You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

938 lines
33 KiB

  1. # Copyright 2018 New Vector Ltd
  2. #
  3. # Licensed under the Apache License, Version 2.0 (the "License");
  4. # you may not use this file except in compliance with the License.
  5. # You may obtain a copy of the License at
  6. #
  7. # http://www.apache.org/licenses/LICENSE-2.0
  8. #
  9. # Unless required by applicable law or agreed to in writing, software
  10. # distributed under the License is distributed on an "AS IS" BASIS,
  11. # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. # See the License for the specific language governing permissions and
  13. # limitations under the License.
  14. from typing import Any, Dict, Generator
  15. from unittest.mock import ANY, Mock, create_autospec
  16. from netaddr import IPSet
  17. from parameterized import parameterized
  18. from twisted.internet import defer
  19. from twisted.internet.defer import Deferred, TimeoutError
  20. from twisted.internet.error import ConnectingCancelledError, DNSLookupError
  21. from twisted.test.proto_helpers import MemoryReactor, StringTransport
  22. from twisted.web.client import Agent, ResponseNeverReceived
  23. from twisted.web.http import HTTPChannel
  24. from twisted.web.http_headers import Headers
  25. from synapse.api.errors import HttpResponseException, RequestSendFailed
  26. from synapse.config._base import ConfigError
  27. from synapse.http.matrixfederationclient import (
  28. ByteParser,
  29. MatrixFederationHttpClient,
  30. MatrixFederationRequest,
  31. )
  32. from synapse.logging.context import (
  33. SENTINEL_CONTEXT,
  34. LoggingContext,
  35. LoggingContextOrSentinel,
  36. current_context,
  37. )
  38. from synapse.server import HomeServer
  39. from synapse.util import Clock
  40. from tests.replication._base import BaseMultiWorkerStreamTestCase
  41. from tests.server import FakeTransport
  42. from tests.test_utils import FakeResponse
  43. from tests.unittest import HomeserverTestCase, override_config
  44. def check_logcontext(context: LoggingContextOrSentinel) -> None:
  45. current = current_context()
  46. if current is not context:
  47. raise AssertionError("Expected logcontext %s but was %s" % (context, current))
  48. class FederationClientTests(HomeserverTestCase):
  49. def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
  50. hs = self.setup_test_homeserver(reactor=reactor, clock=clock)
  51. return hs
  52. def prepare(
  53. self, reactor: MemoryReactor, clock: Clock, homeserver: HomeServer
  54. ) -> None:
  55. self.cl = MatrixFederationHttpClient(self.hs, None)
  56. self.reactor.lookups["testserv"] = "1.2.3.4"
  57. def test_client_get(self) -> None:
  58. """
  59. happy-path test of a GET request
  60. """
  61. @defer.inlineCallbacks
  62. def do_request() -> Generator["Deferred[Any]", object, object]:
  63. with LoggingContext("one") as context:
  64. fetch_d = defer.ensureDeferred(
  65. self.cl.get_json("testserv:8008", "foo/bar")
  66. )
  67. # Nothing happened yet
  68. self.assertNoResult(fetch_d)
  69. # should have reset logcontext to the sentinel
  70. check_logcontext(SENTINEL_CONTEXT)
  71. try:
  72. fetch_res = yield fetch_d
  73. return fetch_res
  74. finally:
  75. check_logcontext(context)
  76. test_d = do_request()
  77. self.pump()
  78. # Nothing happened yet
  79. self.assertNoResult(test_d)
  80. # Make sure treq is trying to connect
  81. clients = self.reactor.tcpClients
  82. self.assertEqual(len(clients), 1)
  83. (host, port, factory, _timeout, _bindAddress) = clients[0]
  84. self.assertEqual(host, "1.2.3.4")
  85. self.assertEqual(port, 8008)
  86. # complete the connection and wire it up to a fake transport
  87. protocol = factory.buildProtocol(None)
  88. transport = StringTransport()
  89. protocol.makeConnection(transport)
  90. # that should have made it send the request to the transport
  91. self.assertRegex(transport.value(), b"^GET /foo/bar")
  92. self.assertRegex(transport.value(), b"Host: testserv:8008")
  93. # Deferred is still without a result
  94. self.assertNoResult(test_d)
  95. # Send it the HTTP response
  96. res_json = b'{ "a": 1 }'
  97. protocol.dataReceived(
  98. b"HTTP/1.1 200 OK\r\n"
  99. b"Server: Fake\r\n"
  100. b"Content-Type: application/json\r\n"
  101. b"Content-Length: %i\r\n"
  102. b"\r\n"
  103. b"%s" % (len(res_json), res_json)
  104. )
  105. self.pump()
  106. res = self.successResultOf(test_d)
  107. # check the response is as expected
  108. self.assertEqual(res, {"a": 1})
  109. def test_dns_error(self) -> None:
  110. """
  111. If the DNS lookup returns an error, it will bubble up.
  112. """
  113. d = defer.ensureDeferred(
  114. self.cl.get_json("testserv2:8008", "foo/bar", timeout=10000)
  115. )
  116. self.pump()
  117. f = self.failureResultOf(d)
  118. self.assertIsInstance(f.value, RequestSendFailed)
  119. self.assertIsInstance(f.value.inner_exception, DNSLookupError)
  120. def test_client_connection_refused(self) -> None:
  121. d = defer.ensureDeferred(
  122. self.cl.get_json("testserv:8008", "foo/bar", timeout=10000)
  123. )
  124. self.pump()
  125. # Nothing happened yet
  126. self.assertNoResult(d)
  127. clients = self.reactor.tcpClients
  128. self.assertEqual(len(clients), 1)
  129. (host, port, factory, _timeout, _bindAddress) = clients[0]
  130. self.assertEqual(host, "1.2.3.4")
  131. self.assertEqual(port, 8008)
  132. e = Exception("go away")
  133. factory.clientConnectionFailed(None, e)
  134. self.pump(0.5)
  135. f = self.failureResultOf(d)
  136. self.assertIsInstance(f.value, RequestSendFailed)
  137. self.assertIs(f.value.inner_exception, e)
  138. def test_client_never_connect(self) -> None:
  139. """
  140. If the HTTP request is not connected and is timed out, it'll give a
  141. ConnectingCancelledError or TimeoutError.
  142. """
  143. d = defer.ensureDeferred(
  144. self.cl.get_json("testserv:8008", "foo/bar", timeout=10000)
  145. )
  146. self.pump()
  147. # Nothing happened yet
  148. self.assertNoResult(d)
  149. # Make sure treq is trying to connect
  150. clients = self.reactor.tcpClients
  151. self.assertEqual(len(clients), 1)
  152. self.assertEqual(clients[0][0], "1.2.3.4")
  153. self.assertEqual(clients[0][1], 8008)
  154. # Deferred is still without a result
  155. self.assertNoResult(d)
  156. # Push by enough to time it out
  157. self.reactor.advance(10.5)
  158. f = self.failureResultOf(d)
  159. self.assertIsInstance(f.value, RequestSendFailed)
  160. self.assertIsInstance(
  161. f.value.inner_exception, (ConnectingCancelledError, TimeoutError)
  162. )
  163. def test_client_connect_no_response(self) -> None:
  164. """
  165. If the HTTP request is connected, but gets no response before being
  166. timed out, it'll give a ResponseNeverReceived.
  167. """
  168. d = defer.ensureDeferred(
  169. self.cl.get_json("testserv:8008", "foo/bar", timeout=10000)
  170. )
  171. self.pump()
  172. # Nothing happened yet
  173. self.assertNoResult(d)
  174. # Make sure treq is trying to connect
  175. clients = self.reactor.tcpClients
  176. self.assertEqual(len(clients), 1)
  177. self.assertEqual(clients[0][0], "1.2.3.4")
  178. self.assertEqual(clients[0][1], 8008)
  179. conn = Mock()
  180. client = clients[0][2].buildProtocol(None)
  181. client.makeConnection(conn)
  182. # Deferred is still without a result
  183. self.assertNoResult(d)
  184. # Push by enough to time it out
  185. self.reactor.advance(10.5)
  186. f = self.failureResultOf(d)
  187. self.assertIsInstance(f.value, RequestSendFailed)
  188. self.assertIsInstance(f.value.inner_exception, ResponseNeverReceived)
  189. def test_client_ip_range_blocklist(self) -> None:
  190. """Ensure that Synapse does not try to connect to blocked IPs"""
  191. # Set up the ip_range blocklist
  192. self.hs.config.server.federation_ip_range_blocklist = IPSet(
  193. ["127.0.0.0/8", "fe80::/64"]
  194. )
  195. self.reactor.lookups["internal"] = "127.0.0.1"
  196. self.reactor.lookups["internalv6"] = "fe80:0:0:0:0:8a2e:370:7337"
  197. self.reactor.lookups["fine"] = "10.20.30.40"
  198. cl = MatrixFederationHttpClient(self.hs, None)
  199. # Try making a GET request to a blocked IPv4 address
  200. # ------------------------------------------------------
  201. # Make the request
  202. d = defer.ensureDeferred(cl.get_json("internal:8008", "foo/bar", timeout=10000))
  203. # Nothing happened yet
  204. self.assertNoResult(d)
  205. self.pump(1)
  206. # Check that it was unable to resolve the address
  207. clients = self.reactor.tcpClients
  208. self.assertEqual(len(clients), 0)
  209. f = self.failureResultOf(d)
  210. self.assertIsInstance(f.value, RequestSendFailed)
  211. self.assertIsInstance(f.value.inner_exception, DNSLookupError)
  212. # Try making a POST request to a blocked IPv6 address
  213. # -------------------------------------------------------
  214. # Make the request
  215. d = defer.ensureDeferred(
  216. cl.post_json("internalv6:8008", "foo/bar", timeout=10000)
  217. )
  218. # Nothing has happened yet
  219. self.assertNoResult(d)
  220. # Move the reactor forwards
  221. self.pump(1)
  222. # Check that it was unable to resolve the address
  223. clients = self.reactor.tcpClients
  224. self.assertEqual(len(clients), 0)
  225. # Check that it was due to a blocked DNS lookup
  226. f = self.failureResultOf(d, RequestSendFailed)
  227. self.assertIsInstance(f.value.inner_exception, DNSLookupError)
  228. # Try making a GET request to an allowed IPv4 address
  229. # ----------------------------------------------------------
  230. # Make the request
  231. d = defer.ensureDeferred(cl.post_json("fine:8008", "foo/bar", timeout=10000))
  232. # Nothing has happened yet
  233. self.assertNoResult(d)
  234. # Move the reactor forwards
  235. self.pump(1)
  236. # Check that it was able to resolve the address
  237. clients = self.reactor.tcpClients
  238. self.assertNotEqual(len(clients), 0)
  239. # Connection will still fail as this IP address does not resolve to anything
  240. f = self.failureResultOf(d, RequestSendFailed)
  241. self.assertIsInstance(f.value.inner_exception, ConnectingCancelledError)
  242. def test_client_gets_headers(self) -> None:
  243. """
  244. Once the client gets the headers, _request returns successfully.
  245. """
  246. request = MatrixFederationRequest(
  247. method="GET", destination="testserv:8008", path="foo/bar"
  248. )
  249. d = defer.ensureDeferred(self.cl._send_request(request, timeout=10000))
  250. self.pump()
  251. conn = Mock()
  252. clients = self.reactor.tcpClients
  253. client = clients[0][2].buildProtocol(None)
  254. client.makeConnection(conn)
  255. # Deferred does not have a result
  256. self.assertNoResult(d)
  257. # Send it the HTTP response
  258. client.dataReceived(b"HTTP/1.1 200 OK\r\nServer: Fake\r\n\r\n")
  259. # We should get a successful response
  260. r = self.successResultOf(d)
  261. self.assertEqual(r.code, 200)
  262. @parameterized.expand(["get_json", "post_json", "delete_json", "put_json"])
  263. def test_timeout_reading_body(self, method_name: str) -> None:
  264. """
  265. If the HTTP request is connected, but gets no response before being
  266. timed out, it'll give a RequestSendFailed with can_retry.
  267. """
  268. method = getattr(self.cl, method_name)
  269. d = defer.ensureDeferred(method("testserv:8008", "foo/bar", timeout=10000))
  270. self.pump()
  271. conn = Mock()
  272. clients = self.reactor.tcpClients
  273. client = clients[0][2].buildProtocol(None)
  274. client.makeConnection(conn)
  275. # Deferred does not have a result
  276. self.assertNoResult(d)
  277. # Send it the HTTP response
  278. client.dataReceived(
  279. b"HTTP/1.1 200 OK\r\nContent-Type: application/json\r\n"
  280. b"Server: Fake\r\n\r\n"
  281. )
  282. # Push by enough to time it out
  283. self.reactor.advance(10.5)
  284. f = self.failureResultOf(d)
  285. self.assertIsInstance(f.value, RequestSendFailed)
  286. self.assertTrue(f.value.can_retry)
  287. self.assertIsInstance(f.value.inner_exception, defer.TimeoutError)
  288. def test_client_requires_trailing_slashes(self) -> None:
  289. """
  290. If a connection is made to a client but the client rejects it due to
  291. requiring a trailing slash. We need to retry the request with a
  292. trailing slash. Workaround for Synapse <= v0.99.3, explained in
  293. https://github.com/matrix-org/synapse/issues/3622.
  294. """
  295. d = defer.ensureDeferred(
  296. self.cl.get_json("testserv:8008", "foo/bar", try_trailing_slash_on_400=True)
  297. )
  298. # Send the request
  299. self.pump()
  300. # there should have been a call to connectTCP
  301. clients = self.reactor.tcpClients
  302. self.assertEqual(len(clients), 1)
  303. (_host, _port, factory, _timeout, _bindAddress) = clients[0]
  304. # complete the connection and wire it up to a fake transport
  305. client = factory.buildProtocol(None)
  306. conn = StringTransport()
  307. client.makeConnection(conn)
  308. # that should have made it send the request to the connection
  309. self.assertRegex(conn.value(), b"^GET /foo/bar")
  310. # Clear the original request data before sending a response
  311. conn.clear()
  312. # Send the HTTP response
  313. client.dataReceived(
  314. b"HTTP/1.1 400 Bad Request\r\n"
  315. b"Content-Type: application/json\r\n"
  316. b"Content-Length: 59\r\n"
  317. b"\r\n"
  318. b'{"errcode":"M_UNRECOGNIZED","error":"Unrecognized request"}'
  319. )
  320. # We should get another request with a trailing slash
  321. self.assertRegex(conn.value(), b"^GET /foo/bar/")
  322. # Send a happy response this time
  323. client.dataReceived(
  324. b"HTTP/1.1 200 OK\r\n"
  325. b"Content-Type: application/json\r\n"
  326. b"Content-Length: 2\r\n"
  327. b"\r\n"
  328. b"{}"
  329. )
  330. # We should get a successful response
  331. r = self.successResultOf(d)
  332. self.assertEqual(r, {})
  333. def test_client_does_not_retry_on_400_plus(self) -> None:
  334. """
  335. Another test for trailing slashes but now test that we don't retry on
  336. trailing slashes on a non-400/M_UNRECOGNIZED response.
  337. See test_client_requires_trailing_slashes() for context.
  338. """
  339. d = defer.ensureDeferred(
  340. self.cl.get_json("testserv:8008", "foo/bar", try_trailing_slash_on_400=True)
  341. )
  342. # Send the request
  343. self.pump()
  344. # there should have been a call to connectTCP
  345. clients = self.reactor.tcpClients
  346. self.assertEqual(len(clients), 1)
  347. (_host, _port, factory, _timeout, _bindAddress) = clients[0]
  348. # complete the connection and wire it up to a fake transport
  349. client = factory.buildProtocol(None)
  350. conn = StringTransport()
  351. client.makeConnection(conn)
  352. # that should have made it send the request to the connection
  353. self.assertRegex(conn.value(), b"^GET /foo/bar")
  354. # Clear the original request data before sending a response
  355. conn.clear()
  356. # Send the HTTP response
  357. client.dataReceived(
  358. b"HTTP/1.1 404 Not Found\r\n"
  359. b"Content-Type: application/json\r\n"
  360. b"Content-Length: 2\r\n"
  361. b"\r\n"
  362. b"{}"
  363. )
  364. # We should not get another request
  365. self.assertEqual(conn.value(), b"")
  366. # We should get a 404 failure response
  367. self.failureResultOf(d)
  368. def test_client_sends_body(self) -> None:
  369. defer.ensureDeferred(
  370. self.cl.post_json(
  371. "testserv:8008", "foo/bar", timeout=10000, data={"a": "b"}
  372. )
  373. )
  374. self.pump()
  375. clients = self.reactor.tcpClients
  376. self.assertEqual(len(clients), 1)
  377. client = clients[0][2].buildProtocol(None)
  378. server = HTTPChannel()
  379. client.makeConnection(FakeTransport(server, self.reactor))
  380. server.makeConnection(FakeTransport(client, self.reactor))
  381. self.pump(0.1)
  382. self.assertEqual(len(server.requests), 1)
  383. request = server.requests[0]
  384. content = request.content.read()
  385. self.assertEqual(content, b'{"a":"b"}')
  386. def test_closes_connection(self) -> None:
  387. """Check that the client closes unused HTTP connections"""
  388. d = defer.ensureDeferred(self.cl.get_json("testserv:8008", "foo/bar"))
  389. self.pump()
  390. # there should have been a call to connectTCP
  391. clients = self.reactor.tcpClients
  392. self.assertEqual(len(clients), 1)
  393. (_host, _port, factory, _timeout, _bindAddress) = clients[0]
  394. # complete the connection and wire it up to a fake transport
  395. client = factory.buildProtocol(None)
  396. conn = StringTransport()
  397. client.makeConnection(conn)
  398. # that should have made it send the request to the connection
  399. self.assertRegex(conn.value(), b"^GET /foo/bar")
  400. # Send the HTTP response
  401. client.dataReceived(
  402. b"HTTP/1.1 200 OK\r\n"
  403. b"Content-Type: application/json\r\n"
  404. b"Content-Length: 2\r\n"
  405. b"\r\n"
  406. b"{}"
  407. )
  408. # We should get a successful response
  409. r = self.successResultOf(d)
  410. self.assertEqual(r, {})
  411. self.assertFalse(conn.disconnecting)
  412. # wait for a while
  413. self.reactor.advance(120)
  414. self.assertTrue(conn.disconnecting)
  415. @parameterized.expand([(b"",), (b"foo",), (b'{"a": Infinity}',)])
  416. def test_json_error(self, return_value: bytes) -> None:
  417. """
  418. Test what happens if invalid JSON is returned from the remote endpoint.
  419. """
  420. test_d = defer.ensureDeferred(self.cl.get_json("testserv:8008", "foo/bar"))
  421. self.pump()
  422. # Nothing happened yet
  423. self.assertNoResult(test_d)
  424. # Make sure treq is trying to connect
  425. clients = self.reactor.tcpClients
  426. self.assertEqual(len(clients), 1)
  427. (host, port, factory, _timeout, _bindAddress) = clients[0]
  428. self.assertEqual(host, "1.2.3.4")
  429. self.assertEqual(port, 8008)
  430. # complete the connection and wire it up to a fake transport
  431. protocol = factory.buildProtocol(None)
  432. transport = StringTransport()
  433. protocol.makeConnection(transport)
  434. # that should have made it send the request to the transport
  435. self.assertRegex(transport.value(), b"^GET /foo/bar")
  436. self.assertRegex(transport.value(), b"Host: testserv:8008")
  437. # Deferred is still without a result
  438. self.assertNoResult(test_d)
  439. # Send it the HTTP response
  440. protocol.dataReceived(
  441. b"HTTP/1.1 200 OK\r\n"
  442. b"Server: Fake\r\n"
  443. b"Content-Type: application/json\r\n"
  444. b"Content-Length: %i\r\n"
  445. b"\r\n"
  446. b"%s" % (len(return_value), return_value)
  447. )
  448. self.pump()
  449. f = self.failureResultOf(test_d)
  450. self.assertIsInstance(f.value, RequestSendFailed)
  451. def test_too_big(self) -> None:
  452. """
  453. Test what happens if a huge response is returned from the remote endpoint.
  454. """
  455. test_d = defer.ensureDeferred(self.cl.get_json("testserv:8008", "foo/bar"))
  456. self.pump()
  457. # Nothing happened yet
  458. self.assertNoResult(test_d)
  459. # Make sure treq is trying to connect
  460. clients = self.reactor.tcpClients
  461. self.assertEqual(len(clients), 1)
  462. (host, port, factory, _timeout, _bindAddress) = clients[0]
  463. self.assertEqual(host, "1.2.3.4")
  464. self.assertEqual(port, 8008)
  465. # complete the connection and wire it up to a fake transport
  466. protocol = factory.buildProtocol(None)
  467. transport = StringTransport()
  468. protocol.makeConnection(transport)
  469. # that should have made it send the request to the transport
  470. self.assertRegex(transport.value(), b"^GET /foo/bar")
  471. self.assertRegex(transport.value(), b"Host: testserv:8008")
  472. # Deferred is still without a result
  473. self.assertNoResult(test_d)
  474. # Send it a huge HTTP response
  475. protocol.dataReceived(
  476. b"HTTP/1.1 200 OK\r\n"
  477. b"Server: Fake\r\n"
  478. b"Content-Type: application/json\r\n"
  479. b"\r\n"
  480. )
  481. self.pump()
  482. # should still be waiting
  483. self.assertNoResult(test_d)
  484. sent = 0
  485. chunk_size = 1024 * 512
  486. while not test_d.called:
  487. protocol.dataReceived(b"a" * chunk_size)
  488. sent += chunk_size
  489. self.assertLessEqual(sent, ByteParser.MAX_RESPONSE_SIZE)
  490. self.assertEqual(sent, ByteParser.MAX_RESPONSE_SIZE)
  491. f = self.failureResultOf(test_d)
  492. self.assertIsInstance(f.value, RequestSendFailed)
  493. self.assertTrue(transport.disconnecting)
  494. def test_build_auth_headers_rejects_falsey_destinations(self) -> None:
  495. with self.assertRaises(ValueError):
  496. self.cl.build_auth_headers(None, b"GET", b"https://example.com")
  497. with self.assertRaises(ValueError):
  498. self.cl.build_auth_headers(b"", b"GET", b"https://example.com")
  499. with self.assertRaises(ValueError):
  500. self.cl.build_auth_headers(
  501. None, b"GET", b"https://example.com", destination_is=b""
  502. )
  503. with self.assertRaises(ValueError):
  504. self.cl.build_auth_headers(
  505. b"", b"GET", b"https://example.com", destination_is=b""
  506. )
  507. @override_config(
  508. {
  509. "federation": {
  510. "client_timeout": "180s",
  511. "max_long_retry_delay": "100s",
  512. "max_short_retry_delay": "7s",
  513. "max_long_retries": 20,
  514. "max_short_retries": 5,
  515. }
  516. }
  517. )
  518. def test_configurable_retry_and_delay_values(self) -> None:
  519. self.assertEqual(self.cl.default_timeout_seconds, 180)
  520. self.assertEqual(self.cl.max_long_retry_delay_seconds, 100)
  521. self.assertEqual(self.cl.max_short_retry_delay_seconds, 7)
  522. self.assertEqual(self.cl.max_long_retries, 20)
  523. self.assertEqual(self.cl.max_short_retries, 5)
  524. class FederationClientProxyTests(BaseMultiWorkerStreamTestCase):
  525. def default_config(self) -> Dict[str, Any]:
  526. conf = super().default_config()
  527. conf["instance_map"] = {
  528. "main": {"host": "testserv", "port": 8765},
  529. "federation_sender": {"host": "testserv", "port": 1001},
  530. }
  531. return conf
  532. @override_config(
  533. {
  534. "outbound_federation_restricted_to": ["federation_sender"],
  535. "worker_replication_secret": "secret",
  536. }
  537. )
  538. def test_proxy_requests_through_federation_sender_worker(self) -> None:
  539. """
  540. Test that all outbound federation requests go through the `federation_sender`
  541. worker
  542. """
  543. # Mock out the `MatrixFederationHttpClient` of the `federation_sender` instance
  544. # so we can act like some remote server responding to requests
  545. mock_client_on_federation_sender = Mock()
  546. mock_agent_on_federation_sender = create_autospec(Agent, spec_set=True)
  547. mock_client_on_federation_sender.agent = mock_agent_on_federation_sender
  548. # Create the `federation_sender` worker
  549. self.make_worker_hs(
  550. "synapse.app.generic_worker",
  551. {"worker_name": "federation_sender"},
  552. federation_http_client=mock_client_on_federation_sender,
  553. )
  554. # Fake `remoteserv:8008` responding to requests
  555. mock_agent_on_federation_sender.request.side_effect = (
  556. lambda *args, **kwargs: defer.succeed(
  557. FakeResponse.json(
  558. payload={
  559. "foo": "bar",
  560. }
  561. )
  562. )
  563. )
  564. # This federation request from the main process should be proxied through the
  565. # `federation_sender` worker off to the remote server
  566. test_request_from_main_process_d = defer.ensureDeferred(
  567. self.hs.get_federation_http_client().get_json("remoteserv:8008", "foo/bar")
  568. )
  569. # Pump the reactor so our deferred goes through the motions
  570. self.pump()
  571. # Make sure that the request was proxied through the `federation_sender` worker
  572. mock_agent_on_federation_sender.request.assert_called_once_with(
  573. b"GET",
  574. b"matrix-federation://remoteserv:8008/foo/bar",
  575. headers=ANY,
  576. bodyProducer=ANY,
  577. )
  578. # Make sure the response is as expected back on the main worker
  579. res = self.successResultOf(test_request_from_main_process_d)
  580. self.assertEqual(res, {"foo": "bar"})
  581. @override_config(
  582. {
  583. "outbound_federation_restricted_to": ["federation_sender"],
  584. "worker_replication_secret": "secret",
  585. }
  586. )
  587. def test_proxy_request_with_network_error_through_federation_sender_worker(
  588. self,
  589. ) -> None:
  590. """
  591. Test that when the outbound federation request fails with a network related
  592. error, a sensible error makes its way back to the main process.
  593. """
  594. # Mock out the `MatrixFederationHttpClient` of the `federation_sender` instance
  595. # so we can act like some remote server responding to requests
  596. mock_client_on_federation_sender = Mock()
  597. mock_agent_on_federation_sender = create_autospec(Agent, spec_set=True)
  598. mock_client_on_federation_sender.agent = mock_agent_on_federation_sender
  599. # Create the `federation_sender` worker
  600. self.make_worker_hs(
  601. "synapse.app.generic_worker",
  602. {"worker_name": "federation_sender"},
  603. federation_http_client=mock_client_on_federation_sender,
  604. )
  605. # Fake `remoteserv:8008` responding to requests
  606. mock_agent_on_federation_sender.request.side_effect = (
  607. lambda *args, **kwargs: defer.fail(ResponseNeverReceived("fake error"))
  608. )
  609. # This federation request from the main process should be proxied through the
  610. # `federation_sender` worker off to the remote server
  611. test_request_from_main_process_d = defer.ensureDeferred(
  612. self.hs.get_federation_http_client().get_json("remoteserv:8008", "foo/bar")
  613. )
  614. # Pump the reactor so our deferred goes through the motions. We pump with 10
  615. # seconds (0.1 * 100) so the `MatrixFederationHttpClient` runs out of retries
  616. # and finally passes along the error response.
  617. self.pump(0.1)
  618. # Make sure that the request was proxied through the `federation_sender` worker
  619. mock_agent_on_federation_sender.request.assert_called_with(
  620. b"GET",
  621. b"matrix-federation://remoteserv:8008/foo/bar",
  622. headers=ANY,
  623. bodyProducer=ANY,
  624. )
  625. # Make sure we get some sort of error back on the main worker
  626. failure_res = self.failureResultOf(test_request_from_main_process_d)
  627. self.assertIsInstance(failure_res.value, RequestSendFailed)
  628. self.assertIsInstance(failure_res.value.inner_exception, HttpResponseException)
  629. self.assertEqual(failure_res.value.inner_exception.code, 502)
  630. @override_config(
  631. {
  632. "outbound_federation_restricted_to": ["federation_sender"],
  633. "worker_replication_secret": "secret",
  634. }
  635. )
  636. def test_proxy_requests_and_discards_hop_by_hop_headers(self) -> None:
  637. """
  638. Test to make sure hop-by-hop headers and addional headers defined in the
  639. `Connection` header are discarded when proxying requests
  640. """
  641. # Mock out the `MatrixFederationHttpClient` of the `federation_sender` instance
  642. # so we can act like some remote server responding to requests
  643. mock_client_on_federation_sender = Mock()
  644. mock_agent_on_federation_sender = create_autospec(Agent, spec_set=True)
  645. mock_client_on_federation_sender.agent = mock_agent_on_federation_sender
  646. # Create the `federation_sender` worker
  647. self.make_worker_hs(
  648. "synapse.app.generic_worker",
  649. {"worker_name": "federation_sender"},
  650. federation_http_client=mock_client_on_federation_sender,
  651. )
  652. # Fake `remoteserv:8008` responding to requests
  653. mock_agent_on_federation_sender.request.side_effect = lambda *args, **kwargs: defer.succeed(
  654. FakeResponse(
  655. code=200,
  656. body=b'{"foo": "bar"}',
  657. headers=Headers(
  658. {
  659. "Content-Type": ["application/json"],
  660. "Connection": ["close, X-Foo, X-Bar"],
  661. # Should be removed because it's defined in the `Connection` header
  662. "X-Foo": ["foo"],
  663. "X-Bar": ["bar"],
  664. # Should be removed because it's a hop-by-hop header
  665. "Proxy-Authorization": "abcdef",
  666. }
  667. ),
  668. )
  669. )
  670. # This federation request from the main process should be proxied through the
  671. # `federation_sender` worker off to the remote server
  672. test_request_from_main_process_d = defer.ensureDeferred(
  673. self.hs.get_federation_http_client().get_json_with_headers(
  674. "remoteserv:8008", "foo/bar"
  675. )
  676. )
  677. # Pump the reactor so our deferred goes through the motions
  678. self.pump()
  679. # Make sure that the request was proxied through the `federation_sender` worker
  680. mock_agent_on_federation_sender.request.assert_called_once_with(
  681. b"GET",
  682. b"matrix-federation://remoteserv:8008/foo/bar",
  683. headers=ANY,
  684. bodyProducer=ANY,
  685. )
  686. res, headers = self.successResultOf(test_request_from_main_process_d)
  687. header_names = set(headers.keys())
  688. # Make sure the response does not include the hop-by-hop headers
  689. self.assertNotIn(b"X-Foo", header_names)
  690. self.assertNotIn(b"X-Bar", header_names)
  691. self.assertNotIn(b"Proxy-Authorization", header_names)
  692. # Make sure the response is as expected back on the main worker
  693. self.assertEqual(res, {"foo": "bar"})
  694. @override_config(
  695. {
  696. "outbound_federation_restricted_to": ["federation_sender"],
  697. # `worker_replication_secret` is set here so that the test setup is able to pass
  698. # but the actual homserver creation test is in the test body below
  699. "worker_replication_secret": "secret",
  700. }
  701. )
  702. def test_not_able_to_proxy_requests_through_federation_sender_worker_when_no_secret_configured(
  703. self,
  704. ) -> None:
  705. """
  706. Test that we aren't able to proxy any outbound federation requests when
  707. `worker_replication_secret` is not configured.
  708. """
  709. with self.assertRaises(ConfigError):
  710. # Create the `federation_sender` worker
  711. self.make_worker_hs(
  712. "synapse.app.generic_worker",
  713. {
  714. "worker_name": "federation_sender",
  715. # Test that we aren't able to proxy any outbound federation requests
  716. # when `worker_replication_secret` is not configured.
  717. "worker_replication_secret": None,
  718. },
  719. )
  720. @override_config(
  721. {
  722. "outbound_federation_restricted_to": ["federation_sender"],
  723. "worker_replication_secret": "secret",
  724. }
  725. )
  726. def test_not_able_to_proxy_requests_through_federation_sender_worker_when_wrong_auth_given(
  727. self,
  728. ) -> None:
  729. """
  730. Test that we aren't able to proxy any outbound federation requests when the
  731. wrong authorization is given.
  732. """
  733. # Mock out the `MatrixFederationHttpClient` of the `federation_sender` instance
  734. # so we can act like some remote server responding to requests
  735. mock_client_on_federation_sender = Mock()
  736. mock_agent_on_federation_sender = create_autospec(Agent, spec_set=True)
  737. mock_client_on_federation_sender.agent = mock_agent_on_federation_sender
  738. # Create the `federation_sender` worker
  739. self.make_worker_hs(
  740. "synapse.app.generic_worker",
  741. {
  742. "worker_name": "federation_sender",
  743. # Test that we aren't able to proxy any outbound federation requests
  744. # when `worker_replication_secret` is wrong.
  745. "worker_replication_secret": "wrong",
  746. },
  747. federation_http_client=mock_client_on_federation_sender,
  748. )
  749. # This federation request from the main process should be proxied through the
  750. # `federation_sender` worker off but will fail here because it's using the wrong
  751. # authorization.
  752. test_request_from_main_process_d = defer.ensureDeferred(
  753. self.hs.get_federation_http_client().get_json("remoteserv:8008", "foo/bar")
  754. )
  755. # Pump the reactor so our deferred goes through the motions. We pump with 10
  756. # seconds (0.1 * 100) so the `MatrixFederationHttpClient` runs out of retries
  757. # and finally passes along the error response.
  758. self.pump(0.1)
  759. # Make sure that the request was *NOT* proxied through the `federation_sender`
  760. # worker
  761. mock_agent_on_federation_sender.request.assert_not_called()
  762. failure_res = self.failureResultOf(test_request_from_main_process_d)
  763. self.assertIsInstance(failure_res.value, HttpResponseException)
  764. self.assertEqual(failure_res.value.code, 401)