2023-01-23 18:55:12 +01:00
|
|
|
// Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package routing_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"encoding/json"
|
|
|
|
"net/http"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
|
|
"github.com/matrix-org/dendrite/relayapi/internal"
|
|
|
|
"github.com/matrix-org/dendrite/relayapi/routing"
|
|
|
|
"github.com/matrix-org/dendrite/relayapi/storage/shared"
|
|
|
|
"github.com/matrix-org/dendrite/test"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
2023-04-19 16:50:33 +02:00
|
|
|
"github.com/matrix-org/gomatrixserverlib/fclient"
|
|
|
|
"github.com/matrix-org/gomatrixserverlib/spec"
|
2023-01-23 18:55:12 +01:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2023-04-19 16:50:33 +02:00
|
|
|
testOrigin = spec.ServerName("kaer.morhen")
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func createTransaction() gomatrixserverlib.Transaction {
|
|
|
|
txn := gomatrixserverlib.Transaction{}
|
|
|
|
txn.PDUs = []json.RawMessage{
|
|
|
|
[]byte(`{"auth_events":[["$0ok8ynDp7kjc95e3:kaer.morhen",{"sha256":"sWCi6Ckp9rDimQON+MrUlNRkyfZ2tjbPbWfg2NMB18Q"}],["$LEwEu0kxrtu5fOiS:kaer.morhen",{"sha256":"1aKajq6DWHru1R1HJjvdWMEavkJJHGaTmPvfuERUXaA"}]],"content":{"body":"Test Message"},"depth":5,"event_id":"$gl2T9l3qm0kUbiIJ:kaer.morhen","hashes":{"sha256":"Qx3nRMHLDPSL5hBAzuX84FiSSP0K0Kju2iFoBWH4Za8"},"origin":"kaer.morhen","origin_server_ts":0,"prev_events":[["$UKNe10XzYzG0TeA9:kaer.morhen",{"sha256":"KtSRyMjt0ZSjsv2koixTRCxIRCGoOp6QrKscsW97XRo"}]],"room_id":"!roomid:kaer.morhen","sender":"@userid:kaer.morhen","signatures":{"kaer.morhen":{"ed25519:auto":"sqDgv3EG7ml5VREzmT9aZeBpS4gAPNIaIeJOwqjDhY0GPU/BcpX5wY4R7hYLrNe5cChgV+eFy/GWm1Zfg5FfDg"}},"type":"m.room.message"}`),
|
|
|
|
}
|
|
|
|
txn.Origin = testOrigin
|
|
|
|
return txn
|
|
|
|
}
|
|
|
|
|
|
|
|
func createFederationRequest(
|
2023-04-19 16:50:33 +02:00
|
|
|
userID spec.UserID,
|
2023-01-23 18:55:12 +01:00
|
|
|
txnID gomatrixserverlib.TransactionID,
|
2023-04-19 16:50:33 +02:00
|
|
|
origin spec.ServerName,
|
|
|
|
destination spec.ServerName,
|
2023-01-23 18:55:12 +01:00
|
|
|
content interface{},
|
2023-04-19 16:50:33 +02:00
|
|
|
) fclient.FederationRequest {
|
2023-01-23 18:55:12 +01:00
|
|
|
var federationPathPrefixV1 = "/_matrix/federation/v1"
|
|
|
|
path := federationPathPrefixV1 + "/send_relay/" + string(txnID) + "/" + userID.Raw()
|
2023-04-19 16:50:33 +02:00
|
|
|
request := fclient.NewFederationRequest("PUT", origin, destination, path)
|
2023-01-23 18:55:12 +01:00
|
|
|
request.SetContent(content)
|
|
|
|
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwardEmptyReturnsOk(t *testing.T) {
|
|
|
|
testDB := test.NewInMemoryRelayDatabase()
|
|
|
|
db := shared.Database{
|
|
|
|
Writer: sqlutil.NewDummyWriter(),
|
|
|
|
RelayQueue: testDB,
|
|
|
|
RelayQueueJSON: testDB,
|
|
|
|
}
|
|
|
|
httpReq := &http.Request{}
|
2023-04-19 16:50:33 +02:00
|
|
|
userID, err := spec.NewUserID("@local:domain", false)
|
2023-01-23 18:55:12 +01:00
|
|
|
assert.NoError(t, err, "Invalid userID")
|
|
|
|
|
|
|
|
txn := createTransaction()
|
|
|
|
request := createFederationRequest(*userID, txn.TransactionID, txn.Origin, txn.Destination, txn)
|
|
|
|
|
|
|
|
relayAPI := internal.NewRelayInternalAPI(
|
2023-01-29 20:26:16 +01:00
|
|
|
&db, nil, nil, nil, nil, false, "", true,
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
response := routing.SendTransactionToRelay(httpReq, &request, relayAPI, "1", *userID)
|
|
|
|
|
|
|
|
assert.Equal(t, 200, response.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwardBadJSONReturnsError(t *testing.T) {
|
|
|
|
testDB := test.NewInMemoryRelayDatabase()
|
|
|
|
db := shared.Database{
|
|
|
|
Writer: sqlutil.NewDummyWriter(),
|
|
|
|
RelayQueue: testDB,
|
|
|
|
RelayQueueJSON: testDB,
|
|
|
|
}
|
|
|
|
httpReq := &http.Request{}
|
2023-04-19 16:50:33 +02:00
|
|
|
userID, err := spec.NewUserID("@local:domain", false)
|
2023-01-23 18:55:12 +01:00
|
|
|
assert.NoError(t, err, "Invalid userID")
|
|
|
|
|
|
|
|
type BadData struct {
|
|
|
|
Field bool `json:"pdus"`
|
|
|
|
}
|
|
|
|
content := BadData{
|
|
|
|
Field: false,
|
|
|
|
}
|
|
|
|
txn := createTransaction()
|
|
|
|
request := createFederationRequest(*userID, txn.TransactionID, txn.Origin, txn.Destination, content)
|
|
|
|
|
|
|
|
relayAPI := internal.NewRelayInternalAPI(
|
2023-01-29 20:26:16 +01:00
|
|
|
&db, nil, nil, nil, nil, false, "", true,
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
response := routing.SendTransactionToRelay(httpReq, &request, relayAPI, "1", *userID)
|
|
|
|
|
|
|
|
assert.NotEqual(t, 200, response.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwardTooManyPDUsReturnsError(t *testing.T) {
|
|
|
|
testDB := test.NewInMemoryRelayDatabase()
|
|
|
|
db := shared.Database{
|
|
|
|
Writer: sqlutil.NewDummyWriter(),
|
|
|
|
RelayQueue: testDB,
|
|
|
|
RelayQueueJSON: testDB,
|
|
|
|
}
|
|
|
|
httpReq := &http.Request{}
|
2023-04-19 16:50:33 +02:00
|
|
|
userID, err := spec.NewUserID("@local:domain", false)
|
2023-01-23 18:55:12 +01:00
|
|
|
assert.NoError(t, err, "Invalid userID")
|
|
|
|
|
|
|
|
type BadData struct {
|
|
|
|
Field []json.RawMessage `json:"pdus"`
|
|
|
|
}
|
|
|
|
content := BadData{
|
|
|
|
Field: []json.RawMessage{},
|
|
|
|
}
|
|
|
|
for i := 0; i < 51; i++ {
|
|
|
|
content.Field = append(content.Field, []byte{})
|
|
|
|
}
|
|
|
|
assert.Greater(t, len(content.Field), 50)
|
|
|
|
|
|
|
|
txn := createTransaction()
|
|
|
|
request := createFederationRequest(*userID, txn.TransactionID, txn.Origin, txn.Destination, content)
|
|
|
|
|
|
|
|
relayAPI := internal.NewRelayInternalAPI(
|
2023-01-29 20:26:16 +01:00
|
|
|
&db, nil, nil, nil, nil, false, "", true,
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
response := routing.SendTransactionToRelay(httpReq, &request, relayAPI, "1", *userID)
|
|
|
|
|
|
|
|
assert.NotEqual(t, 200, response.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestForwardTooManyEDUsReturnsError(t *testing.T) {
|
|
|
|
testDB := test.NewInMemoryRelayDatabase()
|
|
|
|
db := shared.Database{
|
|
|
|
Writer: sqlutil.NewDummyWriter(),
|
|
|
|
RelayQueue: testDB,
|
|
|
|
RelayQueueJSON: testDB,
|
|
|
|
}
|
|
|
|
httpReq := &http.Request{}
|
2023-04-19 16:50:33 +02:00
|
|
|
userID, err := spec.NewUserID("@local:domain", false)
|
2023-01-23 18:55:12 +01:00
|
|
|
assert.NoError(t, err, "Invalid userID")
|
|
|
|
|
|
|
|
type BadData struct {
|
|
|
|
Field []gomatrixserverlib.EDU `json:"edus"`
|
|
|
|
}
|
|
|
|
content := BadData{
|
|
|
|
Field: []gomatrixserverlib.EDU{},
|
|
|
|
}
|
|
|
|
for i := 0; i < 101; i++ {
|
2023-04-19 16:50:33 +02:00
|
|
|
content.Field = append(content.Field, gomatrixserverlib.EDU{Type: spec.MTyping})
|
2023-01-23 18:55:12 +01:00
|
|
|
}
|
|
|
|
assert.Greater(t, len(content.Field), 100)
|
|
|
|
|
|
|
|
txn := createTransaction()
|
|
|
|
request := createFederationRequest(*userID, txn.TransactionID, txn.Origin, txn.Destination, content)
|
|
|
|
|
|
|
|
relayAPI := internal.NewRelayInternalAPI(
|
2023-01-29 20:26:16 +01:00
|
|
|
&db, nil, nil, nil, nil, false, "", true,
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
response := routing.SendTransactionToRelay(httpReq, &request, relayAPI, "1", *userID)
|
|
|
|
|
|
|
|
assert.NotEqual(t, 200, response.Code)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestUniqueTransactionStoredInDatabase(t *testing.T) {
|
|
|
|
testDB := test.NewInMemoryRelayDatabase()
|
|
|
|
db := shared.Database{
|
|
|
|
Writer: sqlutil.NewDummyWriter(),
|
|
|
|
RelayQueue: testDB,
|
|
|
|
RelayQueueJSON: testDB,
|
|
|
|
}
|
|
|
|
httpReq := &http.Request{}
|
2023-04-19 16:50:33 +02:00
|
|
|
userID, err := spec.NewUserID("@local:domain", false)
|
2023-01-23 18:55:12 +01:00
|
|
|
assert.NoError(t, err, "Invalid userID")
|
|
|
|
|
|
|
|
txn := createTransaction()
|
|
|
|
request := createFederationRequest(*userID, txn.TransactionID, txn.Origin, txn.Destination, txn)
|
|
|
|
|
|
|
|
relayAPI := internal.NewRelayInternalAPI(
|
2023-01-29 20:26:16 +01:00
|
|
|
&db, nil, nil, nil, nil, false, "", true,
|
2023-01-23 18:55:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
response := routing.SendTransactionToRelay(
|
|
|
|
httpReq, &request, relayAPI, txn.TransactionID, *userID)
|
|
|
|
transaction, _, err := db.GetTransaction(context.Background(), *userID)
|
|
|
|
assert.NoError(t, err, "Failed retrieving transaction")
|
|
|
|
|
|
|
|
transactionCount, err := db.GetTransactionCount(context.Background(), *userID)
|
|
|
|
assert.NoError(t, err, "Failed retrieving transaction count")
|
|
|
|
|
|
|
|
assert.Equal(t, 200, response.Code)
|
|
|
|
assert.Equal(t, int64(1), transactionCount)
|
|
|
|
assert.Equal(t, txn.TransactionID, transaction.TransactionID)
|
|
|
|
}
|