mirror of
				https://github.com/matrix-org/synapse.git
				synced 2025-11-04 06:07:23 +00:00 
			
		
		
		
	Add final type hint to tests.unittest. (#15072)
Adds a return type to HomeServerTestCase.make_homeserver and deal with any variables which are no longer Any.
This commit is contained in:
		
							parent
							
								
									119e0795a5
								
							
						
					
					
						commit
						42aea0d8af
					
				
							
								
								
									
										1
									
								
								changelog.d/15072.misc
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1
									
								
								changelog.d/15072.misc
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1 @@
 | 
			
		||||
Improve type hints.
 | 
			
		||||
							
								
								
									
										3
									
								
								mypy.ini
									
									
									
									
									
								
							
							
						
						
									
										3
									
								
								mypy.ini
									
									
									
									
									
								
							@ -56,9 +56,6 @@ disallow_untyped_defs = False
 | 
			
		||||
[mypy-synapse.storage.database]
 | 
			
		||||
disallow_untyped_defs = False
 | 
			
		||||
 | 
			
		||||
[mypy-tests.unittest]
 | 
			
		||||
disallow_untyped_defs = False
 | 
			
		||||
 | 
			
		||||
[mypy-tests.util.caches.test_descriptors]
 | 
			
		||||
disallow_untyped_defs = False
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -67,7 +67,9 @@ class FederationReaderOpenIDListenerTests(HomeserverTestCase):
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        # Listen with the config
 | 
			
		||||
        self.hs._listen_http(parse_listener_def(0, config))
 | 
			
		||||
        hs = self.hs
 | 
			
		||||
        assert isinstance(hs, GenericWorkerServer)
 | 
			
		||||
        hs._listen_http(parse_listener_def(0, config))
 | 
			
		||||
 | 
			
		||||
        # Grab the resource from the site that was told to listen
 | 
			
		||||
        site = self.reactor.tcpServers[0][1]
 | 
			
		||||
@ -115,7 +117,9 @@ class SynapseHomeserverOpenIDListenerTests(HomeserverTestCase):
 | 
			
		||||
        }
 | 
			
		||||
 | 
			
		||||
        # Listen with the config
 | 
			
		||||
        self.hs._listener_http(self.hs.config, parse_listener_def(0, config))
 | 
			
		||||
        hs = self.hs
 | 
			
		||||
        assert isinstance(hs, SynapseHomeServer)
 | 
			
		||||
        hs._listener_http(self.hs.config, parse_listener_def(0, config))
 | 
			
		||||
 | 
			
		||||
        # Grab the resource from the site that was told to listen
 | 
			
		||||
        site = self.reactor.tcpServers[0][1]
 | 
			
		||||
 | 
			
		||||
@ -192,7 +192,7 @@ class KeyringTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        key1 = signedjson.key.generate_signing_key("1")
 | 
			
		||||
        r = self.hs.get_datastores().main.store_server_verify_keys(
 | 
			
		||||
            "server9",
 | 
			
		||||
            time.time() * 1000,
 | 
			
		||||
            int(time.time() * 1000),
 | 
			
		||||
            [("server9", get_key_id(key1), FetchKeyResult(get_verify_key(key1), 1000))],
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(r)
 | 
			
		||||
@ -287,7 +287,7 @@ class KeyringTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        key1 = signedjson.key.generate_signing_key("1")
 | 
			
		||||
        r = self.hs.get_datastores().main.store_server_verify_keys(
 | 
			
		||||
            "server9",
 | 
			
		||||
            time.time() * 1000,
 | 
			
		||||
            int(time.time() * 1000),
 | 
			
		||||
            # None is not a valid value in FetchKeyResult, but we're abusing this
 | 
			
		||||
            # API to insert null values into the database. The nulls get converted
 | 
			
		||||
            # to 0 when fetched in KeyStore.get_server_verify_keys.
 | 
			
		||||
@ -466,9 +466,9 @@ class ServerKeyFetcherTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        key_json = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_server_keys_json([lookup_triplet])
 | 
			
		||||
        )
 | 
			
		||||
        res = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res), 1)
 | 
			
		||||
        res = res[0]
 | 
			
		||||
        res_keys = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res_keys), 1)
 | 
			
		||||
        res = res_keys[0]
 | 
			
		||||
        self.assertEqual(res["key_id"], testverifykey_id)
 | 
			
		||||
        self.assertEqual(res["from_server"], SERVER_NAME)
 | 
			
		||||
        self.assertEqual(res["ts_added_ms"], self.reactor.seconds() * 1000)
 | 
			
		||||
@ -584,9 +584,9 @@ class PerspectivesKeyFetcherTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        key_json = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_server_keys_json([lookup_triplet])
 | 
			
		||||
        )
 | 
			
		||||
        res = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res), 1)
 | 
			
		||||
        res = res[0]
 | 
			
		||||
        res_keys = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res_keys), 1)
 | 
			
		||||
        res = res_keys[0]
 | 
			
		||||
        self.assertEqual(res["key_id"], testverifykey_id)
 | 
			
		||||
        self.assertEqual(res["from_server"], self.mock_perspective_server.server_name)
 | 
			
		||||
        self.assertEqual(res["ts_added_ms"], self.reactor.seconds() * 1000)
 | 
			
		||||
@ -705,9 +705,9 @@ class PerspectivesKeyFetcherTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        key_json = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_server_keys_json([lookup_triplet])
 | 
			
		||||
        )
 | 
			
		||||
        res = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res), 1)
 | 
			
		||||
        res = res[0]
 | 
			
		||||
        res_keys = key_json[lookup_triplet]
 | 
			
		||||
        self.assertEqual(len(res_keys), 1)
 | 
			
		||||
        res = res_keys[0]
 | 
			
		||||
        self.assertEqual(res["key_id"], testverifykey_id)
 | 
			
		||||
        self.assertEqual(res["from_server"], self.mock_perspective_server.server_name)
 | 
			
		||||
        self.assertEqual(res["ts_added_ms"], self.reactor.seconds() * 1000)
 | 
			
		||||
 | 
			
		||||
@ -156,11 +156,11 @@ class PresenceRouterTestCase(FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
        # Mock out the calls over federation.
 | 
			
		||||
        fed_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        fed_transport_client.send_transaction = simple_async_mock({})
 | 
			
		||||
        self.fed_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        self.fed_transport_client.send_transaction = simple_async_mock({})
 | 
			
		||||
 | 
			
		||||
        hs = self.setup_test_homeserver(
 | 
			
		||||
            federation_transport_client=fed_transport_client,
 | 
			
		||||
            federation_transport_client=self.fed_transport_client,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        load_legacy_presence_router(hs)
 | 
			
		||||
@ -422,7 +422,7 @@ class PresenceRouterTestCase(FederatingHomeserverTestCase):
 | 
			
		||||
        #
 | 
			
		||||
        # Thus we reset the mock, and try sending all online local user
 | 
			
		||||
        # presence again
 | 
			
		||||
        self.hs.get_federation_transport_client().send_transaction.reset_mock()
 | 
			
		||||
        self.fed_transport_client.send_transaction.reset_mock()
 | 
			
		||||
 | 
			
		||||
        # Broadcast local user online presence
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -447,9 +447,7 @@ class PresenceRouterTestCase(FederatingHomeserverTestCase):
 | 
			
		||||
        }
 | 
			
		||||
        found_users = set()
 | 
			
		||||
 | 
			
		||||
        calls = (
 | 
			
		||||
            self.hs.get_federation_transport_client().send_transaction.call_args_list
 | 
			
		||||
        )
 | 
			
		||||
        calls = self.fed_transport_client.send_transaction.call_args_list
 | 
			
		||||
        for call in calls:
 | 
			
		||||
            call_args = call[0]
 | 
			
		||||
            federation_transaction: Transaction = call_args[0]
 | 
			
		||||
 | 
			
		||||
@ -17,7 +17,7 @@ from unittest.mock import Mock
 | 
			
		||||
from synapse.api.errors import Codes, SynapseError
 | 
			
		||||
from synapse.rest import admin
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
from synapse.types import JsonDict, UserID
 | 
			
		||||
from synapse.types import JsonDict, UserID, create_requester
 | 
			
		||||
 | 
			
		||||
from tests import unittest
 | 
			
		||||
from tests.test_utils import make_awaitable
 | 
			
		||||
@ -56,7 +56,11 @@ class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Artificially raise the complexity
 | 
			
		||||
        store = self.hs.get_datastores().main
 | 
			
		||||
        store.get_current_state_event_counts = lambda x: make_awaitable(500 * 1.23)
 | 
			
		||||
 | 
			
		||||
        async def get_current_state_event_counts(room_id: str) -> int:
 | 
			
		||||
            return int(500 * 1.23)
 | 
			
		||||
 | 
			
		||||
        store.get_current_state_event_counts = get_current_state_event_counts  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Get the room complexity again -- make sure it's our artificial value
 | 
			
		||||
        channel = self.make_signed_federation_request(
 | 
			
		||||
@ -75,12 +79,12 @@ class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Mock out some things, because we don't want to test the whole join
 | 
			
		||||
        fed_transport.client.get_json = Mock(return_value=make_awaitable({"v1": 9999}))
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(("", 1))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        d = handler._remote_join(
 | 
			
		||||
            None,
 | 
			
		||||
            create_requester(u1),
 | 
			
		||||
            ["other.example.com"],
 | 
			
		||||
            "roomid",
 | 
			
		||||
            UserID.from_string(u1),
 | 
			
		||||
@ -106,12 +110,12 @@ class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Mock out some things, because we don't want to test the whole join
 | 
			
		||||
        fed_transport.client.get_json = Mock(return_value=make_awaitable({"v1": 9999}))
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(("", 1))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        d = handler._remote_join(
 | 
			
		||||
            None,
 | 
			
		||||
            create_requester(u1),
 | 
			
		||||
            ["other.example.com"],
 | 
			
		||||
            "roomid",
 | 
			
		||||
            UserID.from_string(u1),
 | 
			
		||||
@ -144,17 +148,18 @@ class RoomComplexityTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Mock out some things, because we don't want to test the whole join
 | 
			
		||||
        fed_transport.client.get_json = Mock(return_value=make_awaitable(None))
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(("", 1))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # Artificially raise the complexity
 | 
			
		||||
        self.hs.get_datastores().main.get_current_state_event_counts = (
 | 
			
		||||
            lambda x: make_awaitable(600)
 | 
			
		||||
        )
 | 
			
		||||
        async def get_current_state_event_counts(room_id: str) -> int:
 | 
			
		||||
            return 600
 | 
			
		||||
 | 
			
		||||
        self.hs.get_datastores().main.get_current_state_event_counts = get_current_state_event_counts  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        d = handler._remote_join(
 | 
			
		||||
            None,
 | 
			
		||||
            create_requester(u1),
 | 
			
		||||
            ["other.example.com"],
 | 
			
		||||
            room_1,
 | 
			
		||||
            UserID.from_string(u1),
 | 
			
		||||
@ -200,12 +205,12 @@ class RoomComplexityAdminTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Mock out some things, because we don't want to test the whole join
 | 
			
		||||
        fed_transport.client.get_json = Mock(return_value=make_awaitable({"v1": 9999}))
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(("", 1))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        d = handler._remote_join(
 | 
			
		||||
            None,
 | 
			
		||||
            create_requester(u1),
 | 
			
		||||
            ["other.example.com"],
 | 
			
		||||
            "roomid",
 | 
			
		||||
            UserID.from_string(u1),
 | 
			
		||||
@ -230,12 +235,12 @@ class RoomComplexityAdminTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Mock out some things, because we don't want to test the whole join
 | 
			
		||||
        fed_transport.client.get_json = Mock(return_value=make_awaitable({"v1": 9999}))
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(
 | 
			
		||||
        handler.federation_handler.do_invite_join = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(("", 1))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        d = handler._remote_join(
 | 
			
		||||
            None,
 | 
			
		||||
            create_requester(u1),
 | 
			
		||||
            ["other.example.com"],
 | 
			
		||||
            "roomid",
 | 
			
		||||
            UserID.from_string(u1),
 | 
			
		||||
 | 
			
		||||
@ -5,7 +5,11 @@ from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
from synapse.api.constants import EventTypes
 | 
			
		||||
from synapse.events import EventBase
 | 
			
		||||
from synapse.federation.sender import PerDestinationQueue, TransactionManager
 | 
			
		||||
from synapse.federation.sender import (
 | 
			
		||||
    FederationSender,
 | 
			
		||||
    PerDestinationQueue,
 | 
			
		||||
    TransactionManager,
 | 
			
		||||
)
 | 
			
		||||
from synapse.federation.units import Edu, Transaction
 | 
			
		||||
from synapse.rest import admin
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
@ -33,8 +37,9 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
    ]
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
        self.federation_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        return self.setup_test_homeserver(
 | 
			
		||||
            federation_transport_client=Mock(spec=["send_transaction"]),
 | 
			
		||||
            federation_transport_client=self.federation_transport_client,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
			
		||||
@ -52,10 +57,14 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
        self.pdus: List[JsonDict] = []
 | 
			
		||||
        self.failed_pdus: List[JsonDict] = []
 | 
			
		||||
        self.is_online = True
 | 
			
		||||
        self.hs.get_federation_transport_client().send_transaction.side_effect = (
 | 
			
		||||
        self.federation_transport_client.send_transaction.side_effect = (
 | 
			
		||||
            self.record_transaction
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        federation_sender = hs.get_federation_sender()
 | 
			
		||||
        assert isinstance(federation_sender, FederationSender)
 | 
			
		||||
        self.federation_sender = federation_sender
 | 
			
		||||
 | 
			
		||||
    def default_config(self) -> JsonDict:
 | 
			
		||||
        config = super().default_config()
 | 
			
		||||
        config["federation_sender_instances"] = None
 | 
			
		||||
@ -229,11 +238,11 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
        # let's delete the federation transmission queue
 | 
			
		||||
        # (this pretends we are starting up fresh.)
 | 
			
		||||
        self.assertFalse(
 | 
			
		||||
            self.hs.get_federation_sender()
 | 
			
		||||
            ._per_destination_queues["host2"]
 | 
			
		||||
            .transmission_loop_running
 | 
			
		||||
            self.federation_sender._per_destination_queues[
 | 
			
		||||
                "host2"
 | 
			
		||||
            ].transmission_loop_running
 | 
			
		||||
        )
 | 
			
		||||
        del self.hs.get_federation_sender()._per_destination_queues["host2"]
 | 
			
		||||
        del self.federation_sender._per_destination_queues["host2"]
 | 
			
		||||
 | 
			
		||||
        # let's also clear any backoffs
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -322,6 +331,7 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
        # also fetch event 5 so we know its last_successful_stream_ordering later
 | 
			
		||||
        event_5 = self.get_success(self.hs.get_datastores().main.get_event(event_id_5))
 | 
			
		||||
 | 
			
		||||
        assert event_2.internal_metadata.stream_ordering is not None
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.set_destination_last_successful_stream_ordering(
 | 
			
		||||
                "host2", event_2.internal_metadata.stream_ordering
 | 
			
		||||
@ -425,15 +435,16 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
        def wake_destination_track(destination: str) -> None:
 | 
			
		||||
            woken.append(destination)
 | 
			
		||||
 | 
			
		||||
        self.hs.get_federation_sender().wake_destination = wake_destination_track
 | 
			
		||||
        self.federation_sender.wake_destination = wake_destination_track  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # cancel the pre-existing timer for _wake_destinations_needing_catchup
 | 
			
		||||
        # this is because we are calling it manually rather than waiting for it
 | 
			
		||||
        # to be called automatically
 | 
			
		||||
        self.hs.get_federation_sender()._catchup_after_startup_timer.cancel()
 | 
			
		||||
        assert self.federation_sender._catchup_after_startup_timer is not None
 | 
			
		||||
        self.federation_sender._catchup_after_startup_timer.cancel()
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_federation_sender()._wake_destinations_needing_catchup(), by=5.0
 | 
			
		||||
            self.federation_sender._wake_destinations_needing_catchup(), by=5.0
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # ASSERT (_wake_destinations_needing_catchup):
 | 
			
		||||
@ -475,6 +486,7 @@ class FederationCatchUpTestCases(FederatingHomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        assert event_1.internal_metadata.stream_ordering is not None
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.set_destination_last_successful_stream_ordering(
 | 
			
		||||
                "host2", event_1.internal_metadata.stream_ordering
 | 
			
		||||
 | 
			
		||||
@ -178,7 +178,7 @@ class FederationClientTest(FederatingHomeserverTestCase):
 | 
			
		||||
                RoomVersions.V9,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertIsNotNone(pulled_pdu_info2)
 | 
			
		||||
        assert pulled_pdu_info2 is not None
 | 
			
		||||
        remote_pdu2 = pulled_pdu_info2.pdu
 | 
			
		||||
 | 
			
		||||
        # Sanity check that we are working against the same event
 | 
			
		||||
@ -226,7 +226,7 @@ class FederationClientTest(FederatingHomeserverTestCase):
 | 
			
		||||
                RoomVersions.V9,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertIsNotNone(pulled_pdu_info)
 | 
			
		||||
        assert pulled_pdu_info is not None
 | 
			
		||||
        remote_pdu = pulled_pdu_info.pdu
 | 
			
		||||
 | 
			
		||||
        # check the right call got made to the agent
 | 
			
		||||
 | 
			
		||||
@ -22,6 +22,7 @@ from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
from synapse.api.constants import EduTypes, RoomEncryptionAlgorithms
 | 
			
		||||
from synapse.federation.units import Transaction
 | 
			
		||||
from synapse.handlers.device import DeviceHandler
 | 
			
		||||
from synapse.rest import admin
 | 
			
		||||
from synapse.rest.client import login
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
@ -41,8 +42,9 @@ class FederationSenderReceiptsTestCases(HomeserverTestCase):
 | 
			
		||||
    """
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
        self.federation_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        hs = self.setup_test_homeserver(
 | 
			
		||||
            federation_transport_client=Mock(spec=["send_transaction"]),
 | 
			
		||||
            federation_transport_client=self.federation_transport_client,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        hs.get_storage_controllers().state.get_current_hosts_in_room = Mock(  # type: ignore[assignment]
 | 
			
		||||
@ -61,9 +63,7 @@ class FederationSenderReceiptsTestCases(HomeserverTestCase):
 | 
			
		||||
        return config
 | 
			
		||||
 | 
			
		||||
    def test_send_receipts(self) -> None:
 | 
			
		||||
        mock_send_transaction = (
 | 
			
		||||
            self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        )
 | 
			
		||||
        mock_send_transaction = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_transaction.return_value = make_awaitable({})
 | 
			
		||||
 | 
			
		||||
        sender = self.hs.get_federation_sender()
 | 
			
		||||
@ -103,9 +103,7 @@ class FederationSenderReceiptsTestCases(HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
    def test_send_receipts_thread(self) -> None:
 | 
			
		||||
        mock_send_transaction = (
 | 
			
		||||
            self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        )
 | 
			
		||||
        mock_send_transaction = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_transaction.return_value = make_awaitable({})
 | 
			
		||||
 | 
			
		||||
        # Create receipts for:
 | 
			
		||||
@ -181,9 +179,7 @@ class FederationSenderReceiptsTestCases(HomeserverTestCase):
 | 
			
		||||
    def test_send_receipts_with_backoff(self) -> None:
 | 
			
		||||
        """Send two receipts in quick succession; the second should be flushed, but
 | 
			
		||||
        only after 20ms"""
 | 
			
		||||
        mock_send_transaction = (
 | 
			
		||||
            self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        )
 | 
			
		||||
        mock_send_transaction = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_transaction.return_value = make_awaitable({})
 | 
			
		||||
 | 
			
		||||
        sender = self.hs.get_federation_sender()
 | 
			
		||||
@ -277,10 +273,11 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
    ]
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
        self.federation_transport_client = Mock(
 | 
			
		||||
            spec=["send_transaction", "query_user_devices"]
 | 
			
		||||
        )
 | 
			
		||||
        return self.setup_test_homeserver(
 | 
			
		||||
            federation_transport_client=Mock(
 | 
			
		||||
                spec=["send_transaction", "query_user_devices"]
 | 
			
		||||
            ),
 | 
			
		||||
            federation_transport_client=self.federation_transport_client,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
    def default_config(self) -> JsonDict:
 | 
			
		||||
@ -310,9 +307,13 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        hs.get_datastores().main.get_current_hosts_in_room = get_current_hosts_in_room  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        device_handler = hs.get_device_handler()
 | 
			
		||||
        assert isinstance(device_handler, DeviceHandler)
 | 
			
		||||
        self.device_handler = device_handler
 | 
			
		||||
 | 
			
		||||
        # whenever send_transaction is called, record the edu data
 | 
			
		||||
        self.edus: List[JsonDict] = []
 | 
			
		||||
        self.hs.get_federation_transport_client().send_transaction.side_effect = (
 | 
			
		||||
        self.federation_transport_client.send_transaction.side_effect = (
 | 
			
		||||
            self.record_transaction
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -353,7 +354,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Send the server a device list EDU for the other user, this will cause
 | 
			
		||||
        # it to try and resync the device lists.
 | 
			
		||||
        self.hs.get_federation_transport_client().query_user_devices.return_value = (
 | 
			
		||||
        self.federation_transport_client.query_user_devices.return_value = (
 | 
			
		||||
            make_awaitable(
 | 
			
		||||
                {
 | 
			
		||||
                    "stream_id": "1",
 | 
			
		||||
@ -364,7 +365,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_device_handler().device_list_updater.incoming_device_list_update(
 | 
			
		||||
            self.device_handler.device_list_updater.incoming_device_list_update(
 | 
			
		||||
                "host2",
 | 
			
		||||
                {
 | 
			
		||||
                    "user_id": "@user2:host2",
 | 
			
		||||
@ -507,9 +508,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        stream_id = self.check_device_update_edu(self.edus.pop(0), u1, "D3", stream_id)
 | 
			
		||||
 | 
			
		||||
        # delete them again
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
 | 
			
		||||
 | 
			
		||||
        # We queue up device list updates to be sent over federation, so we
 | 
			
		||||
        # advance to clear the queue.
 | 
			
		||||
@ -533,7 +532,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        """If the destination server is unreachable, all the updates should get sent on
 | 
			
		||||
        recovery
 | 
			
		||||
        """
 | 
			
		||||
        mock_send_txn = self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        mock_send_txn = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_txn.side_effect = lambda t, cb: defer.fail(AssertionError("fail"))
 | 
			
		||||
 | 
			
		||||
        # create devices
 | 
			
		||||
@ -543,9 +542,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        self.login("user", "pass", device_id="D3")
 | 
			
		||||
 | 
			
		||||
        # delete them again
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
 | 
			
		||||
 | 
			
		||||
        # We queue up device list updates to be sent over federation, so we
 | 
			
		||||
        # advance to clear the queue.
 | 
			
		||||
@ -580,7 +577,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        This case tests the behaviour when the server has never been reachable.
 | 
			
		||||
        """
 | 
			
		||||
        mock_send_txn = self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        mock_send_txn = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_txn.side_effect = lambda t, cb: defer.fail(AssertionError("fail"))
 | 
			
		||||
 | 
			
		||||
        # create devices
 | 
			
		||||
@ -590,9 +587,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        self.login("user", "pass", device_id="D3")
 | 
			
		||||
 | 
			
		||||
        # delete them again
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
 | 
			
		||||
 | 
			
		||||
        # We queue up device list updates to be sent over federation, so we
 | 
			
		||||
        # advance to clear the queue.
 | 
			
		||||
@ -640,7 +635,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        self.check_device_update_edu(self.edus.pop(0), u1, "D1", None)
 | 
			
		||||
 | 
			
		||||
        # now the server goes offline
 | 
			
		||||
        mock_send_txn = self.hs.get_federation_transport_client().send_transaction
 | 
			
		||||
        mock_send_txn = self.federation_transport_client.send_transaction
 | 
			
		||||
        mock_send_txn.side_effect = lambda t, cb: defer.fail(AssertionError("fail"))
 | 
			
		||||
 | 
			
		||||
        self.login("user", "pass", device_id="D2")
 | 
			
		||||
@ -651,9 +646,7 @@ class FederationSenderDevicesTestCases(HomeserverTestCase):
 | 
			
		||||
        self.reactor.advance(1)
 | 
			
		||||
 | 
			
		||||
        # delete them again
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_device_handler().delete_devices(u1, ["D1", "D2", "D3"])
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self.device_handler.delete_devices(u1, ["D1", "D2", "D3"]))
 | 
			
		||||
 | 
			
		||||
        self.assertGreaterEqual(mock_send_txn.call_count, 3)
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -899,7 +899,7 @@ class ApplicationServicesHandlerDeviceListsTestCase(unittest.HomeserverTestCase)
 | 
			
		||||
 | 
			
		||||
        # Mock out application services, and allow defining our own in tests
 | 
			
		||||
        self._services: List[ApplicationService] = []
 | 
			
		||||
        self.hs.get_datastores().main.get_app_services = Mock(
 | 
			
		||||
        self.hs.get_datastores().main.get_app_services = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=self._services
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -61,7 +61,7 @@ class CasHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        cas_response = CasResponse("test_user", {})
 | 
			
		||||
        request = _mock_request()
 | 
			
		||||
@ -89,7 +89,7 @@ class CasHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Map a user via SSO.
 | 
			
		||||
        cas_response = CasResponse("test_user", {})
 | 
			
		||||
@ -129,7 +129,7 @@ class CasHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        cas_response = CasResponse("föö", {})
 | 
			
		||||
        request = _mock_request()
 | 
			
		||||
@ -160,7 +160,7 @@ class CasHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # The response doesn't have the proper userGroup or department.
 | 
			
		||||
        cas_response = CasResponse("test_user", {})
 | 
			
		||||
 | 
			
		||||
@ -23,6 +23,7 @@ from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
from synapse.api.constants import RoomEncryptionAlgorithms
 | 
			
		||||
from synapse.api.errors import Codes, SynapseError
 | 
			
		||||
from synapse.handlers.device import DeviceHandler
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
from synapse.types import JsonDict
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
@ -187,37 +188,37 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # we should now have an unused alg1 key
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        fallback_res = self.get_success(
 | 
			
		||||
            self.store.get_e2e_unused_fallback_key_types(local_user, device_id)
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(res, ["alg1"])
 | 
			
		||||
        self.assertEqual(fallback_res, ["alg1"])
 | 
			
		||||
 | 
			
		||||
        # claiming an OTK when no OTKs are available should return the fallback
 | 
			
		||||
        # key
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        claim_res = self.get_success(
 | 
			
		||||
            self.handler.claim_one_time_keys(
 | 
			
		||||
                {"one_time_keys": {local_user: {device_id: "alg1"}}}, timeout=None
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            res,
 | 
			
		||||
            claim_res,
 | 
			
		||||
            {"failures": {}, "one_time_keys": {local_user: {device_id: fallback_key}}},
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # we shouldn't have any unused fallback keys again
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        unused_res = self.get_success(
 | 
			
		||||
            self.store.get_e2e_unused_fallback_key_types(local_user, device_id)
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(res, [])
 | 
			
		||||
        self.assertEqual(unused_res, [])
 | 
			
		||||
 | 
			
		||||
        # claiming an OTK again should return the same fallback key
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        claim_res = self.get_success(
 | 
			
		||||
            self.handler.claim_one_time_keys(
 | 
			
		||||
                {"one_time_keys": {local_user: {device_id: "alg1"}}}, timeout=None
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            res,
 | 
			
		||||
            claim_res,
 | 
			
		||||
            {"failures": {}, "one_time_keys": {local_user: {device_id: fallback_key}}},
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -231,10 +232,10 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        unused_res = self.get_success(
 | 
			
		||||
            self.store.get_e2e_unused_fallback_key_types(local_user, device_id)
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(res, [])
 | 
			
		||||
        self.assertEqual(unused_res, [])
 | 
			
		||||
 | 
			
		||||
        # uploading a new fallback key should result in an unused fallback key
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -245,10 +246,10 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        unused_res = self.get_success(
 | 
			
		||||
            self.store.get_e2e_unused_fallback_key_types(local_user, device_id)
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(res, ["alg1"])
 | 
			
		||||
        self.assertEqual(unused_res, ["alg1"])
 | 
			
		||||
 | 
			
		||||
        # if the user uploads a one-time key, the next claim should fetch the
 | 
			
		||||
        # one-time key, and then go back to the fallback
 | 
			
		||||
@ -258,23 +259,23 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        claim_res = self.get_success(
 | 
			
		||||
            self.handler.claim_one_time_keys(
 | 
			
		||||
                {"one_time_keys": {local_user: {device_id: "alg1"}}}, timeout=None
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            res,
 | 
			
		||||
            claim_res,
 | 
			
		||||
            {"failures": {}, "one_time_keys": {local_user: {device_id: otk}}},
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        claim_res = self.get_success(
 | 
			
		||||
            self.handler.claim_one_time_keys(
 | 
			
		||||
                {"one_time_keys": {local_user: {device_id: "alg1"}}}, timeout=None
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            res,
 | 
			
		||||
            claim_res,
 | 
			
		||||
            {"failures": {}, "one_time_keys": {local_user: {device_id: fallback_key2}}},
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -287,13 +288,13 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
        claim_res = self.get_success(
 | 
			
		||||
            self.handler.claim_one_time_keys(
 | 
			
		||||
                {"one_time_keys": {local_user: {device_id: "alg1"}}}, timeout=None
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            res,
 | 
			
		||||
            claim_res,
 | 
			
		||||
            {"failures": {}, "one_time_keys": {local_user: {device_id: fallback_key3}}},
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -366,7 +367,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.get_success(self.handler.upload_signing_keys_for_user(local_user, keys1))
 | 
			
		||||
 | 
			
		||||
        # upload two device keys, which will be signed later by the self-signing key
 | 
			
		||||
        device_key_1 = {
 | 
			
		||||
        device_key_1: JsonDict = {
 | 
			
		||||
            "user_id": local_user,
 | 
			
		||||
            "device_id": "abc",
 | 
			
		||||
            "algorithms": [
 | 
			
		||||
@ -379,7 +380,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            },
 | 
			
		||||
            "signatures": {local_user: {"ed25519:abc": "base64+signature"}},
 | 
			
		||||
        }
 | 
			
		||||
        device_key_2 = {
 | 
			
		||||
        device_key_2: JsonDict = {
 | 
			
		||||
            "user_id": local_user,
 | 
			
		||||
            "device_id": "def",
 | 
			
		||||
            "algorithms": [
 | 
			
		||||
@ -451,8 +452,10 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        }
 | 
			
		||||
        self.get_success(self.handler.upload_signing_keys_for_user(local_user, keys1))
 | 
			
		||||
 | 
			
		||||
        device_handler = self.hs.get_device_handler()
 | 
			
		||||
        assert isinstance(device_handler, DeviceHandler)
 | 
			
		||||
        e = self.get_failure(
 | 
			
		||||
            self.hs.get_device_handler().check_device_registered(
 | 
			
		||||
            device_handler.check_device_registered(
 | 
			
		||||
                user_id=local_user,
 | 
			
		||||
                device_id="nqOvzeuGWT/sRx3h7+MHoInYj3Uk2LD/unI9kDYcHwk",
 | 
			
		||||
                initial_device_display_name="new display name",
 | 
			
		||||
@ -475,7 +478,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        device_id = "xyz"
 | 
			
		||||
        # private key: OMkooTr76ega06xNvXIGPbgvvxAOzmQncN8VObS7aBA
 | 
			
		||||
        device_pubkey = "NnHhnqiMFQkq969szYkooLaBAXW244ZOxgukCvm2ZeY"
 | 
			
		||||
        device_key = {
 | 
			
		||||
        device_key: JsonDict = {
 | 
			
		||||
            "user_id": local_user,
 | 
			
		||||
            "device_id": device_id,
 | 
			
		||||
            "algorithms": [
 | 
			
		||||
@ -497,7 +500,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # private key: 2lonYOM6xYKdEsO+6KrC766xBcHnYnim1x/4LFGF8B0
 | 
			
		||||
        master_pubkey = "nqOvzeuGWT/sRx3h7+MHoInYj3Uk2LD/unI9kDYcHwk"
 | 
			
		||||
        master_key = {
 | 
			
		||||
        master_key: JsonDict = {
 | 
			
		||||
            "user_id": local_user,
 | 
			
		||||
            "usage": ["master"],
 | 
			
		||||
            "keys": {"ed25519:" + master_pubkey: master_pubkey},
 | 
			
		||||
@ -540,7 +543,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # the first user
 | 
			
		||||
        other_user = "@otherboris:" + self.hs.hostname
 | 
			
		||||
        other_master_pubkey = "fHZ3NPiKxoLQm5OoZbKa99SYxprOjNs4TwJUKP+twCM"
 | 
			
		||||
        other_master_key = {
 | 
			
		||||
        other_master_key: JsonDict = {
 | 
			
		||||
            # private key: oyw2ZUx0O4GifbfFYM0nQvj9CL0b8B7cyN4FprtK8OI
 | 
			
		||||
            "user_id": other_user,
 | 
			
		||||
            "usage": ["master"],
 | 
			
		||||
@ -702,7 +705,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        remote_master_key = "85T7JXPFBAySB/jwby4S3lBPTqY3+Zg53nYuGmu1ggY"
 | 
			
		||||
        remote_self_signing_key = "QeIiFEjluPBtI7WQdG365QKZcFs9kqmHir6RBD0//nQ"
 | 
			
		||||
 | 
			
		||||
        self.hs.get_federation_client().query_client_keys = mock.Mock(
 | 
			
		||||
        self.hs.get_federation_client().query_client_keys = mock.Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(
 | 
			
		||||
                {
 | 
			
		||||
                    "device_keys": {remote_user_id: {}},
 | 
			
		||||
@ -782,7 +785,7 @@ class E2eKeysHandlerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        remote_master_key = "85T7JXPFBAySB/jwby4S3lBPTqY3+Zg53nYuGmu1ggY"
 | 
			
		||||
        remote_self_signing_key = "QeIiFEjluPBtI7WQdG365QKZcFs9kqmHir6RBD0//nQ"
 | 
			
		||||
 | 
			
		||||
        self.hs.get_federation_client().query_user_devices = mock.Mock(
 | 
			
		||||
        self.hs.get_federation_client().query_user_devices = mock.Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(
 | 
			
		||||
                {
 | 
			
		||||
                    "user_id": remote_user_id,
 | 
			
		||||
 | 
			
		||||
@ -371,14 +371,14 @@ class FederationTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
        # We mock out the FederationClient.backfill method, to pretend that a remote
 | 
			
		||||
        # server has returned our fake event.
 | 
			
		||||
        federation_client_backfill_mock = Mock(return_value=make_awaitable([event]))
 | 
			
		||||
        self.hs.get_federation_client().backfill = federation_client_backfill_mock
 | 
			
		||||
        self.hs.get_federation_client().backfill = federation_client_backfill_mock  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # We also mock the persist method with a side effect of itself. This allows us
 | 
			
		||||
        # to track when it has been called while preserving its function.
 | 
			
		||||
        persist_events_and_notify_mock = Mock(
 | 
			
		||||
            side_effect=self.hs.get_federation_event_handler().persist_events_and_notify
 | 
			
		||||
        )
 | 
			
		||||
        self.hs.get_federation_event_handler().persist_events_and_notify = (
 | 
			
		||||
        self.hs.get_federation_event_handler().persist_events_and_notify = (  # type: ignore[assignment]
 | 
			
		||||
            persist_events_and_notify_mock
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -712,12 +712,12 @@ class PartialJoinTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
            fed_handler, "_sync_partial_state_room", mock_sync_partial_state_room
 | 
			
		||||
        ), patch.object(store, "is_partial_state_room", mock_is_partial_state_room):
 | 
			
		||||
            # Start the partial state sync.
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 1)
 | 
			
		||||
 | 
			
		||||
            # Try to start another partial state sync.
 | 
			
		||||
            # Nothing should happen.
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 1)
 | 
			
		||||
 | 
			
		||||
            # End the partial state sync
 | 
			
		||||
@ -729,7 +729,7 @@ class PartialJoinTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
            # The next attempt to start the partial state sync should work.
 | 
			
		||||
            is_partial_state = True
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 2)
 | 
			
		||||
 | 
			
		||||
    def test_partial_state_room_sync_restart(self) -> None:
 | 
			
		||||
@ -764,7 +764,7 @@ class PartialJoinTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
            fed_handler, "_sync_partial_state_room", mock_sync_partial_state_room
 | 
			
		||||
        ), patch.object(store, "is_partial_state_room", mock_is_partial_state_room):
 | 
			
		||||
            # Start the partial state sync.
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 1)
 | 
			
		||||
 | 
			
		||||
            # Fail the partial state sync.
 | 
			
		||||
@ -773,11 +773,11 @@ class PartialJoinTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 1)
 | 
			
		||||
 | 
			
		||||
            # Start the partial state sync again.
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs1", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 2)
 | 
			
		||||
 | 
			
		||||
            # Deduplicate another partial state sync.
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", ["hs2"], "room_id")
 | 
			
		||||
            fed_handler._start_partial_state_room_sync("hs3", {"hs2"}, "room_id")
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 2)
 | 
			
		||||
 | 
			
		||||
            # Fail the partial state sync.
 | 
			
		||||
@ -786,6 +786,6 @@ class PartialJoinTestCase(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
            self.assertEqual(mock_sync_partial_state_room.call_count, 3)
 | 
			
		||||
            mock_sync_partial_state_room.assert_called_with(
 | 
			
		||||
                initial_destination="hs3",
 | 
			
		||||
                other_destinations=["hs2"],
 | 
			
		||||
                other_destinations={"hs2"},
 | 
			
		||||
                room_id="room_id",
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
@ -29,6 +29,7 @@ from synapse.logging.context import LoggingContext
 | 
			
		||||
from synapse.rest import admin
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
from synapse.state import StateResolutionStore
 | 
			
		||||
from synapse.state.v2 import _mainline_sort, _reverse_topological_power_sort
 | 
			
		||||
from synapse.types import JsonDict
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
@ -161,6 +162,7 @@ class FederationEventHandlerTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
        if prev_exists_as_outlier:
 | 
			
		||||
            prev_event.internal_metadata.outlier = True
 | 
			
		||||
            persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
            assert persistence is not None
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                persistence.persist_event(
 | 
			
		||||
                    prev_event,
 | 
			
		||||
@ -861,7 +863,7 @@ class FederationEventHandlerTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
                        bert_member_event.event_id: bert_member_event,
 | 
			
		||||
                        rejected_kick_event.event_id: rejected_kick_event,
 | 
			
		||||
                    },
 | 
			
		||||
                    state_res_store=main_store,
 | 
			
		||||
                    state_res_store=StateResolutionStore(main_store),
 | 
			
		||||
                )
 | 
			
		||||
            ),
 | 
			
		||||
            [bert_member_event.event_id, rejected_kick_event.event_id],
 | 
			
		||||
@ -906,7 +908,7 @@ class FederationEventHandlerTests(unittest.FederatingHomeserverTestCase):
 | 
			
		||||
                        rejected_power_levels_event.event_id,
 | 
			
		||||
                    ],
 | 
			
		||||
                    event_map={},
 | 
			
		||||
                    state_res_store=main_store,
 | 
			
		||||
                    state_res_store=StateResolutionStore(main_store),
 | 
			
		||||
                    full_conflicted_set=set(),
 | 
			
		||||
                )
 | 
			
		||||
            ),
 | 
			
		||||
 | 
			
		||||
@ -41,20 +41,21 @@ class EventCreationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
			
		||||
        self.handler = self.hs.get_event_creation_handler()
 | 
			
		||||
        self._persist_event_storage_controller = (
 | 
			
		||||
            self.hs.get_storage_controllers().persistence
 | 
			
		||||
        )
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self._persist_event_storage_controller = persistence
 | 
			
		||||
 | 
			
		||||
        self.user_id = self.register_user("tester", "foobar")
 | 
			
		||||
        self.access_token = self.login("tester", "foobar")
 | 
			
		||||
        self.room_id = self.helper.create_room_as(self.user_id, tok=self.access_token)
 | 
			
		||||
 | 
			
		||||
        self.info = self.get_success(
 | 
			
		||||
        info = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(
 | 
			
		||||
                self.access_token,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.token_id = self.info.token_id
 | 
			
		||||
        assert info is not None
 | 
			
		||||
        self.token_id = info.token_id
 | 
			
		||||
 | 
			
		||||
        self.requester = create_requester(self.user_id, access_token_id=self.token_id)
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -852,7 +852,7 @@ class PasswordAuthProviderTests(unittest.HomeserverTestCase):
 | 
			
		||||
            username: The username to use for the test.
 | 
			
		||||
            registration: Whether to test with registration URLs.
 | 
			
		||||
        """
 | 
			
		||||
        self.hs.get_identity_handler().send_threepid_validation = Mock(
 | 
			
		||||
        self.hs.get_identity_handler().send_threepid_validation = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(0),
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -203,7 +203,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    @override_config({"limit_usage_by_mau": True})
 | 
			
		||||
    def test_get_or_create_user_mau_not_blocked(self) -> None:
 | 
			
		||||
        self.store.count_monthly_users = Mock(
 | 
			
		||||
        self.store.count_monthly_users = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(self.hs.config.server.max_mau_value - 1)
 | 
			
		||||
        )
 | 
			
		||||
        # Ensure does not throw exception
 | 
			
		||||
@ -304,7 +304,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
    def test_auto_create_auto_join_rooms_when_user_is_the_first_real_user(self) -> None:
 | 
			
		||||
        room_alias_str = "#room:test"
 | 
			
		||||
 | 
			
		||||
        self.store.count_real_users = Mock(return_value=make_awaitable(1))
 | 
			
		||||
        self.store.count_real_users = Mock(return_value=make_awaitable(1))  # type: ignore[assignment]
 | 
			
		||||
        self.store.is_real_user = Mock(return_value=make_awaitable(True))
 | 
			
		||||
        user_id = self.get_success(self.handler.register_user(localpart="real"))
 | 
			
		||||
        rooms = self.get_success(self.store.get_rooms_for_user(user_id))
 | 
			
		||||
@ -319,7 +319,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
    def test_auto_create_auto_join_rooms_when_user_is_not_the_first_real_user(
 | 
			
		||||
        self,
 | 
			
		||||
    ) -> None:
 | 
			
		||||
        self.store.count_real_users = Mock(return_value=make_awaitable(2))
 | 
			
		||||
        self.store.count_real_users = Mock(return_value=make_awaitable(2))  # type: ignore[assignment]
 | 
			
		||||
        self.store.is_real_user = Mock(return_value=make_awaitable(True))
 | 
			
		||||
        user_id = self.get_success(self.handler.register_user(localpart="real"))
 | 
			
		||||
        rooms = self.get_success(self.store.get_rooms_for_user(user_id))
 | 
			
		||||
@ -346,6 +346,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Ensure the room is properly not federated.
 | 
			
		||||
        room = self.get_success(self.store.get_room_with_stats(room_id["room_id"]))
 | 
			
		||||
        assert room is not None
 | 
			
		||||
        self.assertFalse(room["federatable"])
 | 
			
		||||
        self.assertFalse(room["public"])
 | 
			
		||||
        self.assertEqual(room["join_rules"], "public")
 | 
			
		||||
@ -375,6 +376,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Ensure the room is properly a public room.
 | 
			
		||||
        room = self.get_success(self.store.get_room_with_stats(room_id["room_id"]))
 | 
			
		||||
        assert room is not None
 | 
			
		||||
        self.assertEqual(room["join_rules"], "public")
 | 
			
		||||
 | 
			
		||||
        # Both users should be in the room.
 | 
			
		||||
@ -413,6 +415,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Ensure the room is properly a private room.
 | 
			
		||||
        room = self.get_success(self.store.get_room_with_stats(room_id["room_id"]))
 | 
			
		||||
        assert room is not None
 | 
			
		||||
        self.assertFalse(room["public"])
 | 
			
		||||
        self.assertEqual(room["join_rules"], "invite")
 | 
			
		||||
        self.assertEqual(room["guest_access"], "can_join")
 | 
			
		||||
@ -456,6 +459,7 @@ class RegistrationTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Ensure the room is properly a private room.
 | 
			
		||||
        room = self.get_success(self.store.get_room_with_stats(room_id["room_id"]))
 | 
			
		||||
        assert room is not None
 | 
			
		||||
        self.assertFalse(room["public"])
 | 
			
		||||
        self.assertEqual(room["join_rules"], "invite")
 | 
			
		||||
        self.assertEqual(room["guest_access"], "can_join")
 | 
			
		||||
 | 
			
		||||
@ -134,7 +134,7 @@ class SamlHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # send a mocked-up SAML response to the callback
 | 
			
		||||
        saml_response = FakeAuthnResponse({"uid": "test_user", "username": "test_user"})
 | 
			
		||||
@ -164,7 +164,7 @@ class SamlHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Map a user via SSO.
 | 
			
		||||
        saml_response = FakeAuthnResponse(
 | 
			
		||||
@ -206,11 +206,11 @@ class SamlHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # mock out the error renderer too
 | 
			
		||||
        sso_handler = self.hs.get_sso_handler()
 | 
			
		||||
        sso_handler.render_error = Mock(return_value=None)
 | 
			
		||||
        sso_handler.render_error = Mock(return_value=None)  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        saml_response = FakeAuthnResponse({"uid": "test", "username": "föö"})
 | 
			
		||||
        request = _mock_request()
 | 
			
		||||
@ -227,9 +227,9 @@ class SamlHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler and error renderer
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
        sso_handler = self.hs.get_sso_handler()
 | 
			
		||||
        sso_handler.render_error = Mock(return_value=None)
 | 
			
		||||
        sso_handler.render_error = Mock(return_value=None)  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # register a user to occupy the first-choice MXID
 | 
			
		||||
        store = self.hs.get_datastores().main
 | 
			
		||||
@ -312,7 +312,7 @@ class SamlHandlerTestCase(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # stub out the auth handler
 | 
			
		||||
        auth_handler = self.hs.get_auth_handler()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()
 | 
			
		||||
        auth_handler.complete_sso_login = simple_async_mock()  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # The response doesn't have the proper userGroup or department.
 | 
			
		||||
        saml_response = FakeAuthnResponse({"uid": "test_user", "username": "test_user"})
 | 
			
		||||
 | 
			
		||||
@ -74,8 +74,8 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        mock_keyring.verify_json_for_server.return_value = make_awaitable(True)
 | 
			
		||||
 | 
			
		||||
        # we mock out the federation client too
 | 
			
		||||
        mock_federation_client = Mock(spec=["put_json"])
 | 
			
		||||
        mock_federation_client.put_json.return_value = make_awaitable((200, "OK"))
 | 
			
		||||
        self.mock_federation_client = Mock(spec=["put_json"])
 | 
			
		||||
        self.mock_federation_client.put_json.return_value = make_awaitable((200, "OK"))
 | 
			
		||||
 | 
			
		||||
        # the tests assume that we are starting at unix time 1000
 | 
			
		||||
        reactor.pump((1000,))
 | 
			
		||||
@ -83,7 +83,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.mock_hs_notifier = Mock()
 | 
			
		||||
        hs = self.setup_test_homeserver(
 | 
			
		||||
            notifier=self.mock_hs_notifier,
 | 
			
		||||
            federation_http_client=mock_federation_client,
 | 
			
		||||
            federation_http_client=self.mock_federation_client,
 | 
			
		||||
            keyring=mock_keyring,
 | 
			
		||||
            replication_streams={},
 | 
			
		||||
        )
 | 
			
		||||
@ -233,8 +233,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        put_json = self.hs.get_federation_http_client().put_json
 | 
			
		||||
        put_json.assert_called_once_with(
 | 
			
		||||
        self.mock_federation_client.put_json.assert_called_once_with(
 | 
			
		||||
            "farm",
 | 
			
		||||
            path="/_matrix/federation/v1/send/1000000",
 | 
			
		||||
            data=_expect_edu_transaction(
 | 
			
		||||
@ -349,8 +348,7 @@ class TypingNotificationsTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        self.on_new_event.assert_has_calls([call("typing_key", 1, rooms=[ROOM_ID])])
 | 
			
		||||
 | 
			
		||||
        put_json = self.hs.get_federation_http_client().put_json
 | 
			
		||||
        put_json.assert_called_once_with(
 | 
			
		||||
        self.mock_federation_client.put_json.assert_called_once_with(
 | 
			
		||||
            "farm",
 | 
			
		||||
            path="/_matrix/federation/v1/send/1000000",
 | 
			
		||||
            data=_expect_edu_transaction(
 | 
			
		||||
 | 
			
		||||
@ -11,7 +11,7 @@
 | 
			
		||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
# See the License for the specific language governing permissions and
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
from typing import Tuple
 | 
			
		||||
from typing import Any, Tuple
 | 
			
		||||
from unittest.mock import Mock, patch
 | 
			
		||||
from urllib.parse import quote
 | 
			
		||||
 | 
			
		||||
@ -24,7 +24,7 @@ from synapse.appservice import ApplicationService
 | 
			
		||||
from synapse.rest.client import login, register, room, user_directory
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
from synapse.storage.roommember import ProfileInfo
 | 
			
		||||
from synapse.types import create_requester
 | 
			
		||||
from synapse.types import UserProfile, create_requester
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
 | 
			
		||||
from tests import unittest
 | 
			
		||||
@ -34,6 +34,12 @@ from tests.test_utils.event_injection import inject_member_event
 | 
			
		||||
from tests.unittest import override_config
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
# A spam checker which doesn't implement anything, so create a bare object.
 | 
			
		||||
class UselessSpamChecker:
 | 
			
		||||
    def __init__(self, config: Any):
 | 
			
		||||
        pass
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
    """Tests the UserDirectoryHandler.
 | 
			
		||||
 | 
			
		||||
@ -773,7 +779,7 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        s = self.get_success(self.handler.search_users(u1, "user2", 10))
 | 
			
		||||
        self.assertEqual(len(s["results"]), 1)
 | 
			
		||||
 | 
			
		||||
        async def allow_all(user_profile: ProfileInfo) -> bool:
 | 
			
		||||
        async def allow_all(user_profile: UserProfile) -> bool:
 | 
			
		||||
            # Allow all users.
 | 
			
		||||
            return False
 | 
			
		||||
 | 
			
		||||
@ -787,7 +793,7 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.assertEqual(len(s["results"]), 1)
 | 
			
		||||
 | 
			
		||||
        # Configure a spam checker that filters all users.
 | 
			
		||||
        async def block_all(user_profile: ProfileInfo) -> bool:
 | 
			
		||||
        async def block_all(user_profile: UserProfile) -> bool:
 | 
			
		||||
            # All users are spammy.
 | 
			
		||||
            return True
 | 
			
		||||
 | 
			
		||||
@ -797,6 +803,13 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        s = self.get_success(self.handler.search_users(u1, "user2", 10))
 | 
			
		||||
        self.assertEqual(len(s["results"]), 0)
 | 
			
		||||
 | 
			
		||||
    @override_config(
 | 
			
		||||
        {
 | 
			
		||||
            "spam_checker": {
 | 
			
		||||
                "module": "tests.handlers.test_user_directory.UselessSpamChecker"
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
    )
 | 
			
		||||
    def test_legacy_spam_checker(self) -> None:
 | 
			
		||||
        """
 | 
			
		||||
        A spam checker without the expected method should be ignored.
 | 
			
		||||
@ -825,11 +838,6 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.assertEqual(shares_private, {(u1, u2, room), (u2, u1, room)})
 | 
			
		||||
        self.assertEqual(public_users, set())
 | 
			
		||||
 | 
			
		||||
        # Configure a spam checker.
 | 
			
		||||
        spam_checker = self.hs.get_spam_checker()
 | 
			
		||||
        # The spam checker doesn't need any methods, so create a bare object.
 | 
			
		||||
        spam_checker.spam_checker = object()
 | 
			
		||||
 | 
			
		||||
        # We get one search result when searching for user2 by user1.
 | 
			
		||||
        s = self.get_success(self.handler.search_users(u1, "user2", 10))
 | 
			
		||||
        self.assertEqual(len(s["results"]), 1)
 | 
			
		||||
@ -954,10 +962,9 @@ class UserDirectoryTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        context = self.get_success(unpersisted_context.persist(event))
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.hs.get_storage_controllers().persistence.persist_event(event, context)
 | 
			
		||||
        )
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self.get_success(persistence.persist_event(event, context))
 | 
			
		||||
 | 
			
		||||
    def test_local_user_leaving_room_remains_in_user_directory(self) -> None:
 | 
			
		||||
        """We've chosen to simplify the user directory's implementation by
 | 
			
		||||
 | 
			
		||||
@ -68,11 +68,11 @@ class ModuleApiTestCase(BaseModuleApiTestCase):
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
        # Mock out the calls over federation.
 | 
			
		||||
        fed_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        fed_transport_client.send_transaction = simple_async_mock({})
 | 
			
		||||
        self.fed_transport_client = Mock(spec=["send_transaction"])
 | 
			
		||||
        self.fed_transport_client.send_transaction = simple_async_mock({})
 | 
			
		||||
 | 
			
		||||
        return self.setup_test_homeserver(
 | 
			
		||||
            federation_transport_client=fed_transport_client,
 | 
			
		||||
            federation_transport_client=self.fed_transport_client,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
    def test_can_register_user(self) -> None:
 | 
			
		||||
@ -417,7 +417,7 @@ class ModuleApiTestCase(BaseModuleApiTestCase):
 | 
			
		||||
        #
 | 
			
		||||
        # Thus we reset the mock, and try sending online local user
 | 
			
		||||
        # presence again
 | 
			
		||||
        self.hs.get_federation_transport_client().send_transaction.reset_mock()
 | 
			
		||||
        self.fed_transport_client.send_transaction.reset_mock()
 | 
			
		||||
 | 
			
		||||
        # Broadcast local user online presence
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -429,9 +429,7 @@ class ModuleApiTestCase(BaseModuleApiTestCase):
 | 
			
		||||
 | 
			
		||||
        # Check that a presence update was sent as part of a federation transaction
 | 
			
		||||
        found_update = False
 | 
			
		||||
        calls = (
 | 
			
		||||
            self.hs.get_federation_transport_client().send_transaction.call_args_list
 | 
			
		||||
        )
 | 
			
		||||
        calls = self.fed_transport_client.send_transaction.call_args_list
 | 
			
		||||
        for call in calls:
 | 
			
		||||
            call_args = call[0]
 | 
			
		||||
            federation_transaction: Transaction = call_args[0]
 | 
			
		||||
@ -581,7 +579,7 @@ class ModuleApiTestCase(BaseModuleApiTestCase):
 | 
			
		||||
        mocked_remote_join = simple_async_mock(
 | 
			
		||||
            return_value=("fake-event-id", fake_stream_id)
 | 
			
		||||
        )
 | 
			
		||||
        self.hs.get_room_member_handler()._remote_join = mocked_remote_join
 | 
			
		||||
        self.hs.get_room_member_handler()._remote_join = mocked_remote_join  # type: ignore[assignment]
 | 
			
		||||
        fake_remote_host = f"{self.module_api.server_name}-remote"
 | 
			
		||||
 | 
			
		||||
        # Given that the join is to be faked, we expect the relevant join event not to
 | 
			
		||||
 | 
			
		||||
@ -23,6 +23,7 @@ from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
import synapse.rest.admin
 | 
			
		||||
from synapse.api.errors import Codes, SynapseError
 | 
			
		||||
from synapse.push.emailpusher import EmailPusher
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
@ -105,6 +106,7 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(self.access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        self.token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        # We need to add email to account before we can create a pusher.
 | 
			
		||||
@ -114,7 +116,7 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self.pusher = self.get_success(
 | 
			
		||||
        pusher = self.get_success(
 | 
			
		||||
            self.hs.get_pusherpool().add_or_update_pusher(
 | 
			
		||||
                user_id=self.user_id,
 | 
			
		||||
                access_token=self.token_id,
 | 
			
		||||
@ -127,6 +129,8 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
                data={},
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        assert isinstance(pusher, EmailPusher)
 | 
			
		||||
        self.pusher = pusher
 | 
			
		||||
 | 
			
		||||
        self.auth_handler = hs.get_auth_handler()
 | 
			
		||||
        self.store = hs.get_datastores().main
 | 
			
		||||
@ -375,10 +379,13 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # check that the pusher for that email address has been deleted
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": self.user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by(
 | 
			
		||||
                    {"user_name": self.user_id}
 | 
			
		||||
                )
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 0)
 | 
			
		||||
 | 
			
		||||
    def test_remove_unlinked_pushers_background_job(self) -> None:
 | 
			
		||||
@ -413,10 +420,13 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.wait_for_background_updates()
 | 
			
		||||
 | 
			
		||||
        # Check that all pushers with unlinked addresses were deleted
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": self.user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by(
 | 
			
		||||
                    {"user_name": self.user_id}
 | 
			
		||||
                )
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 0)
 | 
			
		||||
 | 
			
		||||
    def _check_for_mail(self) -> Tuple[Sequence, Dict]:
 | 
			
		||||
@ -428,10 +438,13 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
            that notification.
 | 
			
		||||
        """
 | 
			
		||||
        # Get the stream ordering before it gets sent
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": self.user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by(
 | 
			
		||||
                    {"user_name": self.user_id}
 | 
			
		||||
                )
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        last_stream_ordering = pushers[0].last_stream_ordering
 | 
			
		||||
 | 
			
		||||
@ -439,10 +452,13 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.pump(10)
 | 
			
		||||
 | 
			
		||||
        # It hasn't succeeded yet, so the stream ordering shouldn't have moved
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": self.user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by(
 | 
			
		||||
                    {"user_name": self.user_id}
 | 
			
		||||
                )
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        self.assertEqual(last_stream_ordering, pushers[0].last_stream_ordering)
 | 
			
		||||
 | 
			
		||||
@ -458,10 +474,13 @@ class EmailPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.assertEqual(len(self.email_attempts), 1)
 | 
			
		||||
 | 
			
		||||
        # The stream ordering has increased
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": self.user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by(
 | 
			
		||||
                    {"user_name": self.user_id}
 | 
			
		||||
                )
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        self.assertTrue(pushers[0].last_stream_ordering > last_stream_ordering)
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -11,7 +11,7 @@
 | 
			
		||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
# See the License for the specific language governing permissions and
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
from typing import List, Optional, Tuple
 | 
			
		||||
from typing import Any, List, Tuple
 | 
			
		||||
from unittest.mock import Mock
 | 
			
		||||
 | 
			
		||||
from twisted.internet.defer import Deferred
 | 
			
		||||
@ -22,7 +22,6 @@ from synapse.logging.context import make_deferred_yieldable
 | 
			
		||||
from synapse.push import PusherConfig, PusherConfigException
 | 
			
		||||
from synapse.rest.client import login, push_rule, pusher, receipts, room
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
from synapse.storage.databases.main.registration import TokenLookupResult
 | 
			
		||||
from synapse.types import JsonDict
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
 | 
			
		||||
@ -67,9 +66,10 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        def test_data(data: Optional[JsonDict]) -> None:
 | 
			
		||||
        def test_data(data: Any) -> None:
 | 
			
		||||
            self.get_failure(
 | 
			
		||||
                self.hs.get_pusherpool().add_or_update_pusher(
 | 
			
		||||
                    user_id=user_id,
 | 
			
		||||
@ -113,6 +113,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -140,10 +141,11 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.helper.send(room, body="There!", tok=other_access_token)
 | 
			
		||||
 | 
			
		||||
        # Get the stream ordering before it gets sent
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        last_stream_ordering = pushers[0].last_stream_ordering
 | 
			
		||||
 | 
			
		||||
@ -151,10 +153,11 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.pump()
 | 
			
		||||
 | 
			
		||||
        # It hasn't succeeded yet, so the stream ordering shouldn't have moved
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        self.assertEqual(last_stream_ordering, pushers[0].last_stream_ordering)
 | 
			
		||||
 | 
			
		||||
@ -172,10 +175,11 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.pump()
 | 
			
		||||
 | 
			
		||||
        # The stream ordering has increased
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        self.assertTrue(pushers[0].last_stream_ordering > last_stream_ordering)
 | 
			
		||||
        last_stream_ordering = pushers[0].last_stream_ordering
 | 
			
		||||
@ -194,10 +198,11 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        self.pump()
 | 
			
		||||
 | 
			
		||||
        # The stream ordering has increased, again
 | 
			
		||||
        pushers = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
        pushers = list(
 | 
			
		||||
            self.get_success(
 | 
			
		||||
                self.hs.get_datastores().main.get_pushers_by({"user_name": user_id})
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        pushers = list(pushers)
 | 
			
		||||
        self.assertEqual(len(pushers), 1)
 | 
			
		||||
        self.assertTrue(pushers[0].last_stream_ordering > last_stream_ordering)
 | 
			
		||||
 | 
			
		||||
@ -229,6 +234,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -349,6 +355,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -435,6 +442,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -512,6 +520,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -618,6 +627,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -753,6 +763,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
@ -895,6 +906,7 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        user_tuple = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_tuple is not None
 | 
			
		||||
        token_id = user_tuple.token_id
 | 
			
		||||
        device_id = user_tuple.device_id
 | 
			
		||||
 | 
			
		||||
@ -941,9 +953,10 @@ class HTTPPusherTests(HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # Look up the user info for the access token so we can compare the device ID.
 | 
			
		||||
        lookup_result: TokenLookupResult = self.get_success(
 | 
			
		||||
        lookup_result = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert lookup_result is not None
 | 
			
		||||
 | 
			
		||||
        # Get the user's devices and check it has the correct device ID.
 | 
			
		||||
        channel = self.make_request("GET", "/pushers", access_token=access_token)
 | 
			
		||||
 | 
			
		||||
@ -12,7 +12,7 @@
 | 
			
		||||
# See the License for the specific language governing permissions and
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
 | 
			
		||||
from typing import Any, List, Optional
 | 
			
		||||
from typing import Any, List, Optional, Sequence
 | 
			
		||||
 | 
			
		||||
from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
@ -139,7 +139,7 @@ class EventsStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # this is the point in the DAG where we make a fork
 | 
			
		||||
        fork_point: List[str] = self.get_success(
 | 
			
		||||
        fork_point: Sequence[str] = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_latest_event_ids_in_room(self.room_id)
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -168,7 +168,7 @@ class EventsStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
        pl_event = self.get_success(
 | 
			
		||||
            inject_event(
 | 
			
		||||
                self.hs,
 | 
			
		||||
                prev_event_ids=prev_events,
 | 
			
		||||
                prev_event_ids=list(prev_events),
 | 
			
		||||
                type=EventTypes.PowerLevels,
 | 
			
		||||
                state_key="",
 | 
			
		||||
                sender=self.user_id,
 | 
			
		||||
@ -294,7 +294,7 @@ class EventsStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        # this is the point in the DAG where we make a fork
 | 
			
		||||
        fork_point: List[str] = self.get_success(
 | 
			
		||||
        fork_point: Sequence[str] = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_latest_event_ids_in_room(self.room_id)
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -323,7 +323,7 @@ class EventsStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
            e = self.get_success(
 | 
			
		||||
                inject_event(
 | 
			
		||||
                    self.hs,
 | 
			
		||||
                    prev_event_ids=prev_events,
 | 
			
		||||
                    prev_event_ids=list(prev_events),
 | 
			
		||||
                    type=EventTypes.PowerLevels,
 | 
			
		||||
                    state_key="",
 | 
			
		||||
                    sender=self.user_id,
 | 
			
		||||
 | 
			
		||||
@ -37,7 +37,7 @@ class PartialStateStreamsTestCase(BaseMultiWorkerStreamTestCase):
 | 
			
		||||
        room_id = self.helper.create_room_as("@bob:test")
 | 
			
		||||
        # Mark the room as partial-stated.
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self.store.store_partial_state_room(room_id, ["serv1", "serv2"], 0, "serv1")
 | 
			
		||||
            self.store.store_partial_state_room(room_id, {"serv1", "serv2"}, 0, "serv1")
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        worker = self.make_worker_hs("synapse.app.generic_worker")
 | 
			
		||||
 | 
			
		||||
@ -13,7 +13,7 @@
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
from unittest.mock import Mock
 | 
			
		||||
 | 
			
		||||
from synapse.handlers.typing import RoomMember
 | 
			
		||||
from synapse.handlers.typing import RoomMember, TypingWriterHandler
 | 
			
		||||
from synapse.replication.tcp.streams import TypingStream
 | 
			
		||||
from synapse.util.caches.stream_change_cache import StreamChangeCache
 | 
			
		||||
 | 
			
		||||
@ -33,6 +33,7 @@ class TypingStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
 | 
			
		||||
    def test_typing(self) -> None:
 | 
			
		||||
        typing = self.hs.get_typing_handler()
 | 
			
		||||
        assert isinstance(typing, TypingWriterHandler)
 | 
			
		||||
 | 
			
		||||
        self.reconnect()
 | 
			
		||||
 | 
			
		||||
@ -88,6 +89,7 @@ class TypingStreamTestCase(BaseStreamTestCase):
 | 
			
		||||
        sends the proper position and RDATA).
 | 
			
		||||
        """
 | 
			
		||||
        typing = self.hs.get_typing_handler()
 | 
			
		||||
        assert isinstance(typing, TypingWriterHandler)
 | 
			
		||||
 | 
			
		||||
        self.reconnect()
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -127,6 +127,7 @@ class ChannelsTestCase(BaseMultiWorkerStreamTestCase):
 | 
			
		||||
 | 
			
		||||
        # ... updating the cache ID gen on the master still shouldn't cause the
 | 
			
		||||
        # deferred to wake up.
 | 
			
		||||
        assert store._cache_id_gen is not None
 | 
			
		||||
        ctx = store._cache_id_gen.get_next()
 | 
			
		||||
        self.get_success(ctx.__aenter__())
 | 
			
		||||
        self.get_success(ctx.__aexit__(None, None, None))
 | 
			
		||||
 | 
			
		||||
@ -16,6 +16,7 @@ from unittest.mock import Mock
 | 
			
		||||
 | 
			
		||||
from synapse.api.constants import EventTypes, Membership
 | 
			
		||||
from synapse.events.builder import EventBuilderFactory
 | 
			
		||||
from synapse.handlers.typing import TypingWriterHandler
 | 
			
		||||
from synapse.rest.admin import register_servlets_for_client_rest_resource
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
from synapse.types import UserID, create_requester
 | 
			
		||||
@ -174,6 +175,7 @@ class FederationSenderTestCase(BaseMultiWorkerStreamTestCase):
 | 
			
		||||
        token = self.login("user3", "pass")
 | 
			
		||||
 | 
			
		||||
        typing_handler = self.hs.get_typing_handler()
 | 
			
		||||
        assert isinstance(typing_handler, TypingWriterHandler)
 | 
			
		||||
 | 
			
		||||
        sent_on_1 = False
 | 
			
		||||
        sent_on_2 = False
 | 
			
		||||
 | 
			
		||||
@ -50,6 +50,7 @@ class PusherShardTestCase(BaseMultiWorkerStreamTestCase):
 | 
			
		||||
        user_dict = self.get_success(
 | 
			
		||||
            self.hs.get_datastores().main.get_user_by_access_token(access_token)
 | 
			
		||||
        )
 | 
			
		||||
        assert user_dict is not None
 | 
			
		||||
        token_id = user_dict.token_id
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
 | 
			
		||||
@ -2913,7 +2913,8 @@ class UserMembershipRestTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        other_user_tok = self.login("user", "pass")
 | 
			
		||||
        event_builder_factory = self.hs.get_event_builder_factory()
 | 
			
		||||
        event_creation_handler = self.hs.get_event_creation_handler()
 | 
			
		||||
        storage_controllers = self.hs.get_storage_controllers()
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
 | 
			
		||||
        # Create two rooms, one with a local user only and one with both a local
 | 
			
		||||
        # and remote user.
 | 
			
		||||
@ -2940,7 +2941,7 @@ class UserMembershipRestTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        context = self.get_success(unpersisted_context.persist(event))
 | 
			
		||||
 | 
			
		||||
        self.get_success(storage_controllers.persistence.persist_event(event, context))
 | 
			
		||||
        self.get_success(persistence.persist_event(event, context))
 | 
			
		||||
 | 
			
		||||
        # Now get rooms
 | 
			
		||||
        url = "/_synapse/admin/v1/users/@joiner:remote_hs/joined_rooms"
 | 
			
		||||
 | 
			
		||||
@ -11,6 +11,8 @@
 | 
			
		||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
			
		||||
# See the License for the specific language governing permissions and
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
from typing import Optional
 | 
			
		||||
 | 
			
		||||
from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
import synapse.rest.admin
 | 
			
		||||
@ -33,9 +35,14 @@ class UsernameAvailableTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.register_user("admin", "pass", admin=True)
 | 
			
		||||
        self.admin_user_tok = self.login("admin", "pass")
 | 
			
		||||
 | 
			
		||||
        async def check_username(username: str) -> bool:
 | 
			
		||||
            if username == "allowed":
 | 
			
		||||
                return True
 | 
			
		||||
        async def check_username(
 | 
			
		||||
            localpart: str,
 | 
			
		||||
            guest_access_token: Optional[str] = None,
 | 
			
		||||
            assigned_user_id: Optional[str] = None,
 | 
			
		||||
            inhibit_user_in_use_error: bool = False,
 | 
			
		||||
        ) -> None:
 | 
			
		||||
            if localpart == "allowed":
 | 
			
		||||
                return
 | 
			
		||||
            raise SynapseError(
 | 
			
		||||
                400,
 | 
			
		||||
                "User ID already taken.",
 | 
			
		||||
@ -43,7 +50,7 @@ class UsernameAvailableTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
        handler = self.hs.get_registration_handler()
 | 
			
		||||
        handler.check_username = check_username
 | 
			
		||||
        handler.check_username = check_username  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
    def test_username_available(self) -> None:
 | 
			
		||||
        """
 | 
			
		||||
 | 
			
		||||
@ -1193,7 +1193,7 @@ class AccountStatusTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
                return {}
 | 
			
		||||
 | 
			
		||||
        # Register a mock that will return the expected result depending on the remote.
 | 
			
		||||
        self.hs.get_federation_http_client().post_json = Mock(side_effect=post_json)
 | 
			
		||||
        self.hs.get_federation_http_client().post_json = Mock(side_effect=post_json)  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Check that we've got the correct response from the client-side endpoint.
 | 
			
		||||
        self._test_status(
 | 
			
		||||
 | 
			
		||||
@ -63,14 +63,14 @@ class FilterTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def test_add_filter_non_local_user(self) -> None:
 | 
			
		||||
        _is_mine = self.hs.is_mine
 | 
			
		||||
        self.hs.is_mine = lambda target_user: False
 | 
			
		||||
        self.hs.is_mine = lambda target_user: False  # type: ignore[assignment]
 | 
			
		||||
        channel = self.make_request(
 | 
			
		||||
            "POST",
 | 
			
		||||
            "/_matrix/client/r0/user/%s/filter" % (self.user_id),
 | 
			
		||||
            self.EXAMPLE_FILTER_JSON,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self.hs.is_mine = _is_mine
 | 
			
		||||
        self.hs.is_mine = _is_mine  # type: ignore[assignment]
 | 
			
		||||
        self.assertEqual(channel.code, 403)
 | 
			
		||||
        self.assertEqual(channel.json_body["errcode"], Codes.FORBIDDEN)
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -36,14 +36,14 @@ class PresenceTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
 | 
			
		||||
 | 
			
		||||
        presence_handler = Mock(spec=PresenceHandler)
 | 
			
		||||
        presence_handler.set_state.return_value = make_awaitable(None)
 | 
			
		||||
        self.presence_handler = Mock(spec=PresenceHandler)
 | 
			
		||||
        self.presence_handler.set_state.return_value = make_awaitable(None)
 | 
			
		||||
 | 
			
		||||
        hs = self.setup_test_homeserver(
 | 
			
		||||
            "red",
 | 
			
		||||
            federation_http_client=None,
 | 
			
		||||
            federation_client=Mock(),
 | 
			
		||||
            presence_handler=presence_handler,
 | 
			
		||||
            presence_handler=self.presence_handler,
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        return hs
 | 
			
		||||
@ -61,7 +61,7 @@ class PresenceTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self.assertEqual(channel.code, HTTPStatus.OK)
 | 
			
		||||
        self.assertEqual(self.hs.get_presence_handler().set_state.call_count, 1)
 | 
			
		||||
        self.assertEqual(self.presence_handler.set_state.call_count, 1)
 | 
			
		||||
 | 
			
		||||
    @unittest.override_config({"use_presence": False})
 | 
			
		||||
    def test_put_presence_disabled(self) -> None:
 | 
			
		||||
@ -76,4 +76,4 @@ class PresenceTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self.assertEqual(channel.code, HTTPStatus.OK)
 | 
			
		||||
        self.assertEqual(self.hs.get_presence_handler().set_state.call_count, 0)
 | 
			
		||||
        self.assertEqual(self.presence_handler.set_state.call_count, 0)
 | 
			
		||||
 | 
			
		||||
@ -151,7 +151,7 @@ class RegisterRestServletTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.assertEqual(channel.json_body["errcode"], "M_FORBIDDEN")
 | 
			
		||||
 | 
			
		||||
    def test_POST_guest_registration(self) -> None:
 | 
			
		||||
        self.hs.config.key.macaroon_secret_key = "test"
 | 
			
		||||
        self.hs.config.key.macaroon_secret_key = b"test"
 | 
			
		||||
        self.hs.config.registration.allow_guest_access = True
 | 
			
		||||
 | 
			
		||||
        channel = self.make_request(b"POST", self.url + b"?kind=guest", b"{}")
 | 
			
		||||
@ -1166,12 +1166,15 @@ class AccountValidityBackgroundJobTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        """
 | 
			
		||||
        user_id = self.register_user("kermit_delta", "user")
 | 
			
		||||
 | 
			
		||||
        self.hs.config.account_validity.startup_job_max_delta = self.max_delta
 | 
			
		||||
        self.hs.config.account_validity.account_validity_startup_job_max_delta = (
 | 
			
		||||
            self.max_delta
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        now_ms = self.hs.get_clock().time_msec()
 | 
			
		||||
        self.get_success(self.store._set_expiration_date_when_missing())
 | 
			
		||||
 | 
			
		||||
        res = self.get_success(self.store.get_expiration_ts_for_user(user_id))
 | 
			
		||||
        assert res is not None
 | 
			
		||||
 | 
			
		||||
        self.assertGreaterEqual(res, now_ms + self.validity_period - self.max_delta)
 | 
			
		||||
        self.assertLessEqual(res, now_ms + self.validity_period)
 | 
			
		||||
 | 
			
		||||
@ -136,6 +136,7 @@ class RetentionTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # Send a first event, which should be filtered out at the end of the test.
 | 
			
		||||
        resp = self.helper.send(room_id=room_id, body="1", tok=self.token)
 | 
			
		||||
        first_event_id = resp.get("event_id")
 | 
			
		||||
        assert isinstance(first_event_id, str)
 | 
			
		||||
 | 
			
		||||
        # Advance the time by 2 days. We're using the default retention policy, therefore
 | 
			
		||||
        # after this the first event will still be valid.
 | 
			
		||||
@ -144,6 +145,7 @@ class RetentionTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # Send another event, which shouldn't get filtered out.
 | 
			
		||||
        resp = self.helper.send(room_id=room_id, body="2", tok=self.token)
 | 
			
		||||
        valid_event_id = resp.get("event_id")
 | 
			
		||||
        assert isinstance(valid_event_id, str)
 | 
			
		||||
 | 
			
		||||
        # Advance the time by another 2 days. After this, the first event should be
 | 
			
		||||
        # outdated but not the second one.
 | 
			
		||||
@ -229,7 +231,7 @@ class RetentionTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Check that we can still access state events that were sent before the event that
 | 
			
		||||
        # has been purged.
 | 
			
		||||
        self.get_event(room_id, create_event.event_id)
 | 
			
		||||
        self.get_event(room_id, bool(create_event))
 | 
			
		||||
 | 
			
		||||
    def get_event(self, event_id: str, expect_none: bool = False) -> JsonDict:
 | 
			
		||||
        event = self.get_success(self.store.get_event(event_id, allow_none=True))
 | 
			
		||||
@ -238,7 +240,7 @@ class RetentionTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            self.assertIsNone(event)
 | 
			
		||||
            return {}
 | 
			
		||||
 | 
			
		||||
        self.assertIsNotNone(event)
 | 
			
		||||
        assert event is not None
 | 
			
		||||
 | 
			
		||||
        time_now = self.clock.time_msec()
 | 
			
		||||
        serialized = self.serializer.serialize_event(event, time_now)
 | 
			
		||||
 | 
			
		||||
@ -3382,8 +3382,8 @@ class ThreepidInviteTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # a remote IS. We keep the mock for make_and_store_3pid_invite around so we
 | 
			
		||||
        # can check its call_count later on during the test.
 | 
			
		||||
        make_invite_mock = Mock(return_value=make_awaitable((Mock(event_id="abc"), 0)))
 | 
			
		||||
        self.hs.get_room_member_handler()._make_and_store_3pid_invite = make_invite_mock
 | 
			
		||||
        self.hs.get_identity_handler().lookup_3pid = Mock(
 | 
			
		||||
        self.hs.get_room_member_handler()._make_and_store_3pid_invite = make_invite_mock  # type: ignore[assignment]
 | 
			
		||||
        self.hs.get_identity_handler().lookup_3pid = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -3443,8 +3443,8 @@ class ThreepidInviteTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # a remote IS. We keep the mock for make_and_store_3pid_invite around so we
 | 
			
		||||
        # can check its call_count later on during the test.
 | 
			
		||||
        make_invite_mock = Mock(return_value=make_awaitable((Mock(event_id="abc"), 0)))
 | 
			
		||||
        self.hs.get_room_member_handler()._make_and_store_3pid_invite = make_invite_mock
 | 
			
		||||
        self.hs.get_identity_handler().lookup_3pid = Mock(
 | 
			
		||||
        self.hs.get_room_member_handler()._make_and_store_3pid_invite = make_invite_mock  # type: ignore[assignment]
 | 
			
		||||
        self.hs.get_identity_handler().lookup_3pid = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -3563,8 +3563,10 @@ class TimestampLookupTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        event.internal_metadata.outlier = True
 | 
			
		||||
        persistence = self._storage_controllers.persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self._storage_controllers.persistence.persist_event(
 | 
			
		||||
            persistence.persist_event(
 | 
			
		||||
                event, EventContext.for_outlier(self._storage_controllers)
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -84,7 +84,7 @@ class RoomTestCase(_ShadowBannedBase):
 | 
			
		||||
    def test_invite_3pid(self) -> None:
 | 
			
		||||
        """Ensure that a 3PID invite does not attempt to contact the identity server."""
 | 
			
		||||
        identity_handler = self.hs.get_identity_handler()
 | 
			
		||||
        identity_handler.lookup_3pid = Mock(
 | 
			
		||||
        identity_handler.lookup_3pid = Mock(  # type: ignore[assignment]
 | 
			
		||||
            side_effect=AssertionError("This should not get called")
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -222,7 +222,7 @@ class RoomTestCase(_ShadowBannedBase):
 | 
			
		||||
            event_source.get_new_events(
 | 
			
		||||
                user=UserID.from_string(self.other_user_id),
 | 
			
		||||
                from_key=0,
 | 
			
		||||
                limit=None,
 | 
			
		||||
                limit=10,
 | 
			
		||||
                room_ids=[room_id],
 | 
			
		||||
                is_guest=False,
 | 
			
		||||
            )
 | 
			
		||||
@ -286,6 +286,7 @@ class ProfileTestCase(_ShadowBannedBase):
 | 
			
		||||
                self.banned_user_id,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        assert event is not None
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            event.content, {"membership": "join", "displayname": original_display_name}
 | 
			
		||||
        )
 | 
			
		||||
@ -321,6 +322,7 @@ class ProfileTestCase(_ShadowBannedBase):
 | 
			
		||||
                self.banned_user_id,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        assert event is not None
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
            event.content, {"membership": "join", "displayname": original_display_name}
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -84,7 +84,7 @@ class UpgradeRoomTest(unittest.HomeserverTestCase):
 | 
			
		||||
                self.room_id, EventTypes.Tombstone, ""
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertIsNotNone(tombstone_event)
 | 
			
		||||
        assert tombstone_event is not None
 | 
			
		||||
        self.assertEqual(new_room_id, tombstone_event.content["replacement_room"])
 | 
			
		||||
 | 
			
		||||
        # Check that the new room exists.
 | 
			
		||||
 | 
			
		||||
@ -24,6 +24,7 @@ from synapse.server import HomeServer
 | 
			
		||||
from synapse.server_notices.resource_limits_server_notices import (
 | 
			
		||||
    ResourceLimitsServerNotices,
 | 
			
		||||
)
 | 
			
		||||
from synapse.server_notices.server_notices_sender import ServerNoticesSender
 | 
			
		||||
from synapse.types import JsonDict
 | 
			
		||||
from synapse.util import Clock
 | 
			
		||||
 | 
			
		||||
@ -58,14 +59,15 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        return config
 | 
			
		||||
 | 
			
		||||
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
			
		||||
        self.server_notices_sender = self.hs.get_server_notices_sender()
 | 
			
		||||
        server_notices_sender = self.hs.get_server_notices_sender()
 | 
			
		||||
        assert isinstance(server_notices_sender, ServerNoticesSender)
 | 
			
		||||
 | 
			
		||||
        # relying on [1] is far from ideal, but the only case where
 | 
			
		||||
        # ResourceLimitsServerNotices class needs to be isolated is this test,
 | 
			
		||||
        # general code should never have a reason to do so ...
 | 
			
		||||
        self._rlsn = self.server_notices_sender._server_notices[1]
 | 
			
		||||
        if not isinstance(self._rlsn, ResourceLimitsServerNotices):
 | 
			
		||||
            raise Exception("Failed to find reference to ResourceLimitsServerNotices")
 | 
			
		||||
        rlsn = list(server_notices_sender._server_notices)[1]
 | 
			
		||||
        assert isinstance(rlsn, ResourceLimitsServerNotices)
 | 
			
		||||
        self._rlsn = rlsn
 | 
			
		||||
 | 
			
		||||
        self._rlsn._store.user_last_seen_monthly_active = Mock(
 | 
			
		||||
            return_value=make_awaitable(1000)
 | 
			
		||||
@ -101,25 +103,29 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
    def test_maybe_send_server_notice_to_user_remove_blocked_notice(self) -> None:
 | 
			
		||||
        """Test when user has blocked notice, but should have it removed"""
 | 
			
		||||
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None)
 | 
			
		||||
        )
 | 
			
		||||
        mock_event = Mock(
 | 
			
		||||
            type=EventTypes.Message, content={"msgtype": ServerNoticeMsgType}
 | 
			
		||||
        )
 | 
			
		||||
        self._rlsn._store.get_events = Mock(
 | 
			
		||||
        self._rlsn._store.get_events = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable({"123": mock_event})
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self._rlsn.maybe_send_server_notice_to_user(self.user_id))
 | 
			
		||||
        # Would be better to check the content, but once == remove blocking event
 | 
			
		||||
        self._rlsn._server_notices_manager.maybe_get_notice_room_for_user.assert_called_once()
 | 
			
		||||
        maybe_get_notice_room_for_user = (
 | 
			
		||||
            self._rlsn._server_notices_manager.maybe_get_notice_room_for_user
 | 
			
		||||
        )
 | 
			
		||||
        assert isinstance(maybe_get_notice_room_for_user, Mock)
 | 
			
		||||
        maybe_get_notice_room_for_user.assert_called_once()
 | 
			
		||||
        self._send_notice.assert_called_once()
 | 
			
		||||
 | 
			
		||||
    def test_maybe_send_server_notice_to_user_remove_blocked_notice_noop(self) -> None:
 | 
			
		||||
        """
 | 
			
		||||
        Test when user has blocked notice, but notice ought to be there (NOOP)
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
            side_effect=ResourceLimitError(403, "foo"),
 | 
			
		||||
        )
 | 
			
		||||
@ -127,7 +133,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        mock_event = Mock(
 | 
			
		||||
            type=EventTypes.Message, content={"msgtype": ServerNoticeMsgType}
 | 
			
		||||
        )
 | 
			
		||||
        self._rlsn._store.get_events = Mock(
 | 
			
		||||
        self._rlsn._store.get_events = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable({"123": mock_event})
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -139,7 +145,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        """
 | 
			
		||||
        Test when user does not have blocked notice, but should have one
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
            side_effect=ResourceLimitError(403, "foo"),
 | 
			
		||||
        )
 | 
			
		||||
@ -152,7 +158,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        """
 | 
			
		||||
        Test when user does not have blocked notice, nor should they (NOOP)
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None)
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -165,7 +171,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        Test when user is not part of the MAU cohort - this should not ever
 | 
			
		||||
        happen - but ...
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None)
 | 
			
		||||
        )
 | 
			
		||||
        self._rlsn._store.user_last_seen_monthly_active = Mock(
 | 
			
		||||
@ -183,7 +189,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        Test that when server is over MAU limit and alerting is suppressed, then
 | 
			
		||||
        an alert message is not sent into the room
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
            side_effect=ResourceLimitError(
 | 
			
		||||
                403, "foo", limit_type=LimitBlockingTypes.MONTHLY_ACTIVE_USER
 | 
			
		||||
@ -198,7 +204,7 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        """
 | 
			
		||||
        Test that when a server is disabled, that MAU limit alerting is ignored.
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
            side_effect=ResourceLimitError(
 | 
			
		||||
                403, "foo", limit_type=LimitBlockingTypes.HS_DISABLED
 | 
			
		||||
@ -217,21 +223,21 @@ class TestResourceLimitsServerNotices(unittest.HomeserverTestCase):
 | 
			
		||||
        When the room is already in a blocked state, test that when alerting
 | 
			
		||||
        is suppressed that the room is returned to an unblocked state.
 | 
			
		||||
        """
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(
 | 
			
		||||
        self._rlsn._auth_blocking.check_auth_blocking = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(None),
 | 
			
		||||
            side_effect=ResourceLimitError(
 | 
			
		||||
                403, "foo", limit_type=LimitBlockingTypes.MONTHLY_ACTIVE_USER
 | 
			
		||||
            ),
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        self._rlsn._server_notices_manager.__is_room_currently_blocked = Mock(
 | 
			
		||||
        self._rlsn._is_room_currently_blocked = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable((True, []))
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        mock_event = Mock(
 | 
			
		||||
            type=EventTypes.Message, content={"msgtype": ServerNoticeMsgType}
 | 
			
		||||
        )
 | 
			
		||||
        self._rlsn._store.get_events = Mock(
 | 
			
		||||
        self._rlsn._store.get_events = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable({"123": mock_event})
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self._rlsn.maybe_send_server_notice_to_user(self.user_id))
 | 
			
		||||
@ -262,16 +268,18 @@ class TestResourceLimitsServerNoticesWithRealRooms(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
			
		||||
        self.store = self.hs.get_datastores().main
 | 
			
		||||
        self.server_notices_sender = self.hs.get_server_notices_sender()
 | 
			
		||||
        self.server_notices_manager = self.hs.get_server_notices_manager()
 | 
			
		||||
        self.event_source = self.hs.get_event_sources()
 | 
			
		||||
 | 
			
		||||
        server_notices_sender = self.hs.get_server_notices_sender()
 | 
			
		||||
        assert isinstance(server_notices_sender, ServerNoticesSender)
 | 
			
		||||
 | 
			
		||||
        # relying on [1] is far from ideal, but the only case where
 | 
			
		||||
        # ResourceLimitsServerNotices class needs to be isolated is this test,
 | 
			
		||||
        # general code should never have a reason to do so ...
 | 
			
		||||
        self._rlsn = self.server_notices_sender._server_notices[1]
 | 
			
		||||
        if not isinstance(self._rlsn, ResourceLimitsServerNotices):
 | 
			
		||||
            raise Exception("Failed to find reference to ResourceLimitsServerNotices")
 | 
			
		||||
        rlsn = list(server_notices_sender._server_notices)[1]
 | 
			
		||||
        assert isinstance(rlsn, ResourceLimitsServerNotices)
 | 
			
		||||
        self._rlsn = rlsn
 | 
			
		||||
 | 
			
		||||
        self.user_id = "@user_id:test"
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -120,6 +120,7 @@ class HaveSeenEventsTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        # Persist the event which should invalidate or prefill the
 | 
			
		||||
        # `have_seen_event` cache so we don't return stale values.
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            persistence.persist_event(
 | 
			
		||||
                event,
 | 
			
		||||
 | 
			
		||||
@ -389,6 +389,7 @@ class EventChainStoreTestCase(HomeserverTestCase):
 | 
			
		||||
        """
 | 
			
		||||
 | 
			
		||||
        persist_events_store = self.hs.get_datastores().persist_events
 | 
			
		||||
        assert persist_events_store is not None
 | 
			
		||||
 | 
			
		||||
        for e in events:
 | 
			
		||||
            e.internal_metadata.stream_ordering = self._next_stream_ordering
 | 
			
		||||
@ -397,6 +398,7 @@ class EventChainStoreTestCase(HomeserverTestCase):
 | 
			
		||||
        def _persist(txn: LoggingTransaction) -> None:
 | 
			
		||||
            # We need to persist the events to the events and state_events
 | 
			
		||||
            # tables.
 | 
			
		||||
            assert persist_events_store is not None
 | 
			
		||||
            persist_events_store._store_event_txn(
 | 
			
		||||
                txn,
 | 
			
		||||
                [(e, EventContext(self.hs.get_storage_controllers())) for e in events],
 | 
			
		||||
@ -540,7 +542,9 @@ class EventChainBackgroundUpdateTestCase(HomeserverTestCase):
 | 
			
		||||
                self.requester, events_and_context=[(event, context)]
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        state1 = set(self.get_success(context.get_current_state_ids()).values())
 | 
			
		||||
        state_ids1 = self.get_success(context.get_current_state_ids())
 | 
			
		||||
        assert state_ids1 is not None
 | 
			
		||||
        state1 = set(state_ids1.values())
 | 
			
		||||
 | 
			
		||||
        event, context = self.get_success(
 | 
			
		||||
            event_handler.create_event(
 | 
			
		||||
@ -560,7 +564,9 @@ class EventChainBackgroundUpdateTestCase(HomeserverTestCase):
 | 
			
		||||
                self.requester, events_and_context=[(event, context)]
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        state2 = set(self.get_success(context.get_current_state_ids()).values())
 | 
			
		||||
        state_ids2 = self.get_success(context.get_current_state_ids())
 | 
			
		||||
        assert state_ids2 is not None
 | 
			
		||||
        state2 = set(state_ids2.values())
 | 
			
		||||
 | 
			
		||||
        # Delete the chain cover info.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -54,6 +54,9 @@ class EventFederationWorkerStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
 | 
			
		||||
        self.store = hs.get_datastores().main
 | 
			
		||||
        persist_events = hs.get_datastores().persist_events
 | 
			
		||||
        assert persist_events is not None
 | 
			
		||||
        self.persist_events = persist_events
 | 
			
		||||
 | 
			
		||||
    def test_get_prev_events_for_room(self) -> None:
 | 
			
		||||
        room_id = "@ROOM:local"
 | 
			
		||||
@ -226,7 +229,7 @@ class EventFederationWorkerStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
                    },
 | 
			
		||||
                )
 | 
			
		||||
 | 
			
		||||
            self.hs.datastores.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
            self.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
                txn,
 | 
			
		||||
                [
 | 
			
		||||
                    cast(EventBase, FakeEvent(event_id, room_id, auth_graph[event_id]))
 | 
			
		||||
@ -445,7 +448,7 @@ class EventFederationWorkerStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
                )
 | 
			
		||||
 | 
			
		||||
            # Insert all events apart from 'B'
 | 
			
		||||
            self.hs.datastores.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
            self.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
                txn,
 | 
			
		||||
                [
 | 
			
		||||
                    cast(EventBase, FakeEvent(event_id, room_id, auth_graph[event_id]))
 | 
			
		||||
@ -464,7 +467,7 @@ class EventFederationWorkerStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
                updatevalues={"has_auth_chain_index": False},
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
            self.hs.datastores.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
            self.persist_events._persist_event_auth_chain_txn(
 | 
			
		||||
                txn,
 | 
			
		||||
                [cast(EventBase, FakeEvent("b", room_id, auth_graph["b"]))],
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
@ -40,7 +40,9 @@ class ExtremPruneTestCase(HomeserverTestCase):
 | 
			
		||||
        self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
 | 
			
		||||
    ) -> None:
 | 
			
		||||
        self.state = self.hs.get_state_handler()
 | 
			
		||||
        self._persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self._persistence = persistence
 | 
			
		||||
        self._state_storage_controller = self.hs.get_storage_controllers().state
 | 
			
		||||
        self.store = self.hs.get_datastores().main
 | 
			
		||||
 | 
			
		||||
@ -374,7 +376,9 @@ class InvalideUsersInRoomCacheTestCase(HomeserverTestCase):
 | 
			
		||||
        self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
 | 
			
		||||
    ) -> None:
 | 
			
		||||
        self.state = self.hs.get_state_handler()
 | 
			
		||||
        self._persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        persistence = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persistence is not None
 | 
			
		||||
        self._persistence = persistence
 | 
			
		||||
        self.store = self.hs.get_datastores().main
 | 
			
		||||
 | 
			
		||||
    def test_remote_user_rooms_cache_invalidated(self) -> None:
 | 
			
		||||
 | 
			
		||||
@ -16,8 +16,6 @@ import signedjson.key
 | 
			
		||||
import signedjson.types
 | 
			
		||||
import unpaddedbase64
 | 
			
		||||
 | 
			
		||||
from twisted.internet.defer import Deferred
 | 
			
		||||
 | 
			
		||||
from synapse.storage.keys import FetchKeyResult
 | 
			
		||||
 | 
			
		||||
import tests.unittest
 | 
			
		||||
@ -44,20 +42,26 @@ class KeyStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        key_id_1 = "ed25519:key1"
 | 
			
		||||
        key_id_2 = "ed25519:KEY_ID_2"
 | 
			
		||||
        d = store.store_server_verify_keys(
 | 
			
		||||
            "from_server",
 | 
			
		||||
            10,
 | 
			
		||||
            [
 | 
			
		||||
                ("server1", key_id_1, FetchKeyResult(KEY_1, 100)),
 | 
			
		||||
                ("server1", key_id_2, FetchKeyResult(KEY_2, 200)),
 | 
			
		||||
            ],
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            store.store_server_verify_keys(
 | 
			
		||||
                "from_server",
 | 
			
		||||
                10,
 | 
			
		||||
                [
 | 
			
		||||
                    ("server1", key_id_1, FetchKeyResult(KEY_1, 100)),
 | 
			
		||||
                    ("server1", key_id_2, FetchKeyResult(KEY_2, 200)),
 | 
			
		||||
                ],
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(d)
 | 
			
		||||
 | 
			
		||||
        d = store.get_server_verify_keys(
 | 
			
		||||
            [("server1", key_id_1), ("server1", key_id_2), ("server1", "ed25519:key3")]
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
            store.get_server_verify_keys(
 | 
			
		||||
                [
 | 
			
		||||
                    ("server1", key_id_1),
 | 
			
		||||
                    ("server1", key_id_2),
 | 
			
		||||
                    ("server1", "ed25519:key3"),
 | 
			
		||||
                ]
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        res = self.get_success(d)
 | 
			
		||||
 | 
			
		||||
        self.assertEqual(len(res.keys()), 3)
 | 
			
		||||
        res1 = res[("server1", key_id_1)]
 | 
			
		||||
@ -82,18 +86,20 @@ class KeyStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
        key_id_1 = "ed25519:key1"
 | 
			
		||||
        key_id_2 = "ed25519:key2"
 | 
			
		||||
 | 
			
		||||
        d = store.store_server_verify_keys(
 | 
			
		||||
            "from_server",
 | 
			
		||||
            0,
 | 
			
		||||
            [
 | 
			
		||||
                ("srv1", key_id_1, FetchKeyResult(KEY_1, 100)),
 | 
			
		||||
                ("srv1", key_id_2, FetchKeyResult(KEY_2, 200)),
 | 
			
		||||
            ],
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            store.store_server_verify_keys(
 | 
			
		||||
                "from_server",
 | 
			
		||||
                0,
 | 
			
		||||
                [
 | 
			
		||||
                    ("srv1", key_id_1, FetchKeyResult(KEY_1, 100)),
 | 
			
		||||
                    ("srv1", key_id_2, FetchKeyResult(KEY_2, 200)),
 | 
			
		||||
                ],
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(d)
 | 
			
		||||
 | 
			
		||||
        d = store.get_server_verify_keys([("srv1", key_id_1), ("srv1", key_id_2)])
 | 
			
		||||
        res = self.get_success(d)
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
            store.get_server_verify_keys([("srv1", key_id_1), ("srv1", key_id_2)])
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(len(res.keys()), 2)
 | 
			
		||||
 | 
			
		||||
        res1 = res[("srv1", key_id_1)]
 | 
			
		||||
@ -105,9 +111,7 @@ class KeyStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
        self.assertEqual(res2.valid_until_ts, 200)
 | 
			
		||||
 | 
			
		||||
        # we should be able to look up the same thing again without a db hit
 | 
			
		||||
        res = store.get_server_verify_keys([("srv1", key_id_1)])
 | 
			
		||||
        if isinstance(res, Deferred):
 | 
			
		||||
            res = self.successResultOf(res)
 | 
			
		||||
        res = self.get_success(store.get_server_verify_keys([("srv1", key_id_1)]))
 | 
			
		||||
        self.assertEqual(len(res.keys()), 1)
 | 
			
		||||
        self.assertEqual(res[("srv1", key_id_1)].verify_key, KEY_1)
 | 
			
		||||
 | 
			
		||||
@ -119,8 +123,9 @@ class KeyStoreTestCase(tests.unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(d)
 | 
			
		||||
 | 
			
		||||
        d = store.get_server_verify_keys([("srv1", key_id_1), ("srv1", key_id_2)])
 | 
			
		||||
        res = self.get_success(d)
 | 
			
		||||
        res = self.get_success(
 | 
			
		||||
            store.get_server_verify_keys([("srv1", key_id_1), ("srv1", key_id_2)])
 | 
			
		||||
        )
 | 
			
		||||
        self.assertEqual(len(res.keys()), 2)
 | 
			
		||||
 | 
			
		||||
        res1 = res[("srv1", key_id_1)]
 | 
			
		||||
 | 
			
		||||
@ -112,7 +112,7 @@ class PurgeTests(HomeserverTestCase):
 | 
			
		||||
                self.room_id, "m.room.create", ""
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
        self.assertIsNotNone(create_event)
 | 
			
		||||
        assert create_event is not None
 | 
			
		||||
 | 
			
		||||
        # Purge everything before this topological token
 | 
			
		||||
        self.get_success(
 | 
			
		||||
 | 
			
		||||
@ -37,9 +37,9 @@ class ReceiptTestCase(HomeserverTestCase):
 | 
			
		||||
        self.store = homeserver.get_datastores().main
 | 
			
		||||
 | 
			
		||||
        self.room_creator = homeserver.get_room_creation_handler()
 | 
			
		||||
        self.persist_event_storage_controller = (
 | 
			
		||||
            self.hs.get_storage_controllers().persistence
 | 
			
		||||
        )
 | 
			
		||||
        persist_event_storage_controller = self.hs.get_storage_controllers().persistence
 | 
			
		||||
        assert persist_event_storage_controller is not None
 | 
			
		||||
        self.persist_event_storage_controller = persist_event_storage_controller
 | 
			
		||||
 | 
			
		||||
        # Create a test user
 | 
			
		||||
        self.ourUser = UserID.from_string(OUR_USER_ID)
 | 
			
		||||
 | 
			
		||||
@ -119,7 +119,6 @@ class EventSearchInsertionTest(HomeserverTestCase):
 | 
			
		||||
            "content": {"msgtype": "m.text", "body": 2},
 | 
			
		||||
            "room_id": room_id,
 | 
			
		||||
            "sender": user_id,
 | 
			
		||||
            "depth": prev_event.depth + 1,
 | 
			
		||||
            "prev_events": prev_event_ids,
 | 
			
		||||
            "origin_server_ts": self.clock.time_msec(),
 | 
			
		||||
        }
 | 
			
		||||
@ -134,7 +133,7 @@ class EventSearchInsertionTest(HomeserverTestCase):
 | 
			
		||||
                    prev_state_map,
 | 
			
		||||
                    for_verification=False,
 | 
			
		||||
                ),
 | 
			
		||||
                depth=event_dict["depth"],
 | 
			
		||||
                depth=prev_event.depth + 1,
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -16,7 +16,7 @@ from typing import List
 | 
			
		||||
 | 
			
		||||
from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
from synapse.api.constants import EventTypes, RelationTypes
 | 
			
		||||
from synapse.api.constants import Direction, EventTypes, RelationTypes
 | 
			
		||||
from synapse.api.filtering import Filter
 | 
			
		||||
from synapse.rest import admin
 | 
			
		||||
from synapse.rest.client import login, room
 | 
			
		||||
@ -128,7 +128,7 @@ class PaginationTestCase(HomeserverTestCase):
 | 
			
		||||
                room_id=self.room_id,
 | 
			
		||||
                from_key=self.from_token.room_key,
 | 
			
		||||
                to_key=None,
 | 
			
		||||
                direction="f",
 | 
			
		||||
                direction=Direction.FORWARDS,
 | 
			
		||||
                limit=10,
 | 
			
		||||
                event_filter=Filter(self.hs, filter),
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
@ -14,6 +14,7 @@
 | 
			
		||||
from unittest.mock import MagicMock, patch
 | 
			
		||||
 | 
			
		||||
from synapse.storage.database import make_conn
 | 
			
		||||
from synapse.storage.engines import PostgresEngine
 | 
			
		||||
from synapse.storage.engines._base import IncorrectDatabaseSetup
 | 
			
		||||
 | 
			
		||||
from tests.unittest import HomeserverTestCase
 | 
			
		||||
@ -38,6 +39,7 @@ class UnsafeLocaleTest(HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
    def test_safe_locale(self) -> None:
 | 
			
		||||
        database = self.hs.get_datastores().databases[0]
 | 
			
		||||
        assert isinstance(database.engine, PostgresEngine)
 | 
			
		||||
 | 
			
		||||
        db_conn = make_conn(database._database_config, database.engine, "test_unsafe")
 | 
			
		||||
        with db_conn.cursor() as txn:
 | 
			
		||||
 | 
			
		||||
@ -12,17 +12,17 @@
 | 
			
		||||
# See the License for the specific language governing permissions and
 | 
			
		||||
# limitations under the License.
 | 
			
		||||
 | 
			
		||||
from typing import Optional, Union
 | 
			
		||||
from typing import Collection, List, Optional, Union
 | 
			
		||||
from unittest.mock import Mock
 | 
			
		||||
 | 
			
		||||
from twisted.internet.defer import succeed
 | 
			
		||||
from twisted.test.proto_helpers import MemoryReactor
 | 
			
		||||
 | 
			
		||||
from synapse.api.errors import FederationError
 | 
			
		||||
from synapse.api.room_versions import RoomVersions
 | 
			
		||||
from synapse.api.room_versions import RoomVersion, RoomVersions
 | 
			
		||||
from synapse.events import EventBase, make_event_from_dict
 | 
			
		||||
from synapse.events.snapshot import EventContext
 | 
			
		||||
from synapse.federation.federation_base import event_from_pdu_json
 | 
			
		||||
from synapse.handlers.device import DeviceListUpdater
 | 
			
		||||
from synapse.http.types import QueryParams
 | 
			
		||||
from synapse.logging.context import LoggingContext
 | 
			
		||||
from synapse.server import HomeServer
 | 
			
		||||
@ -81,11 +81,15 @@ class MessageAcceptTests(unittest.HomeserverTestCase):
 | 
			
		||||
        ) -> None:
 | 
			
		||||
            pass
 | 
			
		||||
 | 
			
		||||
        federation_event_handler._check_event_auth = _check_event_auth
 | 
			
		||||
        federation_event_handler._check_event_auth = _check_event_auth  # type: ignore[assignment]
 | 
			
		||||
        self.client = self.hs.get_federation_client()
 | 
			
		||||
        self.client._check_sigs_and_hash_for_pulled_events_and_fetch = (
 | 
			
		||||
            lambda dest, pdus, **k: succeed(pdus)
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
        async def _check_sigs_and_hash_for_pulled_events_and_fetch(
 | 
			
		||||
            dest: str, pdus: Collection[EventBase], room_version: RoomVersion
 | 
			
		||||
        ) -> List[EventBase]:
 | 
			
		||||
            return list(pdus)
 | 
			
		||||
 | 
			
		||||
        self.client._check_sigs_and_hash_for_pulled_events_and_fetch = _check_sigs_and_hash_for_pulled_events_and_fetch  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Send the join, it should return None (which is not an error)
 | 
			
		||||
        self.assertEqual(
 | 
			
		||||
@ -187,7 +191,7 @@ class MessageAcceptTests(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Register the mock on the federation client.
 | 
			
		||||
        federation_client = self.hs.get_federation_client()
 | 
			
		||||
        federation_client.query_user_devices = Mock(side_effect=query_user_devices)
 | 
			
		||||
        federation_client.query_user_devices = Mock(side_effect=query_user_devices)  # type: ignore[assignment]
 | 
			
		||||
 | 
			
		||||
        # Register a mock on the store so that the incoming update doesn't fail because
 | 
			
		||||
        # we don't share a room with the user.
 | 
			
		||||
@ -197,6 +201,7 @@ class MessageAcceptTests(unittest.HomeserverTestCase):
 | 
			
		||||
        # Manually inject a fake device list update. We need this update to include at
 | 
			
		||||
        # least one prev_id so that the user's device list will need to be retried.
 | 
			
		||||
        device_list_updater = self.hs.get_device_handler().device_list_updater
 | 
			
		||||
        assert isinstance(device_list_updater, DeviceListUpdater)
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            device_list_updater.incoming_device_list_update(
 | 
			
		||||
                origin=remote_origin,
 | 
			
		||||
@ -236,7 +241,7 @@ class MessageAcceptTests(unittest.HomeserverTestCase):
 | 
			
		||||
 | 
			
		||||
        # Register mock device list retrieval on the federation client.
 | 
			
		||||
        federation_client = self.hs.get_federation_client()
 | 
			
		||||
        federation_client.query_user_devices = Mock(
 | 
			
		||||
        federation_client.query_user_devices = Mock(  # type: ignore[assignment]
 | 
			
		||||
            return_value=make_awaitable(
 | 
			
		||||
                {
 | 
			
		||||
                    "user_id": remote_user_id,
 | 
			
		||||
@ -269,16 +274,18 @@ class MessageAcceptTests(unittest.HomeserverTestCase):
 | 
			
		||||
        keys = self.get_success(
 | 
			
		||||
            self.store.get_e2e_cross_signing_keys_bulk(user_ids=[remote_user_id]),
 | 
			
		||||
        )
 | 
			
		||||
        self.assertTrue(remote_user_id in keys)
 | 
			
		||||
        self.assertIn(remote_user_id, keys)
 | 
			
		||||
        key = keys[remote_user_id]
 | 
			
		||||
        assert key is not None
 | 
			
		||||
 | 
			
		||||
        # Check that the master key is the one returned by the mock.
 | 
			
		||||
        master_key = keys[remote_user_id]["master"]
 | 
			
		||||
        master_key = key["master"]
 | 
			
		||||
        self.assertEqual(len(master_key["keys"]), 1)
 | 
			
		||||
        self.assertTrue("ed25519:" + remote_master_key in master_key["keys"].keys())
 | 
			
		||||
        self.assertTrue(remote_master_key in master_key["keys"].values())
 | 
			
		||||
 | 
			
		||||
        # Check that the self-signing key is the one returned by the mock.
 | 
			
		||||
        self_signing_key = keys[remote_user_id]["self_signing"]
 | 
			
		||||
        self_signing_key = key["self_signing"]
 | 
			
		||||
        self.assertEqual(len(self_signing_key["keys"]), 1)
 | 
			
		||||
        self.assertTrue(
 | 
			
		||||
            "ed25519:" + remote_self_signing_key in self_signing_key["keys"].keys(),
 | 
			
		||||
 | 
			
		||||
@ -33,7 +33,7 @@ class PhoneHomeStatsTestCase(HomeserverTestCase):
 | 
			
		||||
        If time doesn't move, don't error out.
 | 
			
		||||
        """
 | 
			
		||||
        past_stats = [
 | 
			
		||||
            (self.hs.get_clock().time(), resource.getrusage(resource.RUSAGE_SELF))
 | 
			
		||||
            (int(self.hs.get_clock().time()), resource.getrusage(resource.RUSAGE_SELF))
 | 
			
		||||
        ]
 | 
			
		||||
        stats: JsonDict = {}
 | 
			
		||||
        self.get_success(phone_stats_home(self.hs, stats, past_stats))
 | 
			
		||||
 | 
			
		||||
@ -35,6 +35,8 @@ class FilterEventsForServerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        self.event_creation_handler = self.hs.get_event_creation_handler()
 | 
			
		||||
        self.event_builder_factory = self.hs.get_event_builder_factory()
 | 
			
		||||
        self._storage_controllers = self.hs.get_storage_controllers()
 | 
			
		||||
        assert self._storage_controllers.persistence is not None
 | 
			
		||||
        self._persistence = self._storage_controllers.persistence
 | 
			
		||||
 | 
			
		||||
        self.get_success(create_room(self.hs, TEST_ROOM_ID, "@someone:ROOM"))
 | 
			
		||||
 | 
			
		||||
@ -179,9 +181,7 @@ class FilterEventsForServerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
            self.event_creation_handler.create_new_client_event(builder)
 | 
			
		||||
        )
 | 
			
		||||
        context = self.get_success(unpersisted_context.persist(event))
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self._storage_controllers.persistence.persist_event(event, context)
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self._persistence.persist_event(event, context))
 | 
			
		||||
        return event
 | 
			
		||||
 | 
			
		||||
    def _inject_room_member(
 | 
			
		||||
@ -208,9 +208,7 @@ class FilterEventsForServerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
        context = self.get_success(unpersisted_context.persist(event))
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self._storage_controllers.persistence.persist_event(event, context)
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self._persistence.persist_event(event, context))
 | 
			
		||||
        return event
 | 
			
		||||
 | 
			
		||||
    def _inject_message(
 | 
			
		||||
@ -233,9 +231,7 @@ class FilterEventsForServerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        )
 | 
			
		||||
        context = self.get_success(unpersisted_context.persist(event))
 | 
			
		||||
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self._storage_controllers.persistence.persist_event(event, context)
 | 
			
		||||
        )
 | 
			
		||||
        self.get_success(self._persistence.persist_event(event, context))
 | 
			
		||||
        return event
 | 
			
		||||
 | 
			
		||||
    def _inject_outlier(self) -> EventBase:
 | 
			
		||||
@ -253,7 +249,7 @@ class FilterEventsForServerTestCase(unittest.HomeserverTestCase):
 | 
			
		||||
        event = self.get_success(builder.build(prev_event_ids=[], auth_event_ids=[]))
 | 
			
		||||
        event.internal_metadata.outlier = True
 | 
			
		||||
        self.get_success(
 | 
			
		||||
            self._storage_controllers.persistence.persist_event(
 | 
			
		||||
            self._persistence.persist_event(
 | 
			
		||||
                event, EventContext.for_outlier(self._storage_controllers)
 | 
			
		||||
            )
 | 
			
		||||
        )
 | 
			
		||||
 | 
			
		||||
@ -361,7 +361,9 @@ class HomeserverTestCase(TestCase):
 | 
			
		||||
                store.db_pool.updates.do_next_background_update(False), by=0.1
 | 
			
		||||
            )
 | 
			
		||||
 | 
			
		||||
    def make_homeserver(self, reactor: ThreadedMemoryReactorClock, clock: Clock):
 | 
			
		||||
    def make_homeserver(
 | 
			
		||||
        self, reactor: ThreadedMemoryReactorClock, clock: Clock
 | 
			
		||||
    ) -> HomeServer:
 | 
			
		||||
        """
 | 
			
		||||
        Make and return a homeserver.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@ -54,6 +54,7 @@ class RetryLimiterTestCase(HomeserverTestCase):
 | 
			
		||||
        self.pump()
 | 
			
		||||
 | 
			
		||||
        new_timings = self.get_success(store.get_destination_retry_timings("test_dest"))
 | 
			
		||||
        assert new_timings is not None
 | 
			
		||||
        self.assertEqual(new_timings.failure_ts, failure_ts)
 | 
			
		||||
        self.assertEqual(new_timings.retry_last_ts, failure_ts)
 | 
			
		||||
        self.assertEqual(new_timings.retry_interval, MIN_RETRY_INTERVAL)
 | 
			
		||||
@ -82,6 +83,7 @@ class RetryLimiterTestCase(HomeserverTestCase):
 | 
			
		||||
        self.pump()
 | 
			
		||||
 | 
			
		||||
        new_timings = self.get_success(store.get_destination_retry_timings("test_dest"))
 | 
			
		||||
        assert new_timings is not None
 | 
			
		||||
        self.assertEqual(new_timings.failure_ts, failure_ts)
 | 
			
		||||
        self.assertEqual(new_timings.retry_last_ts, retry_ts)
 | 
			
		||||
        self.assertGreaterEqual(
 | 
			
		||||
 | 
			
		||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user