Compare commits
4 Commits
629a951b49
...
1264c8ac89
Author | SHA1 | Date |
---|---|---|
Erik Johnston | 1264c8ac89 | |
Erik Johnston | 921a3f8a59 | |
Brendan Abolivier | 3ee97a2748 | |
Aaron Raimist | ec606ea9e3 |
|
@ -0,0 +1 @@
|
|||
Allow events to be sent to clients sooner when using sharded event persisters.
|
|
@ -0,0 +1 @@
|
|||
Fix error code for `/profile/{userId}/displayname` to be `M_BAD_JSON`.
|
|
@ -0,0 +1 @@
|
|||
Fix a bug introduced in v1.7.0 that could cause Synapse to insert values from non-state `m.room.retention` events into the `room_retention` database table.
|
|
@ -0,0 +1 @@
|
|||
Fix not sending events over federation when using sharded event writers.
|
|
@ -790,10 +790,6 @@ class FederationSenderHandler:
|
|||
send_queue.process_rows_for_federation(self.federation_sender, rows)
|
||||
await self.update_token(token)
|
||||
|
||||
# We also need to poke the federation sender when new events happen
|
||||
elif stream_name == "events":
|
||||
self.federation_sender.notify_new_events(token)
|
||||
|
||||
# ... and when new receipts happen
|
||||
elif stream_name == ReceiptsStream.NAME:
|
||||
await self._on_new_receipts(rows)
|
||||
|
|
|
@ -83,6 +83,9 @@ class EventValidator:
|
|||
Args:
|
||||
event (FrozenEvent): The event to validate.
|
||||
"""
|
||||
if not event.is_state():
|
||||
raise SynapseError(code=400, msg="must be a state event")
|
||||
|
||||
min_lifetime = event.content.get("min_lifetime")
|
||||
max_lifetime = event.content.get("max_lifetime")
|
||||
|
||||
|
|
|
@ -188,7 +188,7 @@ class FederationRemoteSendQueue:
|
|||
for key in keys[:i]:
|
||||
del self.edus[key]
|
||||
|
||||
def notify_new_events(self, current_id):
|
||||
def notify_new_events(self, max_token):
|
||||
"""As per FederationSender"""
|
||||
# We don't need to replicate this as it gets sent down a different
|
||||
# stream.
|
||||
|
|
|
@ -40,7 +40,7 @@ from synapse.metrics import (
|
|||
events_processed_counter,
|
||||
)
|
||||
from synapse.metrics.background_process_metrics import run_as_background_process
|
||||
from synapse.types import ReadReceipt
|
||||
from synapse.types import ReadReceipt, RoomStreamToken
|
||||
from synapse.util.metrics import Measure, measure_func
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
@ -154,10 +154,15 @@ class FederationSender:
|
|||
self._per_destination_queues[destination] = queue
|
||||
return queue
|
||||
|
||||
def notify_new_events(self, current_id: int) -> None:
|
||||
def notify_new_events(self, max_token: RoomStreamToken) -> None:
|
||||
"""This gets called when we have some new events we might want to
|
||||
send out to other servers.
|
||||
"""
|
||||
# We just use the minimum stream ordering and ignore the vector clock
|
||||
# component. This is safe to do as long as we *always* ignore the vector
|
||||
# clock components.
|
||||
current_id = max_token.stream
|
||||
|
||||
self._last_poked_id = max(current_id, self._last_poked_id)
|
||||
|
||||
if self._is_processing:
|
||||
|
|
|
@ -27,6 +27,7 @@ from synapse.metrics import (
|
|||
event_processing_loop_room_count,
|
||||
)
|
||||
from synapse.metrics.background_process_metrics import run_as_background_process
|
||||
from synapse.types import RoomStreamToken
|
||||
from synapse.util.metrics import Measure
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
@ -47,15 +48,17 @@ class ApplicationServicesHandler:
|
|||
self.current_max = 0
|
||||
self.is_processing = False
|
||||
|
||||
async def notify_interested_services(self, current_id):
|
||||
async def notify_interested_services(self, max_token: RoomStreamToken):
|
||||
"""Notifies (pushes) all application services interested in this event.
|
||||
|
||||
Pushing is done asynchronously, so this method won't block for any
|
||||
prolonged length of time.
|
||||
|
||||
Args:
|
||||
current_id(int): The current maximum ID.
|
||||
"""
|
||||
# We just use the minimum stream ordering and ignore the vector clock
|
||||
# component. This is safe to do as long as we *always* ignore the vector
|
||||
# clock components.
|
||||
current_id = max_token.stream
|
||||
|
||||
services = self.store.get_app_services()
|
||||
if not services or not self.notify_appservices:
|
||||
return
|
||||
|
|
|
@ -319,19 +319,19 @@ class Notifier:
|
|||
)
|
||||
|
||||
if self.federation_sender:
|
||||
self.federation_sender.notify_new_events(max_room_stream_token.stream)
|
||||
self.federation_sender.notify_new_events(max_room_stream_token)
|
||||
|
||||
async def _notify_app_services(self, max_room_stream_token: RoomStreamToken):
|
||||
try:
|
||||
await self.appservice_handler.notify_interested_services(
|
||||
max_room_stream_token.stream
|
||||
max_room_stream_token
|
||||
)
|
||||
except Exception:
|
||||
logger.exception("Error notifying application services of event")
|
||||
|
||||
async def _notify_pusher_pool(self, max_room_stream_token: RoomStreamToken):
|
||||
try:
|
||||
await self._pusher_pool.on_new_notifications(max_room_stream_token.stream)
|
||||
await self._pusher_pool.on_new_notifications(max_room_stream_token)
|
||||
except Exception:
|
||||
logger.exception("Error pusher pool of event")
|
||||
|
||||
|
|
|
@ -18,6 +18,7 @@ import logging
|
|||
from twisted.internet.error import AlreadyCalled, AlreadyCancelled
|
||||
|
||||
from synapse.metrics.background_process_metrics import run_as_background_process
|
||||
from synapse.types import RoomStreamToken
|
||||
|
||||
logger = logging.getLogger(__name__)
|
||||
|
||||
|
@ -91,7 +92,12 @@ class EmailPusher:
|
|||
pass
|
||||
self.timed_call = None
|
||||
|
||||
def on_new_notifications(self, max_stream_ordering):
|
||||
def on_new_notifications(self, max_token: RoomStreamToken):
|
||||
# We just use the minimum stream ordering and ignore the vector clock
|
||||
# component. This is safe to do as long as we *always* ignore the vector
|
||||
# clock components.
|
||||
max_stream_ordering = max_token.stream
|
||||
|
||||
if self.max_stream_ordering:
|
||||
self.max_stream_ordering = max(
|
||||
max_stream_ordering, self.max_stream_ordering
|
||||
|
|
|
@ -23,6 +23,7 @@ from synapse.api.constants import EventTypes
|
|||
from synapse.logging import opentracing
|
||||
from synapse.metrics.background_process_metrics import run_as_background_process
|
||||
from synapse.push import PusherConfigException
|
||||
from synapse.types import RoomStreamToken
|
||||
|
||||
from . import push_rule_evaluator, push_tools
|
||||
|
||||
|
@ -114,7 +115,12 @@ class HttpPusher:
|
|||
if should_check_for_notifs:
|
||||
self._start_processing()
|
||||
|
||||
def on_new_notifications(self, max_stream_ordering):
|
||||
def on_new_notifications(self, max_token: RoomStreamToken):
|
||||
# We just use the minimum stream ordering and ignore the vector clock
|
||||
# component. This is safe to do as long as we *always* ignore the vector
|
||||
# clock components.
|
||||
max_stream_ordering = max_token.stream
|
||||
|
||||
self.max_stream_ordering = max(
|
||||
max_stream_ordering, self.max_stream_ordering or 0
|
||||
)
|
||||
|
|
|
@ -24,6 +24,7 @@ from synapse.push import PusherConfigException
|
|||
from synapse.push.emailpusher import EmailPusher
|
||||
from synapse.push.httppusher import HttpPusher
|
||||
from synapse.push.pusher import PusherFactory
|
||||
from synapse.types import RoomStreamToken
|
||||
from synapse.util.async_helpers import concurrently_execute
|
||||
|
||||
if TYPE_CHECKING:
|
||||
|
@ -186,11 +187,16 @@ class PusherPool:
|
|||
)
|
||||
await self.remove_pusher(p["app_id"], p["pushkey"], p["user_name"])
|
||||
|
||||
async def on_new_notifications(self, max_stream_id: int):
|
||||
async def on_new_notifications(self, max_token: RoomStreamToken):
|
||||
if not self.pushers:
|
||||
# nothing to do here.
|
||||
return
|
||||
|
||||
# We just use the minimum stream ordering and ignore the vector clock
|
||||
# component. This is safe to do as long as we *always* ignore the vector
|
||||
# clock components.
|
||||
max_stream_id = max_token.stream
|
||||
|
||||
if max_stream_id < self._last_room_stream_id_seen:
|
||||
# Nothing to do
|
||||
return
|
||||
|
@ -214,7 +220,7 @@ class PusherPool:
|
|||
|
||||
if u in self.pushers:
|
||||
for p in self.pushers[u].values():
|
||||
p.on_new_notifications(max_stream_id)
|
||||
p.on_new_notifications(max_token)
|
||||
|
||||
except Exception:
|
||||
logger.exception("Exception in pusher on_new_notifications")
|
||||
|
|
|
@ -59,7 +59,9 @@ class ProfileDisplaynameRestServlet(RestServlet):
|
|||
try:
|
||||
new_name = content["displayname"]
|
||||
except Exception:
|
||||
return 400, "Unable to parse name"
|
||||
raise SynapseError(
|
||||
code=400, msg="Unable to parse name", errcode=Codes.BAD_JSON,
|
||||
)
|
||||
|
||||
await self.profile_handler.set_displayname(user, requester, new_name, is_admin)
|
||||
|
||||
|
|
|
@ -1270,6 +1270,10 @@ class PersistEventsStore:
|
|||
)
|
||||
|
||||
def _store_retention_policy_for_room_txn(self, txn, event):
|
||||
if not event.is_state():
|
||||
logger.debug("Ignoring non-state m.room.retention event")
|
||||
return
|
||||
|
||||
if hasattr(event, "content") and (
|
||||
"min_lifetime" in event.content or "max_lifetime" in event.content
|
||||
):
|
||||
|
|
|
@ -18,6 +18,7 @@ from mock import Mock
|
|||
from twisted.internet import defer
|
||||
|
||||
from synapse.handlers.appservice import ApplicationServicesHandler
|
||||
from synapse.types import RoomStreamToken
|
||||
|
||||
from tests.test_utils import make_awaitable
|
||||
from tests.utils import MockClock
|
||||
|
@ -61,7 +62,9 @@ class AppServiceHandlerTestCase(unittest.TestCase):
|
|||
defer.succeed((0, [event])),
|
||||
defer.succeed((0, [])),
|
||||
]
|
||||
yield defer.ensureDeferred(self.handler.notify_interested_services(0))
|
||||
yield defer.ensureDeferred(
|
||||
self.handler.notify_interested_services(RoomStreamToken(None, 0))
|
||||
)
|
||||
self.mock_scheduler.submit_event_for_as.assert_called_once_with(
|
||||
interested_service, event
|
||||
)
|
||||
|
@ -80,7 +83,9 @@ class AppServiceHandlerTestCase(unittest.TestCase):
|
|||
defer.succeed((0, [event])),
|
||||
defer.succeed((0, [])),
|
||||
]
|
||||
yield defer.ensureDeferred(self.handler.notify_interested_services(0))
|
||||
yield defer.ensureDeferred(
|
||||
self.handler.notify_interested_services(RoomStreamToken(None, 0))
|
||||
)
|
||||
self.mock_as_api.query_user.assert_called_once_with(services[0], user_id)
|
||||
|
||||
@defer.inlineCallbacks
|
||||
|
@ -97,7 +102,9 @@ class AppServiceHandlerTestCase(unittest.TestCase):
|
|||
defer.succeed((0, [event])),
|
||||
defer.succeed((0, [])),
|
||||
]
|
||||
yield defer.ensureDeferred(self.handler.notify_interested_services(0))
|
||||
yield defer.ensureDeferred(
|
||||
self.handler.notify_interested_services(RoomStreamToken(None, 0))
|
||||
)
|
||||
self.assertFalse(
|
||||
self.mock_as_api.query_user.called,
|
||||
"query_user called when it shouldn't have been.",
|
||||
|
|
|
@ -14,8 +14,12 @@
|
|||
# limitations under the License.
|
||||
import logging
|
||||
|
||||
from mock import patch
|
||||
|
||||
from synapse.api.room_versions import RoomVersion
|
||||
from synapse.rest import admin
|
||||
from synapse.rest.client.v1 import login, room
|
||||
from synapse.rest.client.v2_alpha import sync
|
||||
|
||||
from tests.replication._base import BaseMultiWorkerStreamTestCase
|
||||
from tests.utils import USE_POSTGRES_FOR_TESTS
|
||||
|
@ -36,6 +40,7 @@ class EventPersisterShardTestCase(BaseMultiWorkerStreamTestCase):
|
|||
admin.register_servlets_for_client_rest_resource,
|
||||
room.register_servlets,
|
||||
login.register_servlets,
|
||||
sync.register_servlets,
|
||||
]
|
||||
|
||||
def prepare(self, reactor, clock, hs):
|
||||
|
@ -43,6 +48,9 @@ class EventPersisterShardTestCase(BaseMultiWorkerStreamTestCase):
|
|||
self.other_user_id = self.register_user("otheruser", "pass")
|
||||
self.other_access_token = self.login("otheruser", "pass")
|
||||
|
||||
self.room_creator = self.hs.get_room_creation_handler()
|
||||
self.store = hs.get_datastore()
|
||||
|
||||
def default_config(self):
|
||||
conf = super().default_config()
|
||||
conf["redis"] = {"enabled": "true"}
|
||||
|
@ -53,6 +61,29 @@ class EventPersisterShardTestCase(BaseMultiWorkerStreamTestCase):
|
|||
}
|
||||
return conf
|
||||
|
||||
def _create_room(self, room_id: str, user_id: str, tok: str):
|
||||
"""Create a room with given room_id
|
||||
"""
|
||||
|
||||
# We control the room ID generation by patching out the
|
||||
# `_generate_room_id` method
|
||||
async def generate_room(
|
||||
creator_id: str, is_public: bool, room_version: RoomVersion
|
||||
):
|
||||
await self.store.store_room(
|
||||
room_id=room_id,
|
||||
room_creator_user_id=creator_id,
|
||||
is_public=is_public,
|
||||
room_version=room_version,
|
||||
)
|
||||
return room_id
|
||||
|
||||
with patch(
|
||||
"synapse.handlers.room.RoomCreationHandler._generate_room_id"
|
||||
) as mock:
|
||||
mock.side_effect = generate_room
|
||||
self.helper.create_room_as(user_id, tok=tok)
|
||||
|
||||
def test_basic(self):
|
||||
"""Simple test to ensure that multiple rooms can be created and joined,
|
||||
and that different rooms get handled by different instances.
|
||||
|
@ -100,3 +131,189 @@ class EventPersisterShardTestCase(BaseMultiWorkerStreamTestCase):
|
|||
|
||||
self.assertTrue(persisted_on_1)
|
||||
self.assertTrue(persisted_on_2)
|
||||
|
||||
def test_vector_clock_token(self):
|
||||
"""Tests that using a stream token with a vector clock component works
|
||||
correctly with basic /sync and /messages usage.
|
||||
"""
|
||||
|
||||
self.make_worker_hs(
|
||||
"synapse.app.generic_worker", {"worker_name": "worker1"},
|
||||
)
|
||||
|
||||
worker_hs2 = self.make_worker_hs(
|
||||
"synapse.app.generic_worker", {"worker_name": "worker2"},
|
||||
)
|
||||
|
||||
sync_hs = self.make_worker_hs(
|
||||
"synapse.app.generic_worker", {"worker_name": "sync"},
|
||||
)
|
||||
|
||||
# Specially selected room IDs that get persisted on different workers.
|
||||
room_id1 = "!foo:test"
|
||||
room_id2 = "!baz:test"
|
||||
|
||||
self.assertEqual(
|
||||
self.hs.config.worker.events_shard_config.get_instance(room_id1), "worker1"
|
||||
)
|
||||
self.assertEqual(
|
||||
self.hs.config.worker.events_shard_config.get_instance(room_id2), "worker2"
|
||||
)
|
||||
|
||||
user_id = self.register_user("user", "pass")
|
||||
access_token = self.login("user", "pass")
|
||||
|
||||
store = self.hs.get_datastore()
|
||||
|
||||
# Create two room on the different workers.
|
||||
self._create_room(room_id1, user_id, access_token)
|
||||
self._create_room(room_id2, user_id, access_token)
|
||||
|
||||
# The other user joins
|
||||
self.helper.join(
|
||||
room=room_id1, user=self.other_user_id, tok=self.other_access_token
|
||||
)
|
||||
self.helper.join(
|
||||
room=room_id2, user=self.other_user_id, tok=self.other_access_token
|
||||
)
|
||||
|
||||
# Do an initial sync so that we're up to date.
|
||||
request, channel = self.make_request("GET", "/sync", access_token=access_token)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
next_batch = channel.json_body["next_batch"]
|
||||
|
||||
# We now gut wrench into the events stream MultiWriterIdGenerator on
|
||||
# worker2 to mimic it getting stuck persisting an event. This ensures
|
||||
# that when we send an event on worker1 we end up in a state where
|
||||
# worker2 events stream position lags that on worker1, resulting in a
|
||||
# RoomStreamToken with a non-empty instance map component.
|
||||
#
|
||||
# Worker2's event stream position will not advance until we call
|
||||
# __aexit__ again.
|
||||
actx = worker_hs2.get_datastore()._stream_id_gen.get_next()
|
||||
self.get_success(actx.__aenter__())
|
||||
|
||||
response = self.helper.send(room_id1, body="Hi!", tok=self.other_access_token)
|
||||
first_event_in_room1 = response["event_id"]
|
||||
|
||||
# Assert that the current stream token has an instance map component, as
|
||||
# we are trying to test vector clock tokens.
|
||||
room_stream_token = store.get_room_max_token()
|
||||
self.assertNotEqual(len(room_stream_token.instance_map), 0)
|
||||
|
||||
# Check that syncing still gets the new event, despite the gap in the
|
||||
# stream IDs.
|
||||
request, channel = self.make_request(
|
||||
"GET", "/sync?since={}".format(next_batch), access_token=access_token
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
|
||||
# We should only see the new event and nothing else
|
||||
self.assertIn(room_id1, channel.json_body["rooms"]["join"])
|
||||
self.assertNotIn(room_id2, channel.json_body["rooms"]["join"])
|
||||
|
||||
events = channel.json_body["rooms"]["join"][room_id1]["timeline"]["events"]
|
||||
self.assertListEqual(
|
||||
[first_event_in_room1], [event["event_id"] for event in events]
|
||||
)
|
||||
|
||||
# Get the next batch and makes sure its a vector clock style token.
|
||||
vector_clock_token = channel.json_body["next_batch"]
|
||||
self.assertTrue(vector_clock_token.startswith("m"))
|
||||
|
||||
# Now that we've got a vector clock token we finish the fake persisting
|
||||
# an event we started above.
|
||||
self.get_success(actx.__aexit__(None, None, None))
|
||||
|
||||
# Now try and send an event to the other rooom so that we can test that
|
||||
# the vector clock style token works as a `since` token.
|
||||
response = self.helper.send(room_id2, body="Hi!", tok=self.other_access_token)
|
||||
first_event_in_room2 = response["event_id"]
|
||||
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/sync?since={}".format(vector_clock_token),
|
||||
access_token=access_token,
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
|
||||
self.assertNotIn(room_id1, channel.json_body["rooms"]["join"])
|
||||
self.assertIn(room_id2, channel.json_body["rooms"]["join"])
|
||||
|
||||
events = channel.json_body["rooms"]["join"][room_id2]["timeline"]["events"]
|
||||
self.assertListEqual(
|
||||
[first_event_in_room2], [event["event_id"] for event in events]
|
||||
)
|
||||
|
||||
next_batch = channel.json_body["next_batch"]
|
||||
|
||||
# We also want to test that the vector clock style token works with
|
||||
# pagination. We do this by sending a couple of new events into the room
|
||||
# and syncing again to get a prev_batch token for each room, then
|
||||
# paginating from there back to the vector clock token.
|
||||
self.helper.send(room_id1, body="Hi again!", tok=self.other_access_token)
|
||||
self.helper.send(room_id2, body="Hi again!", tok=self.other_access_token)
|
||||
|
||||
request, channel = self.make_request(
|
||||
"GET", "/sync?since={}".format(next_batch), access_token=access_token
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
|
||||
prev_batch1 = channel.json_body["rooms"]["join"][room_id1]["timeline"][
|
||||
"prev_batch"
|
||||
]
|
||||
prev_batch2 = channel.json_body["rooms"]["join"][room_id2]["timeline"][
|
||||
"prev_batch"
|
||||
]
|
||||
|
||||
# Paginating back in the first room should not produce any results, as
|
||||
# no events have happened in it. This tests that we are correctly
|
||||
# filtering results based on the vector clock portion.
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/rooms/{}/messages?from={}&to={}&dir=b".format(
|
||||
room_id1, prev_batch1, vector_clock_token
|
||||
),
|
||||
access_token=access_token,
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
self.assertListEqual([], channel.json_body["chunk"])
|
||||
|
||||
# Paginating back on the second room should produce the first event
|
||||
# again. This tests that pagination isn't completely broken.
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/rooms/{}/messages?from={}&to={}&dir=b".format(
|
||||
room_id2, prev_batch2, vector_clock_token
|
||||
),
|
||||
access_token=access_token,
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
self.assertEqual(len(channel.json_body["chunk"]), 1)
|
||||
self.assertEqual(
|
||||
channel.json_body["chunk"][0]["event_id"], first_event_in_room2
|
||||
)
|
||||
|
||||
# Paginating forwards should give the same results
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/rooms/{}/messages?from={}&to={}&dir=f".format(
|
||||
room_id1, vector_clock_token, prev_batch1
|
||||
),
|
||||
access_token=access_token,
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
self.assertListEqual([], channel.json_body["chunk"])
|
||||
|
||||
request, channel = self.make_request(
|
||||
"GET",
|
||||
"/rooms/{}/messages?from={}&to={}&dir=f".format(
|
||||
room_id2, vector_clock_token, prev_batch2,
|
||||
),
|
||||
access_token=access_token,
|
||||
)
|
||||
self.render_on_worker(sync_hs, request)
|
||||
self.assertEqual(len(channel.json_body["chunk"]), 1)
|
||||
self.assertEqual(
|
||||
channel.json_body["chunk"][0]["event_id"], first_event_in_room2
|
||||
)
|
||||
|
|
|
@ -20,7 +20,7 @@ import hmac
|
|||
import inspect
|
||||
import logging
|
||||
import time
|
||||
from typing import Optional, Tuple, Type, TypeVar, Union
|
||||
from typing import Optional, Tuple, Type, TypeVar, Union, overload
|
||||
|
||||
from mock import Mock, patch
|
||||
|
||||
|
@ -364,6 +364,36 @@ class HomeserverTestCase(TestCase):
|
|||
Function to optionally be overridden in subclasses.
|
||||
"""
|
||||
|
||||
# Annoyingly mypy doesn't seem to pick up the fact that T is SynapseRequest
|
||||
# when the `request` arg isn't given, so we define an explicit override to
|
||||
# cover that case.
|
||||
@overload
|
||||
def make_request(
|
||||
self,
|
||||
method: Union[bytes, str],
|
||||
path: Union[bytes, str],
|
||||
content: Union[bytes, dict] = b"",
|
||||
access_token: Optional[str] = None,
|
||||
shorthand: bool = True,
|
||||
federation_auth_origin: str = None,
|
||||
content_is_form: bool = False,
|
||||
) -> Tuple[SynapseRequest, FakeChannel]:
|
||||
...
|
||||
|
||||
@overload
|
||||
def make_request(
|
||||
self,
|
||||
method: Union[bytes, str],
|
||||
path: Union[bytes, str],
|
||||
content: Union[bytes, dict] = b"",
|
||||
access_token: Optional[str] = None,
|
||||
request: Type[T] = SynapseRequest,
|
||||
shorthand: bool = True,
|
||||
federation_auth_origin: str = None,
|
||||
content_is_form: bool = False,
|
||||
) -> Tuple[T, FakeChannel]:
|
||||
...
|
||||
|
||||
def make_request(
|
||||
self,
|
||||
method: Union[bytes, str],
|
||||
|
|
Loading…
Reference in New Issue