2021-04-06 16:38:30 +03:00
|
|
|
#
|
2023-11-21 23:29:58 +03:00
|
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
|
|
#
|
2024-01-23 14:26:48 +03:00
|
|
|
# Copyright 2021 The Matrix.org Foundation C.I.C.
|
2023-11-21 23:29:58 +03:00
|
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Affero General Public License as
|
|
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
|
|
# License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# See the GNU Affero General Public License for more details:
|
|
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
|
|
#
|
|
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
|
|
#
|
|
|
|
# [This file includes modifications made by New Vector Limited]
|
2021-04-06 16:38:30 +03:00
|
|
|
#
|
|
|
|
#
|
|
|
|
from typing import Dict, Iterable, List, Optional, Set, Tuple, Union
|
2023-08-25 16:27:21 +03:00
|
|
|
from unittest.mock import AsyncMock, Mock
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
import attr
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
from synapse.api.constants import EduTypes
|
2021-08-17 16:22:45 +03:00
|
|
|
from synapse.events.presence_router import PresenceRouter, load_legacy_presence_router
|
2021-04-06 16:38:30 +03:00
|
|
|
from synapse.federation.units import Transaction
|
|
|
|
from synapse.handlers.presence import UserPresenceState
|
|
|
|
from synapse.module_api import ModuleApi
|
|
|
|
from synapse.rest import admin
|
2021-08-17 14:57:58 +03:00
|
|
|
from synapse.rest.client import login, presence, room
|
2023-01-25 23:14:03 +03:00
|
|
|
from synapse.server import HomeServer
|
2021-04-06 16:38:30 +03:00
|
|
|
from synapse.types import JsonDict, StreamToken, create_requester
|
2023-01-25 23:14:03 +03:00
|
|
|
from synapse.util import Clock
|
2021-04-06 16:38:30 +03:00
|
|
|
|
2024-05-16 19:54:46 +03:00
|
|
|
from tests.handlers.test_sync import SyncRequestKey, SyncVersion, generate_sync_config
|
2023-02-09 03:23:35 +03:00
|
|
|
from tests.unittest import (
|
|
|
|
FederatingHomeserverTestCase,
|
|
|
|
HomeserverTestCase,
|
|
|
|
override_config,
|
|
|
|
)
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
|
|
|
|
@attr.s
|
|
|
|
class PresenceRouterTestConfig:
|
|
|
|
users_who_should_receive_all_presence = attr.ib(type=List[str], default=[])
|
|
|
|
|
|
|
|
|
2021-08-17 16:22:45 +03:00
|
|
|
class LegacyPresenceRouterTestModule:
|
2021-04-06 16:38:30 +03:00
|
|
|
def __init__(self, config: PresenceRouterTestConfig, module_api: ModuleApi):
|
|
|
|
self._config = config
|
|
|
|
self._module_api = module_api
|
|
|
|
|
|
|
|
async def get_users_for_states(
|
|
|
|
self, state_updates: Iterable[UserPresenceState]
|
|
|
|
) -> Dict[str, Set[UserPresenceState]]:
|
|
|
|
users_to_state = {
|
|
|
|
user_id: set(state_updates)
|
|
|
|
for user_id in self._config.users_who_should_receive_all_presence
|
|
|
|
}
|
|
|
|
return users_to_state
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
async def get_interested_users(self, user_id: str) -> Union[Set[str], str]:
|
2021-04-06 16:38:30 +03:00
|
|
|
if user_id in self._config.users_who_should_receive_all_presence:
|
|
|
|
return PresenceRouter.ALL_USERS
|
|
|
|
|
|
|
|
return set()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def parse_config(config_dict: dict) -> PresenceRouterTestConfig:
|
|
|
|
"""Parse a configuration dictionary from the homeserver config, do
|
|
|
|
some validation and return a typed PresenceRouterConfig.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
config_dict: The configuration dictionary.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A validated config object.
|
|
|
|
"""
|
|
|
|
# Initialise a typed config object
|
|
|
|
config = PresenceRouterTestConfig()
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
users_who_should_receive_all_presence = config_dict.get(
|
2021-04-06 16:38:30 +03:00
|
|
|
"users_who_should_receive_all_presence"
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
assert isinstance(users_who_should_receive_all_presence, list)
|
|
|
|
|
|
|
|
config.users_who_should_receive_all_presence = (
|
|
|
|
users_who_should_receive_all_presence
|
|
|
|
)
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
return config
|
|
|
|
|
|
|
|
|
2021-08-17 16:22:45 +03:00
|
|
|
class PresenceRouterTestModule:
|
|
|
|
def __init__(self, config: PresenceRouterTestConfig, api: ModuleApi):
|
|
|
|
self._config = config
|
|
|
|
self._module_api = api
|
|
|
|
api.register_presence_router_callbacks(
|
|
|
|
get_users_for_states=self.get_users_for_states,
|
|
|
|
get_interested_users=self.get_interested_users,
|
|
|
|
)
|
|
|
|
|
|
|
|
async def get_users_for_states(
|
|
|
|
self, state_updates: Iterable[UserPresenceState]
|
|
|
|
) -> Dict[str, Set[UserPresenceState]]:
|
|
|
|
users_to_state = {
|
|
|
|
user_id: set(state_updates)
|
|
|
|
for user_id in self._config.users_who_should_receive_all_presence
|
|
|
|
}
|
|
|
|
return users_to_state
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
async def get_interested_users(self, user_id: str) -> Union[Set[str], str]:
|
2021-08-17 16:22:45 +03:00
|
|
|
if user_id in self._config.users_who_should_receive_all_presence:
|
|
|
|
return PresenceRouter.ALL_USERS
|
|
|
|
|
|
|
|
return set()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def parse_config(config_dict: dict) -> PresenceRouterTestConfig:
|
|
|
|
"""Parse a configuration dictionary from the homeserver config, do
|
|
|
|
some validation and return a typed PresenceRouterConfig.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
config_dict: The configuration dictionary.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A validated config object.
|
|
|
|
"""
|
|
|
|
# Initialise a typed config object
|
|
|
|
config = PresenceRouterTestConfig()
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
users_who_should_receive_all_presence = config_dict.get(
|
2021-08-17 16:22:45 +03:00
|
|
|
"users_who_should_receive_all_presence"
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
assert isinstance(users_who_should_receive_all_presence, list)
|
|
|
|
|
|
|
|
config.users_who_should_receive_all_presence = (
|
|
|
|
users_who_should_receive_all_presence
|
|
|
|
)
|
2021-08-17 16:22:45 +03:00
|
|
|
|
|
|
|
return config
|
|
|
|
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
class PresenceRouterTestCase(FederatingHomeserverTestCase):
|
2022-12-01 15:38:27 +03:00
|
|
|
"""
|
|
|
|
Test cases using a custom PresenceRouter
|
|
|
|
|
|
|
|
By default in test cases, federation sending is disabled. This class re-enables it
|
|
|
|
for the main process by setting `federation_sender_instances` to None.
|
|
|
|
"""
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
servlets = [
|
|
|
|
admin.register_servlets,
|
|
|
|
login.register_servlets,
|
|
|
|
room.register_servlets,
|
|
|
|
presence.register_servlets,
|
|
|
|
]
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
|
2021-09-30 18:03:29 +03:00
|
|
|
# Mock out the calls over federation.
|
2023-02-14 22:03:35 +03:00
|
|
|
self.fed_transport_client = Mock(spec=["send_transaction"])
|
2023-08-25 16:27:21 +03:00
|
|
|
self.fed_transport_client.send_transaction = AsyncMock(return_value={})
|
2021-09-30 18:03:29 +03:00
|
|
|
|
2021-08-17 16:22:45 +03:00
|
|
|
hs = self.setup_test_homeserver(
|
2023-02-14 22:03:35 +03:00
|
|
|
federation_transport_client=self.fed_transport_client,
|
2021-04-06 16:38:30 +03:00
|
|
|
)
|
2021-08-17 16:22:45 +03:00
|
|
|
|
|
|
|
load_legacy_presence_router(hs)
|
|
|
|
|
|
|
|
return hs
|
2021-04-06 16:38:30 +03:00
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
def prepare(
|
|
|
|
self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
|
|
|
|
) -> None:
|
2021-04-06 16:38:30 +03:00
|
|
|
self.sync_handler = self.hs.get_sync_handler()
|
|
|
|
self.module_api = homeserver.get_module_api()
|
|
|
|
|
2022-12-01 15:38:27 +03:00
|
|
|
def default_config(self) -> JsonDict:
|
|
|
|
config = super().default_config()
|
|
|
|
config["federation_sender_instances"] = None
|
|
|
|
return config
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
@override_config(
|
|
|
|
{
|
|
|
|
"presence": {
|
|
|
|
"presence_router": {
|
2021-08-17 16:22:45 +03:00
|
|
|
"module": __name__ + ".LegacyPresenceRouterTestModule",
|
2021-04-06 16:38:30 +03:00
|
|
|
"config": {
|
|
|
|
"users_who_should_receive_all_presence": [
|
|
|
|
"@presence_gobbler:test",
|
|
|
|
]
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
def test_receiving_all_presence_legacy(self) -> None:
|
2021-08-17 16:22:45 +03:00
|
|
|
self.receiving_all_presence_test_body()
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
{
|
|
|
|
"modules": [
|
|
|
|
{
|
|
|
|
"module": __name__ + ".PresenceRouterTestModule",
|
|
|
|
"config": {
|
|
|
|
"users_who_should_receive_all_presence": [
|
|
|
|
"@presence_gobbler:test",
|
|
|
|
]
|
|
|
|
},
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
def test_receiving_all_presence(self) -> None:
|
2021-08-17 16:22:45 +03:00
|
|
|
self.receiving_all_presence_test_body()
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
def receiving_all_presence_test_body(self) -> None:
|
2021-04-06 16:38:30 +03:00
|
|
|
"""Test that a user that does not share a room with another other can receive
|
|
|
|
presence for them, due to presence routing.
|
|
|
|
"""
|
|
|
|
# Create a user who should receive all presence of others
|
|
|
|
self.presence_receiving_user_id = self.register_user(
|
|
|
|
"presence_gobbler", "monkey"
|
|
|
|
)
|
|
|
|
self.presence_receiving_user_tok = self.login("presence_gobbler", "monkey")
|
|
|
|
|
|
|
|
# And two users who should not have any special routing
|
|
|
|
self.other_user_one_id = self.register_user("other_user_one", "monkey")
|
|
|
|
self.other_user_one_tok = self.login("other_user_one", "monkey")
|
|
|
|
self.other_user_two_id = self.register_user("other_user_two", "monkey")
|
|
|
|
self.other_user_two_tok = self.login("other_user_two", "monkey")
|
|
|
|
|
|
|
|
# Put the other two users in a room with each other
|
|
|
|
room_id = self.helper.create_room_as(
|
|
|
|
self.other_user_one_id, tok=self.other_user_one_tok
|
|
|
|
)
|
|
|
|
|
|
|
|
self.helper.invite(
|
|
|
|
room_id,
|
|
|
|
self.other_user_one_id,
|
|
|
|
self.other_user_two_id,
|
|
|
|
tok=self.other_user_one_tok,
|
|
|
|
)
|
|
|
|
self.helper.join(room_id, self.other_user_two_id, tok=self.other_user_two_tok)
|
|
|
|
# User one sends some presence
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.other_user_one_id,
|
|
|
|
self.other_user_one_tok,
|
|
|
|
"online",
|
|
|
|
"boop",
|
|
|
|
)
|
|
|
|
|
|
|
|
# Check that the presence receiving user gets user one's presence when syncing
|
|
|
|
presence_updates, sync_token = sync_presence(
|
|
|
|
self, self.presence_receiving_user_id
|
|
|
|
)
|
|
|
|
self.assertEqual(len(presence_updates), 1)
|
|
|
|
|
2021-07-13 13:52:58 +03:00
|
|
|
presence_update: UserPresenceState = presence_updates[0]
|
2021-04-06 16:38:30 +03:00
|
|
|
self.assertEqual(presence_update.user_id, self.other_user_one_id)
|
|
|
|
self.assertEqual(presence_update.state, "online")
|
|
|
|
self.assertEqual(presence_update.status_msg, "boop")
|
|
|
|
|
|
|
|
# Have all three users send presence
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.other_user_one_id,
|
|
|
|
self.other_user_one_tok,
|
|
|
|
"online",
|
|
|
|
"user_one",
|
|
|
|
)
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.other_user_two_id,
|
|
|
|
self.other_user_two_tok,
|
|
|
|
"online",
|
|
|
|
"user_two",
|
|
|
|
)
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.presence_receiving_user_id,
|
|
|
|
self.presence_receiving_user_tok,
|
|
|
|
"online",
|
|
|
|
"presence_gobbler",
|
|
|
|
)
|
|
|
|
|
|
|
|
# Check that the presence receiving user gets everyone's presence
|
|
|
|
presence_updates, _ = sync_presence(
|
|
|
|
self, self.presence_receiving_user_id, sync_token
|
|
|
|
)
|
|
|
|
self.assertEqual(len(presence_updates), 3)
|
|
|
|
|
|
|
|
# But that User One only get itself and User Two's presence
|
|
|
|
presence_updates, _ = sync_presence(self, self.other_user_one_id)
|
|
|
|
self.assertEqual(len(presence_updates), 2)
|
|
|
|
|
|
|
|
found = False
|
|
|
|
for update in presence_updates:
|
|
|
|
if update.user_id == self.other_user_two_id:
|
|
|
|
self.assertEqual(update.state, "online")
|
|
|
|
self.assertEqual(update.status_msg, "user_two")
|
|
|
|
found = True
|
|
|
|
|
|
|
|
self.assertTrue(found)
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
{
|
|
|
|
"presence": {
|
|
|
|
"presence_router": {
|
2021-08-17 16:22:45 +03:00
|
|
|
"module": __name__ + ".LegacyPresenceRouterTestModule",
|
2021-04-06 16:38:30 +03:00
|
|
|
"config": {
|
|
|
|
"users_who_should_receive_all_presence": [
|
|
|
|
"@presence_gobbler1:test",
|
|
|
|
"@presence_gobbler2:test",
|
|
|
|
"@far_away_person:island",
|
|
|
|
]
|
|
|
|
},
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
def test_send_local_online_presence_to_with_module_legacy(self) -> None:
|
2021-08-17 16:22:45 +03:00
|
|
|
self.send_local_online_presence_to_with_module_test_body()
|
|
|
|
|
|
|
|
@override_config(
|
|
|
|
{
|
|
|
|
"modules": [
|
|
|
|
{
|
|
|
|
"module": __name__ + ".PresenceRouterTestModule",
|
|
|
|
"config": {
|
|
|
|
"users_who_should_receive_all_presence": [
|
|
|
|
"@presence_gobbler1:test",
|
|
|
|
"@presence_gobbler2:test",
|
|
|
|
"@far_away_person:island",
|
|
|
|
]
|
|
|
|
},
|
|
|
|
},
|
|
|
|
],
|
|
|
|
}
|
|
|
|
)
|
2023-01-25 23:14:03 +03:00
|
|
|
def test_send_local_online_presence_to_with_module(self) -> None:
|
2021-08-17 16:22:45 +03:00
|
|
|
self.send_local_online_presence_to_with_module_test_body()
|
|
|
|
|
2023-01-25 23:14:03 +03:00
|
|
|
def send_local_online_presence_to_with_module_test_body(self) -> None:
|
2021-04-06 16:38:30 +03:00
|
|
|
"""Tests that send_local_presence_to_users sends local online presence to a set
|
|
|
|
of specified local and remote users, with a custom PresenceRouter module enabled.
|
|
|
|
"""
|
|
|
|
# Create a user who will send presence updates
|
|
|
|
self.other_user_id = self.register_user("other_user", "monkey")
|
|
|
|
self.other_user_tok = self.login("other_user", "monkey")
|
|
|
|
|
|
|
|
# And another two users that will also send out presence updates, as well as receive
|
|
|
|
# theirs and everyone else's
|
|
|
|
self.presence_receiving_user_one_id = self.register_user(
|
|
|
|
"presence_gobbler1", "monkey"
|
|
|
|
)
|
|
|
|
self.presence_receiving_user_one_tok = self.login("presence_gobbler1", "monkey")
|
|
|
|
self.presence_receiving_user_two_id = self.register_user(
|
|
|
|
"presence_gobbler2", "monkey"
|
|
|
|
)
|
|
|
|
self.presence_receiving_user_two_tok = self.login("presence_gobbler2", "monkey")
|
|
|
|
|
|
|
|
# Have all three users send some presence updates
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.other_user_id,
|
|
|
|
self.other_user_tok,
|
|
|
|
"online",
|
|
|
|
"I'm online!",
|
|
|
|
)
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.presence_receiving_user_one_id,
|
|
|
|
self.presence_receiving_user_one_tok,
|
|
|
|
"online",
|
|
|
|
"I'm also online!",
|
|
|
|
)
|
|
|
|
send_presence_update(
|
|
|
|
self,
|
|
|
|
self.presence_receiving_user_two_id,
|
|
|
|
self.presence_receiving_user_two_tok,
|
|
|
|
"unavailable",
|
|
|
|
"I'm in a meeting!",
|
|
|
|
)
|
|
|
|
|
|
|
|
# Mark each presence-receiving user for receiving all user presence
|
|
|
|
self.get_success(
|
|
|
|
self.module_api.send_local_online_presence_to(
|
|
|
|
[
|
|
|
|
self.presence_receiving_user_one_id,
|
|
|
|
self.presence_receiving_user_two_id,
|
|
|
|
]
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
# Perform a sync for each user
|
|
|
|
|
|
|
|
# The other user should only receive their own presence
|
|
|
|
presence_updates, _ = sync_presence(self, self.other_user_id)
|
|
|
|
self.assertEqual(len(presence_updates), 1)
|
|
|
|
|
2021-07-13 13:52:58 +03:00
|
|
|
presence_update: UserPresenceState = presence_updates[0]
|
2021-04-06 16:38:30 +03:00
|
|
|
self.assertEqual(presence_update.user_id, self.other_user_id)
|
|
|
|
self.assertEqual(presence_update.state, "online")
|
|
|
|
self.assertEqual(presence_update.status_msg, "I'm online!")
|
|
|
|
|
|
|
|
# Whereas both presence receiving users should receive everyone's presence updates
|
|
|
|
presence_updates, _ = sync_presence(self, self.presence_receiving_user_one_id)
|
|
|
|
self.assertEqual(len(presence_updates), 3)
|
|
|
|
presence_updates, _ = sync_presence(self, self.presence_receiving_user_two_id)
|
|
|
|
self.assertEqual(len(presence_updates), 3)
|
|
|
|
|
2021-07-15 13:52:56 +03:00
|
|
|
# We stagger sending of presence, so we need to wait a bit for them to
|
|
|
|
# get sent out.
|
|
|
|
self.reactor.advance(60)
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
# Test that sending to a remote user works
|
|
|
|
remote_user_id = "@far_away_person:island"
|
|
|
|
|
|
|
|
# Note that due to the remote user being in our module's
|
|
|
|
# users_who_should_receive_all_presence config, they would have
|
|
|
|
# received user presence updates already.
|
|
|
|
#
|
|
|
|
# Thus we reset the mock, and try sending all online local user
|
|
|
|
# presence again
|
2023-02-14 22:03:35 +03:00
|
|
|
self.fed_transport_client.send_transaction.reset_mock()
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
# Broadcast local user online presence
|
|
|
|
self.get_success(
|
|
|
|
self.module_api.send_local_online_presence_to([remote_user_id])
|
|
|
|
)
|
|
|
|
|
2021-07-15 13:52:56 +03:00
|
|
|
# We stagger sending of presence, so we need to wait a bit for them to
|
|
|
|
# get sent out.
|
|
|
|
self.reactor.advance(60)
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
# Check that the expected presence updates were sent
|
2021-05-18 16:13:45 +03:00
|
|
|
# We explicitly compare using sets as we expect that calling
|
|
|
|
# module_api.send_local_online_presence_to will create a presence
|
|
|
|
# update that is a duplicate of the specified user's current presence.
|
|
|
|
# These are sent to clients and will be picked up below, thus we use a
|
|
|
|
# set to deduplicate. We're just interested that non-offline updates were
|
|
|
|
# sent out for each user ID.
|
|
|
|
expected_users = {
|
2021-04-06 16:38:30 +03:00
|
|
|
self.other_user_id,
|
|
|
|
self.presence_receiving_user_one_id,
|
|
|
|
self.presence_receiving_user_two_id,
|
2021-05-18 16:13:45 +03:00
|
|
|
}
|
|
|
|
found_users = set()
|
2021-04-06 16:38:30 +03:00
|
|
|
|
2023-02-14 22:03:35 +03:00
|
|
|
calls = self.fed_transport_client.send_transaction.call_args_list
|
2021-04-06 16:38:30 +03:00
|
|
|
for call in calls:
|
2021-04-09 20:44:38 +03:00
|
|
|
call_args = call[0]
|
2021-07-13 13:52:58 +03:00
|
|
|
federation_transaction: Transaction = call_args[0]
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
# Get the sent EDUs in this transaction
|
|
|
|
edus = federation_transaction.get_dict()["edus"]
|
|
|
|
|
|
|
|
for edu in edus:
|
|
|
|
# Make sure we're only checking presence-type EDUs
|
2022-05-27 14:14:36 +03:00
|
|
|
if edu["edu_type"] != EduTypes.PRESENCE:
|
2021-04-06 16:38:30 +03:00
|
|
|
continue
|
|
|
|
|
|
|
|
# EDUs can contain multiple presence updates
|
2023-01-25 23:14:03 +03:00
|
|
|
for presence_edu in edu["content"]["push"]:
|
2021-04-06 16:38:30 +03:00
|
|
|
# Check for presence updates that contain the user IDs we're after
|
2023-01-25 23:14:03 +03:00
|
|
|
found_users.add(presence_edu["user_id"])
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
# Ensure that no offline states are being sent out
|
2023-01-25 23:14:03 +03:00
|
|
|
self.assertNotEqual(presence_edu["presence"], "offline")
|
2021-04-06 16:38:30 +03:00
|
|
|
|
2021-05-18 16:13:45 +03:00
|
|
|
self.assertEqual(found_users, expected_users)
|
2021-04-06 16:38:30 +03:00
|
|
|
|
|
|
|
|
|
|
|
def send_presence_update(
|
2023-02-09 03:23:35 +03:00
|
|
|
testcase: HomeserverTestCase,
|
2021-04-06 16:38:30 +03:00
|
|
|
user_id: str,
|
|
|
|
access_token: str,
|
|
|
|
presence_state: str,
|
|
|
|
status_message: Optional[str] = None,
|
|
|
|
) -> JsonDict:
|
|
|
|
# Build the presence body
|
|
|
|
body = {"presence": presence_state}
|
|
|
|
if status_message:
|
|
|
|
body["status_msg"] = status_message
|
|
|
|
|
|
|
|
# Update the user's presence state
|
|
|
|
channel = testcase.make_request(
|
|
|
|
"PUT", "/presence/%s/status" % (user_id,), body, access_token=access_token
|
|
|
|
)
|
|
|
|
testcase.assertEqual(channel.code, 200)
|
|
|
|
|
|
|
|
return channel.json_body
|
|
|
|
|
|
|
|
|
2024-05-16 19:54:46 +03:00
|
|
|
_request_key = 0
|
|
|
|
|
|
|
|
|
|
|
|
def generate_request_key() -> SyncRequestKey:
|
|
|
|
global _request_key
|
|
|
|
_request_key += 1
|
|
|
|
return ("request_key", _request_key)
|
|
|
|
|
|
|
|
|
2021-04-06 16:38:30 +03:00
|
|
|
def sync_presence(
|
2023-02-09 03:23:35 +03:00
|
|
|
testcase: HomeserverTestCase,
|
2021-04-06 16:38:30 +03:00
|
|
|
user_id: str,
|
|
|
|
since_token: Optional[StreamToken] = None,
|
|
|
|
) -> Tuple[List[UserPresenceState], StreamToken]:
|
|
|
|
"""Perform a sync request for the given user and return the user presence updates
|
|
|
|
they've received, as well as the next_batch token.
|
|
|
|
|
|
|
|
This method assumes testcase.sync_handler points to the homeserver's sync handler.
|
|
|
|
|
|
|
|
Args:
|
|
|
|
testcase: The testcase that is currently being run.
|
|
|
|
user_id: The ID of the user to generate a sync response for.
|
|
|
|
since_token: An optional token to indicate from at what point to sync from.
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
A tuple containing a list of presence updates, and the sync response's
|
|
|
|
next_batch token.
|
|
|
|
"""
|
|
|
|
requester = create_requester(user_id)
|
|
|
|
sync_config = generate_sync_config(requester.user.to_string())
|
|
|
|
sync_result = testcase.get_success(
|
2023-01-25 23:14:03 +03:00
|
|
|
testcase.hs.get_sync_handler().wait_for_sync_for_user(
|
2024-05-16 19:54:46 +03:00
|
|
|
requester,
|
|
|
|
sync_config,
|
|
|
|
SyncVersion.SYNC_V2,
|
|
|
|
generate_request_key(),
|
|
|
|
since_token,
|
2021-04-06 16:38:30 +03:00
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
return sync_result.presence, sync_result.next_batch
|