessage) error {
|
|
|
|
p.events = append(p.events, keys...)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
type mockDeviceListUpdaterDatabase struct {
|
|
|
|
staleUsers map[string]bool
|
2022-03-10 14:17:28 +01:00
|
|
|
prevIDsExist func(string, []int64) bool
|
2020-08-07 18:32:13 +02:00
|
|
|
storedKeys []api.DeviceMessage
|
2022-03-01 18:18:06 +01:00
|
|
|
mu sync.Mutex // protect staleUsers
|
2020-08-07 18:32:13 +02:00
|
|
|
}
|
|
|
|
|
2022-12-12 08:20:59 +01:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) DeleteStaleDeviceLists(ctx context.Context, userIDs []string) error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-07 18:32:13 +02:00
|
|
|
// StaleDeviceLists returns a list of user IDs ending with the domains provided who have stale device lists.
|
|
|
|
// If no domains are given, all user IDs with stale device lists are returned.
|
2023-04-19 16:50:33 +02:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) StaleDeviceLists(ctx context.Context, domains []spec.ServerName) ([]string, error) {
|
2022-03-01 18:18:06 +01:00
|
|
|
d.mu.Lock()
|
|
|
|
defer d.mu.Unlock()
|
2020-08-07 18:32:13 +02:00
|
|
|
var result []string
|
2022-03-01 18:18:06 +01:00
|
|
|
for userID, isStale := range d.staleUsers {
|
|
|
|
if !isStale {
|
|
|
|
continue
|
|
|
|
}
|
2020-08-07 18:32:13 +02:00
|
|
|
_, remoteServer, err := gomatrixserverlib.SplitID('@', userID)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if len(domains) == 0 {
|
|
|
|
result = append(result, userID)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
for _, d := range domains {
|
|
|
|
if remoteServer == d {
|
|
|
|
result = append(result, userID)
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// MarkDeviceListStale sets the stale bit for this user to isStale.
|
|
|
|
func (d *mockDeviceListUpdaterDatabase) MarkDeviceListStale(ctx context.Context, userID string, isStale bool) error {
|
2022-03-01 18:18:06 +01:00
|
|
|
d.mu.Lock()
|
|
|
|
defer d.mu.Unlock()
|
2020-08-07 18:32:13 +02:00
|
|
|
d.staleUsers[userID] = isStale
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2022-03-02 11:49:29 +01:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) isStale(userID string) bool {
|
|
|
|
d.mu.Lock()
|
|
|
|
defer d.mu.Unlock()
|
|
|
|
return d.staleUsers[userID]
|
|
|
|
}
|
|
|
|
|
2020-08-07 18:32:13 +02:00
|
|
|
// StoreRemoteDeviceKeys persists the given keys. Keys with the same user ID and device ID will be replaced. An empty KeyJSON removes the key
|
|
|
|
// for this (user, device). Does not modify the stream ID for keys.
|
2020-08-12 23:43:02 +02:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) StoreRemoteDeviceKeys(ctx context.Context, keys []api.DeviceMessage, clear []string) error {
|
2020-08-07 18:32:13 +02:00
|
|
|
d.storedKeys = append(d.storedKeys, keys...)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// PrevIDsExists returns true if all prev IDs exist for this user.
|
2022-03-10 14:17:28 +01:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) PrevIDsExists(ctx context.Context, userID string, prevIDs []int64) (bool, error) {
|
2020-08-07 18:32:13 +02:00
|
|
|
return d.prevIDsExist(userID, prevIDs), nil
|
|
|
|
}
|
|
|
|
|
2020-08-18 12:14:20 +02:00
|
|
|
func (d *mockDeviceListUpdaterDatabase) DeviceKeysJSON(ctx context.Context, keys []api.DeviceMessage) error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2021-08-04 18:56:29 +02:00
|
|
|
type mockDeviceListUpdaterAPI struct {
|
|
|
|
}
|
|
|
|
|
2023-05-10 00:46:49 +02:00
|
|
|
func (d *mockDeviceListUpdaterAPI) PerformUploadDeviceKeys(ctx context.Context, req *api.PerformUploadDeviceKeysRequest, res *api.PerformUploadDeviceKeysResponse) {
|
2021-08-04 18:56:29 +02:00
|
|
|
}
|
|
|
|
|
2023-11-09 08:43:27 +01:00
|
|
|
var testIsBlacklistedOrBackingOff = func(s spec.ServerName) (*statistics.ServerStatistics, error) {
|
|
|
|
return &statistics.ServerStatistics{}, nil
|
|
|
|
}
|
|
|
|
|
2020-08-07 18:32:13 +02:00
|
|
|
type roundTripper struct {
|
|
|
|
fn func(*http.Request) (*http.Response, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (t *roundTripper) RoundTrip(req *http.Request) (*http.Response, error) {
|
|
|
|
return t.fn(req)
|
|
|
|
}
|
|
|
|
|
2023-04-24 18:23:25 +02:00
|
|
|
func newFedClient(tripper func(*http.Request) (*http.Response, error)) fclient.FederationClient {
|
2020-08-07 18:32:13 +02:00
|
|
|
_, pkey, _ := ed25519.GenerateKey(nil)
|
2023-04-06 10:55:01 +02:00
|
|
|
fedClient := fclient.NewFederationClient(
|
|
|
|
[]*fclient.SigningIdentity{
|
2022-11-15 16:05:23 +01:00
|
|
|
{
|
2023-04-19 16:50:33 +02:00
|
|
|
ServerName: spec.ServerName("example.test"),
|
2022-11-15 16:05:23 +01:00
|
|
|
KeyID: gomatrixserverlib.KeyID("ed25519:test"),
|
|
|
|
PrivateKey: pkey,
|
|
|
|
},
|
|
|
|
},
|
2023-04-06 10:55:01 +02:00
|
|
|
fclient.WithTransport(&roundTripper{tripper}),
|
2020-08-07 18:32:13 +02:00
|
|
|
)
|
|
|
|
return fedClient
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that the device keys get persisted and emitted if we have the previous IDs.
|
|
|
|
func TestUpdateHavePrevID(t *testing.T) {
|
|
|
|
db := &mockDeviceListUpdaterDatabase{
|
|
|
|
staleUsers: make(map[string]bool),
|
2022-03-10 14:17:28 +01:00
|
|
|
prevIDsExist: func(string, []int64) bool {
|
2020-08-07 18:32:13 +02:00
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
2021-08-04 18:56:29 +02:00
|
|
|
ap := &mockDeviceListUpdaterAPI{}
|
2020-08-07 18:32:13 +02:00
|
|
|
producer := &mockKeyChangeProducer{}
|
2023-11-09 08:43:27 +01:00
|
|
|
updater := NewDeviceListUpdater(process.NewProcessContext(), db, ap, producer, nil, 1, nil, "localhost", caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
2020-08-07 18:32:13 +02:00
|
|
|
event := gomatrixserverlib.DeviceListUpdateEvent{
|
|
|
|
DeviceDisplayName: "Foo Bar",
|
|
|
|
Deleted: false,
|
|
|
|
DeviceID: "FOO",
|
|
|
|
Keys: []byte(`{"key":"value"}`),
|
2022-03-10 14:17:28 +01:00
|
|
|
PrevID: []int64{0},
|
2020-08-07 18:32:13 +02:00
|
|
|
StreamID: 1,
|
|
|
|
UserID: "@alice:localhost",
|
|
|
|
}
|
|
|
|
err := updater.Update(ctx, event)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Update returned an error: %s", err)
|
|
|
|
}
|
|
|
|
want := api.DeviceMessage{
|
2021-08-11 10:44:14 +02:00
|
|
|
Type: api.TypeDeviceKeyUpdate,
|
2020-08-07 18:32:13 +02:00
|
|
|
StreamID: event.StreamID,
|
2021-08-11 10:44:14 +02:00
|
|
|
DeviceKeys: &api.DeviceKeys{
|
2020-08-07 18:32:13 +02:00
|
|
|
DeviceID: event.DeviceID,
|
|
|
|
DisplayName: event.DeviceDisplayName,
|
|
|
|
KeyJSON: event.Keys,
|
|
|
|
UserID: event.UserID,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(producer.events, []api.DeviceMessage{want}) {
|
|
|
|
t.Errorf("Update didn't produce correct event, got %v want %v", producer.events, want)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(db.storedKeys, []api.DeviceMessage{want}) {
|
|
|
|
t.Errorf("DB didn't store correct event, got %v want %v", db.storedKeys, want)
|
|
|
|
}
|
2022-03-02 11:49:29 +01:00
|
|
|
if db.isStale(event.UserID) {
|
2020-08-07 18:32:13 +02:00
|
|
|
t.Errorf("%s incorrectly marked as stale", event.UserID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test that device keys are fetched from the remote server if we are missing prev IDs
|
|
|
|
// and that the user's devices are marked as stale until it succeeds.
|
|
|
|
func TestUpdateNoPrevID(t *testing.T) {
|
|
|
|
db := &mockDeviceListUpdaterDatabase{
|
|
|
|
staleUsers: make(map[string]bool),
|
2022-03-10 14:17:28 +01:00
|
|
|
prevIDsExist: func(string, []int64) bool {
|
2020-08-07 18:32:13 +02:00
|
|
|
return false
|
|
|
|
},
|
|
|
|
}
|
2021-08-04 18:56:29 +02:00
|
|
|
ap := &mockDeviceListUpdaterAPI{}
|
2020-08-07 18:32:13 +02:00
|
|
|
producer := &mockKeyChangeProducer{}
|
|
|
|
remoteUserID := "@alice:example.somewhere"
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(1)
|
|
|
|
keyJSON := `{"user_id":"` + remoteUserID + `","device_id":"JLAFKJWSCS","algorithms":["m.olm.v1.curve25519-aes-sha2","m.megolm.v1.aes-sha2"],"keys":{"curve25519:JLAFKJWSCS":"3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI","ed25519:JLAFKJWSCS":"lEuiRJBit0IG6nUf5pUzWTUEsRVVe/HJkoKuEww9ULI"},"signatures":{"` + remoteUserID + `":{"ed25519:JLAFKJWSCS":"dSO80A01XiigH3uBiDVx/EjzaoycHcjq9lfQX0uWsqxl2giMIiSPR8a4d291W1ihKJL/a+myXS367WT6NAIcBA"}}}`
|
|
|
|
fedClient := newFedClient(func(req *http.Request) (*http.Response, error) {
|
|
|
|
defer wg.Done()
|
|
|
|
if req.URL.Path != "/_matrix/federation/v1/user/devices/"+url.PathEscape(remoteUserID) {
|
|
|
|
return nil, fmt.Errorf("test: invalid path: %s", req.URL.Path)
|
|
|
|
}
|
|
|
|
return &http.Response{
|
|
|
|
StatusCode: 200,
|
2022-08-05 11:26:59 +02:00
|
|
|
Body: io.NopCloser(strings.NewReader(`
|
2020-08-07 18:32:13 +02:00
|
|
|
{
|
|
|
|
"user_id": "` + remoteUserID + `",
|
|
|
|
"stream_id": 5,
|
|
|
|
"devices": [
|
|
|
|
{
|
|
|
|
"device_id": "JLAFKJWSCS",
|
|
|
|
"keys": ` + keyJSON + `,
|
|
|
|
"device_display_name": "Mobile Phone"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
`)),
|
|
|
|
}, nil
|
|
|
|
})
|
2023-11-09 08:43:27 +01:00
|
|
|
updater := NewDeviceListUpdater(process.NewProcessContext(), db, ap, producer, fedClient, 2, nil, "example.test", caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
2020-08-07 18:32:13 +02:00
|
|
|
if err := updater.Start(); err != nil {
|
|
|
|
t.Fatalf("failed to start updater: %s", err)
|
|
|
|
}
|
|
|
|
event := gomatrixserverlib.DeviceListUpdateEvent{
|
|
|
|
DeviceDisplayName: "Mobile Phone",
|
|
|
|
Deleted: false,
|
|
|
|
DeviceID: "another_device_id",
|
|
|
|
Keys: []byte(`{"key":"value"}`),
|
2022-03-10 14:17:28 +01:00
|
|
|
PrevID: []int64{3},
|
2020-08-07 18:32:13 +02:00
|
|
|
StreamID: 4,
|
|
|
|
UserID: remoteUserID,
|
|
|
|
}
|
|
|
|
err := updater.Update(ctx, event)
|
2022-12-12 08:20:59 +01:00
|
|
|
|
2020-08-07 18:32:13 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Update returned an error: %s", err)
|
|
|
|
}
|
|
|
|
t.Log("waiting for /users/devices to be called...")
|
|
|
|
wg.Wait()
|
|
|
|
// wait a bit for db to be updated...
|
|
|
|
time.Sleep(100 * time.Millisecond)
|
|
|
|
want := api.DeviceMessage{
|
2021-08-11 10:44:14 +02:00
|
|
|
Type: api.TypeDeviceKeyUpdate,
|
2020-08-07 18:32:13 +02:00
|
|
|
StreamID: 5,
|
2021-08-11 10:44:14 +02:00
|
|
|
DeviceKeys: &api.DeviceKeys{
|
2020-08-07 18:32:13 +02:00
|
|
|
DeviceID: "JLAFKJWSCS",
|
|
|
|
DisplayName: "Mobile Phone",
|
|
|
|
UserID: remoteUserID,
|
|
|
|
KeyJSON: []byte(keyJSON),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
// Now we should have a fresh list and the keys and emitted something
|
2022-03-02 11:49:29 +01:00
|
|
|
if db.isStale(event.UserID) {
|
2020-08-07 18:32:13 +02:00
|
|
|
t.Errorf("%s still marked as stale", event.UserID)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(producer.events, []api.DeviceMessage{want}) {
|
|
|
|
t.Logf("len got %d len want %d", len(producer.events[0].KeyJSON), len(want.KeyJSON))
|
|
|
|
t.Errorf("Update didn't produce correct event, got %v want %v", producer.events, want)
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(db.storedKeys, []api.DeviceMessage{want}) {
|
|
|
|
t.Errorf("DB didn't store correct event, got %v want %v", db.storedKeys, want)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
2022-03-01 18:18:06 +01:00
|
|
|
|
|
|
|
// Test that if we make N calls to ManualUpdate for the same user, we only do it once, assuming the
|
|
|
|
// update is still ongoing.
|
|
|
|
func TestDebounce(t *testing.T) {
|
2022-03-02 12:38:13 +01:00
|
|
|
t.Skipf("panic on closed channel on GHA")
|
2022-03-01 18:18:06 +01:00
|
|
|
db := &mockDeviceListUpdaterDatabase{
|
|
|
|
staleUsers: make(map[string]bool),
|
2022-03-10 14:17:28 +01:00
|
|
|
prevIDsExist: func(string, []int64) bool {
|
2022-03-01 18:18:06 +01:00
|
|
|
return true
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ap := &mockDeviceListUpdaterAPI{}
|
|
|
|
producer := &mockKeyChangeProducer{}
|
|
|
|
fedCh := make(chan *http.Response, 1)
|
2023-04-19 16:50:33 +02:00
|
|
|
srv := spec.ServerName("example.com")
|
2022-03-01 18:18:06 +01:00
|
|
|
userID := "@alice:example.com"
|
|
|
|
keyJSON := `{"user_id":"` + userID + `","device_id":"JLAFKJWSCS","algorithms":["m.olm.v1.curve25519-aes-sha2","m.megolm.v1.aes-sha2"],"keys":{"curve25519:JLAFKJWSCS":"3C5BFWi2Y8MaVvjM8M22DBmh24PmgR0nPvJOIArzgyI","ed25519:JLAFKJWSCS":"lEuiRJBit0IG6nUf5pUzWTUEsRVVe/HJkoKuEww9ULI"},"signatures":{"` + userID + `":{"ed25519:JLAFKJWSCS":"dSO80A01XiigH3uBiDVx/EjzaoycHcjq9lfQX0uWsqxl2giMIiSPR8a4d291W1ihKJL/a+myXS367WT6NAIcBA"}}}`
|
|
|
|
incomingFedReq := make(chan struct{})
|
|
|
|
fedClient := newFedClient(func(req *http.Request) (*http.Response, error) {
|
|
|
|
if req.URL.Path != "/_matrix/federation/v1/user/devices/"+url.PathEscape(userID) {
|
|
|
|
return nil, fmt.Errorf("test: invalid path: %s", req.URL.Path)
|
|
|
|
}
|
|
|
|
close(incomingFedReq)
|
|
|
|
return <-fedCh, nil
|
|
|
|
})
|
2023-11-09 08:43:27 +01:00
|
|
|
updater := NewDeviceListUpdater(process.NewProcessContext(), db, ap, producer, fedClient, 1, nil, "localhost", caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
2022-03-01 18:18:06 +01:00
|
|
|
if err := updater.Start(); err != nil {
|
|
|
|
t.Fatalf("failed to start updater: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// hit this 5 times
|
|
|
|
var wg sync.WaitGroup
|
|
|
|
wg.Add(5)
|
|
|
|
for i := 0; i < 5; i++ {
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
if err := updater.ManualUpdate(context.Background(), srv, userID); err != nil {
|
|
|
|
t.Errorf("ManualUpdate: %s", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
// wait until the updater hits federation
|
|
|
|
select {
|
|
|
|
case <-incomingFedReq:
|
|
|
|
case <-time.After(time.Second):
|
|
|
|
t.Fatalf("timed out waiting for updater to hit federation")
|
|
|
|
}
|
|
|
|
|
|
|
|
// user should be marked as stale
|
2022-03-02 11:49:29 +01:00
|
|
|
if !db.isStale(userID) {
|
2022-03-01 18:18:06 +01:00
|
|
|
t.Errorf("user %s not marked as stale", userID)
|
|
|
|
}
|
|
|
|
// now send the response over federation
|
|
|
|
fedCh <- &http.Response{
|
|
|
|
StatusCode: 200,
|
2022-08-05 11:26:59 +02:00
|
|
|
Body: io.NopCloser(strings.NewReader(`
|
2022-03-01 18:18:06 +01:00
|
|
|
{
|
|
|
|
"user_id": "` + userID + `",
|
|
|
|
"stream_id": 5,
|
|
|
|
"devices": [
|
|
|
|
{
|
|
|
|
"device_id": "JLAFKJWSCS",
|
|
|
|
"keys": ` + keyJSON + `,
|
|
|
|
"device_display_name": "Mobile Phone"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|
|
|
|
`)),
|
|
|
|
}
|
|
|
|
close(fedCh)
|
|
|
|
// wait until all 5 ManualUpdates return. If we hit federation again we won't send a response
|
|
|
|
// and should panic with read on a closed channel
|
|
|
|
wg.Wait()
|
|
|
|
|
|
|
|
// user is no longer stale now
|
2022-03-02 11:49:29 +01:00
|
|
|
if db.isStale(userID) {
|
2022-03-01 18:18:06 +01:00
|
|
|
t.Errorf("user %s is marked as stale", userID)
|
|
|
|
}
|
|
|
|
}
|
2022-12-12 08:20:59 +01:00
|
|
|
|
2023-02-20 14:58:03 +01:00
|
|
|
func mustCreateKeyserverDB(t *testing.T, dbType test.DBType) (storage.KeyDatabase, func()) {
|
2022-12-12 08:20:59 +01:00
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
connStr, clearDB := test.PrepareDBConnectionString(t, dbType)
|
2023-03-22 09:21:32 +01:00
|
|
|
cm := sqlutil.NewConnectionManager(nil, config.DatabaseOptions{})
|
2023-03-17 12:09:45 +01:00
|
|
|
db, err := storage.NewKeyDatabase(cm, &config.DatabaseOptions{ConnectionString: config.DataSource(connStr)})
|
2022-12-12 08:20:59 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return db, clearDB
|
|
|
|
}
|
|
|
|
|
|
|
|
type mockKeyserverRoomserverAPI struct {
|
|
|
|
leftUsers []string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *mockKeyserverRoomserverAPI) QueryLeftUsers(ctx context.Context, req *roomserver.QueryLeftUsersRequest, res *roomserver.QueryLeftUsersResponse) error {
|
|
|
|
res.LeftUsers = m.leftUsers
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestDeviceListUpdater_CleanUp(t *testing.T) {
|
|
|
|
processCtx := process.NewProcessContext()
|
|
|
|
|
|
|
|
alice := test.NewUser(t)
|
|
|
|
bob := test.NewUser(t)
|
|
|
|
|
|
|
|
// Bob is not joined to any of our rooms
|
|
|
|
rsAPI := &mockKeyserverRoomserverAPI{leftUsers: []string{bob.ID}}
|
|
|
|
|
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
db, clearDB := mustCreateKeyserverDB(t, dbType)
|
|
|
|
defer clearDB()
|
|
|
|
|
|
|
|
// This should not get deleted
|
|
|
|
if err := db.MarkDeviceListStale(processCtx.Context(), alice.ID, true); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// this one should get deleted
|
|
|
|
if err := db.MarkDeviceListStale(processCtx.Context(), bob.ID, true); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
updater := NewDeviceListUpdater(processCtx, db, nil,
|
|
|
|
nil, nil,
|
2023-11-09 08:43:27 +01:00
|
|
|
0, rsAPI, "test", caching.DisableMetrics, testIsBlacklistedOrBackingOff)
|
2022-12-12 08:20:59 +01:00
|
|
|
if err := updater.CleanUp(); err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// check that we still have Alice in our stale list
|
2023-04-19 16:50:33 +02:00
|
|
|
staleUsers, err := db.StaleDeviceLists(ctx, []spec.ServerName{"test"})
|
2022-12-12 08:20:59 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Error(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// There should only be Alice
|
|
|
|
wantCount := 1
|
|
|
|
if count := len(staleUsers); count != wantCount {
|
|
|
|
t.Fatalf("expected there to be %d stale device lists, got %d", wantCount, count)
|
|
|
|
}
|
|
|
|
|
|
|
|
if staleUsers[0] != alice.ID {
|
|
|
|
t.Fatalf("unexpected stale device list user: %s, want %s", staleUsers[0], alice.ID)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2023-10-23 11:09:05 +02:00
|
|
|
|
|
|
|
func Test_dedupeStateList(t *testing.T) {
|
|
|
|
alice := "@alice:localhost"
|
|
|
|
bob := "@bob:localhost"
|
|
|
|
charlie := "@charlie:notlocalhost"
|
|
|
|
invalidUserID := "iaminvalid:localhost"
|
|
|
|
|
|
|
|
tests := []struct {
|
|
|
|
name string
|
|
|
|
staleLists []string
|
|
|
|
want []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "empty stateLists",
|
|
|
|
staleLists: []string{},
|
|
|
|
want: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "single entry",
|
|
|
|
staleLists: []string{alice},
|
|
|
|
want: []string{alice},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "multiple entries without dupe servers",
|
|
|
|
staleLists: []string{alice, charlie},
|
|
|
|
want: []string{alice, charlie},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "multiple entries with dupe servers",
|
|
|
|
staleLists: []string{alice, bob, charlie},
|
|
|
|
want: []string{alice, charlie},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "list with invalid userID",
|
|
|
|
staleLists: []string{alice, bob, invalidUserID},
|
|
|
|
want: []string{alice},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
|
|
if got := dedupeStaleLists(tt.staleLists); !reflect.DeepEqual(got, tt.want) {
|
|
|
|
t.Errorf("dedupeStaleLists() = %v, want %v", got, tt.want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2023-11-09 08:43:27 +01:00
|
|
|
|
|
|
|
func TestDeviceListUpdaterIgnoreBlacklisted(t *testing.T) {
|
|
|
|
unreachableServer := spec.ServerName("notlocalhost")
|
|
|
|
|
|
|
|
updater := DeviceListUpdater{
|
|
|
|
workerChans: make([]chan spec.ServerName, 1),
|
|
|
|
isBlacklistedOrBackingOffFn: func(s spec.ServerName) (*statistics.ServerStatistics, error) {
|
|
|
|
switch s {
|
|
|
|
case unreachableServer:
|
|
|
|
return nil, &api2.FederationClientError{Blacklisted: true}
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
},
|
|
|
|
mu: &sync.Mutex{},
|
|
|
|
userIDToChanMu: &sync.Mutex{},
|
|
|
|
userIDToChan: make(map[string]chan bool),
|
|
|
|
userIDToMutex: make(map[string]*sync.Mutex),
|
|
|
|
}
|
|
|
|
workerCh := make(chan spec.ServerName)
|
|
|
|
defer close(workerCh)
|
|
|
|
updater.workerChans[0] = workerCh
|
|
|
|
|
|
|
|
// happy case
|
|
|
|
alice := "@alice:localhost"
|
|
|
|
aliceCh := updater.assignChannel(alice)
|
|
|
|
defer updater.clearChannel(alice)
|
|
|
|
|
|
|
|
// failing case
|
|
|
|
bob := "@bob:" + unreachableServer
|
|
|
|
bobCh := updater.assignChannel(string(bob))
|
|
|
|
defer updater.clearChannel(string(bob))
|
|
|
|
|
|
|
|
expectedServers := map[spec.ServerName]struct{}{
|
|
|
|
"localhost": {},
|
|
|
|
}
|
|
|
|
unexpectedServers := make(map[spec.ServerName]struct{})
|
|
|
|
|
|
|
|
go func() {
|
|
|
|
for serverName := range workerCh {
|
|
|
|
switch serverName {
|
|
|
|
case "localhost":
|
|
|
|
delete(expectedServers, serverName)
|
|
|
|
aliceCh <- true // unblock notifyWorkers
|
|
|
|
case unreachableServer: // this should not happen as it is "filtered" away by the blacklist
|
|
|
|
unexpectedServers[serverName] = struct{}{}
|
|
|
|
bobCh <- true
|
|
|
|
default:
|
|
|
|
unexpectedServers[serverName] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// alice is not blacklisted
|
|
|
|
updater.notifyWorkers(alice)
|
|
|
|
// bob is blacklisted
|
|
|
|
updater.notifyWorkers(string(bob))
|
|
|
|
|
|
|
|
for server := range expectedServers {
|
|
|
|
t.Errorf("Server still in expectedServers map: %s", server)
|
|
|
|
}
|
|
|
|
|
|
|
|
for server := range unexpectedServers {
|
|
|
|
t.Errorf("unexpected server in result: %s", server)
|
|
|
|
}
|
|
|
|
}
|