2023-04-17 15:37:11 +00:00
|
|
|
"""
|
|
|
|
Tests for generic service methods
|
|
|
|
"""
|
2024-07-26 19:59:44 +00:00
|
|
|
|
2023-11-22 17:26:00 +00:00
|
|
|
import pytest
|
2023-04-17 15:37:11 +00:00
|
|
|
from pytest import raises
|
|
|
|
|
2023-11-22 17:26:00 +00:00
|
|
|
from selfprivacy_api.utils import ReadUserData, WriteUserData
|
|
|
|
from selfprivacy_api.utils.waitloop import wait_until_true
|
|
|
|
|
2024-01-03 19:19:29 +00:00
|
|
|
import selfprivacy_api.services as services_module
|
|
|
|
|
2023-04-19 11:34:14 +00:00
|
|
|
from selfprivacy_api.services.bitwarden import Bitwarden
|
|
|
|
from selfprivacy_api.services.pleroma import Pleroma
|
2023-12-27 11:54:25 +00:00
|
|
|
from selfprivacy_api.services.mailserver import MailServer
|
2023-04-19 11:34:14 +00:00
|
|
|
from selfprivacy_api.services.owned_path import OwnedPath
|
|
|
|
|
2023-04-17 15:37:11 +00:00
|
|
|
from selfprivacy_api.services.test_service import DummyService
|
2023-07-12 15:02:45 +00:00
|
|
|
from selfprivacy_api.services.service import Service, ServiceStatus, StoppedService
|
2024-07-24 15:15:31 +00:00
|
|
|
from selfprivacy_api.services import ServiceManager
|
2023-07-12 12:10:40 +00:00
|
|
|
|
2024-01-09 18:58:09 +00:00
|
|
|
from tests.test_dkim import dkim_file, no_dkim_file
|
2023-12-27 11:54:25 +00:00
|
|
|
|
2023-04-17 15:37:11 +00:00
|
|
|
|
|
|
|
def test_unimplemented_folders_raises():
|
|
|
|
with raises(NotImplementedError):
|
|
|
|
Service.get_folders()
|
|
|
|
with raises(NotImplementedError):
|
|
|
|
Service.get_owned_folders()
|
|
|
|
|
|
|
|
class OurDummy(DummyService, folders=["testydir", "dirtessimo"]):
|
|
|
|
pass
|
|
|
|
|
|
|
|
owned_folders = OurDummy.get_owned_folders()
|
|
|
|
assert owned_folders is not None
|
2023-04-19 11:34:14 +00:00
|
|
|
|
|
|
|
|
2023-07-12 15:02:45 +00:00
|
|
|
def test_service_stopper(raw_dummy_service):
|
|
|
|
dummy: Service = raw_dummy_service
|
|
|
|
dummy.set_delay(0.3)
|
|
|
|
|
|
|
|
assert dummy.get_status() == ServiceStatus.ACTIVE
|
|
|
|
|
|
|
|
with StoppedService(dummy) as stopped_dummy:
|
|
|
|
assert stopped_dummy.get_status() == ServiceStatus.INACTIVE
|
|
|
|
assert dummy.get_status() == ServiceStatus.INACTIVE
|
|
|
|
|
|
|
|
assert dummy.get_status() == ServiceStatus.ACTIVE
|
|
|
|
|
|
|
|
|
2023-07-12 12:10:40 +00:00
|
|
|
def test_delayed_start_stop(raw_dummy_service):
|
|
|
|
dummy = raw_dummy_service
|
2023-07-12 12:27:55 +00:00
|
|
|
dummy.set_delay(0.3)
|
2023-07-12 12:10:40 +00:00
|
|
|
|
2023-07-12 12:27:55 +00:00
|
|
|
dummy.stop()
|
2023-07-12 12:10:40 +00:00
|
|
|
assert dummy.get_status() == ServiceStatus.DEACTIVATING
|
|
|
|
wait_until_true(lambda: dummy.get_status() == ServiceStatus.INACTIVE)
|
|
|
|
assert dummy.get_status() == ServiceStatus.INACTIVE
|
|
|
|
|
2023-07-12 12:27:55 +00:00
|
|
|
dummy.start()
|
2023-07-12 12:10:40 +00:00
|
|
|
assert dummy.get_status() == ServiceStatus.ACTIVATING
|
|
|
|
wait_until_true(lambda: dummy.get_status() == ServiceStatus.ACTIVE)
|
|
|
|
assert dummy.get_status() == ServiceStatus.ACTIVE
|
|
|
|
|
|
|
|
|
2023-04-19 11:34:14 +00:00
|
|
|
def test_owned_folders_from_not_owned():
|
|
|
|
assert Bitwarden.get_owned_folders() == [
|
|
|
|
OwnedPath(
|
|
|
|
path=folder,
|
|
|
|
group="vaultwarden",
|
|
|
|
owner="vaultwarden",
|
|
|
|
)
|
|
|
|
for folder in Bitwarden.get_folders()
|
|
|
|
]
|
|
|
|
|
|
|
|
|
|
|
|
def test_paths_from_owned_paths():
|
|
|
|
assert len(Pleroma.get_folders()) == 2
|
|
|
|
assert Pleroma.get_folders() == [
|
|
|
|
ownedpath.path for ownedpath in Pleroma.get_owned_folders()
|
|
|
|
]
|
2023-04-19 12:12:46 +00:00
|
|
|
|
|
|
|
|
2023-11-22 17:26:00 +00:00
|
|
|
def test_enabling_disabling_reads_json(dummy_service: DummyService):
|
|
|
|
with WriteUserData() as data:
|
2024-01-03 19:19:29 +00:00
|
|
|
data["modules"][dummy_service.get_id()]["enable"] = False
|
2023-11-22 17:26:00 +00:00
|
|
|
assert dummy_service.is_enabled() is False
|
|
|
|
with WriteUserData() as data:
|
2024-01-03 19:19:29 +00:00
|
|
|
data["modules"][dummy_service.get_id()]["enable"] = True
|
2023-11-22 17:26:00 +00:00
|
|
|
assert dummy_service.is_enabled() is True
|
|
|
|
|
|
|
|
|
2024-01-03 19:19:29 +00:00
|
|
|
# A helper to test undefined states. Used in fixtures below
|
|
|
|
def undefine_service_enabled_status(param, dummy_service):
|
|
|
|
if param == "deleted_attribute":
|
|
|
|
with WriteUserData() as data:
|
|
|
|
del data["modules"][dummy_service.get_id()]["enable"]
|
|
|
|
if param == "service_not_in_json":
|
|
|
|
with WriteUserData() as data:
|
|
|
|
del data["modules"][dummy_service.get_id()]
|
|
|
|
if param == "modules_not_in_json":
|
|
|
|
with WriteUserData() as data:
|
|
|
|
del data["modules"]
|
|
|
|
|
|
|
|
|
|
|
|
# May be defined or not
|
|
|
|
@pytest.fixture(
|
|
|
|
params=[
|
|
|
|
"normally_enabled",
|
|
|
|
"deleted_attribute",
|
|
|
|
"service_not_in_json",
|
|
|
|
"modules_not_in_json",
|
|
|
|
]
|
|
|
|
)
|
2023-11-22 17:26:00 +00:00
|
|
|
def possibly_dubiously_enabled_service(
|
|
|
|
dummy_service: DummyService, request
|
|
|
|
) -> DummyService:
|
2024-01-03 19:19:29 +00:00
|
|
|
if request.param != "normally_enabled":
|
|
|
|
undefine_service_enabled_status(request.param, dummy_service)
|
2023-11-22 17:26:00 +00:00
|
|
|
return dummy_service
|
|
|
|
|
|
|
|
|
2024-01-03 19:19:29 +00:00
|
|
|
# Strictly UNdefined
|
|
|
|
@pytest.fixture(
|
|
|
|
params=["deleted_attribute", "service_not_in_json", "modules_not_in_json"]
|
|
|
|
)
|
2023-11-22 17:26:00 +00:00
|
|
|
def undefined_enabledness_service(dummy_service: DummyService, request) -> DummyService:
|
2024-01-03 19:19:29 +00:00
|
|
|
undefine_service_enabled_status(request.param, dummy_service)
|
2023-11-22 17:26:00 +00:00
|
|
|
return dummy_service
|
|
|
|
|
|
|
|
|
|
|
|
def test_undefined_enabledness_in_json_means_False(
|
|
|
|
undefined_enabledness_service: DummyService,
|
|
|
|
):
|
|
|
|
dummy_service = undefined_enabledness_service
|
|
|
|
assert dummy_service.is_enabled() is False
|
|
|
|
|
|
|
|
|
|
|
|
def test_enabling_disabling_writes_json(
|
|
|
|
possibly_dubiously_enabled_service: DummyService,
|
|
|
|
):
|
|
|
|
dummy_service = possibly_dubiously_enabled_service
|
|
|
|
|
|
|
|
dummy_service.disable()
|
|
|
|
with ReadUserData() as data:
|
2024-01-03 19:19:29 +00:00
|
|
|
assert data["modules"][dummy_service.get_id()]["enable"] is False
|
2023-11-22 17:26:00 +00:00
|
|
|
dummy_service.enable()
|
|
|
|
with ReadUserData() as data:
|
2024-01-03 19:19:29 +00:00
|
|
|
assert data["modules"][dummy_service.get_id()]["enable"] is True
|
2023-11-22 17:26:00 +00:00
|
|
|
dummy_service.disable()
|
|
|
|
with ReadUserData() as data:
|
2024-01-03 19:19:29 +00:00
|
|
|
assert data["modules"][dummy_service.get_id()]["enable"] is False
|
2023-12-27 11:54:25 +00:00
|
|
|
|
|
|
|
|
|
|
|
# more detailed testing of this is in test_graphql/test_system.py
|
2024-03-01 11:58:28 +00:00
|
|
|
# Using the same random global IPs as the test_network_utils
|
2023-12-27 11:54:25 +00:00
|
|
|
def test_mailserver_with_dkim_returns_some_dns(dkim_file):
|
2024-03-01 11:58:28 +00:00
|
|
|
records = MailServer().get_dns_records("157.90.247.192", "2a01:4f8:c17:7e3d::2")
|
2023-12-27 11:54:25 +00:00
|
|
|
assert len(records) > 0
|
|
|
|
|
|
|
|
|
|
|
|
def test_mailserver_with_no_dkim_returns_no_dns(no_dkim_file):
|
2024-03-01 11:58:28 +00:00
|
|
|
assert MailServer().get_dns_records("157.90.247.192", "2a01:4f8:c17:7e3d::2") == []
|
2024-01-03 19:19:29 +00:00
|
|
|
|
|
|
|
|
|
|
|
def test_services_enabled_by_default(generic_userdata):
|
2024-07-24 15:15:31 +00:00
|
|
|
assert set(ServiceManager.get_enabled_services()) == set(services_module.services)
|