Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
#
|
2023-11-21 23:29:58 +03:00
|
|
|
# This file is licensed under the Affero General Public License (AGPL) version 3.
|
|
|
|
#
|
2024-01-23 14:26:48 +03:00
|
|
|
# Copyright 2016 OpenMarket Ltd
|
2023-11-21 23:29:58 +03:00
|
|
|
# Copyright (C) 2023 New Vector, Ltd
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU Affero General Public License as
|
|
|
|
# published by the Free Software Foundation, either version 3 of the
|
|
|
|
# License, or (at your option) any later version.
|
|
|
|
#
|
|
|
|
# See the GNU Affero General Public License for more details:
|
|
|
|
# <https://www.gnu.org/licenses/agpl-3.0.html>.
|
|
|
|
#
|
|
|
|
# Originally licensed under the Apache License, Version 2.0:
|
|
|
|
# <http://www.apache.org/licenses/LICENSE-2.0>.
|
|
|
|
#
|
|
|
|
# [This file includes modifications made by New Vector Limited]
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
#
|
|
|
|
#
|
2018-01-09 14:28:33 +03:00
|
|
|
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
import os.path
|
2018-01-09 14:28:33 +03:00
|
|
|
import re
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
import shutil
|
|
|
|
import tempfile
|
2019-09-06 18:45:51 +03:00
|
|
|
from contextlib import redirect_stdout
|
|
|
|
from io import StringIO
|
2018-01-09 14:28:33 +03:00
|
|
|
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
from synapse.config.homeserver import HomeServerConfig
|
2018-07-09 09:09:20 +03:00
|
|
|
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
from tests import unittest
|
|
|
|
|
|
|
|
|
|
|
|
class ConfigGenerationTestCase(unittest.TestCase):
|
2022-12-16 16:53:28 +03:00
|
|
|
def setUp(self) -> None:
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
self.dir = tempfile.mkdtemp()
|
|
|
|
self.file = os.path.join(self.dir, "homeserver.yaml")
|
|
|
|
|
2022-12-16 16:53:28 +03:00
|
|
|
def tearDown(self) -> None:
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
shutil.rmtree(self.dir)
|
|
|
|
|
2022-12-16 16:53:28 +03:00
|
|
|
def test_generate_config_generates_files(self) -> None:
|
2019-09-06 18:45:51 +03:00
|
|
|
with redirect_stdout(StringIO()):
|
|
|
|
HomeServerConfig.load_or_generate_config(
|
|
|
|
"",
|
|
|
|
[
|
|
|
|
"--generate-config",
|
|
|
|
"-c",
|
|
|
|
self.file,
|
|
|
|
"--report-stats=yes",
|
|
|
|
"-H",
|
|
|
|
"lemurs.win",
|
|
|
|
],
|
|
|
|
)
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
|
|
|
|
self.assertSetEqual(
|
2020-02-21 15:15:07 +03:00
|
|
|
{"homeserver.yaml", "lemurs.win.log.config", "lemurs.win.signing.key"},
|
2018-08-10 16:54:09 +03:00
|
|
|
set(os.listdir(self.dir)),
|
Error if macaroon key is missing from config
Currently we store all access tokens in the DB, and fall back to that
check if we can't validate the macaroon, so our fallback works here, but
for guests, their macaroons don't get persisted, so we don't get to
find them in the database. Each restart, we generate a new ephemeral
key, so guests lose access after each server restart.
I tried to fix up the config stuff to be less insane, but gave up, so
instead I bolt on yet another piece of custom one-off insanity.
Also, add some basic tests for config generation and loading.
2016-02-05 04:58:23 +03:00
|
|
|
)
|
2018-01-09 14:28:33 +03:00
|
|
|
|
|
|
|
self.assert_log_filename_is(
|
|
|
|
os.path.join(self.dir, "lemurs.win.log.config"),
|
|
|
|
os.path.join(os.getcwd(), "homeserver.log"),
|
|
|
|
)
|
|
|
|
|
2022-12-16 16:53:28 +03:00
|
|
|
def assert_log_filename_is(self, log_config_file: str, expected: str) -> None:
|
2018-01-09 14:28:33 +03:00
|
|
|
with open(log_config_file) as f:
|
|
|
|
config = f.read()
|
|
|
|
# find the 'filename' line
|
2018-10-24 12:35:01 +03:00
|
|
|
matches = re.findall(r"^\s*filename:\s*(.*)$", config, re.M)
|
2018-01-09 14:28:33 +03:00
|
|
|
self.assertEqual(1, len(matches))
|
|
|
|
self.assertEqual(matches[0], expected)
|