logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://hacktivis.me/git/pleroma.git

signature_test.exs (7492B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.SignatureTest do
  5. use Pleroma.DataCase
  6. import ExUnit.CaptureLog
  7. import Pleroma.Factory
  8. import Tesla.Mock
  9. import Mock
  10. alias Pleroma.Signature
  11. setup do
  12. mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
  13. :ok
  14. end
  15. @private_key "-----BEGIN RSA PRIVATE KEY-----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\n3Z7TQ18Iyh3jAUCzFV9IJlLIExq5Y7P4B3ojWFBN607sDCt8BMPbDYs=\n-----END RSA PRIVATE KEY-----"
  16. @public_key "-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw0P/Tq4gb4G/QVuMGbJo\nC/AfMNcv+m7NfrlOwkVzcU47jgESuYI4UtJayissCdBycHUnfVUd9qol+eznSODz\nCJhfJloqEIC+aSnuEPGA0POtWad6DU0E6/Ho5zQn5WAWUwbRQqowbrsm/GHo2+3v\neR5jGenwA6sYhINg/c3QQbksyV0uJ20Umyx88w8+TJuv53twOfmyDWuYNoQ3y5cc\nHKOZcLHxYOhvwg3PFaGfFHMFiNmF40dTXt9K96r7sbzc44iLD+VphbMPJEjkMuf8\nPGEFOBzy8pm3wJZw2v32RNW2VESwMYyqDzwHXGSq1a73cS7hEnc79gXlELsK04L9\nQQIDAQAB\n-----END PUBLIC KEY-----\n"
  17. @rsa_public_key {
  18. :RSAPublicKey,
  19. 24_650_000_183_914_698_290_885_268_529_673_621_967_457_234_469_123_179_408_466_269_598_577_505_928_170_923_974_132_111_403_341_217_239_999_189_084_572_368_839_502_170_501_850_920_051_662_384_964_248_315_257_926_552_945_648_828_895_432_624_227_029_881_278_113_244_073_644_360_744_504_606_177_648_469_825_063_267_913_017_309_199_785_535_546_734_904_379_798_564_556_494_962_268_682_532_371_146_333_972_821_570_577_277_375_020_977_087_539_994_500_097_107_935_618_711_808_260_846_821_077_839_605_098_669_707_417_692_791_905_543_116_911_754_774_323_678_879_466_618_738_207_538_013_885_607_095_203_516_030_057_611_111_308_904_599_045_146_148_350_745_339_208_006_497_478_057_622_336_882_506_112_530_056_970_653_403_292_123_624_453_213_574_011_183_684_739_084_105_206_483_178_943_532_208_537_215_396_831_110_268_758_639_826_369_857,
  20. # credo:disable-for-previous-line Credo.Check.Readability.MaxLineLength
  21. 65_537
  22. }
  23. defp make_fake_signature(key_id), do: "keyId=\"#{key_id}\""
  24. defp make_fake_conn(key_id),
  25. do: %Plug.Conn{req_headers: %{"signature" => make_fake_signature(key_id <> "#main-key")}}
  26. describe "fetch_public_key/1" do
  27. test "it returns key" do
  28. expected_result = {:ok, @rsa_public_key}
  29. user = insert(:user, public_key: @public_key)
  30. assert Signature.fetch_public_key(make_fake_conn(user.ap_id)) == expected_result
  31. end
  32. test "it returns error when not found user" do
  33. assert Signature.fetch_public_key(make_fake_conn("https://test-ap-id")) == {:error, :error}
  34. end
  35. test "it returns error if public key is nil" do
  36. user = insert(:user, public_key: nil)
  37. assert Signature.fetch_public_key(make_fake_conn(user.ap_id)) == {:error, :error}
  38. end
  39. end
  40. describe "refetch_public_key/1" do
  41. test "it returns key" do
  42. ap_id = "https://mastodon.social/users/lambadalambda"
  43. assert Signature.refetch_public_key(make_fake_conn(ap_id)) == {:ok, @rsa_public_key}
  44. end
  45. test "it returns error when not found user" do
  46. assert capture_log(fn ->
  47. {:error, _} = Signature.refetch_public_key(make_fake_conn("https://test-ap_id"))
  48. end) =~ "[error] Could not decode user"
  49. end
  50. end
  51. describe "sign/2" do
  52. test "it returns signature headers" do
  53. user =
  54. insert(:user, %{
  55. ap_id: "https://mastodon.social/users/lambadalambda",
  56. keys: @private_key
  57. })
  58. assert Signature.sign(
  59. user,
  60. %{
  61. host: "test.test",
  62. "content-length": 100
  63. }
  64. ) ==
  65. "keyId=\"https://mastodon.social/users/lambadalambda#main-key\",algorithm=\"rsa-sha256\",headers=\"content-length host\",signature=\"sibUOoqsFfTDerquAkyprxzDjmJm6erYc42W5w1IyyxusWngSinq5ILTjaBxFvfarvc7ci1xAi+5gkBwtshRMWm7S+Uqix24Yg5EYafXRun9P25XVnYBEIH4XQ+wlnnzNIXQkU3PU9e6D8aajDZVp3hPJNeYt1gIPOA81bROI8/glzb1SAwQVGRbqUHHHKcwR8keiR/W2h7BwG3pVRy4JgnIZRSW7fQogKedDg02gzRXwUDFDk0pr2p3q6bUWHUXNV8cZIzlMK+v9NlyFbVYBTHctAR26GIAN6Hz0eV0mAQAePHDY1mXppbA8Gpp6hqaMuYfwifcXmcc+QFm4e+n3A==\""
  66. end
  67. test "it returns error" do
  68. user = insert(:user, %{ap_id: "https://mastodon.social/users/lambadalambda", keys: ""})
  69. assert Signature.sign(
  70. user,
  71. %{host: "test.test", "content-length": 100}
  72. ) == {:error, []}
  73. end
  74. end
  75. describe "key_id_to_actor_id/1" do
  76. test "it properly deduces the actor id for misskey" do
  77. assert Signature.key_id_to_actor_id("https://example.com/users/1234/publickey") ==
  78. {:ok, "https://example.com/users/1234"}
  79. end
  80. test "it properly deduces the actor id for mastodon and pleroma" do
  81. assert Signature.key_id_to_actor_id("https://example.com/users/1234#main-key") ==
  82. {:ok, "https://example.com/users/1234"}
  83. end
  84. test "it deduces the actor id for gotoSocial" do
  85. assert Signature.key_id_to_actor_id("https://example.com/users/1234/main-key") ==
  86. {:ok, "https://example.com/users/1234"}
  87. end
  88. test "it calls webfinger for 'acct:' accounts" do
  89. with_mock(Pleroma.Web.WebFinger,
  90. finger: fn _ -> {:ok, %{"ap_id" => "https://gensokyo.2hu/users/raymoo"}} end
  91. ) do
  92. assert Signature.key_id_to_actor_id("acct:raymoo@gensokyo.2hu") ==
  93. {:ok, "https://gensokyo.2hu/users/raymoo"}
  94. end
  95. end
  96. end
  97. describe "signed_date" do
  98. test "it returns formatted current date" do
  99. with_mock(NaiveDateTime, utc_now: fn -> ~N[2019-08-23 18:11:24.822233] end) do
  100. assert Signature.signed_date() == "Fri, 23 Aug 2019 18:11:24 GMT"
  101. end
  102. end
  103. test "it returns formatted date" do
  104. assert Signature.signed_date(~N[2019-08-23 08:11:24.822233]) ==
  105. "Fri, 23 Aug 2019 08:11:24 GMT"
  106. end
  107. end
  108. end