spc-pleroma/test/http/connection_test.exs

145 lines
4.1 KiB
Elixir
Raw Normal View History

2020-02-11 07:12:57 +00:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2020-02-11 07:12:57 +00:00
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.HTTP.ConnectionTest do
2020-03-06 17:23:58 +00:00
use ExUnit.Case, async: true
2020-02-11 07:12:57 +00:00
use Pleroma.Tests.Helpers
2020-03-06 17:23:58 +00:00
2020-02-11 07:12:57 +00:00
import ExUnit.CaptureLog
2020-03-06 17:23:58 +00:00
import Mox
2020-02-11 07:12:57 +00:00
alias Pleroma.Config
alias Pleroma.HTTP.Connection
2020-03-06 17:23:58 +00:00
setup :verify_on_exit!
2020-02-11 07:12:57 +00:00
describe "parse_host/1" do
test "as atom to charlist" do
assert Connection.parse_host(:localhost) == 'localhost'
end
test "as string to charlist" do
assert Connection.parse_host("localhost.com") == 'localhost.com'
end
test "as string ip to tuple" do
assert Connection.parse_host("127.0.0.1") == {127, 0, 0, 1}
end
end
describe "parse_proxy/1" do
test "ip with port" do
assert Connection.parse_proxy("127.0.0.1:8123") == {:ok, {127, 0, 0, 1}, 8123}
end
test "host with port" do
assert Connection.parse_proxy("localhost:8123") == {:ok, 'localhost', 8123}
end
test "as tuple" do
assert Connection.parse_proxy({:socks4, :localhost, 9050}) ==
{:ok, :socks4, 'localhost', 9050}
end
test "as tuple with string host" do
assert Connection.parse_proxy({:socks5, "localhost", 9050}) ==
{:ok, :socks5, 'localhost', 9050}
end
end
describe "parse_proxy/1 errors" do
test "ip without port" do
capture_log(fn ->
2020-03-03 14:32:59 +00:00
assert Connection.parse_proxy("127.0.0.1") == {:error, :invalid_proxy}
2020-02-11 07:12:57 +00:00
end) =~ "parsing proxy fail \"127.0.0.1\""
end
test "host without port" do
capture_log(fn ->
2020-03-03 14:32:59 +00:00
assert Connection.parse_proxy("localhost") == {:error, :invalid_proxy}
2020-02-11 07:12:57 +00:00
end) =~ "parsing proxy fail \"localhost\""
end
test "host with bad port" do
capture_log(fn ->
2020-03-03 14:32:59 +00:00
assert Connection.parse_proxy("localhost:port") == {:error, :invalid_proxy_port}
2020-02-11 07:12:57 +00:00
end) =~ "parsing port in proxy fail \"localhost:port\""
end
test "ip with bad port" do
capture_log(fn ->
2020-03-03 14:32:59 +00:00
assert Connection.parse_proxy("127.0.0.1:15.9") == {:error, :invalid_proxy_port}
2020-02-11 07:12:57 +00:00
end) =~ "parsing port in proxy fail \"127.0.0.1:15.9\""
end
test "as tuple without port" do
capture_log(fn ->
2020-03-03 14:32:59 +00:00
assert Connection.parse_proxy({:socks5, :localhost}) == {:error, :invalid_proxy}
2020-02-11 07:12:57 +00:00
end) =~ "parsing proxy fail {:socks5, :localhost}"
end
test "with nil" do
assert Connection.parse_proxy(nil) == nil
end
end
describe "options/3" do
clear_config([:http, :proxy_url])
test "without proxy_url in config" do
Config.delete([:http, :proxy_url])
opts = Connection.options(%URI{})
refute Keyword.has_key?(opts, :proxy)
end
test "parses string proxy host & port" do
Config.put([:http, :proxy_url], "localhost:8123")
opts = Connection.options(%URI{})
assert opts[:proxy] == {'localhost', 8123}
end
test "parses tuple proxy scheme host and port" do
Config.put([:http, :proxy_url], {:socks, 'localhost', 1234})
opts = Connection.options(%URI{})
assert opts[:proxy] == {:socks, 'localhost', 1234}
end
test "passed opts have more weight than defaults" do
Config.put([:http, :proxy_url], {:socks5, 'localhost', 1234})
opts = Connection.options(%URI{}, proxy: {'example.com', 4321})
assert opts[:proxy] == {'example.com', 4321}
end
test "default ssl adapter opts with connection" do
adapter = Application.get_env(:tesla, :adapter)
Application.put_env(:tesla, :adapter, Tesla.Adapter.Gun)
on_exit(fn -> Application.put_env(:tesla, :adapter, adapter) end)
uri = URI.parse("https://some-domain.com")
2020-03-06 17:23:58 +00:00
Pleroma.GunMock
|> expect(:open, fn 'some-domain.com', 443, _ ->
Task.start_link(fn -> Process.sleep(1000) end)
end)
|> expect(:await_up, fn _, _ -> {:ok, :http2} end)
|> expect(:set_owner, fn _, _ -> :ok end)
:ok = Pleroma.Gun.Conn.open(uri, :gun_connections)
2020-02-11 07:12:57 +00:00
opts = Connection.options(uri)
assert opts[:certificates_verification]
2020-03-06 17:23:58 +00:00
refute opts[:tls_opts] == []
2020-02-11 07:12:57 +00:00
assert opts[:close_conn] == false
assert is_pid(opts[:conn])
end
end
end