diff options
author | Andrew Godwin | 2022-11-21 20:10:01 -0700 |
---|---|---|
committer | Andrew Godwin | 2022-11-21 20:10:01 -0700 |
commit | 0d1e09fbcdb1a1db93d9561c9323c7ef105e71ca (patch) | |
tree | 3799cb9523757c98b62e6a552cdf13ca3d98bb1b /users/tests/models | |
parent | e38e17678432613111ea220260c5d76677a84d3e (diff) | |
download | takahe-0d1e09fbcdb1a1db93d9561c9323c7ef105e71ca.tar.gz takahe-0d1e09fbcdb1a1db93d9561c9323c7ef105e71ca.tar.bz2 takahe-0d1e09fbcdb1a1db93d9561c9323c7ef105e71ca.zip |
Refactor almost all tests into /tests/
Diffstat (limited to 'users/tests/models')
-rw-r--r-- | users/tests/models/__init__.py | 0 | ||||
-rw-r--r-- | users/tests/models/test_identity.py | 178 |
2 files changed, 0 insertions, 178 deletions
diff --git a/users/tests/models/__init__.py b/users/tests/models/__init__.py deleted file mode 100644 index e69de29..0000000 --- a/users/tests/models/__init__.py +++ /dev/null diff --git a/users/tests/models/test_identity.py b/users/tests/models/test_identity.py deleted file mode 100644 index 738abe3..0000000 --- a/users/tests/models/test_identity.py +++ /dev/null @@ -1,178 +0,0 @@ -import pytest -from asgiref.sync import async_to_sync - -from core.models import Config -from users.models import Domain, Identity, User -from users.views.identity import CreateIdentity - - -@pytest.mark.django_db -def test_create_identity_form(client): - """ """ - # Make a user - user = User.objects.create(email="test@example.com") - admin = User.objects.create(email="admin@example.com", admin=True) - # Make a domain - domain = Domain.objects.create(domain="example.com", local=True) - domain.users.add(user) - domain.users.add(admin) - - # Test identity_min_length - data = { - "username": "a", - "domain": domain.domain, - "name": "The User", - } - - form = CreateIdentity.form_class(user=user, data=data) - assert not form.is_valid() - assert "username" in form.errors - assert "value has at least" in form.errors["username"][0] - - form = CreateIdentity.form_class(user=admin, data=data) - assert form.errors == {} - - # Test restricted_usernames - data = { - "username": "@root", - "domain": domain.domain, - "name": "The User", - } - - form = CreateIdentity.form_class(user=user, data=data) - assert not form.is_valid() - assert "username" in form.errors - assert "restricted to administrators" in form.errors["username"][0] - - form = CreateIdentity.form_class(user=admin, data=data) - assert form.errors == {} - - # Test valid chars - data = { - "username": "@someval!!!!", - "domain": domain.domain, - "name": "The User", - } - - for u in (user, admin): - form = CreateIdentity.form_class(user=u, data=data) - assert not form.is_valid() - assert "username" in form.errors - assert form.errors["username"][0].startswith("Only the letters") - - -@pytest.mark.django_db -def test_identity_max_per_user(client): - """ - Ensures that the identity limit is functioning - """ - # Make a user - user = User.objects.create(email="test@example.com") - # Make a domain - domain = Domain.objects.create(domain="example.com", local=True) - domain.users.add(user) - # Make an identity for them - for i in range(Config.system.identity_max_per_user): - identity = Identity.objects.create( - actor_uri=f"https://example.com/@test{i}@example.com/actor/", - username=f"test{i}", - domain=domain, - name=f"Test User{i}", - local=True, - ) - identity.users.add(user) - - data = { - "username": "toomany", - "domain": domain.domain, - "name": "Too Many", - } - form = CreateIdentity.form_class(user=user, data=data) - assert form.errors["__all__"][0].startswith("You are not allowed more than") - - user.admin = True - form = CreateIdentity.form_class(user=user, data=data) - assert form.is_valid() - - -@pytest.mark.django_db -def test_fetch_actor(httpx_mock, config_system): - """ - Ensures that making identities via actor fetching works - """ - # Make a shell remote identity - identity = Identity.objects.create( - actor_uri="https://example.com/test-actor/", - local=False, - ) - - # Trigger actor fetch - httpx_mock.add_response( - url="https://example.com/.well-known/webfinger?resource=acct:test@example.com", - json={ - "subject": "acct:test@example.com", - "aliases": [ - "https://example.com/test-actor/", - ], - "links": [ - { - "rel": "http://webfinger.net/rel/profile-page", - "type": "text/html", - "href": "https://example.com/test-actor/", - }, - { - "rel": "self", - "type": "application/activity+json", - "href": "https://example.com/test-actor/", - }, - ], - }, - ) - httpx_mock.add_response( - url="https://example.com/test-actor/", - json={ - "@context": [ - "https://www.w3.org/ns/activitystreams", - "https://w3id.org/security/v1", - ], - "id": "https://example.com/test-actor/", - "type": "Person", - "inbox": "https://example.com/test-actor/inbox/", - "publicKey": { - "id": "https://example.com/test-actor/#main-key", - "owner": "https://example.com/test-actor/", - "publicKeyPem": "-----BEGIN PUBLIC KEY-----\nits-a-faaaake\n-----END PUBLIC KEY-----\n", - }, - "followers": "https://example.com/test-actor/followers/", - "following": "https://example.com/test-actor/following/", - "icon": { - "type": "Image", - "mediaType": "image/jpeg", - "url": "https://example.com/icon.jpg", - }, - "image": { - "type": "Image", - "mediaType": "image/jpeg", - "url": "https://example.com/image.jpg", - }, - "as:manuallyApprovesFollowers": False, - "name": "Test User", - "preferredUsername": "test", - "published": "2022-11-02T00:00:00Z", - "summary": "<p>A test user</p>", - "url": "https://example.com/test-actor/view/", - }, - ) - async_to_sync(identity.fetch_actor)() - - # Verify the data arrived - identity = Identity.objects.get(pk=identity.pk) - assert identity.name == "Test User" - assert identity.username == "test" - assert identity.domain_id == "example.com" - assert identity.profile_uri == "https://example.com/test-actor/view/" - assert identity.inbox_uri == "https://example.com/test-actor/inbox/" - assert identity.icon_uri == "https://example.com/icon.jpg" - assert identity.image_uri == "https://example.com/image.jpg" - assert identity.summary == "<p>A test user</p>" - assert "ts-a-faaaake" in identity.public_key |