2021-12-07 18:23:42 +01:00
package server
import (
2021-12-07 20:06:33 +01:00
"bufio"
2021-12-07 20:46:10 +01:00
"context"
2022-01-17 19:28:07 +01:00
"encoding/base64"
2021-12-07 18:23:42 +01:00
"encoding/json"
2021-12-15 22:12:40 +01:00
"fmt"
2023-01-28 15:03:14 +01:00
"golang.org/x/crypto/bcrypt"
2022-12-28 04:14:14 +01:00
"heckel.io/ntfy/user"
2022-06-16 17:40:56 +02:00
"io"
2022-01-17 19:28:07 +01:00
"math/rand"
2021-12-07 18:23:42 +01:00
"net/http"
"net/http/httptest"
2022-10-05 22:42:07 +02:00
"net/netip"
2023-02-06 05:34:27 +01:00
"os"
2021-12-07 20:06:33 +01:00
"path/filepath"
2021-12-07 18:23:42 +01:00
"strings"
2021-12-24 00:10:22 +01:00
"sync"
2021-12-07 18:23:42 +01:00
"testing"
2021-12-07 20:46:10 +01:00
"time"
2022-05-13 19:08:07 +02:00
2022-10-05 22:42:07 +02:00
"github.com/stretchr/testify/assert"
2022-05-13 19:08:07 +02:00
"github.com/stretchr/testify/require"
2023-01-27 04:57:18 +01:00
"heckel.io/ntfy/log"
2022-05-13 19:08:07 +02:00
"heckel.io/ntfy/util"
2021-12-07 18:23:42 +01:00
)
2023-02-06 05:34:27 +01:00
func TestMain ( m * testing . M ) {
log . SetLevel ( log . ErrorLevel )
os . Exit ( m . Run ( ) )
2023-01-27 04:57:18 +01:00
}
2021-12-07 20:06:33 +01:00
func TestServer_PublishAndPoll ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
2021-12-07 18:23:42 +01:00
2021-12-07 21:39:42 +01:00
response1 := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
2021-12-07 20:06:33 +01:00
msg1 := toMessage ( t , response1 . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . NotEmpty ( t , msg1 . ID )
require . Equal ( t , "my first message" , msg1 . Message )
2021-12-07 18:23:42 +01:00
2021-12-08 22:08:50 +01:00
response2 := request ( t , s , "PUT" , "/mytopic" , "my second\n\nmessage" , nil )
2021-12-07 20:06:33 +01:00
msg2 := toMessage ( t , response2 . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . NotEqual ( t , msg1 . ID , msg2 . ID )
require . NotEmpty ( t , msg2 . ID )
require . Equal ( t , "my second\n\nmessage" , msg2 . Message )
2021-12-07 20:06:33 +01:00
2021-12-07 21:39:42 +01:00
response := request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
2021-12-07 20:06:33 +01:00
messages := toMessages ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 2 , len ( messages ) )
require . Equal ( t , "my first message" , messages [ 0 ] . Message )
require . Equal ( t , "my second\n\nmessage" , messages [ 1 ] . Message )
2021-12-08 22:08:50 +01:00
2021-12-15 22:12:40 +01:00
response = request ( t , s , "GET" , "/mytopic/sse?poll=1&since=all" , "" , nil )
2021-12-08 22:08:50 +01:00
lines := strings . Split ( strings . TrimSpace ( response . Body . String ( ) ) , "\n" )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 3 , len ( lines ) )
require . Equal ( t , "my first message" , toMessage ( t , strings . TrimPrefix ( lines [ 0 ] , "data: " ) ) . Message )
require . Equal ( t , "" , lines [ 1 ] )
require . Equal ( t , "my second\n\nmessage" , toMessage ( t , strings . TrimPrefix ( lines [ 2 ] , "data: " ) ) . Message )
2021-12-08 22:08:50 +01:00
response = request ( t , s , "GET" , "/mytopic/raw?poll=1" , "" , nil )
lines = strings . Split ( strings . TrimSpace ( response . Body . String ( ) ) , "\n" )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 2 , len ( lines ) )
require . Equal ( t , "my first message" , lines [ 0 ] )
require . Equal ( t , "my second message" , lines [ 1 ] ) // \n -> " "
2021-12-07 18:23:42 +01:00
}
2022-06-01 05:16:44 +02:00
func TestServer_PublishWithFirebase ( t * testing . T ) {
sender := newTestFirebaseSender ( 10 )
s := newTestServer ( t , newTestConfig ( t ) )
s . firebaseClient = newFirebaseClient ( sender , & testAuther { Allow : true } )
response := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
msg1 := toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg1 . ID )
require . Equal ( t , "my first message" , msg1 . Message )
2022-07-08 16:16:23 +02:00
time . Sleep ( 100 * time . Millisecond ) // Firebase publishing happens
2022-06-01 05:55:05 +02:00
require . Equal ( t , 1 , len ( sender . Messages ( ) ) )
require . Equal ( t , "my first message" , sender . Messages ( ) [ 0 ] . Data [ "message" ] )
require . Equal ( t , "my first message" , sender . Messages ( ) [ 0 ] . APNS . Payload . Aps . Alert . Body )
require . Equal ( t , "my first message" , sender . Messages ( ) [ 0 ] . APNS . Payload . CustomData [ "message" ] )
2022-06-01 05:16:44 +02:00
}
2021-12-07 20:46:10 +01:00
func TestServer_SubscribeOpenAndKeepalive ( t * testing . T ) {
c := newTestConfig ( t )
c . KeepaliveInterval = time . Second
s := newTestServer ( t , c )
2021-12-07 20:06:33 +01:00
2021-12-07 20:46:10 +01:00
rr := httptest . NewRecorder ( )
ctx , cancel := context . WithCancel ( context . Background ( ) )
req , err := http . NewRequestWithContext ( ctx , "GET" , "/mytopic/json" , nil )
if err != nil {
t . Fatal ( err )
}
doneChan := make ( chan bool )
go func ( ) {
s . handle ( rr , req )
doneChan <- true
} ( )
time . Sleep ( 1300 * time . Millisecond )
cancel ( )
<- doneChan
2021-12-07 20:06:33 +01:00
2021-12-07 20:46:10 +01:00
messages := toMessages ( t , rr . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 2 , len ( messages ) )
require . Equal ( t , openEvent , messages [ 0 ] . Event )
require . Equal ( t , "mytopic" , messages [ 0 ] . Topic )
require . Equal ( t , "" , messages [ 0 ] . Message )
require . Equal ( t , "" , messages [ 0 ] . Title )
require . Equal ( t , 0 , messages [ 0 ] . Priority )
require . Nil ( t , messages [ 0 ] . Tags )
require . Equal ( t , keepaliveEvent , messages [ 1 ] . Event )
require . Equal ( t , "mytopic" , messages [ 1 ] . Topic )
require . Equal ( t , "" , messages [ 1 ] . Message )
require . Equal ( t , "" , messages [ 1 ] . Title )
require . Equal ( t , 0 , messages [ 1 ] . Priority )
require . Nil ( t , messages [ 1 ] . Tags )
2021-12-07 20:06:33 +01:00
}
2021-12-07 21:39:42 +01:00
func TestServer_PublishAndSubscribe ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
subscribeRR := httptest . NewRecorder ( )
subscribeCancel := subscribe ( t , s , "/mytopic/json" , subscribeRR )
publishFirstRR := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , publishFirstRR . Code )
2023-02-09 02:00:10 +01:00
time . Sleep ( 500 * time . Millisecond ) // Publishing is done asynchronously, this avoids races
2021-12-07 21:39:42 +01:00
publishSecondRR := request ( t , s , "PUT" , "/mytopic" , "my other message" , map [ string ] string {
"Title" : " This is a title " ,
"X-Tags" : "tag1,tag 2, tag3" ,
"p" : "1" ,
} )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , publishSecondRR . Code )
2021-12-07 21:39:42 +01:00
subscribeCancel ( )
messages := toMessages ( t , subscribeRR . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 3 , len ( messages ) )
require . Equal ( t , openEvent , messages [ 0 ] . Event )
require . Equal ( t , messageEvent , messages [ 1 ] . Event )
require . Equal ( t , "mytopic" , messages [ 1 ] . Topic )
require . Equal ( t , "my first message" , messages [ 1 ] . Message )
require . Equal ( t , "" , messages [ 1 ] . Title )
require . Equal ( t , 0 , messages [ 1 ] . Priority )
require . Nil ( t , messages [ 1 ] . Tags )
2023-02-19 01:48:21 +01:00
require . True ( t , time . Now ( ) . Add ( 12 * time . Hour - 5 * time . Second ) . Unix ( ) < messages [ 1 ] . Expires )
require . True ( t , time . Now ( ) . Add ( 12 * time . Hour + 5 * time . Second ) . Unix ( ) > messages [ 1 ] . Expires )
2021-12-11 04:57:01 +01:00
require . Equal ( t , messageEvent , messages [ 2 ] . Event )
require . Equal ( t , "mytopic" , messages [ 2 ] . Topic )
require . Equal ( t , "my other message" , messages [ 2 ] . Message )
require . Equal ( t , "This is a title" , messages [ 2 ] . Title )
require . Equal ( t , 1 , messages [ 2 ] . Priority )
require . Equal ( t , [ ] string { "tag1" , "tag 2" , "tag3" } , messages [ 2 ] . Tags )
2021-12-07 21:39:42 +01:00
}
2023-02-09 14:32:51 +01:00
func TestServer_Publish_Disallowed_Topic ( t * testing . T ) {
c := newTestConfig ( t )
c . DisallowedTopics = [ ] string { "about" , "time" , "this" , "got" , "added" }
s := newTestServer ( t , c )
rr := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
require . Equal ( t , 200 , rr . Code )
rr = request ( t , s , "PUT" , "/about" , "another message" , nil )
require . Equal ( t , 400 , rr . Code )
require . Equal ( t , 40010 , toHTTPError ( t , rr . Body . String ( ) ) . Code )
}
2021-12-08 22:08:50 +01:00
func TestServer_StaticSites ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
rr := request ( t , s , "GET" , "/" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , rr . Code )
require . Contains ( t , rr . Body . String ( ) , "</html>" )
2021-12-08 22:08:50 +01:00
rr = request ( t , s , "HEAD" , "/" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , rr . Code )
2021-12-08 22:08:50 +01:00
2021-12-15 22:12:40 +01:00
rr = request ( t , s , "OPTIONS" , "/" , "" , nil )
require . Equal ( t , 200 , rr . Code )
2021-12-08 22:08:50 +01:00
rr = request ( t , s , "GET" , "/does-not-exist.txt" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 404 , rr . Code )
2021-12-08 22:08:50 +01:00
rr = request ( t , s , "GET" , "/mytopic" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , rr . Code )
2022-03-06 02:48:27 +01:00
require . Contains ( t , rr . Body . String ( ) , ` <meta name="robots" content="noindex, nofollow"/> ` )
2021-12-08 22:08:50 +01:00
2022-03-06 02:48:27 +01:00
rr = request ( t , s , "GET" , "/static/css/home.css" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , rr . Code )
2022-12-28 04:14:14 +01:00
require . Contains ( t , rr . Body . String ( ) , ` /* general styling */ ` )
2021-12-08 22:08:50 +01:00
rr = request ( t , s , "GET" , "/docs" , "" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 301 , rr . Code )
2021-12-08 22:08:50 +01:00
2022-02-27 02:19:28 +01:00
// Docs test removed, it was failing annoyingly.
2021-12-11 04:57:01 +01:00
}
2022-05-13 19:08:07 +02:00
func TestServer_WebEnabled ( t * testing . T ) {
conf := newTestConfig ( t )
conf . EnableWeb = false
s := newTestServer ( t , conf )
rr := request ( t , s , "GET" , "/" , "" , nil )
require . Equal ( t , 404 , rr . Code )
rr = request ( t , s , "GET" , "/config.js" , "" , nil )
require . Equal ( t , 404 , rr . Code )
rr = request ( t , s , "GET" , "/static/css/home.css" , "" , nil )
require . Equal ( t , 404 , rr . Code )
conf2 := newTestConfig ( t )
conf2 . EnableWeb = true
s2 := newTestServer ( t , conf2 )
rr = request ( t , s2 , "GET" , "/" , "" , nil )
require . Equal ( t , 200 , rr . Code )
rr = request ( t , s2 , "GET" , "/config.js" , "" , nil )
require . Equal ( t , 200 , rr . Code )
rr = request ( t , s2 , "GET" , "/static/css/home.css" , "" , nil )
require . Equal ( t , 200 , rr . Code )
}
2021-12-11 04:57:01 +01:00
func TestServer_PublishLargeMessage ( t * testing . T ) {
2022-01-12 17:05:04 +01:00
c := newTestConfig ( t )
c . AttachmentCacheDir = "" // Disable attachments
s := newTestServer ( t , c )
2021-12-11 04:57:01 +01:00
2021-12-31 16:12:53 +01:00
body := strings . Repeat ( "this is a large message" , 5000 )
2021-12-11 04:57:01 +01:00
response := request ( t , s , "PUT" , "/mytopic" , body , nil )
2022-01-02 23:56:12 +01:00
require . Equal ( t , 400 , response . Code )
2021-12-09 16:23:17 +01:00
}
2021-12-15 22:12:40 +01:00
func TestServer_PublishPriority ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
for prio := 1 ; prio <= 5 ; prio ++ {
response := request ( t , s , "GET" , fmt . Sprintf ( "/mytopic/publish?priority=%d" , prio ) , fmt . Sprintf ( "priority %d" , prio ) , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , prio , msg . Priority )
}
response := request ( t , s , "GET" , "/mytopic/publish?priority=min" , "test" , nil )
require . Equal ( t , 1 , toMessage ( t , response . Body . String ( ) ) . Priority )
response = request ( t , s , "GET" , "/mytopic/send?priority=low" , "test" , nil )
require . Equal ( t , 2 , toMessage ( t , response . Body . String ( ) ) . Priority )
response = request ( t , s , "GET" , "/mytopic/send?priority=default" , "test" , nil )
require . Equal ( t , 3 , toMessage ( t , response . Body . String ( ) ) . Priority )
response = request ( t , s , "GET" , "/mytopic/send?priority=high" , "test" , nil )
require . Equal ( t , 4 , toMessage ( t , response . Body . String ( ) ) . Priority )
response = request ( t , s , "GET" , "/mytopic/send?priority=max" , "test" , nil )
require . Equal ( t , 5 , toMessage ( t , response . Body . String ( ) ) . Priority )
response = request ( t , s , "GET" , "/mytopic/trigger?priority=urgent" , "test" , nil )
require . Equal ( t , 5 , toMessage ( t , response . Body . String ( ) ) . Priority )
2022-01-12 17:05:04 +01:00
response = request ( t , s , "GET" , "/mytopic/trigger?priority=INVALID" , "test" , nil )
require . Equal ( t , 40007 , toHTTPError ( t , response . Body . String ( ) ) . Code )
2021-12-15 22:12:40 +01:00
}
2022-03-23 19:29:55 +01:00
func TestServer_PublishGETOnlyOneTopic ( t * testing . T ) {
// This tests a bug that allowed publishing topics with a comma in the name (no ticket)
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "GET" , "/mytopic,mytopic2/publish?m=hi" , "" , nil )
require . Equal ( t , 404 , response . Code )
}
2021-12-09 16:23:17 +01:00
func TestServer_PublishNoCache ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "this message is not cached" , map [ string ] string {
"Cache" : "no" ,
} )
msg := toMessage ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "this message is not cached" , msg . Message )
2023-02-19 01:54:47 +01:00
require . Equal ( t , int64 ( 0 ) , msg . Expires )
2021-12-11 04:57:01 +01:00
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Empty ( t , messages )
}
2021-12-15 22:12:40 +01:00
2021-12-11 04:57:01 +01:00
func TestServer_PublishAt ( t * testing . T ) {
c := newTestConfig ( t )
c . MinDelay = time . Second
2022-06-01 03:39:19 +02:00
c . DelayedSenderInterval = 100 * time . Millisecond
2021-12-11 04:57:01 +01:00
s := newTestServer ( t , c )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"In" : "1s" ,
} )
require . Equal ( t , 200 , response . Code )
2021-12-09 16:23:17 +01:00
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 0 , len ( messages ) )
time . Sleep ( time . Second )
require . Nil ( t , s . sendDelayedMessages ( ) )
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
messages = toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) )
require . Equal ( t , "a message" , messages [ 0 ] . Message )
2022-10-08 03:27:22 +02:00
require . Equal ( t , netip . Addr { } , messages [ 0 ] . Sender ) // Never return the sender!
2022-06-01 03:39:19 +02:00
messages , err := s . messageCache . Messages ( "mytopic" , sinceAllMessages , true )
require . Nil ( t , err )
require . Equal ( t , 1 , len ( messages ) )
require . Equal ( t , "a message" , messages [ 0 ] . Message )
2022-10-08 03:27:22 +02:00
require . Equal ( t , "9.9.9.9" , messages [ 0 ] . Sender . String ( ) ) // It's stored in the DB though!
2021-12-11 04:57:01 +01:00
}
2023-02-14 20:05:41 +01:00
func TestServer_PublishAt_Expires ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"In" : "2 days" ,
} )
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . True ( t , m . Expires > time . Now ( ) . Add ( 12 * time . Hour + 48 * time . Hour - time . Minute ) . Unix ( ) )
require . True ( t , m . Expires < time . Now ( ) . Add ( 12 * time . Hour + 48 * time . Hour + time . Minute ) . Unix ( ) )
}
2021-12-11 04:57:01 +01:00
func TestServer_PublishAtWithCacheError ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"Cache" : "no" ,
"In" : "30 min" ,
} )
require . Equal ( t , 400 , response . Code )
2021-12-25 15:15:05 +01:00
require . Equal ( t , errHTTPBadRequestDelayNoCache , toHTTPError ( t , response . Body . String ( ) ) )
2021-12-11 04:57:01 +01:00
}
func TestServer_PublishAtTooShortDelay ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"In" : "1s" ,
} )
require . Equal ( t , 400 , response . Code )
}
func TestServer_PublishAtTooLongDelay ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"In" : "99999999h" ,
} )
require . Equal ( t , 400 , response . Code )
}
2022-01-12 17:05:04 +01:00
func TestServer_PublishAtInvalidDelay ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic?delay=INVALID" , "a message" , nil )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 400 , response . Code )
require . Equal ( t , 40004 , err . Code )
}
func TestServer_PublishAtTooLarge ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic?x-in=99999h" , "a message" , nil )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 400 , response . Code )
require . Equal ( t , 40006 , err . Code )
}
2021-12-11 04:57:01 +01:00
func TestServer_PublishAtAndPrune ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "a message" , map [ string ] string {
"In" : "1h" ,
} )
require . Equal ( t , 200 , response . Code )
2022-12-28 04:14:14 +01:00
s . execManager ( ) // Fire pruning
2021-12-11 04:57:01 +01:00
response = request ( t , s , "GET" , "/mytopic/json?poll=1&scheduled=1" , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) ) // Not affected by pruning
require . Equal ( t , "a message" , messages [ 0 ] . Message )
2021-12-09 16:23:17 +01:00
}
func TestServer_PublishAndMultiPoll ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic1" , "message 1" , nil )
msg := toMessage ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "mytopic1" , msg . Topic )
require . Equal ( t , "message 1" , msg . Message )
2021-12-09 16:23:17 +01:00
response = request ( t , s , "PUT" , "/mytopic2" , "message 2" , nil )
msg = toMessage ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "mytopic2" , msg . Topic )
require . Equal ( t , "message 2" , msg . Message )
2021-12-09 16:23:17 +01:00
response = request ( t , s , "GET" , "/mytopic1/json?poll=1" , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 1 , len ( messages ) )
require . Equal ( t , "mytopic1" , messages [ 0 ] . Topic )
require . Equal ( t , "message 1" , messages [ 0 ] . Message )
2021-12-09 16:23:17 +01:00
response = request ( t , s , "GET" , "/mytopic1,mytopic2/json?poll=1" , "" , nil )
messages = toMessages ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 2 , len ( messages ) )
require . Equal ( t , "mytopic1" , messages [ 0 ] . Topic )
require . Equal ( t , "message 1" , messages [ 0 ] . Message )
require . Equal ( t , "mytopic2" , messages [ 1 ] . Topic )
require . Equal ( t , "message 2" , messages [ 1 ] . Message )
2021-12-09 16:23:17 +01:00
}
func TestServer_PublishWithNopCache ( t * testing . T ) {
c := newTestConfig ( t )
c . CacheDuration = 0
s := newTestServer ( t , c )
subscribeRR := httptest . NewRecorder ( )
subscribeCancel := subscribe ( t , s , "/mytopic/json" , subscribeRR )
publishRR := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 200 , publishRR . Code )
2021-12-08 22:08:50 +01:00
2021-12-09 16:23:17 +01:00
subscribeCancel ( )
messages := toMessages ( t , subscribeRR . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Equal ( t , 2 , len ( messages ) )
require . Equal ( t , openEvent , messages [ 0 ] . Event )
require . Equal ( t , messageEvent , messages [ 1 ] . Event )
require . Equal ( t , "my first message" , messages [ 1 ] . Message )
2021-12-09 16:23:17 +01:00
response := request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
messages = toMessages ( t , response . Body . String ( ) )
2021-12-11 04:57:01 +01:00
require . Empty ( t , messages )
2021-12-08 22:08:50 +01:00
}
2021-12-15 22:12:40 +01:00
func TestServer_PublishAndPollSince ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
request ( t , s , "PUT" , "/mytopic" , "test 1" , nil )
time . Sleep ( 1100 * time . Millisecond )
since := time . Now ( ) . Unix ( )
request ( t , s , "PUT" , "/mytopic" , "test 2" , nil )
response := request ( t , s , "GET" , fmt . Sprintf ( "/mytopic/json?poll=1&since=%d" , since ) , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) )
require . Equal ( t , "test 2" , messages [ 0 ] . Message )
2022-01-12 17:05:04 +01:00
response = request ( t , s , "GET" , "/mytopic/json?poll=1&since=10s" , "" , nil )
messages = toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 2 , len ( messages ) )
require . Equal ( t , "test 1" , messages [ 0 ] . Message )
response = request ( t , s , "GET" , "/mytopic/json?poll=1&since=100ms" , "" , nil )
messages = toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) )
require . Equal ( t , "test 2" , messages [ 0 ] . Message )
response = request ( t , s , "GET" , "/mytopic/json?poll=1&since=INVALID" , "" , nil )
require . Equal ( t , 40008 , toHTTPError ( t , response . Body . String ( ) ) . Code )
2021-12-15 22:12:40 +01:00
}
2022-06-20 18:11:52 +02:00
func newMessageWithTimestamp ( topic , message string , timestamp int64 ) * message {
m := newDefaultMessage ( topic , message )
m . Time = timestamp
return m
}
func TestServer_PollSinceID_MultipleTopics ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic1" , "test 1" , 1655740277 ) ) )
markerMessage := newMessageWithTimestamp ( "mytopic2" , "test 2" , 1655740283 )
require . Nil ( t , s . messageCache . AddMessage ( markerMessage ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic1" , "test 3" , 1655740289 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic2" , "test 4" , 1655740293 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic1" , "test 5" , 1655740297 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic2" , "test 6" , 1655740303 ) ) )
response := request ( t , s , "GET" , fmt . Sprintf ( "/mytopic1,mytopic2/json?poll=1&since=%s" , markerMessage . ID ) , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 4 , len ( messages ) )
require . Equal ( t , "test 3" , messages [ 0 ] . Message )
require . Equal ( t , "mytopic1" , messages [ 0 ] . Topic )
require . Equal ( t , "test 4" , messages [ 1 ] . Message )
require . Equal ( t , "mytopic2" , messages [ 1 ] . Topic )
require . Equal ( t , "test 5" , messages [ 2 ] . Message )
require . Equal ( t , "mytopic1" , messages [ 2 ] . Topic )
require . Equal ( t , "test 6" , messages [ 3 ] . Message )
require . Equal ( t , "mytopic2" , messages [ 3 ] . Topic )
}
func TestServer_PollSinceID_MultipleTopics_IDDoesNotMatch ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic1" , "test 3" , 1655740289 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic2" , "test 4" , 1655740293 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic1" , "test 5" , 1655740297 ) ) )
require . Nil ( t , s . messageCache . AddMessage ( newMessageWithTimestamp ( "mytopic2" , "test 6" , 1655740303 ) ) )
response := request ( t , s , "GET" , "/mytopic1,mytopic2/json?poll=1&since=NoMatchForID" , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 4 , len ( messages ) )
require . Equal ( t , "test 3" , messages [ 0 ] . Message )
require . Equal ( t , "test 4" , messages [ 1 ] . Message )
require . Equal ( t , "test 5" , messages [ 2 ] . Message )
require . Equal ( t , "test 6" , messages [ 3 ] . Message )
}
2021-12-15 22:12:40 +01:00
func TestServer_PublishViaGET ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "GET" , "/mytopic/trigger" , "" , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "triggered" , msg . Message )
response = request ( t , s , "GET" , "/mytopic/send?message=This+is+a+test&t=This+is+a+title&tags=skull&x-priority=5&delay=24h" , "" , nil )
msg = toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "This is a test" , msg . Message )
require . Equal ( t , "This is a title" , msg . Title )
require . Equal ( t , [ ] string { "skull" } , msg . Tags )
require . Equal ( t , 5 , msg . Priority )
require . Greater ( t , msg . Time , time . Now ( ) . Add ( 23 * time . Hour ) . Unix ( ) )
}
2022-02-13 15:23:55 +01:00
func TestServer_PublishMessageInHeaderWithNewlines ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "" , map [ string ] string {
"Message" : "Line 1\\nLine 2" ,
} )
msg := toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg . ID )
require . Equal ( t , "Line 1\nLine 2" , msg . Message ) // \\n -> \n !
}
2022-01-12 17:05:04 +01:00
func TestServer_PublishInvalidTopic ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
2022-06-02 05:24:44 +02:00
s . smtpSender = & testMailer { }
2022-01-12 17:05:04 +01:00
response := request ( t , s , "PUT" , "/docs" , "fail" , nil )
require . Equal ( t , 40010 , toHTTPError ( t , response . Body . String ( ) ) . Code )
}
2021-12-22 09:44:16 +01:00
func TestServer_PollWithQueryFilters ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic?priority=1&tags=tag1,tag2" , "my first message" , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg . ID )
response = request ( t , s , "PUT" , "/mytopic?title=a+title" , "my second message" , map [ string ] string {
"Tags" : "tag2,tag3" ,
} )
msg = toMessage ( t , response . Body . String ( ) )
require . NotEmpty ( t , msg . ID )
queriesThatShouldReturnMessageOne := [ ] string {
"/mytopic/json?poll=1&priority=1" ,
"/mytopic/json?poll=1&priority=min" ,
2021-12-22 13:46:17 +01:00
"/mytopic/json?poll=1&priority=min,low" ,
"/mytopic/json?poll=1&priority=1,2" ,
"/mytopic/json?poll=1&p=2,min" ,
2021-12-22 09:44:16 +01:00
"/mytopic/json?poll=1&tags=tag1" ,
"/mytopic/json?poll=1&tags=tag1,tag2" ,
"/mytopic/json?poll=1&message=my+first+message" ,
}
for _ , query := range queriesThatShouldReturnMessageOne {
response = request ( t , s , "GET" , query , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) , "Query failed: " + query )
require . Equal ( t , "my first message" , messages [ 0 ] . Message , "Query failed: " + query )
}
queriesThatShouldReturnMessageTwo := [ ] string {
"/mytopic/json?poll=1&x-priority=3" , // !
"/mytopic/json?poll=1&priority=3" ,
"/mytopic/json?poll=1&priority=default" ,
"/mytopic/json?poll=1&p=3" ,
"/mytopic/json?poll=1&x-tags=tag2,tag3" ,
"/mytopic/json?poll=1&tags=tag2,tag3" ,
"/mytopic/json?poll=1&tag=tag2,tag3" ,
"/mytopic/json?poll=1&ta=tag2,tag3" ,
"/mytopic/json?poll=1&x-title=a+title" ,
"/mytopic/json?poll=1&title=a+title" ,
"/mytopic/json?poll=1&t=a+title" ,
"/mytopic/json?poll=1&x-message=my+second+message" ,
"/mytopic/json?poll=1&message=my+second+message" ,
"/mytopic/json?poll=1&m=my+second+message" ,
"/mytopic/json?x-poll=1&m=my+second+message" ,
"/mytopic/json?po=1&m=my+second+message" ,
}
for _ , query := range queriesThatShouldReturnMessageTwo {
response = request ( t , s , "GET" , query , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 1 , len ( messages ) , "Query failed: " + query )
require . Equal ( t , "my second message" , messages [ 0 ] . Message , "Query failed: " + query )
}
queriesThatShouldReturnNoMessages := [ ] string {
"/mytopic/json?poll=1&priority=4" ,
"/mytopic/json?poll=1&tags=tag1,tag2,tag3" ,
"/mytopic/json?poll=1&title=another+title" ,
"/mytopic/json?poll=1&message=my+third+message" ,
"/mytopic/json?poll=1&message=my+third+message" ,
}
for _ , query := range queriesThatShouldReturnNoMessages {
response = request ( t , s , "GET" , query , "" , nil )
messages := toMessages ( t , response . Body . String ( ) )
require . Equal ( t , 0 , len ( messages ) , "Query failed: " + query )
}
}
func TestServer_SubscribeWithQueryFilters ( t * testing . T ) {
c := newTestConfig ( t )
c . KeepaliveInterval = 800 * time . Millisecond
s := newTestServer ( t , c )
subscribeResponse := httptest . NewRecorder ( )
subscribeCancel := subscribe ( t , s , "/mytopic/json?tags=zfs-issue" , subscribeResponse )
response := request ( t , s , "PUT" , "/mytopic" , "my first message" , nil )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "PUT" , "/mytopic" , "ZFS scrub failed" , map [ string ] string {
"Tags" : "zfs-issue,zfs-scrub" ,
} )
require . Equal ( t , 200 , response . Code )
time . Sleep ( 850 * time . Millisecond )
subscribeCancel ( )
messages := toMessages ( t , subscribeResponse . Body . String ( ) )
require . Equal ( t , 3 , len ( messages ) )
require . Equal ( t , openEvent , messages [ 0 ] . Event )
require . Equal ( t , messageEvent , messages [ 1 ] . Event )
require . Equal ( t , "ZFS scrub failed" , messages [ 1 ] . Message )
require . Equal ( t , keepaliveEvent , messages [ 2 ] . Event )
}
2022-01-26 05:04:09 +01:00
func TestServer_Auth_Success_Admin ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2022-01-26 05:04:09 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleAdmin ) )
2022-01-26 05:04:09 +01:00
response := request ( t , s , "GET" , "/mytopic/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
2022-01-26 05:04:09 +01:00
} )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , ` { "success":true} ` + "\n" , response . Body . String ( ) )
}
func TestServer_Auth_Success_User ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionDenyAll
2022-01-26 05:04:09 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "ben" , "ben" , user . RoleUser ) )
2023-01-21 04:47:37 +01:00
require . Nil ( t , s . userManager . AllowAccess ( "ben" , "mytopic" , user . PermissionReadWrite ) )
2022-01-26 05:04:09 +01:00
response := request ( t , s , "GET" , "/mytopic/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "ben" , "ben" ) ,
2022-01-26 05:04:09 +01:00
} )
require . Equal ( t , 200 , response . Code )
}
2022-01-27 18:49:05 +01:00
func TestServer_Auth_Success_User_MultipleTopics ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionDenyAll
2022-01-27 18:49:05 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "ben" , "ben" , user . RoleUser ) )
2023-01-21 04:47:37 +01:00
require . Nil ( t , s . userManager . AllowAccess ( "ben" , "mytopic" , user . PermissionReadWrite ) )
require . Nil ( t , s . userManager . AllowAccess ( "ben" , "anothertopic" , user . PermissionReadWrite ) )
2022-01-27 18:49:05 +01:00
response := request ( t , s , "GET" , "/mytopic,anothertopic/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "ben" , "ben" ) ,
2022-01-27 18:49:05 +01:00
} )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "GET" , "/mytopic,anothertopic,NOT-THIS-ONE/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "ben" , "ben" ) ,
2022-01-27 18:49:05 +01:00
} )
require . Equal ( t , 403 , response . Code )
}
2022-01-26 05:04:09 +01:00
func TestServer_Auth_Fail_InvalidPass ( t * testing . T ) {
c := newTestConfig ( t )
c . AuthFile = filepath . Join ( t . TempDir ( ) , "user.db" )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionDenyAll
2022-01-26 05:04:09 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleAdmin ) )
2022-01-26 05:04:09 +01:00
response := request ( t , s , "GET" , "/mytopic/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "phil" , "INVALID" ) ,
2022-01-26 05:04:09 +01:00
} )
require . Equal ( t , 401 , response . Code )
}
func TestServer_Auth_Fail_Unauthorized ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionDenyAll
2022-01-26 05:04:09 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "ben" , "ben" , user . RoleUser ) )
2023-01-21 04:47:37 +01:00
require . Nil ( t , s . userManager . AllowAccess ( "ben" , "sometopic" , user . PermissionReadWrite ) ) // Not mytopic!
2022-01-26 05:04:09 +01:00
response := request ( t , s , "GET" , "/mytopic/auth" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "ben" , "ben" ) ,
2022-01-26 05:04:09 +01:00
} )
require . Equal ( t , 403 , response . Code )
}
func TestServer_Auth_Fail_CannotPublish ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionReadWrite // Open by default
2022-01-26 05:04:09 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleAdmin ) )
2023-01-21 04:47:37 +01:00
require . Nil ( t , s . userManager . AllowAccess ( user . Everyone , "private" , user . PermissionDenyAll ) )
require . Nil ( t , s . userManager . AllowAccess ( user . Everyone , "announcements" , user . PermissionRead ) )
2022-01-26 05:04:09 +01:00
response := request ( t , s , "PUT" , "/mytopic" , "test" , nil )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "PUT" , "/announcements" , "test" , nil )
require . Equal ( t , 403 , response . Code ) // Cannot write as anonymous
response = request ( t , s , "PUT" , "/announcements" , "test" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
2022-01-26 05:04:09 +01:00
} )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "GET" , "/announcements/json?poll=1" , "" , nil )
require . Equal ( t , 200 , response . Code ) // Anonymous read allowed
response = request ( t , s , "GET" , "/private/json?poll=1" , "" , nil )
require . Equal ( t , 403 , response . Code ) // Anonymous read not allowed
}
2023-02-08 21:20:44 +01:00
func TestServer_Auth_Fail_Rate_Limiting ( t * testing . T ) {
c := newTestConfigWithAuthFile ( t )
s := newTestServer ( t , c )
for i := 0 ; i < 10 ; i ++ {
response := request ( t , s , "PUT" , "/announcements" , "test" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 401 , response . Code )
}
response := request ( t , s , "PUT" , "/announcements" , "test" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 429 , response . Code )
require . Equal ( t , 42909 , toHTTPError ( t , response . Body . String ( ) ) . Code )
}
2022-02-26 05:25:04 +01:00
func TestServer_Auth_ViaQuery ( t * testing . T ) {
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-03 03:12:42 +01:00
c . AuthDefault = user . PermissionDenyAll
2022-02-26 05:25:04 +01:00
s := newTestServer ( t , c )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "ben" , "some pass" , user . RoleAdmin ) )
2022-02-26 05:25:04 +01:00
2023-01-11 04:51:51 +01:00
u := fmt . Sprintf ( "/mytopic/json?poll=1&auth=%s" , base64 . RawURLEncoding . EncodeToString ( [ ] byte ( util . BasicAuth ( "ben" , "some pass" ) ) ) )
2022-02-26 05:25:04 +01:00
response := request ( t , s , "GET" , u , "" , nil )
require . Equal ( t , 200 , response . Code )
2023-01-11 04:51:51 +01:00
u = fmt . Sprintf ( "/mytopic/json?poll=1&auth=%s" , base64 . RawURLEncoding . EncodeToString ( [ ] byte ( util . BasicAuth ( "ben" , "WRONNNGGGG" ) ) ) )
2022-02-26 05:25:04 +01:00
response = request ( t , s , "GET" , u , "" , nil )
require . Equal ( t , 401 , response . Code )
}
2023-02-23 16:15:57 +01:00
func TestServer_Auth_NonBasicHeader ( t * testing . T ) {
s := newTestServer ( t , newTestConfigWithAuthFile ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Authorization" : "WebPush not-supported" ,
} )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Authorization" : "Bearer supported" ,
} )
require . Equal ( t , 401 , response . Code )
response = request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Authorization" : "basic supported" ,
} )
require . Equal ( t , 401 , response . Code )
}
2023-01-27 15:42:54 +01:00
func TestServer_StatsResetter ( t * testing . T ) {
2023-01-27 04:57:18 +01:00
// This tests the stats resetter for
// - an anonymous user
// - a user without a tier (treated like the same as the anonymous user)
// - a user with a tier
2023-01-11 04:51:51 +01:00
c := newTestConfigWithAuthFile ( t )
2023-01-18 19:46:40 +01:00
c . VisitorStatsResetTime = time . Now ( ) . Add ( 2 * time . Second )
2023-01-11 04:51:51 +01:00
s := newTestServer ( t , c )
go s . runStatsResetter ( )
2023-01-27 04:57:18 +01:00
// Create user with tier (tieruser) and user without tier (phil)
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-27 04:57:18 +01:00
Code : "test" ,
MessageLimit : 5 ,
MessageExpiryDuration : - 5 * time . Second , // Second, what a hack!
} ) )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
2023-01-27 04:57:18 +01:00
require . Nil ( t , s . userManager . AddUser ( "tieruser" , "tieruser" , user . RoleUser ) )
require . Nil ( t , s . userManager . ChangeTier ( "tieruser" , "test" ) )
// Send an anonymous message
response := request ( t , s , "PUT" , "/mytopic" , "test" , nil )
2023-01-27 05:10:58 +01:00
require . Equal ( t , 200 , response . Code )
2023-01-11 04:51:51 +01:00
2023-01-27 04:57:18 +01:00
// Send messages from user without tier (phil)
2023-01-11 04:51:51 +01:00
for i := 0 ; i < 5 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
}
2023-01-27 04:57:18 +01:00
// Send messages from user with tier
for i := 0 ; i < 2 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Authorization" : util . BasicAuth ( "tieruser" , "tieruser" ) ,
} )
require . Equal ( t , 200 , response . Code )
}
// User stats show 6 messages (for user without tier)
response = request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
2023-01-11 04:51:51 +01:00
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
2023-01-27 04:57:18 +01:00
account , err := util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 6 ) , account . Stats . Messages )
// User stats show 6 messages (for anonymous visitor)
response = request ( t , s , "GET" , "/v1/account" , "" , nil )
require . Equal ( t , 200 , response . Code )
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 6 ) , account . Stats . Messages )
2023-01-11 04:51:51 +01:00
2023-01-27 04:57:18 +01:00
// User stats show 2 messages (for user with tier)
2023-01-11 04:51:51 +01:00
response = request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
2023-01-27 04:57:18 +01:00
"Authorization" : util . BasicAuth ( "tieruser" , "tieruser" ) ,
2023-01-11 04:51:51 +01:00
} )
require . Equal ( t , 200 , response . Code )
2023-01-27 04:57:18 +01:00
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
2023-01-11 04:51:51 +01:00
require . Nil ( t , err )
2023-01-27 04:57:18 +01:00
require . Equal ( t , int64 ( 2 ) , account . Stats . Messages )
2023-01-11 04:51:51 +01:00
2023-01-18 19:46:40 +01:00
// Wait for stats resetter to run
time . Sleep ( 2200 * time . Millisecond )
2023-01-11 04:51:51 +01:00
// User stats show 0 messages now!
2023-01-27 04:57:18 +01:00
response = request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 0 ) , account . Stats . Messages )
// Since this is a user without a tier, the anonymous user should have the same stats
2023-01-11 04:51:51 +01:00
response = request ( t , s , "GET" , "/v1/account" , "" , nil )
require . Equal ( t , 200 , response . Code )
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 0 ) , account . Stats . Messages )
2023-01-27 04:57:18 +01:00
// User stats show 0 messages (for user with tier)
response = request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "tieruser" , "tieruser" ) ,
} )
require . Equal ( t , 200 , response . Code )
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 0 ) , account . Stats . Messages )
2023-01-11 04:51:51 +01:00
}
2023-01-27 17:33:51 +01:00
func TestServer_StatsResetter_MessageLimiter_EmailsLimiter ( t * testing . T ) {
// This tests that the messageLimiter (the only fixed limiter) and the emailsLimiter (token bucket)
// is reset by the stats resetter
2023-01-27 15:42:54 +01:00
c := newTestConfigWithAuthFile ( t )
s := newTestServer ( t , c )
2023-01-27 17:33:51 +01:00
s . smtpSender = & testMailer { }
2023-01-27 15:42:54 +01:00
// Publish some messages, and check stats
for i := 0 ; i < 3 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , "test" , nil )
require . Equal ( t , 200 , response . Code )
}
2023-01-27 17:33:51 +01:00
response := request ( t , s , "PUT" , "/mytopic" , "test" , map [ string ] string {
"Email" : "test@email.com" ,
} )
require . Equal ( t , 200 , response . Code )
2023-01-27 15:42:54 +01:00
rr := request ( t , s , "GET" , "/v1/account" , "" , nil )
require . Equal ( t , 200 , rr . Code )
account , err := util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( rr . Body ) )
require . Nil ( t , err )
2023-01-27 17:33:51 +01:00
require . Equal ( t , int64 ( 4 ) , account . Stats . Messages )
require . Equal ( t , int64 ( 1 ) , account . Stats . Emails )
v := s . visitor ( netip . MustParseAddr ( "9.9.9.9" ) , nil )
require . Equal ( t , int64 ( 4 ) , v . Stats ( ) . Messages )
require . Equal ( t , int64 ( 4 ) , v . messagesLimiter . Value ( ) )
require . Equal ( t , int64 ( 1 ) , v . Stats ( ) . Emails )
require . Equal ( t , int64 ( 1 ) , v . emailsLimiter . Value ( ) )
2023-01-27 15:42:54 +01:00
// Reset stats and check again
s . resetStats ( )
rr = request ( t , s , "GET" , "/v1/account" , "" , nil )
require . Equal ( t , 200 , rr . Code )
account , err = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( rr . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 0 ) , account . Stats . Messages )
2023-01-27 17:33:51 +01:00
require . Equal ( t , int64 ( 0 ) , account . Stats . Emails )
v = s . visitor ( netip . MustParseAddr ( "9.9.9.9" ) , nil )
require . Equal ( t , int64 ( 0 ) , v . Stats ( ) . Messages )
require . Equal ( t , int64 ( 0 ) , v . messagesLimiter . Value ( ) )
require . Equal ( t , int64 ( 0 ) , v . Stats ( ) . Emails )
require . Equal ( t , int64 ( 0 ) , v . emailsLimiter . Value ( ) )
}
func TestServer_DailyMessageQuotaFromDatabase ( t * testing . T ) {
// This tests that the daily message quota is prefilled originally from the database,
// if the visitor is unknown
c := newTestConfigWithAuthFile ( t )
2023-01-29 02:29:06 +01:00
c . AuthStatsQueueWriterInterval = 100 * time . Millisecond
2023-01-27 17:33:51 +01:00
s := newTestServer ( t , c )
// Create user, and update it with some message and email stats
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-27 17:33:51 +01:00
Code : "test" ,
} ) )
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
u , err := s . userManager . User ( "phil" )
require . Nil ( t , err )
2023-02-09 21:24:12 +01:00
s . userManager . EnqueueUserStats ( u . ID , & user . Stats {
2023-01-27 17:33:51 +01:00
Messages : 123456 ,
Emails : 999 ,
} )
time . Sleep ( 400 * time . Millisecond )
// Get account and verify stats are read from the DB, and that the visitor also has these stats
rr := request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , rr . Code )
account , err := util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( rr . Body ) )
require . Nil ( t , err )
require . Equal ( t , int64 ( 123456 ) , account . Stats . Messages )
require . Equal ( t , int64 ( 999 ) , account . Stats . Emails )
v := s . visitor ( netip . MustParseAddr ( "9.9.9.9" ) , u )
require . Equal ( t , int64 ( 123456 ) , v . Stats ( ) . Messages )
require . Equal ( t , int64 ( 123456 ) , v . messagesLimiter . Value ( ) )
require . Equal ( t , int64 ( 999 ) , v . Stats ( ) . Emails )
require . Equal ( t , int64 ( 999 ) , v . emailsLimiter . Value ( ) )
2023-01-27 15:42:54 +01:00
}
2021-12-24 00:03:04 +01:00
type testMailer struct {
count int
2021-12-24 15:01:29 +01:00
mu sync . Mutex
2021-12-24 00:03:04 +01:00
}
2022-06-02 05:24:44 +02:00
func ( t * testMailer ) Send ( v * visitor , m * message , to string ) error {
2021-12-24 00:10:22 +01:00
t . mu . Lock ( )
defer t . mu . Unlock ( )
2021-12-24 00:03:04 +01:00
t . count ++
return nil
}
2022-06-02 05:24:44 +02:00
func ( t * testMailer ) Counts ( ) ( total int64 , success int64 , failure int64 ) {
return 0 , 0 , 0
}
2022-03-30 20:37:42 +02:00
func ( t * testMailer ) Count ( ) int {
t . mu . Lock ( )
defer t . mu . Unlock ( )
return t . count
}
2022-02-15 01:23:57 +01:00
func TestServer_PublishTooRequests_Defaults ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
for i := 0 ; i < 60 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "message %d" , i ) , nil )
require . Equal ( t , 200 , response . Code )
}
response := request ( t , s , "PUT" , "/mytopic" , "message" , nil )
require . Equal ( t , 429 , response . Code )
}
func TestServer_PublishTooRequests_Defaults_ExemptHosts ( t * testing . T ) {
c := newTestConfig ( t )
2023-02-25 03:10:41 +01:00
c . VisitorRequestLimitBurst = 3
2022-10-05 22:42:07 +02:00
c . VisitorRequestExemptIPAddrs = [ ] netip . Prefix { netip . MustParsePrefix ( "9.9.9.9/32" ) } // see request()
2022-02-15 01:23:57 +01:00
s := newTestServer ( t , c )
2023-02-25 03:10:41 +01:00
for i := 0 ; i < 5 ; i ++ { // > 3
2022-02-15 01:23:57 +01:00
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "message %d" , i ) , nil )
require . Equal ( t , 200 , response . Code )
}
}
2023-02-25 03:10:41 +01:00
func TestServer_PublishTooRequests_Defaults_ExemptHosts_MessageDailyLimit ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorRequestLimitBurst = 10
c . VisitorMessageDailyLimit = 4
c . VisitorRequestExemptIPAddrs = [ ] netip . Prefix { netip . MustParsePrefix ( "9.9.9.9/32" ) } // see request()
s := newTestServer ( t , c )
for i := 0 ; i < 8 ; i ++ { // 4
response := request ( t , s , "PUT" , "/mytopic" , "message" , nil )
require . Equal ( t , 200 , response . Code )
}
}
2022-02-15 01:23:57 +01:00
func TestServer_PublishTooRequests_ShortReplenish ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorRequestLimitBurst = 60
2023-01-22 05:15:22 +01:00
c . VisitorRequestLimitReplenish = time . Second
2022-02-15 01:23:57 +01:00
s := newTestServer ( t , c )
for i := 0 ; i < 60 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "message %d" , i ) , nil )
require . Equal ( t , 200 , response . Code )
}
response := request ( t , s , "PUT" , "/mytopic" , "message" , nil )
require . Equal ( t , 429 , response . Code )
2023-01-22 05:15:22 +01:00
time . Sleep ( 1020 * time . Millisecond )
2022-02-15 01:23:57 +01:00
response = request ( t , s , "PUT" , "/mytopic" , "message" , nil )
require . Equal ( t , 200 , response . Code )
}
2021-12-24 00:03:04 +01:00
func TestServer_PublishTooManyEmails_Defaults ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
2022-06-02 05:24:44 +02:00
s . smtpSender = & testMailer { }
2021-12-24 00:03:04 +01:00
for i := 0 ; i < 16 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "message %d" , i ) , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 200 , response . Code )
}
response := request ( t , s , "PUT" , "/mytopic" , "one too many" , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 429 , response . Code )
}
func TestServer_PublishTooManyEmails_Replenish ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorEmailLimitReplenish = 500 * time . Millisecond
s := newTestServer ( t , c )
2022-06-02 05:24:44 +02:00
s . smtpSender = & testMailer { }
2021-12-24 00:03:04 +01:00
for i := 0 ; i < 16 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "message %d" , i ) , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 200 , response . Code )
}
response := request ( t , s , "PUT" , "/mytopic" , "one too many" , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 429 , response . Code )
time . Sleep ( 510 * time . Millisecond )
response = request ( t , s , "PUT" , "/mytopic" , "this should be okay again too many" , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "PUT" , "/mytopic" , "and bad again" , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 429 , response . Code )
}
func TestServer_PublishDelayedEmail_Fail ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
2022-06-02 05:24:44 +02:00
s . smtpSender = & testMailer { }
2021-12-24 00:03:04 +01:00
response := request ( t , s , "PUT" , "/mytopic" , "fail" , map [ string ] string {
"E-Mail" : "test@example.com" ,
"Delay" : "20 min" ,
} )
require . Equal ( t , 400 , response . Code )
}
func TestServer_PublishEmailNoMailer_Fail ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "fail" , map [ string ] string {
"E-Mail" : "test@example.com" ,
} )
require . Equal ( t , 400 , response . Code )
}
2021-12-25 22:07:55 +01:00
func TestServer_UnifiedPushDiscovery ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "GET" , "/mytopic?up=1" , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , ` { "unifiedpush": { "version":1}} ` + "\n" , response . Body . String ( ) )
}
2022-01-18 01:14:51 +01:00
func TestServer_PublishUnifiedPushBinary_AndPoll ( t * testing . T ) {
2022-01-17 19:28:07 +01:00
b := make ( [ ] byte , 12 ) // Max length
_ , err := rand . Read ( b )
require . Nil ( t , err )
s := newTestServer ( t , newTestConfig ( t ) )
2023-02-25 03:10:41 +01:00
2023-02-25 05:16:03 +01:00
// Register a UnifiedPush subscriber
response := request ( t , s , "GET" , "/up123456789012/json?poll=1" , "" , map [ string ] string {
"Rate-Topics" : "up123456789012" ,
} )
require . Equal ( t , 200 , response . Code )
// Publish message to topic
response = request ( t , s , "PUT" , "/up123456789012?up=1" , string ( b ) , nil )
2022-01-17 19:28:07 +01:00
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "base64" , m . Encoding )
b2 , err := base64 . StdEncoding . DecodeString ( m . Message )
require . Nil ( t , err )
require . Equal ( t , b , b2 )
2022-01-18 01:14:51 +01:00
2023-02-25 05:16:03 +01:00
// Retrieve and check published message
2023-02-25 03:10:41 +01:00
response = request ( t , s , "GET" , "/up123456789012/json?poll=1" , string ( b ) , nil )
2022-01-18 01:14:51 +01:00
require . Equal ( t , 200 , response . Code )
m = toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "base64" , m . Encoding )
b2 , err = base64 . StdEncoding . DecodeString ( m . Message )
require . Nil ( t , err )
require . Equal ( t , b , b2 )
2022-01-17 19:28:07 +01:00
}
func TestServer_PublishUnifiedPushBinary_Truncated ( t * testing . T ) {
b := make ( [ ] byte , 5000 ) // Longer than max length
_ , err := rand . Read ( b )
require . Nil ( t , err )
s := newTestServer ( t , newTestConfig ( t ) )
2023-02-25 05:16:03 +01:00
// Register a UnifiedPush subscriber
response := request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , map [ string ] string {
"Rate-Topics" : "mytopic" ,
} )
require . Equal ( t , 200 , response . Code )
// Publish message to topic
response = request ( t , s , "PUT" , "/mytopic?up=1" , string ( b ) , nil )
2022-01-17 19:28:07 +01:00
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "base64" , m . Encoding )
b2 , err := base64 . StdEncoding . DecodeString ( m . Message )
require . Nil ( t , err )
require . Equal ( t , 4096 , len ( b2 ) )
require . Equal ( t , b [ : 4096 ] , b2 )
}
func TestServer_PublishUnifiedPushText ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
2023-02-25 03:10:41 +01:00
2023-02-25 05:16:03 +01:00
// Register a UnifiedPush subscriber
response := request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , map [ string ] string {
"Rate-Topics" : "mytopic" ,
} )
require . Equal ( t , 200 , response . Code )
// Publish UnifiedPush text message
response = request ( t , s , "PUT" , "/mytopic?up=1" , "this is a unifiedpush text message" , nil )
2022-01-17 19:28:07 +01:00
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "" , m . Encoding )
require . Equal ( t , "this is a unifiedpush text message" , m . Message )
}
2022-06-20 03:25:35 +02:00
func TestServer_MatrixGateway_Discovery_Success ( t * testing . T ) {
2022-06-15 22:03:12 +02:00
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "GET" , "/_matrix/push/v1/notify" , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , ` { "unifiedpush": { "gateway":"matrix"}} ` + "\n" , response . Body . String ( ) )
}
2022-06-20 03:25:35 +02:00
func TestServer_MatrixGateway_Discovery_Failure_Unconfigured ( t * testing . T ) {
c := newTestConfig ( t )
c . BaseURL = ""
s := newTestServer ( t , c )
response := request ( t , s , "GET" , "/_matrix/push/v1/notify" , "" , nil )
require . Equal ( t , 500 , response . Code )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 50003 , err . Code )
}
2022-06-15 22:03:12 +02:00
func TestServer_MatrixGateway_Push_Success ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
notification := ` { "notification": { "devices":[ { "pushkey":"http://127.0.0.1:12345/mytopic?up=1"}]}} `
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , ` { "rejected":[]} ` + "\n" , response . Body . String ( ) )
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , notification , m . Message )
}
func TestServer_MatrixGateway_Push_Failure_InvalidPushkey ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
notification := ` { "notification": { "devices":[ { "pushkey":"http://wrong-base-url.com/mytopic?up=1"}]}} `
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
2023-02-23 21:38:45 +01:00
require . Equal ( t , 400 , response . Code )
2022-06-15 22:03:12 +02:00
require . Equal ( t , ` { "rejected":["http://wrong-base-url.com/mytopic?up=1"]} ` + "\n" , response . Body . String ( ) )
2023-02-23 21:38:45 +01:00
require . Equal ( t , "40020" , response . Header ( ) . Get ( "X-Ntfy-Error-Code" ) )
require . Equal ( t , "invalid request: push key must be prefixed with base URL, received push key: http://wrong-base-url.com/mytopic?up=1, configured base URL: http://127.0.0.1:12345" , response . Header ( ) . Get ( "X-Ntfy-Error-Message" ) )
2022-06-15 22:03:12 +02:00
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , "" , response . Body . String ( ) ) // Empty!
}
func TestServer_MatrixGateway_Push_Failure_EverythingIsWrong ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
notification := ` { "message":"this is not really a Matrix message"} `
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
require . Equal ( t , 400 , response . Code )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 40019 , err . Code )
require . Equal ( t , 400 , err . HTTPCode )
}
2022-06-16 18:42:19 +02:00
func TestServer_MatrixGateway_Push_Failure_Unconfigured ( t * testing . T ) {
c := newTestConfig ( t )
c . BaseURL = ""
s := newTestServer ( t , c )
notification := ` { "notification": { "devices":[ { "pushkey":"http://127.0.0.1:12345/mytopic?up=1"}]}} `
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
require . Equal ( t , 500 , response . Code )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 50003 , err . Code )
require . Equal ( t , 500 , err . HTTPCode )
}
2022-04-22 20:51:44 +02:00
func TestServer_PublishActions_AndPoll ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "my message" , map [ string ] string {
"Actions" : "view, Open portal, https://home.nest.com/; http, Turn down, https://api.nest.com/device/XZ1D2, body=target_temp_f=65" ,
} )
require . Equal ( t , 200 , response . Code )
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , nil )
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , 2 , len ( m . Actions ) )
require . Equal ( t , "view" , m . Actions [ 0 ] . Action )
require . Equal ( t , "Open portal" , m . Actions [ 0 ] . Label )
require . Equal ( t , "https://home.nest.com/" , m . Actions [ 0 ] . URL )
require . Equal ( t , "http" , m . Actions [ 1 ] . Action )
require . Equal ( t , "Turn down" , m . Actions [ 1 ] . Label )
require . Equal ( t , "https://api.nest.com/device/XZ1D2" , m . Actions [ 1 ] . URL )
require . Equal ( t , "target_temp_f=65" , m . Actions [ 1 ] . Body )
}
2022-03-16 19:16:54 +01:00
func TestServer_PublishAsJSON ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
body := ` { "topic":"mytopic","message":"A message","title":"a title\nwith lines","tags":["tag1","tag 2"], ` +
2022-03-29 21:40:26 +02:00
` "not-a-thing":"ok", "attach":"http://google.com","filename":"google.pdf", "click":"http://ntfy.sh","priority":4, ` +
2022-07-16 21:31:03 +02:00
` "icon":"https://ntfy.sh/static/img/ntfy.png", "delay":"30min"} `
2022-03-16 19:16:54 +01:00
response := request ( t , s , "PUT" , "/" , body , nil )
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "mytopic" , m . Topic )
require . Equal ( t , "A message" , m . Message )
require . Equal ( t , "a title\nwith lines" , m . Title )
require . Equal ( t , [ ] string { "tag1" , "tag 2" } , m . Tags )
require . Equal ( t , "http://google.com" , m . Attachment . URL )
require . Equal ( t , "google.pdf" , m . Attachment . Name )
require . Equal ( t , "http://ntfy.sh" , m . Click )
2022-07-17 23:40:24 +02:00
require . Equal ( t , "https://ntfy.sh/static/img/ntfy.png" , m . Icon )
2022-07-16 21:31:03 +02:00
2022-03-16 19:16:54 +01:00
require . Equal ( t , 4 , m . Priority )
2022-03-29 21:40:26 +02:00
require . True ( t , m . Time > time . Now ( ) . Unix ( ) + 29 * 60 )
require . True ( t , m . Time < time . Now ( ) . Unix ( ) + 31 * 60 )
}
2023-02-25 03:10:41 +01:00
func TestServer_PublishAsJSON_RateLimit_MessageDailyLimit ( t * testing . T ) {
2023-02-23 21:38:45 +01:00
// Publishing as JSON follows a different path. This ensures that rate
// limiting works for this endpoint as well
c := newTestConfig ( t )
c . VisitorMessageDailyLimit = 3
s := newTestServer ( t , c )
for i := 0 ; i < 3 ; i ++ {
response := request ( t , s , "PUT" , "/" , ` { "topic":"mytopic","message":"A message"} ` , nil )
require . Equal ( t , 200 , response . Code )
}
response := request ( t , s , "PUT" , "/" , ` { "topic":"mytopic","message":"A message"} ` , nil )
require . Equal ( t , 429 , response . Code )
require . Equal ( t , 42908 , toHTTPError ( t , response . Body . String ( ) ) . Code )
}
2022-03-29 21:40:26 +02:00
func TestServer_PublishAsJSON_WithEmail ( t * testing . T ) {
mailer := & testMailer { }
s := newTestServer ( t , newTestConfig ( t ) )
2022-06-02 05:24:44 +02:00
s . smtpSender = mailer
2022-03-29 21:40:26 +02:00
body := ` { "topic":"mytopic","message":"A message","email":"phil@example.com"} `
response := request ( t , s , "PUT" , "/" , body , nil )
require . Equal ( t , 200 , response . Code )
2022-06-23 21:01:35 +02:00
time . Sleep ( 100 * time . Millisecond ) // E-Mail publishing happens in a Go routine
2022-03-29 21:40:26 +02:00
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "mytopic" , m . Topic )
require . Equal ( t , "A message" , m . Message )
2022-03-30 20:37:42 +02:00
require . Equal ( t , 1 , mailer . Count ( ) )
2022-03-16 19:16:54 +01:00
}
2022-04-22 20:51:44 +02:00
func TestServer_PublishAsJSON_WithActions ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
body := ` {
"topic" : "mytopic" ,
"message" : "A message" ,
"actions" : [
{
"action" : "view" ,
"label" : "Open portal" ,
"url" : "https://home.nest.com/"
} ,
{
"action" : "http" ,
"label" : "Turn down" ,
"url" : "https://api.nest.com/device/XZ1D2" ,
"body" : "target_temp_f=65"
}
]
} `
response := request ( t , s , "POST" , "/" , body , nil )
require . Equal ( t , 200 , response . Code )
m := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "mytopic" , m . Topic )
require . Equal ( t , "A message" , m . Message )
require . Equal ( t , 2 , len ( m . Actions ) )
require . Equal ( t , "view" , m . Actions [ 0 ] . Action )
require . Equal ( t , "Open portal" , m . Actions [ 0 ] . Label )
require . Equal ( t , "https://home.nest.com/" , m . Actions [ 0 ] . URL )
require . Equal ( t , "http" , m . Actions [ 1 ] . Action )
require . Equal ( t , "Turn down" , m . Actions [ 1 ] . Label )
require . Equal ( t , "https://api.nest.com/device/XZ1D2" , m . Actions [ 1 ] . URL )
require . Equal ( t , "target_temp_f=65" , m . Actions [ 1 ] . Body )
}
2022-03-16 19:16:54 +01:00
func TestServer_PublishAsJSON_Invalid ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
body := ` { "topic":"mytopic",INVALID `
response := request ( t , s , "PUT" , "/" , body , nil )
require . Equal ( t , 400 , response . Code )
}
2023-01-08 03:04:13 +01:00
func TestServer_PublishWithTierBasedMessageLimitAndExpiry ( t * testing . T ) {
c := newTestConfigWithAuthFile ( t )
s := newTestServer ( t , c )
// Create tier with certain limits
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-27 04:57:18 +01:00
Code : "test" ,
MessageLimit : 5 ,
MessageExpiryDuration : - 5 * time . Second , // Second, what a hack!
2023-01-08 03:04:13 +01:00
} ) )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
2023-01-08 03:04:13 +01:00
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
// Publish to reach message limit
for i := 0 ; i < 5 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , fmt . Sprintf ( "this is message %d" , i + 1 ) , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
msg := toMessage ( t , response . Body . String ( ) )
require . True ( t , msg . Expires < time . Now ( ) . Unix ( ) + 5 )
}
response := request ( t , s , "PUT" , "/mytopic" , "this is too much" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
2023-01-09 02:46:46 +01:00
require . Equal ( t , 429 , response . Code )
// Run pruning and see if they are gone
s . execManager ( )
response = request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
require . Empty ( t , response . Body )
2023-01-08 03:04:13 +01:00
}
2022-01-12 17:05:04 +01:00
func TestServer_PublishAttachment ( t * testing . T ) {
2023-02-12 18:08:56 +01:00
content := "text file!" + util . RandomString ( 4990 ) // > 4096
2022-01-12 17:05:04 +01:00
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "attachment.txt" , msg . Attachment . Name )
require . Equal ( t , "text/plain; charset=utf-8" , msg . Attachment . Type )
require . Equal ( t , int64 ( 5000 ) , msg . Attachment . Size )
2022-03-14 02:30:14 +01:00
require . GreaterOrEqual ( t , msg . Attachment . Expires , time . Now ( ) . Add ( 179 * time . Minute ) . Unix ( ) ) // Almost 3 hours
2022-01-12 17:05:04 +01:00
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
2022-10-08 03:27:22 +02:00
require . Equal ( t , netip . Addr { } , msg . Sender ) // Should never be returned
2022-01-12 17:05:04 +01:00
require . FileExists ( t , filepath . Join ( s . config . AttachmentCacheDir , msg . ID ) )
2022-06-11 03:33:39 +02:00
// GET
2022-01-12 17:05:04 +01:00
path := strings . TrimPrefix ( msg . Attachment . URL , "http://127.0.0.1:12345" )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , "5000" , response . Header ( ) . Get ( "Content-Length" ) )
require . Equal ( t , content , response . Body . String ( ) )
2022-01-13 21:17:30 +01:00
2022-06-11 03:33:39 +02:00
// HEAD
response = request ( t , s , "HEAD" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , "5000" , response . Header ( ) . Get ( "Content-Length" ) )
require . Equal ( t , "" , response . Body . String ( ) )
2022-01-13 21:17:30 +01:00
// Slightly unrelated cross-test: make sure we add an owner for internal attachments
2022-12-20 03:42:36 +01:00
size , err := s . messageCache . AttachmentBytesUsedBySender ( "9.9.9.9" ) // See request()
2022-01-13 21:17:30 +01:00
require . Nil ( t , err )
require . Equal ( t , int64 ( 5000 ) , size )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentShortWithFilename ( t * testing . T ) {
2022-01-13 21:17:30 +01:00
c := newTestConfig ( t )
c . BehindProxy = true
s := newTestServer ( t , c )
2022-01-12 17:05:04 +01:00
content := "this is an ATTACHMENT"
2022-01-13 21:17:30 +01:00
response := request ( t , s , "PUT" , "/mytopic?f=myfile.txt" , content , map [ string ] string {
"X-Forwarded-For" : "1.2.3.4" ,
} )
2022-01-12 17:05:04 +01:00
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "myfile.txt" , msg . Attachment . Name )
require . Equal ( t , "text/plain; charset=utf-8" , msg . Attachment . Type )
require . Equal ( t , int64 ( 21 ) , msg . Attachment . Size )
require . GreaterOrEqual ( t , msg . Attachment . Expires , time . Now ( ) . Add ( 3 * time . Hour ) . Unix ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
2022-10-08 03:27:22 +02:00
require . Equal ( t , netip . Addr { } , msg . Sender ) // Should never be returned
2022-01-12 17:05:04 +01:00
require . FileExists ( t , filepath . Join ( s . config . AttachmentCacheDir , msg . ID ) )
path := strings . TrimPrefix ( msg . Attachment . URL , "http://127.0.0.1:12345" )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , "21" , response . Header ( ) . Get ( "Content-Length" ) )
require . Equal ( t , content , response . Body . String ( ) )
2022-01-13 21:17:30 +01:00
// Slightly unrelated cross-test: make sure we add an owner for internal attachments
2022-12-20 03:42:36 +01:00
size , err := s . messageCache . AttachmentBytesUsedBySender ( "1.2.3.4" )
2022-01-13 21:17:30 +01:00
require . Nil ( t , err )
require . Equal ( t , int64 ( 21 ) , size )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentExternalWithoutFilename ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "" , map [ string ] string {
"Attach" : "https://upload.wikimedia.org/wikipedia/commons/f/fd/Pink_flower.jpg" ,
} )
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "You received a file: Pink_flower.jpg" , msg . Message )
require . Equal ( t , "Pink_flower.jpg" , msg . Attachment . Name )
require . Equal ( t , "https://upload.wikimedia.org/wikipedia/commons/f/fd/Pink_flower.jpg" , msg . Attachment . URL )
2022-01-14 18:13:14 +01:00
require . Equal ( t , "" , msg . Attachment . Type )
require . Equal ( t , int64 ( 0 ) , msg . Attachment . Size )
require . Equal ( t , int64 ( 0 ) , msg . Attachment . Expires )
2022-10-08 03:27:22 +02:00
require . Equal ( t , netip . Addr { } , msg . Sender )
2022-01-13 21:17:30 +01:00
// Slightly unrelated cross-test: make sure we don't add an owner for external attachments
2022-12-20 03:42:36 +01:00
size , err := s . messageCache . AttachmentBytesUsedBySender ( "127.0.0.1" )
2022-01-13 21:17:30 +01:00
require . Nil ( t , err )
require . Equal ( t , int64 ( 0 ) , size )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentExternalWithFilename ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , "This is a custom message" , map [ string ] string {
"X-Attach" : "https://upload.wikimedia.org/wikipedia/commons/f/fd/Pink_flower.jpg" ,
"File" : "some file.jpg" ,
} )
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , "This is a custom message" , msg . Message )
require . Equal ( t , "some file.jpg" , msg . Attachment . Name )
require . Equal ( t , "https://upload.wikimedia.org/wikipedia/commons/f/fd/Pink_flower.jpg" , msg . Attachment . URL )
2022-01-14 18:13:14 +01:00
require . Equal ( t , "" , msg . Attachment . Type )
require . Equal ( t , int64 ( 0 ) , msg . Attachment . Size )
require . Equal ( t , int64 ( 0 ) , msg . Attachment . Expires )
2022-10-08 03:27:22 +02:00
require . Equal ( t , netip . Addr { } , msg . Sender )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentBadURL ( t * testing . T ) {
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic?a=not+a+URL" , "" , nil )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 400 , response . Code )
require . Equal ( t , 400 , err . HTTPCode )
require . Equal ( t , 40013 , err . Code )
}
func TestServer_PublishAttachmentTooLargeContentLength ( t * testing . T ) {
content := util . RandomString ( 5000 ) // > 4096
s := newTestServer ( t , newTestConfig ( t ) )
response := request ( t , s , "PUT" , "/mytopic" , content , map [ string ] string {
"Content-Length" : "20000000" ,
} )
err := toHTTPError ( t , response . Body . String ( ) )
2022-04-04 02:19:43 +02:00
require . Equal ( t , 413 , response . Code )
require . Equal ( t , 413 , err . HTTPCode )
require . Equal ( t , 41301 , err . Code )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentTooLargeBodyAttachmentFileSizeLimit ( t * testing . T ) {
content := util . RandomString ( 5001 ) // > 5000, see below
c := newTestConfig ( t )
c . AttachmentFileSizeLimit = 5000
s := newTestServer ( t , c )
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
err := toHTTPError ( t , response . Body . String ( ) )
2022-04-04 02:19:43 +02:00
require . Equal ( t , 413 , response . Code )
require . Equal ( t , 413 , err . HTTPCode )
require . Equal ( t , 41301 , err . Code )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentExpiryBeforeDelivery ( t * testing . T ) {
c := newTestConfig ( t )
c . AttachmentExpiryDuration = 10 * time . Minute
s := newTestServer ( t , c )
response := request ( t , s , "PUT" , "/mytopic" , util . RandomString ( 5000 ) , map [ string ] string {
"Delay" : "11 min" , // > AttachmentExpiryDuration
} )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 400 , response . Code )
require . Equal ( t , 400 , err . HTTPCode )
2022-01-14 18:23:58 +01:00
require . Equal ( t , 40015 , err . Code )
2022-01-12 17:05:04 +01:00
}
func TestServer_PublishAttachmentTooLargeBodyVisitorAttachmentTotalSizeLimit ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorAttachmentTotalSizeLimit = 10000
s := newTestServer ( t , c )
2023-02-16 22:32:43 +01:00
response := request ( t , s , "PUT" , "/mytopic" , "text file!" + util . RandomString ( 4990 ) , nil )
2022-01-12 17:05:04 +01:00
msg := toMessage ( t , response . Body . String ( ) )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , "You received a file: attachment.txt" , msg . Message )
require . Equal ( t , int64 ( 5000 ) , msg . Attachment . Size )
content := util . RandomString ( 5001 ) // 5000+5001 > , see below
response = request ( t , s , "PUT" , "/mytopic" , content , nil )
err := toHTTPError ( t , response . Body . String ( ) )
2022-04-04 02:19:43 +02:00
require . Equal ( t , 413 , response . Code )
require . Equal ( t , 413 , err . HTTPCode )
require . Equal ( t , 41301 , err . Code )
2022-01-12 17:05:04 +01:00
}
2023-01-18 19:46:40 +01:00
func TestServer_PublishAttachmentAndExpire ( t * testing . T ) {
2022-01-12 17:05:04 +01:00
content := util . RandomString ( 5000 ) // > 4096
c := newTestConfig ( t )
c . AttachmentExpiryDuration = time . Millisecond // Hack
s := newTestServer ( t , c )
// Publish and make sure we can retrieve it
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
file := filepath . Join ( s . config . AttachmentCacheDir , msg . ID )
require . FileExists ( t , file )
path := strings . TrimPrefix ( msg . Attachment . URL , "http://127.0.0.1:12345" )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , content , response . Body . String ( ) )
2023-01-08 03:04:13 +01:00
// Prune and makes sure it's gone
2022-01-12 17:05:04 +01:00
time . Sleep ( time . Second ) // Sigh ...
2022-12-28 04:14:14 +01:00
s . execManager ( )
2022-01-12 17:05:04 +01:00
require . NoFileExists ( t , file )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 404 , response . Code )
}
2023-01-08 03:04:13 +01:00
func TestServer_PublishAttachmentWithTierBasedExpiry ( t * testing . T ) {
content := util . RandomString ( 5000 ) // > 4096
c := newTestConfigWithAuthFile ( t )
c . AttachmentExpiryDuration = time . Millisecond // Hack
s := newTestServer ( t , c )
// Create tier with certain limits
2023-01-09 21:40:46 +01:00
sevenDays := time . Duration ( 604800 ) * time . Second
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-08 03:04:13 +01:00
Code : "test" ,
2023-01-27 04:57:18 +01:00
MessageLimit : 10 ,
MessageExpiryDuration : sevenDays ,
2023-01-08 03:04:13 +01:00
AttachmentFileSizeLimit : 50_000 ,
AttachmentTotalSizeLimit : 200_000 ,
2023-01-09 21:40:46 +01:00
AttachmentExpiryDuration : sevenDays , // 7 days
2023-01-25 16:05:54 +01:00
AttachmentBandwidthLimit : 100000 ,
2023-01-08 03:04:13 +01:00
} ) )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
2023-01-08 03:04:13 +01:00
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
// Publish and make sure we can retrieve it
response := request ( t , s , "PUT" , "/mytopic" , content , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
2023-01-25 16:05:54 +01:00
require . Equal ( t , 200 , response . Code )
2023-01-08 03:04:13 +01:00
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
2023-01-09 21:40:46 +01:00
require . True ( t , msg . Attachment . Expires > time . Now ( ) . Add ( sevenDays - 30 * time . Second ) . Unix ( ) )
require . True ( t , msg . Expires > time . Now ( ) . Add ( sevenDays - 30 * time . Second ) . Unix ( ) )
2023-01-08 03:04:13 +01:00
file := filepath . Join ( s . config . AttachmentCacheDir , msg . ID )
require . FileExists ( t , file )
path := strings . TrimPrefix ( msg . Attachment . URL , "http://127.0.0.1:12345" )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , content , response . Body . String ( ) )
// Prune and makes sure it's still there
time . Sleep ( time . Second ) // Sigh ...
s . execManager ( )
require . FileExists ( t , file )
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
}
2023-01-25 16:05:54 +01:00
func TestServer_PublishAttachmentWithTierBasedBandwidthLimit ( t * testing . T ) {
content := util . RandomString ( 5000 ) // > 4096
c := newTestConfigWithAuthFile ( t )
2023-01-29 21:11:26 +01:00
c . VisitorAttachmentDailyBandwidthLimit = 1000 // Much lower than tier bandwidth!
2023-01-25 16:05:54 +01:00
s := newTestServer ( t , c )
// Create tier with certain limits
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-25 16:05:54 +01:00
Code : "test" ,
2023-01-27 04:57:18 +01:00
MessageLimit : 10 ,
MessageExpiryDuration : time . Hour ,
2023-01-25 16:05:54 +01:00
AttachmentFileSizeLimit : 50_000 ,
AttachmentTotalSizeLimit : 200_000 ,
AttachmentExpiryDuration : time . Hour ,
AttachmentBandwidthLimit : 14000 , // < 3x5000 bytes -> enough for one upload, one download
} ) )
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
// Publish and make sure we can retrieve it
rr := request ( t , s , "PUT" , "/mytopic" , content , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , rr . Code )
msg := toMessage ( t , rr . Body . String ( ) )
// Retrieve it (first time succeeds)
2023-01-29 21:11:26 +01:00
rr = request ( t , s , "GET" , "/file/" + msg . ID , content , nil ) // File downloads do not send auth headers!!
2023-01-25 16:05:54 +01:00
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , content , rr . Body . String ( ) )
// Retrieve it AGAIN (fails, due to bandwidth limit)
2023-01-29 21:11:26 +01:00
rr = request ( t , s , "GET" , "/file/" + msg . ID , content , nil )
2023-01-25 16:05:54 +01:00
require . Equal ( t , 429 , rr . Code )
}
2023-01-08 03:04:13 +01:00
func TestServer_PublishAttachmentWithTierBasedLimits ( t * testing . T ) {
smallFile := util . RandomString ( 20_000 )
largeFile := util . RandomString ( 50_000 )
c := newTestConfigWithAuthFile ( t )
c . AttachmentFileSizeLimit = 20_000
c . VisitorAttachmentTotalSizeLimit = 40_000
s := newTestServer ( t , c )
// Create tier with certain limits
2023-02-07 04:38:22 +01:00
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
2023-01-08 03:04:13 +01:00
Code : "test" ,
2023-01-27 04:57:18 +01:00
MessageLimit : 100 ,
2023-01-08 03:04:13 +01:00
AttachmentFileSizeLimit : 50_000 ,
AttachmentTotalSizeLimit : 200_000 ,
2023-01-09 21:40:46 +01:00
AttachmentExpiryDuration : 30 * time . Second ,
2023-01-25 16:05:54 +01:00
AttachmentBandwidthLimit : 1000000 ,
2023-01-08 03:04:13 +01:00
} ) )
2023-01-23 04:21:30 +01:00
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
2023-01-08 03:04:13 +01:00
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
// Publish small file as anonymous
response := request ( t , s , "PUT" , "/mytopic" , smallFile , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
require . FileExists ( t , filepath . Join ( s . config . AttachmentCacheDir , msg . ID ) )
// Publish large file as anonymous
response = request ( t , s , "PUT" , "/mytopic" , largeFile , nil )
require . Equal ( t , 413 , response . Code )
2023-01-09 02:46:46 +01:00
require . Equal ( t , 41301 , toHTTPError ( t , response . Body . String ( ) ) . Code )
2023-01-08 03:04:13 +01:00
// Publish too large file as phil
response = request ( t , s , "PUT" , "/mytopic" , largeFile + " a few more bytes" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 413 , response . Code )
2023-01-09 02:46:46 +01:00
require . Equal ( t , 41301 , toHTTPError ( t , response . Body . String ( ) ) . Code )
2023-01-08 03:04:13 +01:00
// Publish large file as phil (4x)
for i := 0 ; i < 4 ; i ++ {
response = request ( t , s , "PUT" , "/mytopic" , largeFile , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , response . Code )
msg = toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
require . FileExists ( t , filepath . Join ( s . config . AttachmentCacheDir , msg . ID ) )
}
response = request ( t , s , "PUT" , "/mytopic" , largeFile , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 413 , response . Code )
2023-01-09 02:46:46 +01:00
require . Equal ( t , 41301 , toHTTPError ( t , response . Body . String ( ) ) . Code )
2023-01-08 03:04:13 +01:00
}
2022-01-13 03:24:48 +01:00
func TestServer_PublishAttachmentBandwidthLimit ( t * testing . T ) {
2022-01-13 00:52:07 +01:00
content := util . RandomString ( 5000 ) // > 4096
c := newTestConfig ( t )
2022-01-13 03:24:48 +01:00
c . VisitorAttachmentDailyBandwidthLimit = 5 * 5000 + 123 // A little more than 1 upload and 3 downloads
2022-01-13 00:52:07 +01:00
s := newTestServer ( t , c )
// Publish attachment
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
2023-01-18 21:50:06 +01:00
// Value it 4 times successfully
2022-01-13 00:52:07 +01:00
path := strings . TrimPrefix ( msg . Attachment . URL , "http://127.0.0.1:12345" )
for i := 1 ; i <= 4 ; i ++ { // 4 successful downloads
response = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , content , response . Body . String ( ) )
}
// And then fail with a 429
response = request ( t , s , "GET" , path , "" , nil )
err := toHTTPError ( t , response . Body . String ( ) )
require . Equal ( t , 429 , response . Code )
2022-01-13 03:24:48 +01:00
require . Equal ( t , 42905 , err . Code )
2022-01-13 00:52:07 +01:00
}
2022-01-13 03:24:48 +01:00
func TestServer_PublishAttachmentBandwidthLimitUploadOnly ( t * testing . T ) {
2022-01-13 00:52:07 +01:00
content := util . RandomString ( 5000 ) // > 4096
c := newTestConfig ( t )
2022-01-13 03:24:48 +01:00
c . VisitorAttachmentDailyBandwidthLimit = 5 * 5000 + 500 // 5 successful uploads
2022-01-13 00:52:07 +01:00
s := newTestServer ( t , c )
// 5 successful uploads
for i := 1 ; i <= 5 ; i ++ {
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
}
// And a failed one
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
err := toHTTPError ( t , response . Body . String ( ) )
2022-04-04 02:19:43 +02:00
require . Equal ( t , 413 , response . Code )
require . Equal ( t , 41301 , err . Code )
}
2023-02-11 03:44:12 +01:00
func TestServer_PublishAttachmentAndImmediatelyGetItWithCacheTimeout ( t * testing . T ) {
// This tests the awkward util.Retry in handleFile: Due to the async persisting of messages,
// the message is not immediately available when attempting to download it.
c := newTestConfig ( t )
c . CacheBatchTimeout = 500 * time . Millisecond
c . CacheBatchSize = 10
s := newTestServer ( t , c )
content := "this is an ATTACHMENT"
rr := request ( t , s , "PUT" , "/mytopic?f=myfile.txt" , content , nil )
m := toMessage ( t , rr . Body . String ( ) )
require . Equal ( t , "myfile.txt" , m . Attachment . Name )
path := strings . TrimPrefix ( m . Attachment . URL , "http://127.0.0.1:12345" )
rr = request ( t , s , "GET" , path , "" , nil )
require . Equal ( t , 200 , rr . Code ) // Not 404!
require . Equal ( t , content , rr . Body . String ( ) )
}
2022-12-28 04:14:14 +01:00
func TestServer_PublishAttachmentAccountStats ( t * testing . T ) {
2022-04-04 02:19:43 +02:00
content := util . RandomString ( 4999 ) // > 4096
c := newTestConfig ( t )
c . AttachmentFileSizeLimit = 5000
c . VisitorAttachmentTotalSizeLimit = 6000
s := newTestServer ( t , c )
// Upload one attachment
response := request ( t , s , "PUT" , "/mytopic" , content , nil )
msg := toMessage ( t , response . Body . String ( ) )
require . Contains ( t , msg . Attachment . URL , "http://127.0.0.1:12345/file/" )
// User stats
2022-12-28 04:14:14 +01:00
response = request ( t , s , "GET" , "/v1/account" , "" , nil )
2022-04-04 02:19:43 +02:00
require . Equal ( t , 200 , response . Code )
2023-01-11 04:51:51 +01:00
account , err := util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( response . Body ) )
require . Nil ( t , err )
2022-12-28 04:14:14 +01:00
require . Equal ( t , int64 ( 5000 ) , account . Limits . AttachmentFileSize )
require . Equal ( t , int64 ( 6000 ) , account . Limits . AttachmentTotalSize )
require . Equal ( t , int64 ( 4999 ) , account . Stats . AttachmentTotalSize )
require . Equal ( t , int64 ( 1001 ) , account . Stats . AttachmentTotalSizeRemaining )
2023-01-11 04:51:51 +01:00
require . Equal ( t , int64 ( 1 ) , account . Stats . Messages )
2022-01-13 00:52:07 +01:00
}
2022-06-16 21:31:09 +02:00
func TestServer_Visitor_XForwardedFor_None ( t * testing . T ) {
c := newTestConfig ( t )
c . BehindProxy = true
s := newTestServer ( t , c )
r , _ := http . NewRequest ( "GET" , "/bla" , nil )
r . RemoteAddr = "8.9.10.11"
r . Header . Set ( "X-Forwarded-For" , " " ) // Spaces, not empty!
2023-01-27 04:57:18 +01:00
v , err := s . maybeAuthenticate ( r )
2022-12-28 04:14:14 +01:00
require . Nil ( t , err )
2022-10-08 03:27:22 +02:00
require . Equal ( t , "8.9.10.11" , v . ip . String ( ) )
2022-06-16 21:31:09 +02:00
}
func TestServer_Visitor_XForwardedFor_Single ( t * testing . T ) {
c := newTestConfig ( t )
c . BehindProxy = true
s := newTestServer ( t , c )
r , _ := http . NewRequest ( "GET" , "/bla" , nil )
r . RemoteAddr = "8.9.10.11"
r . Header . Set ( "X-Forwarded-For" , "1.1.1.1" )
2023-01-27 04:57:18 +01:00
v , err := s . maybeAuthenticate ( r )
2022-12-28 04:14:14 +01:00
require . Nil ( t , err )
2022-10-08 03:27:22 +02:00
require . Equal ( t , "1.1.1.1" , v . ip . String ( ) )
2022-06-16 21:31:09 +02:00
}
func TestServer_Visitor_XForwardedFor_Multiple ( t * testing . T ) {
c := newTestConfig ( t )
c . BehindProxy = true
s := newTestServer ( t , c )
r , _ := http . NewRequest ( "GET" , "/bla" , nil )
r . RemoteAddr = "8.9.10.11"
r . Header . Set ( "X-Forwarded-For" , "1.2.3.4 , 2.4.4.2,234.5.2.1 " )
2023-01-27 04:57:18 +01:00
v , err := s . maybeAuthenticate ( r )
2022-12-28 04:14:14 +01:00
require . Nil ( t , err )
2022-10-08 03:27:22 +02:00
require . Equal ( t , "234.5.2.1" , v . ip . String ( ) )
2022-06-16 21:31:09 +02:00
}
2022-06-22 21:11:50 +02:00
func TestServer_PublishWhileUpdatingStatsWithLotsOfMessages ( t * testing . T ) {
2022-06-23 02:17:47 +02:00
count := 50000
c := newTestConfig ( t )
c . TotalTopicLimit = 50001
2022-06-23 17:02:45 +02:00
c . CacheStartupQueries = "pragma journal_mode = WAL; pragma synchronous = normal; pragma temp_store = memory;"
2022-06-23 02:17:47 +02:00
s := newTestServer ( t , c )
2022-06-22 21:11:50 +02:00
// Add lots of messages
2023-01-27 04:57:18 +01:00
log . Info ( "Adding %d messages" , count )
2022-06-22 21:11:50 +02:00
start := time . Now ( )
2022-06-23 02:17:47 +02:00
messages := make ( [ ] * message , 0 )
2022-06-22 21:11:50 +02:00
for i := 0 ; i < count ; i ++ {
2022-06-23 02:17:47 +02:00
topicID := fmt . Sprintf ( "topic%d" , i )
_ , err := s . topicsFromIDs ( topicID ) // Add topic to internal s.topics array
require . Nil ( t , err )
messages = append ( messages , newDefaultMessage ( topicID , "some message" ) )
2022-06-22 21:11:50 +02:00
}
2022-06-23 02:17:47 +02:00
require . Nil ( t , s . messageCache . addMessages ( messages ) )
2023-01-27 04:57:18 +01:00
log . Info ( "Done: Adding %d messages; took %s" , count , time . Since ( start ) . Round ( time . Millisecond ) )
2022-06-22 21:11:50 +02:00
// Update stats
statsChan := make ( chan bool )
go func ( ) {
2023-01-27 04:57:18 +01:00
log . Info ( "Updating stats" )
2022-06-22 21:11:50 +02:00
start := time . Now ( )
2022-12-28 04:14:14 +01:00
s . execManager ( )
2023-01-27 04:57:18 +01:00
log . Info ( "Done: Updating stats; took %s" , time . Since ( start ) . Round ( time . Millisecond ) )
2022-06-22 21:11:50 +02:00
statsChan <- true
} ( )
time . Sleep ( 50 * time . Millisecond ) // Make sure it starts first
// Publish message (during stats update)
2023-01-27 04:57:18 +01:00
log . Info ( "Publishing message" )
2022-06-22 21:11:50 +02:00
start = time . Now ( )
response := request ( t , s , "PUT" , "/mytopic" , "some body" , nil )
m := toMessage ( t , response . Body . String ( ) )
2022-06-23 02:17:47 +02:00
assert . Equal ( t , "some body" , m . Message )
assert . True ( t , time . Since ( start ) < 100 * time . Millisecond )
2023-01-27 04:57:18 +01:00
log . Info ( "Done: Publishing message; took %s" , time . Since ( start ) . Round ( time . Millisecond ) )
2022-06-22 21:11:50 +02:00
2022-06-23 02:17:47 +02:00
// Wait for all goroutines
2023-01-29 03:27:05 +01:00
select {
case <- statsChan :
case <- time . After ( 10 * time . Second ) :
t . Fatal ( "Timed out waiting for Go routines" )
}
2023-01-27 04:57:18 +01:00
log . Info ( "Done: Waiting for all locks" )
2022-06-22 21:11:50 +02:00
}
2023-01-29 03:27:05 +01:00
func TestServer_AnonymousUser_And_NonTierUser_Are_Same_Visitor ( t * testing . T ) {
conf := newTestConfigWithAuthFile ( t )
s := newTestServer ( t , conf )
defer s . closeDatabases ( )
// Create user without tier
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
// Publish a message (anonymous user)
rr := request ( t , s , "POST" , "/mytopic" , "hi" , nil )
require . Equal ( t , 200 , rr . Code )
// Publish a message (non-tier user)
rr = request ( t , s , "POST" , "/mytopic" , "hi" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
require . Equal ( t , 200 , rr . Code )
// User stats (anonymous user)
rr = request ( t , s , "GET" , "/v1/account" , "" , nil )
account , _ := util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( rr . Body ) )
require . Equal ( t , int64 ( 2 ) , account . Stats . Messages )
// User stats (non-tier user)
rr = request ( t , s , "GET" , "/v1/account" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
} )
account , _ = util . UnmarshalJSON [ apiAccountResponse ] ( io . NopCloser ( rr . Body ) )
require . Equal ( t , int64 ( 2 ) , account . Stats . Messages )
}
2023-02-25 03:10:41 +01:00
func TestServer_SubscriberRateLimiting_Success ( t * testing . T ) {
2023-02-23 03:00:56 +01:00
c := newTestConfigWithAuthFile ( t )
c . VisitorRequestLimitBurst = 3
s := newTestServer ( t , c )
2023-02-23 03:33:18 +01:00
// "Register" visitor 1.2.3.4 to topic "subscriber1topic" as a rate limit visitor
2023-02-23 03:00:56 +01:00
subscriber1Fn := func ( r * http . Request ) {
r . RemoteAddr = "1.2.3.4"
}
rr := request ( t , s , "GET" , "/subscriber1topic/json?poll=1" , "" , map [ string ] string {
2023-02-23 04:26:43 +01:00
"Rate-Topics" : "subscriber1topic" ,
2023-02-23 03:00:56 +01:00
} , subscriber1Fn )
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , "" , rr . Body . String ( ) )
2023-02-25 03:10:41 +01:00
// "Register" visitor 8.7.7.1 to topic "up012345678912" as a rate limit visitor (implicitly via topic name)
2023-02-23 03:00:56 +01:00
subscriber2Fn := func ( r * http . Request ) {
r . RemoteAddr = "8.7.7.1"
}
2023-02-25 03:10:41 +01:00
rr = request ( t , s , "GET" , "/up012345678912/json?poll=1" , "" , nil , subscriber2Fn )
2023-02-23 03:00:56 +01:00
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , "" , rr . Body . String ( ) )
2023-02-23 03:33:18 +01:00
// Publish 2 messages to "subscriber1topic" as visitor 9.9.9.9. It'd be 3 normally, but the
// GET request before is also counted towards the request limiter.
for i := 0 ; i < 2 ; i ++ {
2023-02-23 03:00:56 +01:00
rr := request ( t , s , "PUT" , "/subscriber1topic" , "some message" , nil )
require . Equal ( t , 200 , rr . Code )
}
rr = request ( t , s , "PUT" , "/subscriber1topic" , "some message" , nil )
require . Equal ( t , 429 , rr . Code )
2023-02-25 03:10:41 +01:00
// Publish another 2 messages to "up012345678912" as visitor 9.9.9.9
2023-02-23 03:33:18 +01:00
for i := 0 ; i < 2 ; i ++ {
2023-02-25 03:10:41 +01:00
rr := request ( t , s , "PUT" , "/up012345678912" , "some message" , nil )
2023-02-23 03:00:56 +01:00
require . Equal ( t , 200 , rr . Code ) // If we fail here, handlePublish is using the wrong visitor!
}
2023-02-25 03:10:41 +01:00
rr = request ( t , s , "PUT" , "/up012345678912" , "some message" , nil )
2023-02-23 03:00:56 +01:00
require . Equal ( t , 429 , rr . Code )
2023-02-23 03:33:18 +01:00
// Hurray! At this point, visitor 9.9.9.9 has published 4 messages, even though
// VisitorRequestLimitBurst is 3. That means it's working.
// Now let's confirm that so far we haven't used up any of visitor 9.9.9.9's request limiter
// by publishing another 3 requests from it.
2023-02-23 03:00:56 +01:00
for i := 0 ; i < 3 ; i ++ {
rr := request ( t , s , "PUT" , "/some-other-topic" , "some message" , nil )
require . Equal ( t , 200 , rr . Code )
}
rr = request ( t , s , "PUT" , "/some-other-topic" , "some message" , nil )
require . Equal ( t , 429 , rr . Code )
}
2023-02-23 04:44:48 +01:00
func TestServer_SubscriberRateLimiting_UP_Only ( t * testing . T ) {
c := newTestConfigWithAuthFile ( t )
c . VisitorRequestLimitBurst = 3
s := newTestServer ( t , c )
// "Register" 5 different UnifiedPush visitors
for i := 0 ; i < 5 ; i ++ {
subscriberFn := func ( r * http . Request ) {
r . RemoteAddr = fmt . Sprintf ( "1.2.3.%d" , i + 1 )
}
2023-02-25 03:10:41 +01:00
rr := request ( t , s , "GET" , fmt . Sprintf ( "/up12345678901%d/json?poll=1" , i ) , "" , nil , subscriberFn )
2023-02-23 04:44:48 +01:00
require . Equal ( t , 200 , rr . Code )
}
// Publish 2 messages per topic
for i := 0 ; i < 5 ; i ++ {
for j := 0 ; j < 2 ; j ++ {
2023-02-25 03:10:41 +01:00
rr := request ( t , s , "PUT" , fmt . Sprintf ( "/up12345678901%d?up=1" , i ) , "some message" , nil )
2023-02-23 04:44:48 +01:00
require . Equal ( t , 200 , rr . Code )
}
}
}
func TestServer_Matrix_SubscriberRateLimiting_UP_Only ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorRequestLimitBurst = 3
s := newTestServer ( t , c )
// "Register" 5 different UnifiedPush visitors
for i := 0 ; i < 5 ; i ++ {
2023-02-25 03:10:41 +01:00
rr := request ( t , s , "GET" , fmt . Sprintf ( "/up12345678901%d/json?poll=1" , i ) , "" , nil , func ( r * http . Request ) {
2023-02-23 04:44:48 +01:00
r . RemoteAddr = fmt . Sprintf ( "1.2.3.%d" , i + 1 )
2023-02-25 03:10:41 +01:00
} )
2023-02-23 04:44:48 +01:00
require . Equal ( t , 200 , rr . Code )
}
// Publish 2 messages per topic
for i := 0 ; i < 5 ; i ++ {
2023-02-25 03:10:41 +01:00
notification := fmt . Sprintf ( ` { "notification": { "devices":[ { "pushkey":"http://127.0.0.1:12345/up12345678901%d?up=1"}]}} ` , i )
2023-02-23 04:44:48 +01:00
for j := 0 ; j < 2 ; j ++ {
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , ` { "rejected":[]} ` + "\n" , response . Body . String ( ) )
}
response := request ( t , s , "POST" , "/_matrix/push/v1/notify" , notification , nil )
require . Equal ( t , 429 , response . Code , notification )
2023-02-25 03:10:41 +01:00
require . Equal ( t , fmt . Sprintf ( ` { "rejected":["http://127.0.0.1:12345/up12345678901%d?up=1"]} ` + "\n" , i ) , response . Body . String ( ) )
2023-02-23 04:44:48 +01:00
}
}
2023-02-24 02:46:53 +01:00
func TestServer_SubscriberRateLimiting_VisitorExpiration ( t * testing . T ) {
c := newTestConfig ( t )
c . VisitorRequestLimitBurst = 3
s := newTestServer ( t , c )
// "Register" rate visitor
subscriberFn := func ( r * http . Request ) {
r . RemoteAddr = "1.2.3.4"
}
rr := request ( t , s , "GET" , "/mytopic/json?poll=1" , "" , map [ string ] string {
2023-02-24 20:45:30 +01:00
"rate-topics" : "mytopic" ,
2023-02-24 02:46:53 +01:00
} , subscriberFn )
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , "1.2.3.4" , s . topics [ "mytopic" ] . rateVisitor . ip . String ( ) )
require . Equal ( t , s . visitors [ "ip:1.2.3.4" ] , s . topics [ "mytopic" ] . rateVisitor )
// Publish message, observe rate visitor tokens being decreased
response := request ( t , s , "POST" , "/mytopic" , "some message" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , int64 ( 0 ) , s . visitors [ "ip:9.9.9.9" ] . messagesLimiter . Value ( ) )
require . Equal ( t , int64 ( 1 ) , s . topics [ "mytopic" ] . rateVisitor . messagesLimiter . Value ( ) )
require . Equal ( t , s . visitors [ "ip:1.2.3.4" ] , s . topics [ "mytopic" ] . rateVisitor )
// Expire visitor
s . visitors [ "ip:1.2.3.4" ] . seen = time . Now ( ) . Add ( - 1 * 25 * time . Hour )
s . pruneVisitors ( )
// Publish message again, observe that rateVisitor is not used anymore and is reset
response = request ( t , s , "POST" , "/mytopic" , "some message" , nil )
require . Equal ( t , 200 , response . Code )
require . Equal ( t , int64 ( 1 ) , s . visitors [ "ip:9.9.9.9" ] . messagesLimiter . Value ( ) )
require . Nil ( t , s . topics [ "mytopic" ] . rateVisitor )
require . Nil ( t , s . visitors [ "ip:1.2.3.4" ] )
}
2023-02-23 15:38:53 +01:00
2023-02-24 20:45:30 +01:00
func TestServer_SubscriberRateLimiting_ProtectedTopics ( t * testing . T ) {
c := newTestConfigWithAuthFile ( t )
c . AuthDefault = user . PermissionDenyAll
s := newTestServer ( t , c )
// Create some ACLs
require . Nil ( t , s . userManager . AddTier ( & user . Tier {
Code : "test" ,
MessageLimit : 5 ,
} ) )
require . Nil ( t , s . userManager . AddUser ( "ben" , "ben" , user . RoleUser ) )
require . Nil ( t , s . userManager . ChangeTier ( "ben" , "test" ) )
require . Nil ( t , s . userManager . AllowAccess ( "ben" , "announcements" , user . PermissionReadWrite ) )
require . Nil ( t , s . userManager . AllowAccess ( user . Everyone , "announcements" , user . PermissionRead ) )
require . Nil ( t , s . userManager . AllowAccess ( user . Everyone , "public_topic" , user . PermissionReadWrite ) )
require . Nil ( t , s . userManager . AddUser ( "phil" , "phil" , user . RoleUser ) )
require . Nil ( t , s . userManager . ChangeTier ( "phil" , "test" ) )
require . Nil ( t , s . userManager . AddReservation ( "phil" , "reserved-for-phil" , user . PermissionReadWrite ) )
// Set rate visitor as user "phil" on topic
// - "reserved-for-phil": Allowed, because I am the owner
// - "public_topic": Allowed, because it has read-write permissions for everyone
// - "announcements": NOT allowed, because it has read-only permissions for everyone
rr := request ( t , s , "GET" , "/reserved-for-phil,public_topic,announcements/json?poll=1" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "phil" , "phil" ) ,
"Rate-Topics" : "reserved-for-phil,public_topic,announcements" ,
} )
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , "phil" , s . topics [ "reserved-for-phil" ] . rateVisitor . user . Name )
require . Equal ( t , "phil" , s . topics [ "public_topic" ] . rateVisitor . user . Name )
require . Nil ( t , s . topics [ "announcements" ] . rateVisitor )
// Set rate visitor as user "ben" on topic
// - "reserved-for-phil": NOT allowed, because I am not the owner
// - "public_topic": Allowed, because it has read-write permissions for everyone
// - "announcements": Allowed, because I have read-write permissions
rr = request ( t , s , "GET" , "/reserved-for-phil,public_topic,announcements/json?poll=1" , "" , map [ string ] string {
"Authorization" : util . BasicAuth ( "ben" , "ben" ) ,
"Rate-Topics" : "reserved-for-phil,public_topic,announcements" ,
} )
require . Equal ( t , 200 , rr . Code )
require . Equal ( t , "phil" , s . topics [ "reserved-for-phil" ] . rateVisitor . user . Name )
require . Equal ( t , "ben" , s . topics [ "public_topic" ] . rateVisitor . user . Name )
require . Equal ( t , "ben" , s . topics [ "announcements" ] . rateVisitor . user . Name )
}
func TestServer_SubscriberRateLimiting_ProtectedTopics_WithDefaultReadWrite ( t * testing . T ) {
c := newTestConfigWithAuthFile ( t )
c . AuthDefault = user . PermissionReadWrite
s := newTestServer ( t , c )
// Create some ACLs
require . Nil ( t , s . userManager . AllowAccess ( user . Everyone , "announcements" , user . PermissionRead ) )
// Set rate visitor as ip:1.2.3.4 on topic
2023-02-25 03:10:41 +01:00
// - "up123456789012": Allowed, because no ACLs and nobody owns the topic
2023-02-24 20:45:30 +01:00
// - "announcements": NOT allowed, because it has read-only permissions for everyone
2023-02-25 03:10:41 +01:00
rr := request ( t , s , "GET" , "/up123456789012,announcements/json?poll=1" , "" , nil , func ( r * http . Request ) {
2023-02-24 20:45:30 +01:00
r . RemoteAddr = "1.2.3.4"
} )
require . Equal ( t , 200 , rr . Code )
2023-02-25 03:10:41 +01:00
require . Equal ( t , "1.2.3.4" , s . topics [ "up123456789012" ] . rateVisitor . ip . String ( ) )
2023-02-24 20:45:30 +01:00
require . Nil ( t , s . topics [ "announcements" ] . rateVisitor )
}
2021-12-19 20:27:26 +01:00
func newTestConfig ( t * testing . T ) * Config {
2021-12-22 14:17:50 +01:00
conf := NewConfig ( )
2022-01-12 17:05:04 +01:00
conf . BaseURL = "http://127.0.0.1:12345"
2021-12-07 20:06:33 +01:00
conf . CacheFile = filepath . Join ( t . TempDir ( ) , "cache.db" )
2023-01-28 15:03:14 +01:00
conf . CacheStartupQueries = "pragma journal_mode = WAL; pragma synchronous = normal; pragma temp_store = memory;"
2022-01-12 17:05:04 +01:00
conf . AttachmentCacheDir = t . TempDir ( )
2021-12-07 20:06:33 +01:00
return conf
2021-12-07 18:23:42 +01:00
}
2023-01-06 16:45:38 +01:00
func newTestConfigWithAuthFile ( t * testing . T ) * Config {
2022-12-29 01:55:11 +01:00
conf := newTestConfig ( t )
conf . AuthFile = filepath . Join ( t . TempDir ( ) , "user.db" )
2023-01-28 15:03:14 +01:00
conf . AuthStartupQueries = "pragma journal_mode = WAL; pragma synchronous = normal; pragma temp_store = memory;"
conf . AuthBcryptCost = bcrypt . MinCost // This speeds up tests a lot
2022-12-29 01:55:11 +01:00
return conf
}
2021-12-19 20:27:26 +01:00
func newTestServer ( t * testing . T , config * Config ) * Server {
2021-12-07 18:23:42 +01:00
server , err := New ( config )
if err != nil {
t . Fatal ( err )
}
return server
}
2021-12-07 20:06:33 +01:00
2023-02-23 03:00:56 +01:00
func request ( t * testing . T , s * Server , method , url , body string , headers map [ string ] string , fn ... func ( r * http . Request ) ) * httptest . ResponseRecorder {
2021-12-07 20:06:33 +01:00
rr := httptest . NewRecorder ( )
2023-02-23 03:33:18 +01:00
r , err := http . NewRequest ( method , url , strings . NewReader ( body ) )
2021-12-07 20:06:33 +01:00
if err != nil {
t . Fatal ( err )
}
2023-02-23 03:33:18 +01:00
r . RemoteAddr = "9.9.9.9" // Used for tests
2021-12-07 21:43:51 +01:00
for k , v := range headers {
2023-02-23 03:33:18 +01:00
r . Header . Set ( k , v )
2021-12-07 21:39:42 +01:00
}
2023-02-23 03:00:56 +01:00
for _ , f := range fn {
2023-02-23 03:33:18 +01:00
f ( r )
2023-02-23 03:00:56 +01:00
}
2023-02-23 03:33:18 +01:00
s . handle ( rr , r )
2021-12-07 20:06:33 +01:00
return rr
}
2021-12-07 21:39:42 +01:00
func subscribe ( t * testing . T , s * Server , url string , rr * httptest . ResponseRecorder ) context . CancelFunc {
ctx , cancel := context . WithCancel ( context . Background ( ) )
req , err := http . NewRequestWithContext ( ctx , "GET" , url , nil )
if err != nil {
t . Fatal ( err )
}
done := make ( chan bool )
go func ( ) {
s . handle ( rr , req )
done <- true
} ( )
cancelAndWaitForDone := func ( ) {
2023-01-30 02:11:58 +01:00
time . Sleep ( 200 * time . Millisecond )
2021-12-07 21:39:42 +01:00
cancel ( )
<- done
}
2023-01-30 02:11:58 +01:00
time . Sleep ( 200 * time . Millisecond )
2021-12-07 21:39:42 +01:00
return cancelAndWaitForDone
}
2021-12-07 20:06:33 +01:00
func toMessages ( t * testing . T , s string ) [ ] * message {
messages := make ( [ ] * message , 0 )
scanner := bufio . NewScanner ( strings . NewReader ( s ) )
for scanner . Scan ( ) {
messages = append ( messages , toMessage ( t , scanner . Text ( ) ) )
}
return messages
}
func toMessage ( t * testing . T , s string ) * message {
var m message
2021-12-11 04:57:01 +01:00
require . Nil ( t , json . NewDecoder ( strings . NewReader ( s ) ) . Decode ( & m ) )
2021-12-07 20:06:33 +01:00
return & m
}
2021-12-15 22:12:40 +01:00
2021-12-25 15:15:05 +01:00
func toHTTPError ( t * testing . T , s string ) * errHTTP {
var e errHTTP
require . Nil ( t , json . NewDecoder ( strings . NewReader ( s ) ) . Decode ( & e ) )
return & e
}
2022-06-16 17:40:56 +02:00
func readAll ( t * testing . T , rc io . ReadCloser ) string {
b , err := io . ReadAll ( rc )
if err != nil {
t . Fatal ( err )
}
return string ( b )
}