From 0d1e09fbcdb1a1db93d9561c9323c7ef105e71ca Mon Sep 17 00:00:00 2001
From: Andrew Godwin
Date: Mon, 21 Nov 2022 20:10:01 -0700
Subject: Refactor almost all tests into /tests/
---
tests/users/views/test_activitypub.py | 31 ++++++++++++++++++
tests/users/views/test_auth.py | 59 +++++++++++++++++++++++++++++++++++
2 files changed, 90 insertions(+)
create mode 100644 tests/users/views/test_activitypub.py
create mode 100644 tests/users/views/test_auth.py
(limited to 'tests/users/views')
diff --git a/tests/users/views/test_activitypub.py b/tests/users/views/test_activitypub.py
new file mode 100644
index 0000000..72ab8c3
--- /dev/null
+++ b/tests/users/views/test_activitypub.py
@@ -0,0 +1,31 @@
+import pytest
+
+from users.models import Domain, Identity, User
+
+
+@pytest.mark.django_db
+def test_webfinger_actor(client):
+ """
+ Ensures the webfinger and actor URLs are working properly
+ """
+ # Make a user
+ user = User.objects.create(email="test@example.com")
+ # Make a domain
+ domain = Domain.objects.create(domain="example.com", local=True)
+ domain.users.add(user)
+ # Make an identity for them
+ identity = Identity.objects.create(
+ actor_uri="https://example.com/@test@example.com/",
+ username="test",
+ domain=domain,
+ name="Test User",
+ local=True,
+ )
+ identity.generate_keypair()
+ # Fetch their webfinger
+ data = client.get("/.well-known/webfinger?resource=acct:test@example.com").json()
+ assert data["subject"] == "acct:test@example.com"
+ assert data["aliases"][0] == "https://example.com/@test/"
+ # Fetch their actor
+ data = client.get("/@test@example.com/", HTTP_ACCEPT="application/ld+json").json()
+ assert data["id"] == "https://example.com/@test@example.com/"
diff --git a/tests/users/views/test_auth.py b/tests/users/views/test_auth.py
new file mode 100644
index 0000000..22e1fb6
--- /dev/null
+++ b/tests/users/views/test_auth.py
@@ -0,0 +1,59 @@
+import mock
+import pytest
+
+from core.models import Config
+from users.models import User
+
+
+@pytest.fixture
+def config_system():
+ # TODO: Good enough for now, but a better Config mocking system is needed
+ result = Config.load_system()
+ with mock.patch("core.models.Config.load_system", return_value=result):
+ yield result
+
+
+@pytest.mark.django_db
+def test_signup_disabled(client, config_system):
+ # Signup disabled and no signup text
+ config_system.signup_allowed = False
+ resp = client.get("/auth/signup/")
+ assert resp.status_code == 200
+ content = str(resp.content)
+ assert "Not accepting new users at this time" in content
+ assert "" not in content
+
+ # Signup disabled with signup text configured
+ config_system.signup_text = "Go away!!!!!!"
+ resp = client.get("/auth/signup/")
+ assert resp.status_code == 200
+ content = str(resp.content)
+ assert "Go away!!!!!!" in content
+
+ # Ensure direct POST doesn't side step guard
+ resp = client.post(
+ "/auth/signup/", data={"email": "test_signup_disabled@example.org"}
+ )
+ assert resp.status_code == 200
+ assert not User.objects.filter(email="test_signup_disabled@example.org").exists()
+
+ # Signup enabled
+ config_system.signup_allowed = True
+ resp = client.get("/auth/signup/")
+ assert resp.status_code == 200
+ content = str(resp.content)
+ assert "Not accepting new users at this time" not in content
+ assert "" in content
+
+
+@pytest.mark.django_db
+def test_signup_invite_only(client, config_system):
+ config_system.signup_allowed = True
+ config_system.signup_invite_only = True
+
+ resp = client.get("/auth/signup/")
+ assert resp.status_code == 200
+ content = str(resp.content)
+ assert 'name="invite_code"' in content
+
+ # TODO: Actually test this
--
cgit v1.2.3