mirror of
https://git.selfprivacy.org/SelfPrivacy/selfprivacy-rest-api.git
synced 2024-12-12 16:18:48 +00:00
318 lines
8.8 KiB
Python
318 lines
8.8 KiB
Python
"""Tests configuration."""
|
|
|
|
# pylint: disable=redefined-outer-name
|
|
# pylint: disable=unused-argument
|
|
import os
|
|
import pytest
|
|
import datetime
|
|
import subprocess
|
|
|
|
from os import path
|
|
from os import makedirs
|
|
from typing import Generator
|
|
from fastapi.testclient import TestClient
|
|
from shutil import copyfile
|
|
|
|
from selfprivacy_api.models.tokens.token import Token
|
|
|
|
from selfprivacy_api.utils.huey import huey
|
|
|
|
import selfprivacy_api.services as services
|
|
from selfprivacy_api.services import Service, ServiceManager
|
|
from selfprivacy_api.services.test_service import DummyService
|
|
|
|
from selfprivacy_api.repositories.tokens.redis_tokens_repository import (
|
|
RedisTokensRepository,
|
|
)
|
|
|
|
API_REBUILD_SYSTEM_UNIT = "sp-nixos-rebuild.service"
|
|
API_UPGRADE_SYSTEM_UNIT = "sp-nixos-upgrade.service"
|
|
|
|
TESTFILE_BODY = "testytest!"
|
|
TESTFILE2_BODY = "testissimo!"
|
|
|
|
TOKENS_FILE_CONTENTS = {
|
|
"tokens": [
|
|
{
|
|
"token": "TEST_TOKEN",
|
|
"name": "test_token",
|
|
"date": datetime.datetime(2022, 1, 14, 8, 31, 10, 789314),
|
|
},
|
|
{
|
|
"token": "TEST_TOKEN2",
|
|
"name": "test_token2",
|
|
"date": datetime.datetime(2022, 1, 14, 8, 31, 10, 789314),
|
|
},
|
|
]
|
|
}
|
|
|
|
TOKENS = [
|
|
Token(
|
|
token="TEST_TOKEN",
|
|
device_name="test_token",
|
|
created_at=datetime.datetime(2022, 1, 14, 8, 31, 10, 789314),
|
|
),
|
|
Token(
|
|
token="TEST_TOKEN2",
|
|
device_name="test_token2",
|
|
created_at=datetime.datetime(2022, 1, 14, 8, 31, 10, 789314),
|
|
),
|
|
]
|
|
|
|
DEVICE_WE_AUTH_TESTS_WITH = TOKENS_FILE_CONTENTS["tokens"][0]
|
|
|
|
|
|
def pytest_generate_tests(metafunc):
|
|
os.environ["TEST_MODE"] = "true"
|
|
|
|
|
|
def global_data_dir():
|
|
return path.join(path.dirname(__file__), "data")
|
|
|
|
|
|
@pytest.fixture
|
|
def empty_redis_repo():
|
|
repo = RedisTokensRepository()
|
|
repo.reset()
|
|
assert repo.get_tokens() == []
|
|
return repo
|
|
|
|
|
|
@pytest.fixture
|
|
def redis_repo_with_tokens():
|
|
repo = RedisTokensRepository()
|
|
repo.reset()
|
|
for token in TOKENS:
|
|
repo._store_token(token)
|
|
assert sorted(repo.get_tokens(), key=lambda x: x.token) == sorted(
|
|
TOKENS, key=lambda x: x.token
|
|
)
|
|
|
|
|
|
def clone_global_file(filename, tmpdir) -> str:
|
|
source_path = path.join(global_data_dir(), filename)
|
|
clone_path = path.join(tmpdir, filename)
|
|
|
|
copyfile(source_path, clone_path)
|
|
return clone_path
|
|
|
|
|
|
@pytest.fixture
|
|
def generic_userdata(mocker, tmpdir):
|
|
userdata_path = clone_global_file("turned_on.json", tmpdir)
|
|
mock = mocker.patch("selfprivacy_api.utils.USERDATA_FILE", new=userdata_path)
|
|
mock = mocker.patch("selfprivacy_api.services.USERDATA_FILE", new=userdata_path)
|
|
|
|
secrets_path = clone_global_file("secrets.json", tmpdir)
|
|
mock = mocker.patch("selfprivacy_api.utils.SECRETS_FILE", new=secrets_path)
|
|
mock = mocker.patch("selfprivacy_api.services.SECRETS_FILE", new=secrets_path)
|
|
|
|
return mock
|
|
|
|
|
|
@pytest.fixture
|
|
def client(redis_repo_with_tokens):
|
|
from selfprivacy_api.app import app
|
|
|
|
return TestClient(app)
|
|
|
|
|
|
@pytest.fixture
|
|
def authorized_client(redis_repo_with_tokens):
|
|
"""Authorized test client fixture."""
|
|
from selfprivacy_api.app import app
|
|
|
|
client = TestClient(app)
|
|
client.headers.update(
|
|
{"Authorization": "Bearer " + DEVICE_WE_AUTH_TESTS_WITH["token"]}
|
|
)
|
|
return client
|
|
|
|
|
|
@pytest.fixture
|
|
def wrong_auth_client(redis_repo_with_tokens):
|
|
"""Wrong token test client fixture."""
|
|
from selfprivacy_api.app import app
|
|
|
|
client = TestClient(app)
|
|
client.headers.update({"Authorization": "Bearer WRONG_TOKEN"})
|
|
return client
|
|
|
|
|
|
@pytest.fixture()
|
|
def volume_folders(tmpdir, mocker):
|
|
volumes_dir = path.join(tmpdir, "volumes")
|
|
|
|
makedirs(volumes_dir)
|
|
volumenames = ["sda1", "sda2"]
|
|
for d in volumenames:
|
|
service_dir = path.join(volumes_dir, d)
|
|
makedirs(service_dir)
|
|
mock = mocker.patch("selfprivacy_api.services.owned_path.VOLUMES_PATH", volumes_dir)
|
|
|
|
|
|
TESTFILE_NAME = "testfile.txt"
|
|
TESTFILE2_NAME = "testfile2.txt"
|
|
|
|
from typing import List
|
|
from os import listdir
|
|
|
|
|
|
def testfile_paths(service_dirs: List[str]) -> List[str]:
|
|
testfile_path_1 = path.join(service_dirs[0], TESTFILE_NAME)
|
|
testfile_path_2 = path.join(service_dirs[1], TESTFILE2_NAME)
|
|
return [testfile_path_1, testfile_path_2]
|
|
|
|
|
|
def write_testfile_bodies(service: DummyService, bodies: List[str]):
|
|
# Convenience for restore tests
|
|
paths = testfile_paths(service.get_folders())
|
|
for p, body in zip(paths, bodies):
|
|
with open(p, "w") as file:
|
|
file.write(body)
|
|
|
|
|
|
def get_testfile_bodies(service: DummyService):
|
|
# Convenience for restore tests
|
|
testfiles: List[str] = []
|
|
for folder in service.get_folders():
|
|
files = listdir(folder)
|
|
files = [path.join(folder, file) for file in files]
|
|
testfiles.extend(files)
|
|
bodies = {}
|
|
for f in testfiles:
|
|
with open(f, "r") as file:
|
|
bodies[f] = file.read()
|
|
return bodies
|
|
|
|
|
|
def assert_original_files(service: DummyService):
|
|
# For use in restoration tests mostly
|
|
|
|
paths = testfile_paths(service.get_folders())
|
|
assert get_testfile_bodies(service) == {
|
|
paths[0]: TESTFILE_BODY,
|
|
paths[1]: TESTFILE2_BODY,
|
|
}
|
|
|
|
|
|
@pytest.fixture()
|
|
def raw_dummy_service(tmpdir) -> DummyService:
|
|
dirnames = ["test_service", "also_test_service"]
|
|
service_dirs = []
|
|
for d in dirnames:
|
|
service_dir = path.join(tmpdir, d)
|
|
makedirs(service_dir)
|
|
service_dirs.append(service_dir)
|
|
|
|
paths = testfile_paths(service_dirs)
|
|
bodies = [TESTFILE_BODY, TESTFILE2_BODY]
|
|
|
|
# Just touching first, filling is separate
|
|
for fullpath in paths:
|
|
with open(fullpath, "w") as file:
|
|
file.write("")
|
|
|
|
class TestDummyService(DummyService, folders=service_dirs):
|
|
pass
|
|
|
|
service = TestDummyService()
|
|
write_testfile_bodies(service, bodies)
|
|
|
|
assert_original_files(service)
|
|
|
|
return service
|
|
|
|
|
|
def ensure_user_exists(user: str):
|
|
try:
|
|
output = subprocess.check_output(
|
|
["useradd", "-U", user], stderr=subprocess.PIPE, shell=False
|
|
)
|
|
except subprocess.CalledProcessError as error:
|
|
if b"already exists" not in error.stderr:
|
|
raise error
|
|
|
|
try:
|
|
output = subprocess.check_output(
|
|
["useradd", user], stderr=subprocess.PIPE, shell=False
|
|
)
|
|
except subprocess.CalledProcessError as error:
|
|
assert b"already exists" in error.stderr
|
|
return
|
|
|
|
raise ValueError("could not create user", user)
|
|
|
|
|
|
@pytest.fixture()
|
|
def dummy_service(
|
|
tmpdir, raw_dummy_service, generic_userdata
|
|
) -> Generator[Service, None, None]:
|
|
service = raw_dummy_service
|
|
user = service.get_user()
|
|
|
|
# TODO: use create_user from users actions. But it will need NIXOS to be there
|
|
# and react to our changes to files.
|
|
# from selfprivacy_api.actions.users import create_user
|
|
# create_user(user, "yay, it is me")
|
|
ensure_user_exists(user)
|
|
|
|
# register our service
|
|
services.services.append(service)
|
|
|
|
huey.immediate = True
|
|
assert huey.immediate is True
|
|
|
|
assert ServiceManager.get_service_by_id(service.get_id()) is not None
|
|
service.enable()
|
|
yield service
|
|
|
|
# Cleanup because apparently it matters wrt tasks
|
|
# Some tests may remove it from the list intentionally, this is fine
|
|
if service in services.services:
|
|
services.services.remove(service)
|
|
|
|
|
|
def prepare_nixos_rebuild_calls(fp, unit_name):
|
|
# Start the unit
|
|
fp.register(["systemctl", "start", unit_name])
|
|
|
|
# Wait for it to start
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=inactive")
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=inactive")
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=active")
|
|
|
|
# Check its exectution
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=active")
|
|
fp.register(
|
|
["journalctl", "-u", unit_name, "-n", "1", "-o", "cat"],
|
|
stdout="Starting rebuild...",
|
|
)
|
|
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=active")
|
|
fp.register(
|
|
["journalctl", "-u", unit_name, "-n", "1", "-o", "cat"], stdout="Rebuilding..."
|
|
)
|
|
|
|
fp.register(["systemctl", "show", unit_name], stdout="ActiveState=inactive")
|
|
|
|
|
|
# My best-effort attempt at making tests involving rebuild friendlier
|
|
@pytest.fixture()
|
|
def catch_nixos_rebuild_calls(fp):
|
|
# A helper function to be used in tests of all systems that requires
|
|
# rebuilds
|
|
prepare_nixos_rebuild_calls(fp, API_REBUILD_SYSTEM_UNIT)
|
|
return fp
|
|
|
|
|
|
def assert_rebuild_was_made(fp):
|
|
# You call it after you have done the operation that
|
|
# calls a rebuild
|
|
assert_rebuild_or_upgrade_was_made(fp, API_REBUILD_SYSTEM_UNIT)
|
|
|
|
|
|
def assert_rebuild_or_upgrade_was_made(fp, unit_name):
|
|
assert fp.call_count(["systemctl", "start", unit_name]) == 1
|
|
assert fp.call_count(["systemctl", "show", unit_name]) == 6
|