2022-05-24 17:39:54 +03:00
|
|
|
# Copyright 2022 The Matrix.org Foundation C.I.C.
|
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2023-08-03 21:43:51 +03:00
|
|
|
from typing import Any, List, Mapping, Optional, Sequence, Union
|
2022-05-24 17:39:54 +03:00
|
|
|
from unittest.mock import Mock
|
|
|
|
|
|
|
|
from twisted.test.proto_helpers import MemoryReactor
|
|
|
|
|
|
|
|
from synapse.appservice import ApplicationService
|
|
|
|
from synapse.server import HomeServer
|
|
|
|
from synapse.types import JsonDict
|
|
|
|
from synapse.util import Clock
|
|
|
|
|
|
|
|
from tests import unittest
|
2023-08-03 21:43:51 +03:00
|
|
|
from tests.unittest import override_config
|
2022-05-24 17:39:54 +03:00
|
|
|
|
|
|
|
PROTOCOL = "myproto"
|
|
|
|
TOKEN = "myastoken"
|
|
|
|
URL = "http://mytestservice"
|
|
|
|
|
|
|
|
|
|
|
|
class ApplicationServiceApiTestCase(unittest.HomeserverTestCase):
|
2023-02-06 15:49:06 +03:00
|
|
|
def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
|
2022-05-24 17:39:54 +03:00
|
|
|
self.api = hs.get_application_service_api()
|
|
|
|
self.service = ApplicationService(
|
|
|
|
id="unique_identifier",
|
|
|
|
sender="@as:test",
|
|
|
|
url=URL,
|
|
|
|
token="unused",
|
|
|
|
hs_token=TOKEN,
|
|
|
|
)
|
|
|
|
|
2023-08-03 21:43:51 +03:00
|
|
|
def test_query_3pe_authenticates_token_via_header(self) -> None:
|
2022-05-24 17:39:54 +03:00
|
|
|
"""
|
|
|
|
Tests that 3pe queries to the appservice are authenticated
|
|
|
|
with the appservice's token.
|
|
|
|
"""
|
|
|
|
|
|
|
|
SUCCESS_RESULT_USER = [
|
|
|
|
{
|
|
|
|
"protocol": PROTOCOL,
|
|
|
|
"userid": "@a:user",
|
|
|
|
"fields": {
|
|
|
|
"more": "fields",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
]
|
|
|
|
SUCCESS_RESULT_LOCATION = [
|
|
|
|
{
|
|
|
|
"protocol": PROTOCOL,
|
|
|
|
"alias": "#a:room",
|
|
|
|
"fields": {
|
|
|
|
"more": "fields",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|
2023-04-03 20:20:32 +03:00
|
|
|
URL_USER = f"{URL}/_matrix/app/v1/thirdparty/user/{PROTOCOL}"
|
|
|
|
URL_LOCATION = f"{URL}/_matrix/app/v1/thirdparty/location/{PROTOCOL}"
|
2022-05-24 17:39:54 +03:00
|
|
|
|
|
|
|
self.request_url = None
|
|
|
|
|
2022-10-04 14:06:41 +03:00
|
|
|
async def get_json(
|
2022-10-26 16:00:01 +03:00
|
|
|
url: str,
|
|
|
|
args: Mapping[Any, Any],
|
|
|
|
headers: Mapping[Union[str, bytes], Sequence[Union[str, bytes]]],
|
2022-10-04 14:06:41 +03:00
|
|
|
) -> List[JsonDict]:
|
2023-08-03 21:43:51 +03:00
|
|
|
# Ensure the access token is passed as a header.
|
2023-09-06 22:19:17 +03:00
|
|
|
if not headers or not headers.get(b"Authorization"):
|
2022-05-24 17:39:54 +03:00
|
|
|
raise RuntimeError("Access token not provided")
|
2023-08-03 21:43:51 +03:00
|
|
|
# ... and not as a query param
|
|
|
|
if b"access_token" in args:
|
|
|
|
raise RuntimeError(
|
|
|
|
"Access token should not be passed as a query param."
|
|
|
|
)
|
2022-05-24 17:39:54 +03:00
|
|
|
|
2023-09-06 22:19:17 +03:00
|
|
|
self.assertEqual(
|
|
|
|
headers.get(b"Authorization"), [f"Bearer {TOKEN}".encode()]
|
|
|
|
)
|
2023-08-03 21:43:51 +03:00
|
|
|
self.request_url = url
|
|
|
|
if url == URL_USER:
|
|
|
|
return SUCCESS_RESULT_USER
|
|
|
|
elif url == URL_LOCATION:
|
|
|
|
return SUCCESS_RESULT_LOCATION
|
|
|
|
else:
|
|
|
|
raise RuntimeError(
|
|
|
|
"URL provided was invalid. This should never be seen."
|
|
|
|
)
|
|
|
|
|
|
|
|
# We assign to a method, which mypy doesn't like.
|
2023-08-29 17:38:56 +03:00
|
|
|
self.api.get_json = Mock(side_effect=get_json) # type: ignore[method-assign]
|
2023-08-03 21:43:51 +03:00
|
|
|
|
|
|
|
result = self.get_success(
|
|
|
|
self.api.query_3pe(self.service, "user", PROTOCOL, {b"some": [b"field"]})
|
|
|
|
)
|
|
|
|
self.assertEqual(self.request_url, URL_USER)
|
|
|
|
self.assertEqual(result, SUCCESS_RESULT_USER)
|
|
|
|
result = self.get_success(
|
|
|
|
self.api.query_3pe(
|
|
|
|
self.service, "location", PROTOCOL, {b"some": [b"field"]}
|
|
|
|
)
|
|
|
|
)
|
|
|
|
self.assertEqual(self.request_url, URL_LOCATION)
|
|
|
|
self.assertEqual(result, SUCCESS_RESULT_LOCATION)
|
|
|
|
|
|
|
|
@override_config({"use_appservice_legacy_authorization": True})
|
|
|
|
def test_query_3pe_authenticates_token_via_param(self) -> None:
|
|
|
|
"""
|
|
|
|
Tests that 3pe queries to the appservice are authenticated
|
|
|
|
with the appservice's token.
|
|
|
|
"""
|
|
|
|
|
|
|
|
SUCCESS_RESULT_USER = [
|
|
|
|
{
|
|
|
|
"protocol": PROTOCOL,
|
|
|
|
"userid": "@a:user",
|
|
|
|
"fields": {
|
|
|
|
"more": "fields",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
]
|
|
|
|
SUCCESS_RESULT_LOCATION = [
|
|
|
|
{
|
|
|
|
"protocol": PROTOCOL,
|
|
|
|
"alias": "#a:room",
|
|
|
|
"fields": {
|
|
|
|
"more": "fields",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
]
|
|
|
|
|
|
|
|
URL_USER = f"{URL}/_matrix/app/v1/thirdparty/user/{PROTOCOL}"
|
|
|
|
URL_LOCATION = f"{URL}/_matrix/app/v1/thirdparty/location/{PROTOCOL}"
|
|
|
|
|
|
|
|
self.request_url = None
|
|
|
|
|
|
|
|
async def get_json(
|
|
|
|
url: str,
|
|
|
|
args: Mapping[Any, Any],
|
|
|
|
headers: Optional[
|
|
|
|
Mapping[Union[str, bytes], Sequence[Union[str, bytes]]]
|
|
|
|
] = None,
|
|
|
|
) -> List[JsonDict]:
|
|
|
|
# Ensure the access token is passed as a both a query param and in the headers.
|
|
|
|
if not args.get(b"access_token"):
|
|
|
|
raise RuntimeError("Access token should be provided in query params.")
|
2023-09-06 22:19:17 +03:00
|
|
|
if not headers or not headers.get(b"Authorization"):
|
2023-08-03 21:43:51 +03:00
|
|
|
raise RuntimeError("Access token should be provided in auth headers.")
|
|
|
|
|
2022-05-24 17:39:54 +03:00
|
|
|
self.assertEqual(args.get(b"access_token"), TOKEN)
|
2023-09-06 22:19:17 +03:00
|
|
|
self.assertEqual(
|
|
|
|
headers.get(b"Authorization"), [f"Bearer {TOKEN}".encode()]
|
|
|
|
)
|
2022-05-24 17:39:54 +03:00
|
|
|
self.request_url = url
|
|
|
|
if url == URL_USER:
|
|
|
|
return SUCCESS_RESULT_USER
|
|
|
|
elif url == URL_LOCATION:
|
|
|
|
return SUCCESS_RESULT_LOCATION
|
|
|
|
else:
|
|
|
|
raise RuntimeError(
|
|
|
|
"URL provided was invalid. This should never be seen."
|
|
|
|
)
|
|
|
|
|
|
|
|
# We assign to a method, which mypy doesn't like.
|
2023-08-29 17:38:56 +03:00
|
|
|
self.api.get_json = Mock(side_effect=get_json) # type: ignore[method-assign]
|
2022-05-24 17:39:54 +03:00
|
|
|
|
|
|
|
result = self.get_success(
|
|
|
|
self.api.query_3pe(self.service, "user", PROTOCOL, {b"some": [b"field"]})
|
|
|
|
)
|
|
|
|
self.assertEqual(self.request_url, URL_USER)
|
|
|
|
self.assertEqual(result, SUCCESS_RESULT_USER)
|
|
|
|
result = self.get_success(
|
|
|
|
self.api.query_3pe(
|
|
|
|
self.service, "location", PROTOCOL, {b"some": [b"field"]}
|
|
|
|
)
|
|
|
|
)
|
|
|
|
self.assertEqual(self.request_url, URL_LOCATION)
|
|
|
|
self.assertEqual(result, SUCCESS_RESULT_LOCATION)
|
2023-03-28 21:26:27 +03:00
|
|
|
|
|
|
|
def test_claim_keys(self) -> None:
|
|
|
|
"""
|
|
|
|
Tests that the /keys/claim response is properly parsed for missing
|
|
|
|
keys.
|
|
|
|
"""
|
|
|
|
|
|
|
|
RESPONSE: JsonDict = {
|
|
|
|
"@alice:example.org": {
|
|
|
|
"DEVICE_1": {
|
|
|
|
"signed_curve25519:AAAAHg": {
|
|
|
|
# We don't really care about the content of the keys,
|
|
|
|
# they get passed back transparently.
|
|
|
|
},
|
|
|
|
"signed_curve25519:BBBBHg": {},
|
|
|
|
},
|
|
|
|
"DEVICE_2": {"signed_curve25519:CCCCHg": {}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
async def post_json_get_json(
|
|
|
|
uri: str,
|
|
|
|
post_json: Any,
|
|
|
|
headers: Mapping[Union[str, bytes], Sequence[Union[str, bytes]]],
|
|
|
|
) -> JsonDict:
|
|
|
|
# Ensure the access token is passed as both a header and query arg.
|
2023-09-06 22:19:17 +03:00
|
|
|
if not headers.get(b"Authorization"):
|
2023-03-28 21:26:27 +03:00
|
|
|
raise RuntimeError("Access token not provided")
|
|
|
|
|
2023-09-06 22:19:17 +03:00
|
|
|
self.assertEqual(
|
|
|
|
headers.get(b"Authorization"), [f"Bearer {TOKEN}".encode()]
|
|
|
|
)
|
2023-03-28 21:26:27 +03:00
|
|
|
return RESPONSE
|
|
|
|
|
|
|
|
# We assign to a method, which mypy doesn't like.
|
2023-08-29 17:38:56 +03:00
|
|
|
self.api.post_json_get_json = Mock(side_effect=post_json_get_json) # type: ignore[method-assign]
|
2023-03-28 21:26:27 +03:00
|
|
|
|
|
|
|
MISSING_KEYS = [
|
|
|
|
# Known user, known device, missing algorithm.
|
2023-04-27 19:57:46 +03:00
|
|
|
("@alice:example.org", "DEVICE_2", "xyz", 1),
|
2023-03-28 21:26:27 +03:00
|
|
|
# Known user, missing device.
|
2023-04-27 19:57:46 +03:00
|
|
|
("@alice:example.org", "DEVICE_3", "signed_curve25519", 1),
|
2023-03-28 21:26:27 +03:00
|
|
|
# Unknown user.
|
2023-04-27 19:57:46 +03:00
|
|
|
("@bob:example.org", "DEVICE_4", "signed_curve25519", 1),
|
2023-03-28 21:26:27 +03:00
|
|
|
]
|
|
|
|
|
|
|
|
claimed_keys, missing = self.get_success(
|
|
|
|
self.api.claim_client_keys(
|
|
|
|
self.service,
|
|
|
|
[
|
|
|
|
# Found devices
|
2023-04-27 19:57:46 +03:00
|
|
|
("@alice:example.org", "DEVICE_1", "signed_curve25519", 1),
|
|
|
|
("@alice:example.org", "DEVICE_2", "signed_curve25519", 1),
|
2023-03-28 21:26:27 +03:00
|
|
|
]
|
|
|
|
+ MISSING_KEYS,
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
self.assertEqual(claimed_keys, RESPONSE)
|
|
|
|
self.assertEqual(missing, MISSING_KEYS)
|