mirror of
https://github.com/progval/irctest.git
synced 2025-04-05 23:09:48 +00:00
Compare commits
56 Commits
redaction
...
master-ori
Author | SHA1 | Date | |
---|---|---|---|
cab27be1f5 | |||
fc6bd4968d | |||
c2adc33109 | |||
4519927265 | |||
42f3a1f2fe | |||
f3ff2a424b | |||
0c03a8e1c7 | |||
7a05081960 | |||
ee2e77b1e6 | |||
9ff2239943 | |||
5f75f231a4 | |||
b3a4a18885 | |||
24df4e4496 | |||
2b8aeacd4a | |||
fc15ff09c0 | |||
7bf7df8ad1 | |||
6abc5b4f98 | |||
cefbabf5c3 | |||
9b6f65b622 | |||
034fe5c51c | |||
911c0ded04 | |||
9b99c6ce20 | |||
e6b1ca5521 | |||
ac2671acb0 | |||
8a81224ba8 | |||
442c57e6c6 | |||
f8faec77f1 | |||
71d9315813 | |||
857e8d195e | |||
19a0623e91 | |||
de4c51e744 | |||
1198504f74 | |||
5b319a46ee | |||
5950d97926 | |||
b35a7f7a60 | |||
f47584589b | |||
0804b78572 | |||
aecfc26a63 | |||
f9f13961eb | |||
2bc3cafd25 | |||
86d26d6121 | |||
3d0b493a11 | |||
711de43b22 | |||
8b52ceeee3 | |||
6d9c06096b | |||
9575987555 | |||
15a92ccf0b | |||
0c12e0ed20 | |||
f71badbbc1 | |||
41f0418df7 | |||
2a55c85c5a | |||
0c7358c0a5 | |||
6326af34cc | |||
ba1fe57248 | |||
6baee70852 | |||
2bdcba3da5 |
120
.github/deploy_to_netlify.py
vendored
120
.github/deploy_to_netlify.py
vendored
@ -1,120 +0,0 @@
|
|||||||
#!/usr/bin/env python3
|
|
||||||
|
|
||||||
import json
|
|
||||||
import os
|
|
||||||
import pprint
|
|
||||||
import re
|
|
||||||
import subprocess
|
|
||||||
import sys
|
|
||||||
import urllib.request
|
|
||||||
|
|
||||||
event_name = os.environ["GITHUB_EVENT_NAME"]
|
|
||||||
|
|
||||||
is_pull_request = is_push = False
|
|
||||||
if event_name.startswith("pull_request"):
|
|
||||||
is_pull_request = True
|
|
||||||
elif event_name.startswith("push"):
|
|
||||||
is_push = True
|
|
||||||
elif event_name.startswith("schedule"):
|
|
||||||
# Don't publish; scheduled workflows run against the latest commit of every
|
|
||||||
# implementation, so they are likely to have failed tests for the wrong reasons
|
|
||||||
sys.exit(0)
|
|
||||||
else:
|
|
||||||
print("Unexpected event name:", event_name)
|
|
||||||
|
|
||||||
with open(os.environ["GITHUB_EVENT_PATH"]) as fd:
|
|
||||||
github_event = json.load(fd)
|
|
||||||
|
|
||||||
pprint.pprint(github_event)
|
|
||||||
|
|
||||||
context_suffix = ""
|
|
||||||
|
|
||||||
command = ["netlify", "deploy", "--dir=dashboard/"]
|
|
||||||
if is_pull_request:
|
|
||||||
pr_number = github_event["number"]
|
|
||||||
sha = github_event.get("after") or github_event["pull_request"]["head"]["sha"]
|
|
||||||
# Aliases can't exceed 37 chars
|
|
||||||
command.extend(["--alias", f"pr-{pr_number}-{sha[0:10]}"])
|
|
||||||
context_suffix = " (pull_request)"
|
|
||||||
elif is_push:
|
|
||||||
ref = github_event["ref"]
|
|
||||||
m = re.match("refs/heads/(.*)", ref)
|
|
||||||
if m:
|
|
||||||
branch = m.group(1)
|
|
||||||
sha = github_event["head_commit"]["id"]
|
|
||||||
|
|
||||||
if branch in ("main", "master"):
|
|
||||||
command.extend(["--prod"])
|
|
||||||
else:
|
|
||||||
command.extend(["--alias", f"br-{branch[0:23]}-{sha[0:10]}"])
|
|
||||||
context_suffix = " (push)"
|
|
||||||
else:
|
|
||||||
# TODO
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
print("Running", command)
|
|
||||||
proc = subprocess.run(command, capture_output=True)
|
|
||||||
|
|
||||||
output = proc.stdout.decode()
|
|
||||||
assert proc.returncode == 0, (output, proc.stderr.decode())
|
|
||||||
print(output)
|
|
||||||
|
|
||||||
m = re.search("https://[^ ]*--[^ ]*netlify.app", output)
|
|
||||||
assert m
|
|
||||||
netlify_site_url = m.group(0)
|
|
||||||
target_url = f"{netlify_site_url}/index.xhtml"
|
|
||||||
|
|
||||||
print("Published to", netlify_site_url)
|
|
||||||
|
|
||||||
|
|
||||||
def send_status() -> None:
|
|
||||||
statuses_url = github_event["repository"]["statuses_url"].format(sha=sha)
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"state": "success",
|
|
||||||
"context": f"Dashboard{context_suffix}",
|
|
||||||
"description": "Table of all test results",
|
|
||||||
"target_url": target_url,
|
|
||||||
}
|
|
||||||
request = urllib.request.Request(
|
|
||||||
statuses_url,
|
|
||||||
data=json.dumps(payload).encode(),
|
|
||||||
headers={
|
|
||||||
"Authorization": f'token {os.environ["GITHUB_TOKEN"]}',
|
|
||||||
"Content-Type": "text/json",
|
|
||||||
"Accept": "application/vnd.github+json",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
response = urllib.request.urlopen(request)
|
|
||||||
|
|
||||||
assert response.status == 201, response.read()
|
|
||||||
|
|
||||||
|
|
||||||
send_status()
|
|
||||||
|
|
||||||
|
|
||||||
def send_pr_comment() -> None:
|
|
||||||
comments_url = github_event["pull_request"]["_links"]["comments"]["href"]
|
|
||||||
|
|
||||||
payload = {
|
|
||||||
"body": f"[Test results]({target_url})",
|
|
||||||
}
|
|
||||||
request = urllib.request.Request(
|
|
||||||
comments_url,
|
|
||||||
data=json.dumps(payload).encode(),
|
|
||||||
headers={
|
|
||||||
"Authorization": f'token {os.environ["GITHUB_TOKEN"]}',
|
|
||||||
"Content-Type": "text/json",
|
|
||||||
"Accept": "application/vnd.github+json",
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
response = urllib.request.urlopen(request)
|
|
||||||
|
|
||||||
assert response.status == 201, response.read()
|
|
||||||
|
|
||||||
|
|
||||||
if is_pull_request:
|
|
||||||
send_pr_comment()
|
|
41
.github/workflows/lint.yml
vendored
41
.github/workflows/lint.yml
vendored
@ -1,41 +0,0 @@
|
|||||||
name: Lint
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build:
|
|
||||||
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
steps:
|
|
||||||
|
|
||||||
- uses: actions/checkout@v2
|
|
||||||
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v2
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
|
|
||||||
- name: Cache dependencies
|
|
||||||
uses: actions/cache@v2
|
|
||||||
with:
|
|
||||||
path: |
|
|
||||||
~/.cache
|
|
||||||
key: ${{ runner.os }}-lint
|
|
||||||
|
|
||||||
- name: Install dependencies
|
|
||||||
run: |
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
python -m pip install pre-commit pytest
|
|
||||||
pip install -r requirements.txt
|
|
||||||
|
|
||||||
- name: Lint
|
|
||||||
run: |
|
|
||||||
pre-commit run -a
|
|
||||||
|
|
||||||
- name: Check generated workflows are in sync
|
|
||||||
run: |
|
|
||||||
python make_workflows.py
|
|
||||||
git diff --exit-code
|
|
1189
.github/workflows/test-devel.yml
vendored
1189
.github/workflows/test-devel.yml
vendored
File diff suppressed because it is too large
Load Diff
222
.github/workflows/test-devel_release.yml
vendored
222
.github/workflows/test-devel_release.yml
vendored
@ -1,222 +0,0 @@
|
|||||||
# This file was auto-generated by make_workflows.py.
|
|
||||||
# Do not edit it manually, modifications will be lost.
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build-anope:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- name: Create directories
|
|
||||||
run: cd ~/; mkdir -p .local/ go/
|
|
||||||
- name: Cache dependencies
|
|
||||||
uses: actions/cache@v3
|
|
||||||
with:
|
|
||||||
key: 3-${{ runner.os }}-anope-devel_release
|
|
||||||
path: '~/.cache
|
|
||||||
|
|
||||||
${ github.workspace }/anope
|
|
||||||
|
|
||||||
'
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v4
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
- name: Checkout Anope
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
with:
|
|
||||||
path: anope
|
|
||||||
ref: 2.0.9
|
|
||||||
repository: anope/anope
|
|
||||||
- name: Build Anope
|
|
||||||
run: |
|
|
||||||
cd $GITHUB_WORKSPACE/anope/
|
|
||||||
cp $GITHUB_WORKSPACE/data/anope/* .
|
|
||||||
CFLAGS=-O0 ./Config -quick
|
|
||||||
make -C build -j 4
|
|
||||||
make -C build install
|
|
||||||
- name: Make artefact tarball
|
|
||||||
run: cd ~; tar -czf artefacts-anope.tar.gz .local/ go/
|
|
||||||
- name: Upload build artefacts
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-anope
|
|
||||||
path: ~/artefacts-*.tar.gz
|
|
||||||
retention-days: 1
|
|
||||||
build-inspircd:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- name: Create directories
|
|
||||||
run: cd ~/; mkdir -p .local/ go/
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v4
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
- name: Checkout InspIRCd
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
with:
|
|
||||||
path: inspircd
|
|
||||||
ref: insp3
|
|
||||||
repository: inspircd/inspircd
|
|
||||||
- name: Build InspIRCd
|
|
||||||
run: |
|
|
||||||
cd $GITHUB_WORKSPACE/inspircd/
|
|
||||||
|
|
||||||
# Insp3 <= 3.16.0 and Insp4 <= 4.0.0a21 don't support -DINSPIRCD_UNLIMITED_MAINLOOP
|
|
||||||
patch src/inspircd.cpp < $GITHUB_WORKSPACE/patches/inspircd_mainloop.patch || true
|
|
||||||
|
|
||||||
./configure --prefix=$HOME/.local/inspircd --development
|
|
||||||
|
|
||||||
CXXFLAGS=-DINSPIRCD_UNLIMITED_MAINLOOP make -j 4
|
|
||||||
make install
|
|
||||||
- name: Make artefact tarball
|
|
||||||
run: cd ~; tar -czf artefacts-inspircd.tar.gz .local/ go/
|
|
||||||
- name: Upload build artefacts
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-inspircd
|
|
||||||
path: ~/artefacts-*.tar.gz
|
|
||||||
retention-days: 1
|
|
||||||
publish-test-results:
|
|
||||||
if: success() || failure()
|
|
||||||
name: Publish Dashboard
|
|
||||||
needs:
|
|
||||||
- test-inspircd
|
|
||||||
- test-inspircd-anope
|
|
||||||
- test-inspircd-atheme
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Download Artifacts
|
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
|
||||||
path: artifacts
|
|
||||||
- name: Install dashboard dependencies
|
|
||||||
run: |-
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install defusedxml docutils -r requirements.txt
|
|
||||||
- name: Generate dashboard
|
|
||||||
run: |-
|
|
||||||
shopt -s globstar
|
|
||||||
python3 -m irctest.dashboard.format dashboard/ artifacts/**/*.xml
|
|
||||||
echo '/ /index.xhtml' > dashboard/_redirects
|
|
||||||
- name: Install netlify-cli
|
|
||||||
run: npm i -g netlify-cli
|
|
||||||
- env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
NETLIFY_AUTH_TOKEN: ${{ secrets.NETLIFY_AUTH_TOKEN }}
|
|
||||||
NETLIFY_SITE_ID: ${{ secrets.NETLIFY_SITE_ID }}
|
|
||||||
name: Deploy to Netlify
|
|
||||||
run: ./.github/deploy_to_netlify.py
|
|
||||||
test-inspircd:
|
|
||||||
needs:
|
|
||||||
- build-inspircd
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v4
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
- name: Download build artefacts
|
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-inspircd
|
|
||||||
path: '~'
|
|
||||||
- name: Unpack artefacts
|
|
||||||
run: cd ~; find -name 'artefacts-*.tar.gz' -exec tar -xzf '{}' \;
|
|
||||||
- name: Install system dependencies
|
|
||||||
run: sudo apt-get install atheme-services faketime
|
|
||||||
- name: Install irctest dependencies
|
|
||||||
run: |-
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install pytest pytest-xdist -r requirements.txt
|
|
||||||
- name: Test with pytest
|
|
||||||
run: PYTEST_ARGS='--junit-xml pytest.xml' PATH=$HOME/.local/bin:$PATH PATH=~/.local/inspircd/sbin:~/.local/inspircd/bin:$PATH
|
|
||||||
make inspircd
|
|
||||||
timeout-minutes: 30
|
|
||||||
- if: always()
|
|
||||||
name: Publish results
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: pytest-results_inspircd_devel_release
|
|
||||||
path: pytest.xml
|
|
||||||
test-inspircd-anope:
|
|
||||||
needs:
|
|
||||||
- build-inspircd
|
|
||||||
- build-anope
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v4
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
- name: Download build artefacts
|
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-inspircd
|
|
||||||
path: '~'
|
|
||||||
- name: Download build artefacts
|
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-anope
|
|
||||||
path: '~'
|
|
||||||
- name: Unpack artefacts
|
|
||||||
run: cd ~; find -name 'artefacts-*.tar.gz' -exec tar -xzf '{}' \;
|
|
||||||
- name: Install system dependencies
|
|
||||||
run: sudo apt-get install atheme-services faketime
|
|
||||||
- name: Install irctest dependencies
|
|
||||||
run: |-
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install pytest pytest-xdist -r requirements.txt
|
|
||||||
- name: Test with pytest
|
|
||||||
run: PYTEST_ARGS='--junit-xml pytest.xml' PATH=$HOME/.local/bin:$PATH PATH=~/.local/inspircd/sbin:~/.local/inspircd/bin:$PATH make
|
|
||||||
inspircd-anope
|
|
||||||
timeout-minutes: 30
|
|
||||||
- if: always()
|
|
||||||
name: Publish results
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: pytest-results_inspircd-anope_devel_release
|
|
||||||
path: pytest.xml
|
|
||||||
test-inspircd-atheme:
|
|
||||||
needs:
|
|
||||||
- build-inspircd
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
- name: Set up Python 3.7
|
|
||||||
uses: actions/setup-python@v4
|
|
||||||
with:
|
|
||||||
python-version: 3.7
|
|
||||||
- name: Download build artefacts
|
|
||||||
uses: actions/download-artifact@v3
|
|
||||||
with:
|
|
||||||
name: installed-inspircd
|
|
||||||
path: '~'
|
|
||||||
- name: Unpack artefacts
|
|
||||||
run: cd ~; find -name 'artefacts-*.tar.gz' -exec tar -xzf '{}' \;
|
|
||||||
- name: Install system dependencies
|
|
||||||
run: sudo apt-get install atheme-services faketime
|
|
||||||
- name: Install irctest dependencies
|
|
||||||
run: |-
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install pytest pytest-xdist -r requirements.txt
|
|
||||||
- name: Test with pytest
|
|
||||||
run: PYTEST_ARGS='--junit-xml pytest.xml' PATH=$HOME/.local/bin:$PATH PATH=~/.local/inspircd/sbin:~/.local/inspircd/bin:$PATH
|
|
||||||
make inspircd-atheme
|
|
||||||
timeout-minutes: 30
|
|
||||||
- if: always()
|
|
||||||
name: Publish results
|
|
||||||
uses: actions/upload-artifact@v3
|
|
||||||
with:
|
|
||||||
name: pytest-results_inspircd-atheme_devel_release
|
|
||||||
path: pytest.xml
|
|
||||||
name: irctest with devel_release versions
|
|
||||||
'on':
|
|
||||||
schedule:
|
|
||||||
- cron: 51 8 * * 6
|
|
||||||
- cron: 51 8 * * 0
|
|
||||||
- cron: 51 17 * * *
|
|
||||||
workflow_dispatch: null
|
|
1344
.github/workflows/test-stable.yml
vendored
1344
.github/workflows/test-stable.yml
vendored
File diff suppressed because it is too large
Load Diff
@ -1,24 +0,0 @@
|
|||||||
exclude: ^irctest/scram
|
|
||||||
|
|
||||||
repos:
|
|
||||||
- repo: https://github.com/psf/black
|
|
||||||
rev: 23.1.0
|
|
||||||
hooks:
|
|
||||||
- id: black
|
|
||||||
language_version: python3
|
|
||||||
|
|
||||||
- repo: https://github.com/PyCQA/isort
|
|
||||||
rev: 5.11.5
|
|
||||||
hooks:
|
|
||||||
- id: isort
|
|
||||||
|
|
||||||
- repo: https://github.com/PyCQA/flake8
|
|
||||||
rev: 5.0.4
|
|
||||||
hooks:
|
|
||||||
- id: flake8
|
|
||||||
|
|
||||||
- repo: https://github.com/pre-commit/mirrors-mypy
|
|
||||||
rev: v1.0.1
|
|
||||||
hooks:
|
|
||||||
- id: mypy
|
|
||||||
additional_dependencies: [types-PyYAML, types-docutils]
|
|
@ -1,92 +0,0 @@
|
|||||||
# Contributing
|
|
||||||
|
|
||||||
## Code style
|
|
||||||
|
|
||||||
### Syntax
|
|
||||||
|
|
||||||
Any color you like as long as it's [Black](https://github.com/psf/black).
|
|
||||||
In short:
|
|
||||||
|
|
||||||
* 88 columns
|
|
||||||
* double quotes
|
|
||||||
* avoid backslashes at line breaks (use parentheses)
|
|
||||||
* closing brackets/parentheses/... go on the same indent level as the line
|
|
||||||
that opened them
|
|
||||||
|
|
||||||
We also use `isort` to order imports (in short: just
|
|
||||||
[follow PEP 8](https://www.python.org/dev/peps/pep-0008/#imports))
|
|
||||||
|
|
||||||
You can use [pre-commit](https://pre-commit.com/) to automatically run them
|
|
||||||
when you create a git commit.
|
|
||||||
Alternatively, run `pre-commit run -a`
|
|
||||||
|
|
||||||
|
|
||||||
### Naming
|
|
||||||
|
|
||||||
[Follow PEP 8](https://www.python.org/dev/peps/pep-0008/#naming-conventions),
|
|
||||||
with these exceptions:
|
|
||||||
|
|
||||||
* assertion methods (eg. `assertMessageMatch` are mixedCase to be consistent
|
|
||||||
with the unittest module)
|
|
||||||
* other methods defined in `cases.py` are also mixedCase for consistency with
|
|
||||||
the former, for now
|
|
||||||
* test names are also mixedCase for the same reason
|
|
||||||
|
|
||||||
Additionally:
|
|
||||||
|
|
||||||
* test module names should be snake\_case and match the name of the
|
|
||||||
specification they are testing (if IRCv3), or the feature they are
|
|
||||||
testing (if RFC or just common usage)
|
|
||||||
|
|
||||||
|
|
||||||
## What to test
|
|
||||||
|
|
||||||
**All tests should have a docstring** pointing to a reference document
|
|
||||||
(eg. RFC, IRCv3 specification, or modern.ircdocs.horse).
|
|
||||||
If there is no reference, documentation can do.
|
|
||||||
|
|
||||||
If the behavior being tested is not documented, then **please document it
|
|
||||||
outside** this repository (eg. at modern.ircdocs.horse),
|
|
||||||
and/or get it specified through IRCv3.
|
|
||||||
|
|
||||||
"That's just how everyone does it" is not good justification.
|
|
||||||
Linking to an external document saying "Here is how everyone does it" is.
|
|
||||||
|
|
||||||
If reference documents / documentations are long or not trivial,
|
|
||||||
**try to quote the specific part being tested**.
|
|
||||||
See `irctest/server_tests/kick.py` for example.
|
|
||||||
|
|
||||||
Tests for **pending/draft specifications are welcome**.
|
|
||||||
|
|
||||||
Note that irctest also welcomes implementation-specific tests for
|
|
||||||
functional testing; for now only Ergo.
|
|
||||||
This does not relax the requirement on documentating tests.
|
|
||||||
|
|
||||||
|
|
||||||
## Writing tests
|
|
||||||
|
|
||||||
**Use unittest-style assertions** (`self.assertEqual(x, y)` instead of
|
|
||||||
pytest-style (`assert x == y`). This allows consistency with the assertion
|
|
||||||
methods we define, such as `assertMessageMatch`.
|
|
||||||
|
|
||||||
Always **add an error message in assertions**.
|
|
||||||
`irctest` should show readable errors to people unfamiliar with the
|
|
||||||
codebase.
|
|
||||||
Ideally, explain what happened and what should have happened instead.
|
|
||||||
|
|
||||||
All tests should be tagged with
|
|
||||||
`@cases.mark_specifications`.
|
|
||||||
|
|
||||||
|
|
||||||
## Continuous integration
|
|
||||||
|
|
||||||
We run automated tests on all commits and pull requests, to check that tests
|
|
||||||
accept existing implementations.
|
|
||||||
Scripts to run the tests are defined in `workflows.yml`, and the
|
|
||||||
`make_workflows.py` script reads this configuration to generate files
|
|
||||||
in `.github/workflows/` that are used by the CI.
|
|
||||||
|
|
||||||
If an implementation cannot pass a test, that test should be excluded via
|
|
||||||
a definition in the Makefile.
|
|
||||||
If it is a bug, please open a bug report to the affected software if possible,
|
|
||||||
and link to the bug report in a comment.
|
|
286
Makefile
286
Makefile
@ -1,283 +1,5 @@
|
|||||||
PYTEST ?= python3 -m pytest
|
.PHONY: oragono
|
||||||
|
|
||||||
# Extra arguments to pass to pytest (eg. `-n 4` to run in parallel if
|
oragono:
|
||||||
# pytest-xdist is installed)
|
pyflakes3 ./irctest/cases.py ./irctest/client_mock.py ./irctest/controllers/oragono.py irctest/server_tests/*.py
|
||||||
PYTEST_ARGS ?=
|
./test.py irctest.controllers.oragono
|
||||||
|
|
||||||
# Will be appended at the end of the -k argument to pytest
|
|
||||||
EXTRA_SELECTORS ?=
|
|
||||||
|
|
||||||
BAHAMUT_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
and not IRCv3 \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
CHARYBDIS_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
ERGO_SELECTORS := \
|
|
||||||
not deprecated \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
HYBRID_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
INSPIRCD_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# HelpTestCase fails because it returns NOTICEs instead of numerics
|
|
||||||
IRCU2_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# same justification as ircu2
|
|
||||||
# lusers "unregistered" tests fail because
|
|
||||||
NEFARIOUS_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# same justification as ircu2
|
|
||||||
SNIRCD_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
IRC2_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
MAMMON_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
NGIRCD_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
PLEXUS4_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# Limnoria can actually pass all the test so there is none to exclude.
|
|
||||||
# `(foo or not foo)` serves as a `true` value so it doesn't break when
|
|
||||||
# $(EXTRA_SELECTORS) is non-empty
|
|
||||||
LIMNORIA_SELECTORS := \
|
|
||||||
(foo or not foo) \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
SOLANUM_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# Same as Limnoria
|
|
||||||
SOPEL_SELECTORS := \
|
|
||||||
(foo or not foo) \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
# Tests marked with arbitrary_client_tags can't pass because Unreal whitelists which tags it relays
|
|
||||||
# Tests marked with react_tag can't pass because Unreal blocks +draft/react https://github.com/unrealircd/unrealircd/pull/149
|
|
||||||
# Tests marked with private_chathistory can't pass because Unreal does not implement CHATHISTORY for DMs
|
|
||||||
|
|
||||||
UNREALIRCD_SELECTORS := \
|
|
||||||
not Ergo \
|
|
||||||
and not deprecated \
|
|
||||||
and not strict \
|
|
||||||
and not arbitrary_client_tags \
|
|
||||||
and not react_tag \
|
|
||||||
and not private_chathistory \
|
|
||||||
$(EXTRA_SELECTORS)
|
|
||||||
|
|
||||||
.PHONY: all flakes bahamut charybdis ergo inspircd ircu2 snircd irc2 mammon nefarious limnoria sopel solanum unrealircd
|
|
||||||
|
|
||||||
all: flakes bahamut charybdis ergo inspircd ircu2 snircd irc2 mammon nefarious limnoria sopel solanum unrealircd
|
|
||||||
|
|
||||||
flakes:
|
|
||||||
find irctest/ -name "*.py" -not -path "irctest/scram/*" -print0 | xargs -0 pyflakes3
|
|
||||||
|
|
||||||
bahamut:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.bahamut \
|
|
||||||
-m 'not services' \
|
|
||||||
-n 4 \
|
|
||||||
-vv -s \
|
|
||||||
-k '$(BAHAMUT_SELECTORS)'
|
|
||||||
|
|
||||||
bahamut-atheme:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.bahamut \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(BAHAMUT_SELECTORS)'
|
|
||||||
|
|
||||||
bahamut-anope:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.bahamut \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(BAHAMUT_SELECTORS)'
|
|
||||||
|
|
||||||
charybdis:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.charybdis \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-k '$(CHARYBDIS_SELECTORS)'
|
|
||||||
|
|
||||||
ergo:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.ergo \
|
|
||||||
-k "$(ERGO_SELECTORS)"
|
|
||||||
|
|
||||||
hybrid:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.hybrid \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-k "$(HYBRID_SELECTORS)"
|
|
||||||
|
|
||||||
inspircd:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.inspircd \
|
|
||||||
-m 'not services' \
|
|
||||||
-k '$(INSPIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
inspircd-atheme:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.inspircd \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(INSPIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
inspircd-anope:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.inspircd \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(INSPIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
ircu2:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.ircu2 \
|
|
||||||
-m 'not services and not IRCv3' \
|
|
||||||
-n 4 \
|
|
||||||
-k '$(IRCU2_SELECTORS)'
|
|
||||||
|
|
||||||
nefarious:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.nefarious \
|
|
||||||
-m 'not services' \
|
|
||||||
-n 4 \
|
|
||||||
-k '$(NEFARIOUS_SELECTORS)'
|
|
||||||
|
|
||||||
snircd:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.snircd \
|
|
||||||
-m 'not services and not IRCv3' \
|
|
||||||
-n 4 \
|
|
||||||
-k '$(SNIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
irc2:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.irc2 \
|
|
||||||
-m 'not services and not IRCv3' \
|
|
||||||
-n 4 \
|
|
||||||
-k '$(IRC2_SELECTORS)'
|
|
||||||
|
|
||||||
limnoria:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.limnoria \
|
|
||||||
-k '$(LIMNORIA_SELECTORS)'
|
|
||||||
|
|
||||||
mammon:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.mammon \
|
|
||||||
-k '$(MAMMON_SELECTORS)'
|
|
||||||
|
|
||||||
plexus4:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.plexus4 \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-k "$(PLEXUS4_SELECTORS)"
|
|
||||||
|
|
||||||
ngircd:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.ngircd \
|
|
||||||
-m 'not services' \
|
|
||||||
-n 4 \
|
|
||||||
-k "$(NGIRCD_SELECTORS)"
|
|
||||||
|
|
||||||
ngircd-anope:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.ngircd \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k "$(NGIRCD_SELECTORS)"
|
|
||||||
|
|
||||||
ngircd-atheme:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller irctest.controllers.ngircd \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k "$(NGIRCD_SELECTORS)"
|
|
||||||
|
|
||||||
solanum:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.solanum \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-k '$(SOLANUM_SELECTORS)'
|
|
||||||
|
|
||||||
sopel:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.sopel \
|
|
||||||
-k '$(SOPEL_SELECTORS)'
|
|
||||||
|
|
||||||
unrealircd:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.unrealircd \
|
|
||||||
-m 'not services' \
|
|
||||||
-k '$(UNREALIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
unrealircd-5: unrealircd
|
|
||||||
|
|
||||||
unrealircd-atheme:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.unrealircd \
|
|
||||||
--services-controller=irctest.controllers.atheme_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(UNREALIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
unrealircd-anope:
|
|
||||||
$(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.unrealircd \
|
|
||||||
--services-controller=irctest.controllers.anope_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(UNREALIRCD_SELECTORS)'
|
|
||||||
|
|
||||||
unrealircd-dlk:
|
|
||||||
pifpaf run mysql -- $(PYTEST) $(PYTEST_ARGS) \
|
|
||||||
--controller=irctest.controllers.unrealircd \
|
|
||||||
--services-controller=irctest.controllers.dlk_services \
|
|
||||||
-m 'services' \
|
|
||||||
-k '$(UNREALIRCD_SELECTORS)'
|
|
||||||
|
185
README.md
185
README.md
@ -1,7 +1,10 @@
|
|||||||
# irctest
|
# irctest
|
||||||
|
|
||||||
This project aims at testing interoperability of software using the
|
This project aims at testing interoperability of software using the
|
||||||
IRC protocol, by running them against common test suites.
|
IRC protocol, by running them against test suites and making different
|
||||||
|
software communicate with each other.
|
||||||
|
|
||||||
|
It is very young and does not contain a lot of test cases yet.
|
||||||
|
|
||||||
## The big picture
|
## The big picture
|
||||||
|
|
||||||
@ -11,196 +14,95 @@ This project contains:
|
|||||||
* small wrappers around existing software to run tests on them
|
* small wrappers around existing software to run tests on them
|
||||||
|
|
||||||
Wrappers run software in temporary directories, so running `irctest` should
|
Wrappers run software in temporary directories, so running `irctest` should
|
||||||
have no side effect.
|
have no side effect, with [the exception of Sopel](https://github.com/sopel-irc/sopel/issues/946).
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
Install irctest and dependencies:
|
Install irctest and dependencies:
|
||||||
|
|
||||||
```
|
```
|
||||||
sudo apt install faketime # Optional, but greatly speeds up irctest/server_tests/list.py
|
|
||||||
cd ~
|
|
||||||
git clone https://github.com/ProgVal/irctest.git
|
git clone https://github.com/ProgVal/irctest.git
|
||||||
cd irctest
|
cd irctest
|
||||||
pip3 install --user -r requirements.txt
|
pip3 install --user -r requirements.txt
|
||||||
|
python3 setup.py install --user
|
||||||
```
|
```
|
||||||
|
|
||||||
Add `~/.local/bin/` (and/or `~/go/bin/` for Ergo)
|
Add `~/.local/bin/` to your `PATH` if it is not.
|
||||||
to your `PATH` if it is not.
|
|
||||||
|
|
||||||
```
|
```
|
||||||
export PATH=$HOME/.local/bin/:$HOME/go/bin/:$PATH
|
export PATH=$HOME/.local/bin/:$PATH
|
||||||
```
|
```
|
||||||
|
|
||||||
## Using pytest
|
## Run tests
|
||||||
|
|
||||||
irctest is invoked using the pytest test runner / CLI.
|
To run (client) tests on Limnoria:
|
||||||
|
|
||||||
You can usually invoke it with `python3 -m pytest` command; which can often
|
|
||||||
be called by the `pytest` or `pytest-3` commands (if not, alias them if you
|
|
||||||
are planning to use them often).
|
|
||||||
|
|
||||||
The rest of this README assumes `pytest` works.
|
|
||||||
|
|
||||||
## Test selection
|
|
||||||
|
|
||||||
A major feature of pytest that irctest heavily relies on is test selection.
|
|
||||||
Using the `-k` option, you can select and deselect tests based on their names
|
|
||||||
and/or markers (listed in `pytest.ini`).
|
|
||||||
For example, you can run `LUSERS`-related tests with `-k lusers`.
|
|
||||||
Or only tests based on RFC1459 with `-k rfc1459`.
|
|
||||||
|
|
||||||
By default, all tests run; even niche ones. So you probably always want to
|
|
||||||
use these options: `-k 'not Ergo and not deprecated and not strict`.
|
|
||||||
This excludes:
|
|
||||||
|
|
||||||
* `Ergo`-specific tests (included as Ergo uses irctest as its official
|
|
||||||
integration test suite)
|
|
||||||
* tests for deprecated specifications, such as the IRCv3 METADATA
|
|
||||||
specification
|
|
||||||
* tests that check for a strict interpretation of a specification, when
|
|
||||||
the specification is ambiguous.
|
|
||||||
|
|
||||||
## Running tests
|
|
||||||
|
|
||||||
### Servers
|
|
||||||
|
|
||||||
#### Ergo:
|
|
||||||
|
|
||||||
```
|
```
|
||||||
cd /tmp/
|
pip3 install --user limnoria
|
||||||
git clone https://github.com/ergochat/ergo.git
|
python3 -m irctest irctest.controllers.limnoria
|
||||||
cd ergo/
|
|
||||||
make install
|
|
||||||
cd ~/irctest
|
|
||||||
pytest --controller irctest.controllers.ergo -k 'not deprecated'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Solanum:
|
To run (client) tests on Sopel:
|
||||||
|
|
||||||
```
|
```
|
||||||
cd /tmp/
|
pip3 install --user sopel
|
||||||
git clone https://github.com/solanum-ircd/solanum.git
|
mkdir ~/.sopel/
|
||||||
cd solanum
|
python3 -m irctest irctest.controllers.sopel
|
||||||
./autogen.sh
|
|
||||||
./configure --prefix=$HOME/.local/
|
|
||||||
make -j 4
|
|
||||||
make install
|
|
||||||
pytest --controller irctest.controllers.solanum -k 'not Ergo and not deprecated and not strict'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Charybdis:
|
To run (server) tests on InspIRCd:
|
||||||
|
|
||||||
```
|
|
||||||
cd /tmp/
|
|
||||||
git clone https://github.com/atheme/charybdis.git
|
|
||||||
cd charybdis
|
|
||||||
./autogen.sh
|
|
||||||
./configure --prefix=$HOME/.local/
|
|
||||||
make -j 4
|
|
||||||
make install
|
|
||||||
cd ~/irctest
|
|
||||||
pytest --controller irctest.controllers.charybdis -k 'not Ergo and not deprecated and not strict'
|
|
||||||
```
|
|
||||||
|
|
||||||
#### InspIRCd:
|
|
||||||
|
|
||||||
```
|
```
|
||||||
cd /tmp/
|
cd /tmp/
|
||||||
git clone https://github.com/inspircd/inspircd.git
|
git clone https://github.com/inspircd/inspircd.git
|
||||||
cd inspircd
|
cd inspircd
|
||||||
|
|
||||||
# Optional, makes tests run considerably faster. Pick one depending on the InspIRCd version:
|
|
||||||
# on Insp3 <= 3.16.0 and Insp4 <= 4.0.0a21:
|
|
||||||
patch src/inspircd.cpp < ~/irctest/patches/inspircd_mainloop.patch
|
|
||||||
# on Insp3 >= 3.17.0 and Insp4 >= 4.0.0a22:
|
|
||||||
export CXXFLAGS=-DINSPIRCD_UNLIMITED_MAINLOOP
|
|
||||||
|
|
||||||
./configure --prefix=$HOME/.local/ --development
|
./configure --prefix=$HOME/.local/ --development
|
||||||
make -j 4
|
make -j 4
|
||||||
make install
|
make install
|
||||||
cd ~/irctest
|
python3 -m irctest irctest.controllers.inspircd
|
||||||
pytest --controller irctest.controllers.inspircd -k 'not Ergo and not deprecated and not strict'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Mammon:
|
To run (server) tests on Mammon:
|
||||||
|
|
||||||
```
|
```
|
||||||
pip3 install --user git+https://github.com/mammon-ircd/mammon.git
|
pip3 install --user git+https://github.com/mammon-ircd/mammon.git
|
||||||
cd ~/irctest
|
python3 -m irctest irctest.controllers.mammon
|
||||||
pytest --controller irctest.controllers.mammon -k 'not Ergo and not deprecated and not strict'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
#### UnrealIRCd:
|
To run (server) tests on Charybdis::
|
||||||
|
|
||||||
```
|
```
|
||||||
cd /tmp/
|
cd /tmp/
|
||||||
git clone https://github.com/unrealircd/unrealircd.git
|
git clone https://github.com/atheme/charybdis.git
|
||||||
cd unrealircd
|
cd charybdis
|
||||||
./Config # This will ask a few questions, answer them.
|
./configure --prefix=$HOME/.local/
|
||||||
make -j 4
|
make -j 4
|
||||||
make install
|
make install
|
||||||
cd ~/irctest
|
python3 -m irctest irctest.controllers.charybdis
|
||||||
pytest --controller irctest.controllers.unreal -k 'not Ergo and not deprecated and not strict'
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Full help
|
||||||
### Servers with services
|
|
||||||
|
|
||||||
Besides Ergo (that has built-in services), most server controllers can optionally run
|
|
||||||
service packages.
|
|
||||||
|
|
||||||
#### Atheme:
|
|
||||||
|
|
||||||
You can install it with
|
|
||||||
|
|
||||||
```
|
```
|
||||||
sudo apt install atheme-services
|
usage: python3 -m irctest [-h] [--show-io] [-v] [-s SPECIFICATION] [-l] module
|
||||||
```
|
|
||||||
|
|
||||||
and add this to the `pytest` call:
|
positional arguments:
|
||||||
|
module The module used to run the tested program.
|
||||||
|
|
||||||
```
|
optional arguments:
|
||||||
--services-controller irctest.controllers.atheme_services
|
-h, --help show this help message and exit
|
||||||
```
|
--show-io Show input/outputs with the tested program.
|
||||||
|
-v, --verbose Verbosity. Give this option multiple times to make it
|
||||||
#### Anope:
|
even more verbose.
|
||||||
|
-s SPECIFICATION, --specification SPECIFICATION
|
||||||
Build with:
|
The set of specifications to test the program with.
|
||||||
|
Valid values: RFC1459, RFC2812, IRCv3.1, IRCv3.2. Use
|
||||||
```
|
this option multiple times to test with multiple
|
||||||
cd /tmp/
|
specifications. If it is not given, defaults to all.
|
||||||
git clone https://github.com/anope/anope.git
|
-l, --loose Disables strict checks of conformity to the
|
||||||
cd anope
|
specification. Strict means the specification is
|
||||||
./Config # This will ask a few questions, answer them.
|
unclear, and the most restrictive interpretation is
|
||||||
make -C build -j 4
|
choosen.
|
||||||
make -C build install
|
|
||||||
```
|
|
||||||
|
|
||||||
and add this to the `pytest` call:
|
|
||||||
|
|
||||||
```
|
|
||||||
--services-controller irctest.controllers.anope_services
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
### Clients
|
|
||||||
|
|
||||||
#### Limnoria:
|
|
||||||
|
|
||||||
```
|
|
||||||
pip3 install --user limnoria pyxmpp2-scram
|
|
||||||
cd ~/irctest
|
|
||||||
pytest --controller irctest.controllers.limnoria
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Sopel:
|
|
||||||
|
|
||||||
```
|
|
||||||
pip3 install --user sopel
|
|
||||||
mkdir ~/.sopel/
|
|
||||||
cd ~/irctest
|
|
||||||
pytest --controller irctest.controllers.sopel
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## What `irctest` is not
|
## What `irctest` is not
|
||||||
@ -212,4 +114,3 @@ At best, `irctest` can help you find issues in your software, but it may
|
|||||||
still have false positives (because it does not implement itself a
|
still have false positives (because it does not implement itself a
|
||||||
full-featured client/server, so it supports only “usual” behavior).
|
full-featured client/server, so it supports only “usual” behavior).
|
||||||
Bug reports for false positives are welcome.
|
Bug reports for false positives are welcome.
|
||||||
|
|
||||||
|
132
conftest.py
132
conftest.py
@ -1,132 +0,0 @@
|
|||||||
import importlib
|
|
||||||
|
|
||||||
import _pytest.unittest
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
# Must be called before importing irctest.cases.
|
|
||||||
pytest.register_assert_rewrite("irctest.cases")
|
|
||||||
|
|
||||||
from irctest.basecontrollers import ( # noqa: E402
|
|
||||||
BaseClientController,
|
|
||||||
BaseServerController,
|
|
||||||
)
|
|
||||||
from irctest.cases import ( # noqa: E402
|
|
||||||
BaseClientTestCase,
|
|
||||||
BaseServerTestCase,
|
|
||||||
_IrcTestCase,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def pytest_addoption(parser):
|
|
||||||
"""Called by pytest, registers CLI options passed to the pytest command."""
|
|
||||||
parser.addoption(
|
|
||||||
"--controller", help="Which module to use to run the tested software."
|
|
||||||
)
|
|
||||||
parser.addoption(
|
|
||||||
"--services-controller", help="Which module to use to run a services package."
|
|
||||||
)
|
|
||||||
parser.addoption(
|
|
||||||
"--openssl-bin", type=str, default="openssl", help="The openssl binary to use"
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def pytest_configure(config):
|
|
||||||
"""Called by pytest, after it parsed the command-line."""
|
|
||||||
module_name = config.getoption("controller")
|
|
||||||
services_module_name = config.getoption("services_controller")
|
|
||||||
|
|
||||||
if module_name is None:
|
|
||||||
print("Missing --controller option, errors may occur.")
|
|
||||||
_IrcTestCase.controllerClass = None
|
|
||||||
_IrcTestCase.show_io = True # TODO
|
|
||||||
return
|
|
||||||
|
|
||||||
try:
|
|
||||||
module = importlib.import_module(module_name)
|
|
||||||
except ImportError:
|
|
||||||
pytest.exit("Cannot import module {}".format(module_name), 1)
|
|
||||||
|
|
||||||
controller_class = module.get_irctest_controller_class()
|
|
||||||
if issubclass(controller_class, BaseClientController):
|
|
||||||
from irctest import client_tests as module
|
|
||||||
|
|
||||||
if services_module_name is not None:
|
|
||||||
pytest.exit("You may not use --services-controller for client tests.")
|
|
||||||
elif issubclass(controller_class, BaseServerController):
|
|
||||||
from irctest import server_tests as module
|
|
||||||
else:
|
|
||||||
pytest.exit(
|
|
||||||
r"{}.Controller should be a subclass of "
|
|
||||||
r"irctest.basecontroller.Base{{Client,Server}}Controller".format(
|
|
||||||
module_name
|
|
||||||
),
|
|
||||||
1,
|
|
||||||
)
|
|
||||||
|
|
||||||
if services_module_name is not None:
|
|
||||||
try:
|
|
||||||
services_module = importlib.import_module(services_module_name)
|
|
||||||
except ImportError:
|
|
||||||
pytest.exit("Cannot import module {}".format(services_module_name), 1)
|
|
||||||
controller_class.services_controller_class = (
|
|
||||||
services_module.get_irctest_controller_class()
|
|
||||||
)
|
|
||||||
|
|
||||||
_IrcTestCase.controllerClass = controller_class
|
|
||||||
_IrcTestCase.controllerClass.openssl_bin = config.getoption("openssl_bin")
|
|
||||||
_IrcTestCase.show_io = True # TODO
|
|
||||||
|
|
||||||
|
|
||||||
def pytest_collection_modifyitems(session, config, items):
|
|
||||||
"""Called by pytest after finishing the test collection,
|
|
||||||
and before actually running the tests.
|
|
||||||
|
|
||||||
This function filters out client tests if running with a server controller,
|
|
||||||
and vice versa.
|
|
||||||
"""
|
|
||||||
|
|
||||||
# First, check if we should run server tests or client tests
|
|
||||||
server_tests = client_tests = False
|
|
||||||
if _IrcTestCase.controllerClass is None:
|
|
||||||
pass
|
|
||||||
elif issubclass(_IrcTestCase.controllerClass, BaseServerController):
|
|
||||||
server_tests = True
|
|
||||||
elif issubclass(_IrcTestCase.controllerClass, BaseClientController):
|
|
||||||
client_tests = True
|
|
||||||
else:
|
|
||||||
assert False, (
|
|
||||||
f"{_IrcTestCase.controllerClass} inherits neither "
|
|
||||||
f"BaseClientController or BaseServerController"
|
|
||||||
)
|
|
||||||
|
|
||||||
filtered_items = []
|
|
||||||
|
|
||||||
# Iterate over each of the test functions (they are pytest "Nodes")
|
|
||||||
for item in items:
|
|
||||||
assert isinstance(item, _pytest.python.Function)
|
|
||||||
|
|
||||||
# unittest-style test functions have the node of UnitTest class as parent
|
|
||||||
assert isinstance(
|
|
||||||
item.parent,
|
|
||||||
(
|
|
||||||
_pytest.python.Class, # pytest >= 7.0.0
|
|
||||||
_pytest.python.Instance, # pytest < 7.0.0
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
# and that node references the UnitTest class
|
|
||||||
assert issubclass(item.parent.cls, _IrcTestCase)
|
|
||||||
|
|
||||||
# and in this project, TestCase classes all inherit either from
|
|
||||||
# BaseClientController or BaseServerController.
|
|
||||||
if issubclass(item.parent.cls, BaseServerTestCase):
|
|
||||||
if server_tests:
|
|
||||||
filtered_items.append(item)
|
|
||||||
elif issubclass(item.parent.cls, BaseClientTestCase):
|
|
||||||
if client_tests:
|
|
||||||
filtered_items.append(item)
|
|
||||||
else:
|
|
||||||
filtered_items.append(item)
|
|
||||||
|
|
||||||
# Finally, rewrite in-place the list of tests pytest will run
|
|
||||||
items[:] = filtered_items
|
|
@ -1,8 +0,0 @@
|
|||||||
INSTDIR="$HOME/.local/"
|
|
||||||
RUNGROUP=""
|
|
||||||
UMASK=077
|
|
||||||
DEBUG="yes"
|
|
||||||
USE_PCH="yes"
|
|
||||||
EXTRA_INCLUDE_DIRS=""
|
|
||||||
EXTRA_LIB_DIRS=""
|
|
||||||
EXTRA_CONFIG_ARGS=""
|
|
@ -1,83 +0,0 @@
|
|||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIIJRAIBADANBgkqhkiG9w0BAQEFAASCCS4wggkqAgEAAoICAQDT0URxi7/l7ZGe
|
|
||||||
tkPv9Yh8h2s9BpbAR4Wq8sakgqETWg/nE/JQM5dPxroVbtZWWQXuJEFsgBKbASLa
|
|
||||||
/eg5cyJv4Uu5WIZpG1LxdPEEIOSMWjzoAGwoLxbTRGrS7qNXsknB9RwDuq8lPQiK
|
|
||||||
kiAahg1Cn1vRrQ4cRrG+AkQWpRHJEDoLjCSo8IcAsKAZlw/eGtAcmeNvkr5AujEw
|
|
||||||
XjIwx2FoDyKaNGRH5Z7gLWvCKBNxQuJuMTzh8guLqdGbE4hH3rqyICbW5DGPaOZL
|
|
||||||
LErWuJ7kEhLZG2HDW5JaXOr0QfFYAA8pl9/qCuFMdoxRUKRcYBoxoMmz6dlsmipN
|
|
||||||
7vIj+TT6TemwcAT25pwMJIVS4WC4+BZilNH2eWKD9hZA8Kq7FDPu+1rxOJaLbE/b
|
|
||||||
vpK8jZeRdqFzE1eBCgPkw8D8V0r7J18d+DsmgOe2kRycaia/t9M4rhqe0FXjX1X1
|
|
||||||
lzQ52grxgc28Ejd1fGQXIJmdTh4BqKqTzxup0izS7dgFP1Ezm6Z4O+wklpL5uQF2
|
|
||||||
Ex4X6QEj76iCxH+J/01/cvbxMe3iuGXECbO/y1FIrg7FKzZSrQo4aP63lS7Y7aq0
|
|
||||||
t2t6kOS83ebhnpgHClgFs8/C3ayzYBBtbK63PYthwO8Rt6WamCIZFF5tA3XoI4Ak
|
|
||||||
fZcWD18loZai+QznVzbLNINf++rTwwIDAQABAoICAQCs1tT3piZHU2yAyo9zLbJa
|
|
||||||
kxGxcT/v1CzBSmtG8ATJyrKxRzhxszdj9HABbzjcqrXJFbKA+5yy+OFdOtSUlFtk
|
|
||||||
Wb21lwPOnmo29sp4KPL1h+itEzMuMwZ4DBry1aFZvPSsnPpoHJwwUbY3hHdHzVzi
|
|
||||||
oTCGTqT188Wzmxu+MqHppCEJLSj45ZPzvyxU1UwwW0a4H+ZTM7WlEYlzw1lHLlpQ
|
|
||||||
VBFTLS8q77aNjOKiQptiz0X+zpS0dhJvu3l7BhwtMRS8prmqnffG4r0QWCsVPP8C
|
|
||||||
cbEJkWtbwswQikN6Xpi1yw6UTQZ8brZa810aOSh07EJTfrU35rjxAndEspbJPd+4
|
|
||||||
Zz6fKNnRA7A4fFap2hF4TSP/UF12b4ulQ8FfcMMTFszWko5M6fWFuCeWfNbyXML5
|
|
||||||
fmn+NmSOboj7LkDqbpxtyaIVXXb2Y3F6A2fNllm/mxaGrRoEGNaH3o0qBgWRzJJB
|
|
||||||
TDSvIQtJddzL+iMaqxz4ufXAREJernZmPa3vlkVGLINNQUC9JLrB5eFjLzPiZN2U
|
|
||||||
8RgQ9YX5tjoJ+DtPWuMFDiCS1ZE20/UBOEYTeqIVuKdK3AjJDMFSjg8fRvsWRqZe
|
|
||||||
zsHv6tCtIFZFxYRxtrRGTUPQF+1QD6zBjYxZZk1B4n3uYBGVQFM/LnNHUxRnJBx1
|
|
||||||
PunD4ICOY97xd2hcPmGiCQKCAQEA8NCXYaHzhv6fg95H/iMuJVcOCKrJ5rVr4poG
|
|
||||||
SD0KZtS7SLzUYat8WcuoSubh5Eb2hHtrsnLrSOTnwQUO61f4gCRm2sEqHYsOAd7+
|
|
||||||
mNe1jfil0UBVqqL9GBcGYJkc5+DHgUlJQaxMV+4YLt8fD0KfZEnHaDAYX3kUdz+p
|
|
||||||
be//YAKv+JmxWcUdBF60AUWPjbCJT/1pfJeY8nEBFiYtlYKKN24+4OiRdJ2yRGzt
|
|
||||||
ZtNHaWy5EFF70yVgPX5MGQ7Z2JpejzK+lt+9nG4h1uJ4M2X4YrGVrRCn1W8jwqm/
|
|
||||||
bXest3E6wkkLoWDm9EaeYj00DUgMOviPyP4ckyxilG+Fny4JbwKCAQEA4SyUV03X
|
|
||||||
KEoL5sOD69sLu3TpnIQz73u9an9W/f2f7rsGwmCcR9RdYGV29ltwfBvOm0FnPQio
|
|
||||||
GliN+3PTWAL6bb8VYo2IR53VKpVHKSQUlzDOD9PGObXw1CT/+0zoMP7FBA4dTJDf
|
|
||||||
xQ63AQNpSCGdwbxZygPWzLV5O1WxMeXhnQRL1EBvMyJ52od0+HbajDXg5mNiBKNQ
|
|
||||||
AtVhB9pEu47Blu/KBqWjfh/GeBLPZB7MHmGNBYbBGGskKRLG4sIbwShs9cx8UM0/
|
|
||||||
9dxXkX2d8hjnSD/0ZBh54HHUaEvKAKfpz1L8AC0ll7biCAy0CZK23AoZu/KT8zJ+
|
|
||||||
qvz3AuJcW3lo7QKCAQEAzfGltNJawPUamBzNttKBUV+s2c6tkkdO92C/xKGnNp/x
|
|
||||||
dtg+TTTpyKV5zGy9fIsPoecnCFptS06vwAvCYZQ/Kd93stcFXHSiSwlY9H9tfffK
|
|
||||||
XzTEzoRLLIHsa0omRUufcrqpEqf2NjChr9wS5OsWAx9xkHGpNmUHEqB4FlPsM0C5
|
|
||||||
G0LdQCdplGYlTP0fMo5qL+VJhErle1kXE8kcrMMRzyvSTGe4lWGTph79vDUt2kQn
|
|
||||||
1IPLAJzzPEO5cqiXtzz1Z0N/aOn5b0FkYTAWmeY30LeMiJA46Df+/ihLVKPHKq6E
|
|
||||||
EMmFT8LeYMPQCbXLwRv/kaMm3D4tU9PejpD9Vk95swKCAQAtULBlxXeIVyaAAVba
|
|
||||||
L1H0Hroo0n41MtzSwt+568G05JSep5yr4/QKw0CmoY5Im7v/iLEDGmviKXIhaZTd
|
|
||||||
wHOvhGYEWGFVsFDG6hXRFL7EEoFVtBPPZ2sY9n1BkJ+lxI/XmhORZhJycNypaotU
|
|
||||||
hddets4HFrCyr86+/ybS2OWHmOa9x13Zl5WYQexrWFfxIaKqGtQOBOPEPjbxwp5U
|
|
||||||
dI1HF+i7X7hAWJqzbW2pQ31mm9EqjIztoho73diCp/e37q/G46kdBcFadEZ3NCWG
|
|
||||||
JDbfVmeTgU19usq5Vo9HhINMQvIOAwfuuVJRtmTBDHKaY7n8FfxqU/4j4RbA0Ncv
|
|
||||||
XYadAoIBAQC7yh4/UZCGhklUhhk/667OfchWvWGriCSaYGmQPdMzxjnIjAvvIUe9
|
|
||||||
riOTBSZXYYLmZHsmY/jK7KMGB3AsLTypSa9+ddAWqWn2dvOYyxNiAaSJK/RZfA9A
|
|
||||||
ocVfvvkhOfNAYIF+A+fyJ2pznsDkBf9tPkhN7kovl+mr/e25qZb1d09377770Pi7
|
|
||||||
thzEi+JLrRgYVLrCrPi2j4l7/Va/UaAPz+Dtu2GCT9vXgnhZtpb8R1kTViZFryTv
|
|
||||||
k+qbNYJzVm61Vit9mVAGe+WuzhlclJnN6LIZGG3zYHIulRAJrH1XDauHZfHzCKgi
|
|
||||||
FnMesy4thDMH/MhUfRtbylZTq45gtvCA
|
|
||||||
-----END PRIVATE KEY-----
|
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIIFazCCA1OgAwIBAgIUYHD08+9S32VTD9IEsr2Oe1dH3VEwDQYJKoZIhvcNAQEL
|
|
||||||
BQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
|
||||||
GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yMjA0MDQxODE2NTZaFw0yMzA0
|
|
||||||
MDQxODE2NTZaMEUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIDApTb21lLVN0YXRlMSEw
|
|
||||||
HwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQwggIiMA0GCSqGSIb3DQEB
|
|
||||||
AQUAA4ICDwAwggIKAoICAQDT0URxi7/l7ZGetkPv9Yh8h2s9BpbAR4Wq8sakgqET
|
|
||||||
Wg/nE/JQM5dPxroVbtZWWQXuJEFsgBKbASLa/eg5cyJv4Uu5WIZpG1LxdPEEIOSM
|
|
||||||
WjzoAGwoLxbTRGrS7qNXsknB9RwDuq8lPQiKkiAahg1Cn1vRrQ4cRrG+AkQWpRHJ
|
|
||||||
EDoLjCSo8IcAsKAZlw/eGtAcmeNvkr5AujEwXjIwx2FoDyKaNGRH5Z7gLWvCKBNx
|
|
||||||
QuJuMTzh8guLqdGbE4hH3rqyICbW5DGPaOZLLErWuJ7kEhLZG2HDW5JaXOr0QfFY
|
|
||||||
AA8pl9/qCuFMdoxRUKRcYBoxoMmz6dlsmipN7vIj+TT6TemwcAT25pwMJIVS4WC4
|
|
||||||
+BZilNH2eWKD9hZA8Kq7FDPu+1rxOJaLbE/bvpK8jZeRdqFzE1eBCgPkw8D8V0r7
|
|
||||||
J18d+DsmgOe2kRycaia/t9M4rhqe0FXjX1X1lzQ52grxgc28Ejd1fGQXIJmdTh4B
|
|
||||||
qKqTzxup0izS7dgFP1Ezm6Z4O+wklpL5uQF2Ex4X6QEj76iCxH+J/01/cvbxMe3i
|
|
||||||
uGXECbO/y1FIrg7FKzZSrQo4aP63lS7Y7aq0t2t6kOS83ebhnpgHClgFs8/C3ayz
|
|
||||||
YBBtbK63PYthwO8Rt6WamCIZFF5tA3XoI4AkfZcWD18loZai+QznVzbLNINf++rT
|
|
||||||
wwIDAQABo1MwUTAdBgNVHQ4EFgQU+9eHi2eqy0f3fDS0GjqkijGDDocwHwYDVR0j
|
|
||||||
BBgwFoAU+9eHi2eqy0f3fDS0GjqkijGDDocwDwYDVR0TAQH/BAUwAwEB/zANBgkq
|
|
||||||
hkiG9w0BAQsFAAOCAgEAAJXO3qUc/PW75pI2dt1cKv20VqozkfEf7P0eeVisCDxn
|
|
||||||
1p3QhVgI2lEe9kzdHp7t42g5xLkUhQEVmBcKm9xbl+k2D1X0+T8px1x6ZiWfbhXL
|
|
||||||
ptc/qCIXjPCgVN3s+Kasii3hHkZxKGZz/ySmBmfDJZjQZtbZzQWpvvX6SD4s7sjo
|
|
||||||
gWbZW3qvQ0bFTGdD1IjKYGaxK6aSrNkAIutiAX4RczJ1QSwb9Z2EIen+ABAvOZS9
|
|
||||||
xv3LiiidWcuOT7WzXEa4QvOslCEkAF+jj6mGYB7NWtly0kj4AEPvI4IoYTi9dohS
|
|
||||||
CA0zd1DTfjRwpAnT5P4sj4mpjLyRBumeeVGpCZhUxfKpFjIB2AnlgxrU+LPq5c9R
|
|
||||||
ZZ9Q5oeLxjRPjpqBeWwgnbjXstQCL9g0U7SsEemsv+zmvG5COhAmG5Wce/65ILlg
|
|
||||||
450H4bcn1ul0xvxz9hat6tqEZry3HcNE/CGDT+tXuhHpqOXkY1/c78C0QbWjWodR
|
|
||||||
tCvlXW00a+7TlEhNr4XBNdqtIQfYS9K9yiVVNfZLPEsN/SA3BGXmrr+du1/E4Ria
|
|
||||||
CkVpmBdJsVu5eMaUj1arsCqI4fwHzljtojJe/pCzZBVkOaSWQEQ+LL4iVnMas68m
|
|
||||||
qyshtNf4KNiM55OQmyTiFHMTIxCtdEcHaR3mUxR7GrIhc/bxyxUUBtMAuUX0Kjs=
|
|
||||||
-----END CERTIFICATE-----
|
|
@ -1,3 +0,0 @@
|
|||||||
Boilerplate files so Unreal can be built non-interactively.
|
|
||||||
|
|
||||||
Obviously, you shouldn't use the .pem in a production environment!
|
|
@ -1,24 +0,0 @@
|
|||||||
BASEPATH="$HOME/.local/unrealircd"
|
|
||||||
BINDIR="$HOME/.local/unrealircd/bin"
|
|
||||||
DATADIR="$HOME/.local/unrealircd/data"
|
|
||||||
CONFDIR="$HOME/.local/unrealircd/conf"
|
|
||||||
MODULESDIR="$HOME/.local/unrealircd/modules"
|
|
||||||
LOGDIR="$HOME/.local/unrealircd/logs"
|
|
||||||
CACHEDIR="$HOME/.local/unrealircd/cache"
|
|
||||||
DOCDIR="$HOME/.local/unrealircd/doc"
|
|
||||||
TMPDIR="$HOME/.local/unrealircd/tmp"
|
|
||||||
PRIVATELIBDIR="$HOME/.local/unrealircd/lib"
|
|
||||||
PREFIXAQ="1"
|
|
||||||
MAXCONNECTIONS_REQUEST="auto"
|
|
||||||
NICKNAMEHISTORYLENGTH="2000"
|
|
||||||
DEFPERM="0600"
|
|
||||||
SSLDIR=""
|
|
||||||
REMOTEINC=""
|
|
||||||
CURLDIR=""
|
|
||||||
SHOWLISTMODES="1"
|
|
||||||
NOOPEROVERRIDE=""
|
|
||||||
OPEROVERRIDEVERIFY=""
|
|
||||||
GENCERTIFICATE="1"
|
|
||||||
EXTRAPARA=""
|
|
||||||
ADVANCED=""
|
|
||||||
|
|
@ -1,14 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICGDCCAZ6gAwIBAgIUeHAOQnvT7N9kCmUuIklelkzz8SUwCgYIKoZIzj0EAwIw
|
|
||||||
QzELMAkGA1UEBhMCVVMxETAPBgNVBAgMCE5ldyBZb3JrMRIwEAYDVQQKDAlJUkMg
|
|
||||||
Z2Vla3MxDTALBgNVBAsMBElSQ2QwHhcNMjEwNzAyMTk1MTM5WhcNMzEwNjMwMTk1
|
|
||||||
MTM5WjBDMQswCQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxEjAQBgNVBAoM
|
|
||||||
CUlSQyBnZWVrczENMAsGA1UECwwESVJDZDB2MBAGByqGSM49AgEGBSuBBAAiA2IA
|
|
||||||
BHA6iqLQgkS42xHg/dEPq9dKjlLi0HWvCM7nOCXAyFy1DjrmbFoSCQBCUbISsk/C
|
|
||||||
Txru3YIfXe6jSCS8UTb15m70mrmmiUr/umxiqjAOiso051hCrzxVmjTpEAqMSnrc
|
|
||||||
zKNTMFEwHQYDVR0OBBYEFFNHqsBNxDNhVxfAgdv6/y4Xd6/ZMB8GA1UdIwQYMBaA
|
|
||||||
FFNHqsBNxDNhVxfAgdv6/y4Xd6/ZMA8GA1UdEwEB/wQFMAMBAf8wCgYIKoZIzj0E
|
|
||||||
AwIDaAAwZQIwAo29xUEAzqOMgPAWtMifHFLuPQPuWcNGbaI5S4W81NO8uIcNv/kM
|
|
||||||
mFocuITr76p0AjEApzGjc5wM+KydwoVTP+fg1aGQA13Ba2nCzN3R5XwR/USCigjv
|
|
||||||
na1QtWAKjpvR/rsp
|
|
||||||
-----END CERTIFICATE-----
|
|
@ -1,9 +0,0 @@
|
|||||||
-----BEGIN EC PARAMETERS-----
|
|
||||||
BgUrgQQAIg==
|
|
||||||
-----END EC PARAMETERS-----
|
|
||||||
-----BEGIN EC PRIVATE KEY-----
|
|
||||||
MIGkAgEBBDCWkDHktJiTqC7im+Ni37fbXxtMBqIKPwkAItpKMeuh28QrXWwNE1a5
|
|
||||||
wSa38C1nd8igBwYFK4EEACKhZANiAARwOoqi0IJEuNsR4P3RD6vXSo5S4tB1rwjO
|
|
||||||
5zglwMhctQ465mxaEgkAQlGyErJPwk8a7t2CH13uo0gkvFE29eZu9Jq5polK/7ps
|
|
||||||
YqowDorKNOdYQq88VZo06RAKjEp63Mw=
|
|
||||||
-----END EC PRIVATE KEY-----
|
|
@ -1,9 +0,0 @@
|
|||||||
-----BEGIN CERTIFICATE REQUEST-----
|
|
||||||
MIIBOjCBwgIBADBDMQswCQYDVQQGEwJVUzERMA8GA1UECAwITmV3IFlvcmsxEjAQ
|
|
||||||
BgNVBAoMCUlSQyBnZWVrczENMAsGA1UECwwESVJDZDB2MBAGByqGSM49AgEGBSuB
|
|
||||||
BAAiA2IABHA6iqLQgkS42xHg/dEPq9dKjlLi0HWvCM7nOCXAyFy1DjrmbFoSCQBC
|
|
||||||
UbISsk/CTxru3YIfXe6jSCS8UTb15m70mrmmiUr/umxiqjAOiso051hCrzxVmjTp
|
|
||||||
EAqMSnrczKAAMAoGCCqGSM49BAMCA2cAMGQCMEL5ezlauGUaxh+pXt897ffmzqci
|
|
||||||
fqYm3FgVW5x6EdtCxtcwwAwnR84LKcd/YRKOygIwNmZiRVKeSeC7Ess1PxuzT1Mu
|
|
||||||
Cw3bBqkE5LmO1hu/+0lK+QoFPEeLDrygIh+SDdGH
|
|
||||||
-----END CERTIFICATE REQUEST-----
|
|
87
irctest/__main__.py
Normal file
87
irctest/__main__.py
Normal file
@ -0,0 +1,87 @@
|
|||||||
|
import sys
|
||||||
|
import unittest
|
||||||
|
import argparse
|
||||||
|
import unittest
|
||||||
|
import functools
|
||||||
|
import importlib
|
||||||
|
from .cases import _IrcTestCase
|
||||||
|
from .runner import TextTestRunner
|
||||||
|
from .specifications import Specifications
|
||||||
|
from .basecontrollers import BaseClientController, BaseServerController
|
||||||
|
|
||||||
|
def main(args):
|
||||||
|
try:
|
||||||
|
module = importlib.import_module(args.module)
|
||||||
|
except ImportError:
|
||||||
|
print('Cannot import module {}'.format(args.module), file=sys.stderr)
|
||||||
|
exit(1)
|
||||||
|
|
||||||
|
controller_class = module.get_irctest_controller_class()
|
||||||
|
if issubclass(controller_class, BaseClientController):
|
||||||
|
import irctest.client_tests as module
|
||||||
|
elif issubclass(controller_class, BaseServerController):
|
||||||
|
import irctest.server_tests as module
|
||||||
|
else:
|
||||||
|
print(r'{}.Controller should be a subclass of '
|
||||||
|
r'irctest.basecontroller.Base{{Client,Server}}Controller'
|
||||||
|
.format(args.module),
|
||||||
|
file=sys.stderr)
|
||||||
|
exit(1)
|
||||||
|
_IrcTestCase.controllerClass = controller_class
|
||||||
|
_IrcTestCase.controllerClass.openssl_bin = args.openssl_bin
|
||||||
|
_IrcTestCase.show_io = args.show_io
|
||||||
|
_IrcTestCase.strictTests = not args.loose
|
||||||
|
if args.specification:
|
||||||
|
try:
|
||||||
|
_IrcTestCase.testedSpecifications = frozenset(
|
||||||
|
Specifications.of_name(x) for x in args.specification
|
||||||
|
)
|
||||||
|
except ValueError:
|
||||||
|
print('Invalid set of specifications: {}'
|
||||||
|
.format(', '.join(args.specification)))
|
||||||
|
exit(1)
|
||||||
|
else:
|
||||||
|
_IrcTestCase.testedSpecifications = frozenset(
|
||||||
|
Specifications)
|
||||||
|
print('Testing {} on specification(s): {}'.format(
|
||||||
|
controller_class.software_name,
|
||||||
|
', '.join(sorted(map(lambda x:x.value,
|
||||||
|
_IrcTestCase.testedSpecifications)))))
|
||||||
|
ts = module.discover()
|
||||||
|
testRunner = TextTestRunner(
|
||||||
|
verbosity=args.verbose,
|
||||||
|
descriptions=True,
|
||||||
|
)
|
||||||
|
testLoader = unittest.loader.defaultTestLoader
|
||||||
|
result = testRunner.run(ts)
|
||||||
|
if result.failures or result.errors:
|
||||||
|
exit(1)
|
||||||
|
else:
|
||||||
|
exit(0)
|
||||||
|
|
||||||
|
|
||||||
|
parser = argparse.ArgumentParser(
|
||||||
|
description='A script to test interoperability of IRC software.')
|
||||||
|
parser.add_argument('module', type=str,
|
||||||
|
help='The module used to run the tested program.')
|
||||||
|
parser.add_argument('--openssl-bin', type=str, default='openssl',
|
||||||
|
help='The openssl binary to use')
|
||||||
|
parser.add_argument('--show-io', action='store_true',
|
||||||
|
help='Show input/outputs with the tested program.')
|
||||||
|
parser.add_argument('-v', '--verbose', action='count', default=1,
|
||||||
|
help='Verbosity. Give this option multiple times to make '
|
||||||
|
'it even more verbose.')
|
||||||
|
parser.add_argument('-s', '--specification', type=str, action='append',
|
||||||
|
help=('The set of specifications to test the program with. '
|
||||||
|
'Valid values: {}. '
|
||||||
|
'Use this option multiple times to test with multiple '
|
||||||
|
'specifications. If it is not given, defaults to all.')
|
||||||
|
.format(', '.join(x.value for x in Specifications)))
|
||||||
|
parser.add_argument('-l', '--loose', action='store_true',
|
||||||
|
help='Disables strict checks of conformity to the specification. '
|
||||||
|
'Strict means the specification is unclear, and the most restrictive '
|
||||||
|
'interpretation is choosen.')
|
||||||
|
|
||||||
|
|
||||||
|
args = parser.parse_args()
|
||||||
|
main(args)
|
@ -1,23 +1,19 @@
|
|||||||
import dataclasses
|
|
||||||
import enum
|
import enum
|
||||||
from typing import Optional, Tuple
|
import collections
|
||||||
|
|
||||||
|
|
||||||
@enum.unique
|
@enum.unique
|
||||||
class Mechanisms(enum.Enum):
|
class Mechanisms(enum.Enum):
|
||||||
"""Enumeration for representing possible mechanisms."""
|
"""Enumeration for representing possible mechanisms."""
|
||||||
|
@classmethod
|
||||||
def to_string(self) -> str:
|
def as_string(cls, mech):
|
||||||
return self.name.upper().replace("_", "-")
|
return {cls.plain: 'PLAIN',
|
||||||
|
cls.ecdsa_nist256p_challenge: 'ECDSA-NIST256P-CHALLENGE',
|
||||||
|
cls.scram_sha_256: 'SCRAM-SHA-256',
|
||||||
|
}[mech]
|
||||||
plain = 1
|
plain = 1
|
||||||
ecdsa_nist256p_challenge = 2
|
ecdsa_nist256p_challenge = 2
|
||||||
scram_sha_256 = 3
|
scram_sha_256 = 3
|
||||||
|
|
||||||
|
Authentication = collections.namedtuple('Authentication',
|
||||||
@dataclasses.dataclass
|
'mechanisms username password ecdsa_key')
|
||||||
class Authentication:
|
Authentication.__new__.__defaults__ = ([Mechanisms.plain], None, None, None)
|
||||||
mechanisms: Tuple[Mechanisms] = (Mechanisms.plain,)
|
|
||||||
username: Optional[str] = None
|
|
||||||
password: Optional[str] = None
|
|
||||||
ecdsa_key: Optional[str] = None
|
|
||||||
|
@ -1,426 +1,102 @@
|
|||||||
from __future__ import annotations
|
|
||||||
|
|
||||||
import dataclasses
|
|
||||||
import multiprocessing
|
|
||||||
import os
|
import os
|
||||||
from pathlib import Path
|
|
||||||
import shutil
|
import shutil
|
||||||
import socket
|
import socket
|
||||||
import subprocess
|
|
||||||
import tempfile
|
import tempfile
|
||||||
import textwrap
|
|
||||||
import time
|
import time
|
||||||
from typing import (
|
import subprocess
|
||||||
IO,
|
|
||||||
Any,
|
|
||||||
Callable,
|
|
||||||
Dict,
|
|
||||||
List,
|
|
||||||
MutableMapping,
|
|
||||||
Optional,
|
|
||||||
Set,
|
|
||||||
Tuple,
|
|
||||||
Type,
|
|
||||||
)
|
|
||||||
|
|
||||||
import irctest
|
|
||||||
|
|
||||||
from . import authentication, tls
|
|
||||||
from .client_mock import ClientMock
|
|
||||||
from .irc_utils.junkdrawer import find_hostname_and_port
|
|
||||||
from .irc_utils.message_parser import Message
|
|
||||||
from .runner import NotImplementedByController
|
from .runner import NotImplementedByController
|
||||||
|
|
||||||
|
|
||||||
class ProcessStopped(Exception):
|
|
||||||
"""Raised when the controlled process stopped unexpectedly"""
|
|
||||||
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass
|
|
||||||
class TestCaseControllerConfig:
|
|
||||||
"""Test-case-specific configuration passed to the controller.
|
|
||||||
This is usually used to ask controllers to enable a feature;
|
|
||||||
but should not be an issue if controllers enable it all the time."""
|
|
||||||
|
|
||||||
chathistory: bool = False
|
|
||||||
"""Whether to enable chathistory features."""
|
|
||||||
|
|
||||||
ergo_roleplay: bool = False
|
|
||||||
"""Whether to enable the Ergo role-play commands."""
|
|
||||||
|
|
||||||
ergo_config: Optional[Callable[[Dict], Any]] = None
|
|
||||||
"""Oragono-specific configuration function that alters the dict in-place
|
|
||||||
This should be used as little as possible, using the other attributes instead;
|
|
||||||
as they are work with any controller."""
|
|
||||||
|
|
||||||
|
|
||||||
class _BaseController:
|
class _BaseController:
|
||||||
"""Base class for software controllers.
|
"""Base class for software controllers.
|
||||||
|
|
||||||
A software controller is an object that handles configuring and running
|
A software controller is an object that handles configuring and running
|
||||||
a process (eg. a server or a client), as well as sending it instructions
|
a process (eg. a server or a client), as well as sending it instructions
|
||||||
that are not part of the IRC specification."""
|
that are not part of the IRC specification."""
|
||||||
|
pass
|
||||||
|
|
||||||
# set by conftest.py
|
class DirectoryBasedController(_BaseController):
|
||||||
openssl_bin: str
|
"""Helper for controllers whose software configuration is based on an
|
||||||
|
arbitrary directory."""
|
||||||
supports_sts: bool
|
def __init__(self):
|
||||||
supported_sasl_mechanisms: Set[str]
|
super().__init__()
|
||||||
proc: Optional[subprocess.Popen]
|
self.directory = None
|
||||||
|
|
||||||
_used_ports: Set[Tuple[str, int]]
|
|
||||||
"""``(hostname, port))`` used by this controller."""
|
|
||||||
# the following need to be shared between processes in case we are running in
|
|
||||||
# parallel (with pytest-xdist)
|
|
||||||
# The dicts are used as a set of (hostname, port), because _manager.set() doesn't
|
|
||||||
# exist.
|
|
||||||
_manager = multiprocessing.Manager()
|
|
||||||
_port_lock = _manager.Lock()
|
|
||||||
"""Lock for access to ``_all_used_ports`` and ``_available_ports``."""
|
|
||||||
_all_used_ports: MutableMapping[Tuple[str, int], None] = _manager.dict()
|
|
||||||
"""``(hostname, port)`` used by all controllers."""
|
|
||||||
_available_ports: MutableMapping[Tuple[str, int], None] = _manager.dict()
|
|
||||||
"""``(hostname, port)`` available to any controller."""
|
|
||||||
|
|
||||||
def __init__(self, test_config: TestCaseControllerConfig):
|
|
||||||
self.test_config = test_config
|
|
||||||
self.proc = None
|
self.proc = None
|
||||||
self._used_ports = set()
|
|
||||||
|
|
||||||
def get_hostname_and_port(self) -> Tuple[str, int]:
|
def kill_proc(self):
|
||||||
with self._port_lock:
|
|
||||||
try:
|
|
||||||
# try to get a known available port
|
|
||||||
((hostname, port), _) = self._available_ports.popitem()
|
|
||||||
except KeyError:
|
|
||||||
# if there aren't any, iterate while we get a fresh one.
|
|
||||||
while True:
|
|
||||||
(hostname, port) = find_hostname_and_port()
|
|
||||||
if (hostname, port) not in self._all_used_ports:
|
|
||||||
# double-checking in self._used_ports to prevent collisions
|
|
||||||
# between controllers starting at the same time.
|
|
||||||
break
|
|
||||||
|
|
||||||
# Make this port unavailable to other processes
|
|
||||||
self._all_used_ports[(hostname, port)] = None
|
|
||||||
|
|
||||||
return (hostname, port)
|
|
||||||
|
|
||||||
def check_is_alive(self) -> None:
|
|
||||||
assert self.proc
|
|
||||||
self.proc.poll()
|
|
||||||
if self.proc.returncode is not None:
|
|
||||||
raise ProcessStopped()
|
|
||||||
|
|
||||||
def kill_proc(self) -> None:
|
|
||||||
"""Terminates the controlled process, waits for it to exit, and
|
"""Terminates the controlled process, waits for it to exit, and
|
||||||
eventually kills it."""
|
eventually kills it."""
|
||||||
assert self.proc
|
|
||||||
self.proc.terminate()
|
self.proc.terminate()
|
||||||
try:
|
try:
|
||||||
self.proc.wait(5)
|
self.proc.wait(5)
|
||||||
except subprocess.TimeoutExpired:
|
except subprocess.TimeoutExpired:
|
||||||
self.proc.kill()
|
self.proc.kill()
|
||||||
self.proc = None
|
self.proc = None
|
||||||
|
def kill(self):
|
||||||
def kill(self) -> None:
|
|
||||||
"""Calls `kill_proc` and cleans the configuration."""
|
"""Calls `kill_proc` and cleans the configuration."""
|
||||||
if self.proc:
|
if self.proc:
|
||||||
self.kill_proc()
|
self.kill_proc()
|
||||||
|
|
||||||
# move this controller's ports from _all_used_ports to _available_ports
|
|
||||||
for hostname, port in self._used_ports:
|
|
||||||
del self._all_used_ports[(hostname, port)]
|
|
||||||
self._available_ports[(hostname, port)] = None
|
|
||||||
|
|
||||||
|
|
||||||
class DirectoryBasedController(_BaseController):
|
|
||||||
"""Helper for controllers whose software configuration is based on an
|
|
||||||
arbitrary directory."""
|
|
||||||
|
|
||||||
directory: Optional[Path]
|
|
||||||
|
|
||||||
def __init__(self, test_config: TestCaseControllerConfig):
|
|
||||||
super().__init__(test_config)
|
|
||||||
self.directory = None
|
|
||||||
|
|
||||||
def kill(self) -> None:
|
|
||||||
"""Calls `kill_proc` and cleans the configuration."""
|
|
||||||
super().kill()
|
|
||||||
if self.directory:
|
if self.directory:
|
||||||
shutil.rmtree(self.directory)
|
shutil.rmtree(self.directory)
|
||||||
|
def terminate(self):
|
||||||
def terminate(self) -> None:
|
|
||||||
"""Stops the process gracefully, and does not clean its config."""
|
"""Stops the process gracefully, and does not clean its config."""
|
||||||
assert self.proc
|
|
||||||
self.proc.terminate()
|
self.proc.terminate()
|
||||||
self.proc.wait()
|
self.proc.wait()
|
||||||
self.proc = None
|
self.proc = None
|
||||||
|
def open_file(self, name, mode='a'):
|
||||||
def open_file(self, name: str, mode: str = "a") -> IO:
|
|
||||||
"""Open a file in the configuration directory."""
|
"""Open a file in the configuration directory."""
|
||||||
assert self.directory
|
assert self.directory
|
||||||
if os.sep in name:
|
if os.sep in name:
|
||||||
dir_ = self.directory / os.path.dirname(name)
|
dir_ = os.path.join(self.directory, os.path.dirname(name))
|
||||||
dir_.mkdir(parents=True, exist_ok=True)
|
if not os.path.isdir(dir_):
|
||||||
assert dir_.is_dir()
|
os.makedirs(dir_)
|
||||||
return (self.directory / name).open(mode)
|
assert os.path.isdir(dir_)
|
||||||
|
return open(os.path.join(self.directory, name), mode)
|
||||||
def create_config(self) -> None:
|
def create_config(self):
|
||||||
if not self.directory:
|
"""If there is no config dir, creates it and returns True.
|
||||||
self.directory = Path(tempfile.mkdtemp())
|
Else returns False."""
|
||||||
|
if self.directory:
|
||||||
def gen_ssl(self) -> None:
|
return False
|
||||||
assert self.directory
|
else:
|
||||||
self.csr_path = self.directory / "ssl.csr"
|
self.directory = tempfile.mkdtemp()
|
||||||
self.key_path = self.directory / "ssl.key"
|
return True
|
||||||
self.pem_path = self.directory / "ssl.pem"
|
|
||||||
self.dh_path = self.directory / "dh.pem"
|
|
||||||
subprocess.check_output(
|
|
||||||
[
|
|
||||||
self.openssl_bin,
|
|
||||||
"req",
|
|
||||||
"-new",
|
|
||||||
"-newkey",
|
|
||||||
"rsa",
|
|
||||||
"-nodes",
|
|
||||||
"-out",
|
|
||||||
self.csr_path,
|
|
||||||
"-keyout",
|
|
||||||
self.key_path,
|
|
||||||
"-batch",
|
|
||||||
],
|
|
||||||
stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
subprocess.check_output(
|
|
||||||
[
|
|
||||||
self.openssl_bin,
|
|
||||||
"x509",
|
|
||||||
"-req",
|
|
||||||
"-in",
|
|
||||||
self.csr_path,
|
|
||||||
"-signkey",
|
|
||||||
self.key_path,
|
|
||||||
"-out",
|
|
||||||
self.pem_path,
|
|
||||||
],
|
|
||||||
stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
with self.dh_path.open("w") as fd:
|
|
||||||
fd.write(
|
|
||||||
textwrap.dedent(
|
|
||||||
"""
|
|
||||||
-----BEGIN DH PARAMETERS-----
|
|
||||||
MIGHAoGBAJICSyQAiLj1fw8b5xELcnpqBQ+wvOyKgim4IetWOgZnRQFkTgOeoRZD
|
|
||||||
HksACRFJL/EqHxDKcy/2Ghwr2axhNxSJ+UOBmraP3WfodV/fCDPnZ+XnI9fjHsIr
|
|
||||||
rjisPMqomjXeiTB1UeAHvLUmCK4yx6lpAJsCYwJjsqkycUfHiy1bAgEC
|
|
||||||
-----END DH PARAMETERS-----
|
|
||||||
"""
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
|
def gen_ssl(self):
|
||||||
|
self.csr_path = os.path.join(self.directory, 'ssl.csr')
|
||||||
|
self.key_path = os.path.join(self.directory, 'ssl.key')
|
||||||
|
self.pem_path = os.path.join(self.directory, 'ssl.pem')
|
||||||
|
self.dh_path = os.path.join(self.directory, 'dh.pem')
|
||||||
|
subprocess.check_output([self.openssl_bin, 'req', '-new', '-newkey', 'rsa',
|
||||||
|
'-nodes', '-out', self.csr_path, '-keyout', self.key_path,
|
||||||
|
'-batch'],
|
||||||
|
stderr=subprocess.DEVNULL)
|
||||||
|
subprocess.check_output([self.openssl_bin, 'x509', '-req',
|
||||||
|
'-in', self.csr_path, '-signkey', self.key_path,
|
||||||
|
'-out', self.pem_path],
|
||||||
|
stderr=subprocess.DEVNULL)
|
||||||
|
subprocess.check_output([self.openssl_bin, 'dhparam',
|
||||||
|
'-out', self.dh_path, '128'],
|
||||||
|
stderr=subprocess.DEVNULL)
|
||||||
|
|
||||||
class BaseClientController(_BaseController):
|
class BaseClientController(_BaseController):
|
||||||
"""Base controller for IRC clients."""
|
"""Base controller for IRC clients."""
|
||||||
|
def run(self, hostname, port, auth):
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
auth: Optional[authentication.Authentication],
|
|
||||||
tls_config: Optional[tls.TlsConfig] = None,
|
|
||||||
) -> None:
|
|
||||||
raise NotImplementedError()
|
raise NotImplementedError()
|
||||||
|
|
||||||
|
|
||||||
class BaseServerController(_BaseController):
|
class BaseServerController(_BaseController):
|
||||||
"""Base controller for IRC server."""
|
"""Base controller for IRC server."""
|
||||||
|
|
||||||
software_name: str # Class property
|
|
||||||
_port_wait_interval = 0.1
|
|
||||||
port_open = False
|
port_open = False
|
||||||
port: int
|
def run(self, hostname, port, password,
|
||||||
hostname: str
|
valid_metadata_keys, invalid_metadata_keys):
|
||||||
services_controller: Optional[BaseServicesController] = None
|
|
||||||
services_controller_class: Type[BaseServicesController]
|
|
||||||
extban_mute_char: Optional[str] = None
|
|
||||||
"""Character used for the 'mute' extban"""
|
|
||||||
nickserv = "NickServ"
|
|
||||||
|
|
||||||
def __init__(self, *args: Any, **kwargs: Any):
|
|
||||||
super().__init__(*args, **kwargs)
|
|
||||||
self.faketime_enabled = False
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
raise NotImplementedError()
|
raise NotImplementedError()
|
||||||
|
def registerUser(self, case, username, password=None):
|
||||||
def registerUser(
|
raise NotImplementedByController('account registration')
|
||||||
self,
|
def wait_for_port(self):
|
||||||
case: irctest.cases.BaseServerTestCase, # type: ignore
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
if self.services_controller is not None:
|
|
||||||
self.services_controller.registerUser(case, username, password)
|
|
||||||
else:
|
|
||||||
raise NotImplementedByController("account registration")
|
|
||||||
|
|
||||||
def wait_for_port(self) -> None:
|
|
||||||
started_at = time.time()
|
|
||||||
while not self.port_open:
|
while not self.port_open:
|
||||||
self.check_is_alive()
|
time.sleep(0.1)
|
||||||
time.sleep(self._port_wait_interval)
|
|
||||||
try:
|
try:
|
||||||
c = socket.create_connection(("localhost", self.port), timeout=1.0)
|
c = socket.create_connection(('localhost', self.port), timeout=1.0)
|
||||||
c.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)
|
|
||||||
|
|
||||||
# Make sure the server properly processes the disconnect.
|
|
||||||
# Otherwise, it may still count it in LUSER and fail tests in
|
|
||||||
# test_lusers.py (eg. this happens with Charybdis 3.5.0)
|
|
||||||
c.sendall(b"QUIT :chkport\r\n")
|
|
||||||
data = b""
|
|
||||||
try:
|
|
||||||
while b"chkport" not in data and b"ERROR" not in data:
|
|
||||||
data += c.recv(4096)
|
|
||||||
time.sleep(0.01)
|
|
||||||
|
|
||||||
c.send(b" ") # Triggers BrokenPipeError
|
|
||||||
except BrokenPipeError:
|
|
||||||
# ircu2 cuts the connection without a message if registration
|
|
||||||
# is not complete.
|
|
||||||
pass
|
|
||||||
except socket.timeout:
|
|
||||||
# irc2 just keeps it open
|
|
||||||
pass
|
|
||||||
|
|
||||||
c.close()
|
c.close()
|
||||||
self.port_open = True
|
self.port_open = True
|
||||||
except ConnectionRefusedError:
|
except Exception as e:
|
||||||
if time.time() - started_at >= 60:
|
|
||||||
# waited for 60 seconds, giving up
|
|
||||||
raise
|
|
||||||
|
|
||||||
def wait_for_services(self) -> None:
|
|
||||||
assert self.services_controller
|
|
||||||
self.services_controller.wait_for_services()
|
|
||||||
|
|
||||||
def terminate(self) -> None:
|
|
||||||
if self.services_controller is not None:
|
|
||||||
self.services_controller.terminate() # type: ignore
|
|
||||||
super().terminate() # type: ignore
|
|
||||||
|
|
||||||
def kill(self) -> None:
|
|
||||||
if self.services_controller is not None:
|
|
||||||
self.services_controller.kill() # type: ignore
|
|
||||||
super().kill()
|
|
||||||
|
|
||||||
|
|
||||||
class BaseServicesController(_BaseController):
|
|
||||||
def __init__(
|
|
||||||
self,
|
|
||||||
test_config: TestCaseControllerConfig,
|
|
||||||
server_controller: BaseServerController,
|
|
||||||
):
|
|
||||||
super().__init__(test_config)
|
|
||||||
self.test_config = test_config
|
|
||||||
self.server_controller = server_controller
|
|
||||||
self.services_up = False
|
|
||||||
|
|
||||||
def run(self, protocol: str, server_hostname: str, server_port: int) -> None:
|
|
||||||
raise NotImplementedError("BaseServerController.run()")
|
|
||||||
|
|
||||||
def wait_for_services(self) -> None:
|
|
||||||
if self.services_up:
|
|
||||||
# Don't check again if they are already available
|
|
||||||
return
|
|
||||||
self.server_controller.wait_for_port()
|
|
||||||
|
|
||||||
c = ClientMock(name="chkNS", show_io=True)
|
|
||||||
c.connect(self.server_controller.hostname, self.server_controller.port)
|
|
||||||
c.sendLine("NICK chkNS")
|
|
||||||
c.sendLine("USER chk chk chk chk")
|
|
||||||
for msg in c.getMessages(synchronize=False):
|
|
||||||
if msg.command == "PING":
|
|
||||||
# Hi Unreal
|
|
||||||
c.sendLine("PONG :" + msg.params[0])
|
|
||||||
c.getMessages()
|
|
||||||
|
|
||||||
timeout = time.time() + 3
|
|
||||||
while True:
|
|
||||||
c.sendLine(f"PRIVMSG {self.server_controller.nickserv} :help")
|
|
||||||
|
|
||||||
msgs = self.getNickServResponse(c, timeout=1)
|
|
||||||
for msg in msgs:
|
|
||||||
if msg.command == "401":
|
|
||||||
# NickServ not available yet
|
|
||||||
pass
|
|
||||||
elif msg.command == "NOTICE":
|
|
||||||
# NickServ is available
|
|
||||||
assert "nickserv" in (msg.prefix or "").lower(), msg
|
|
||||||
print("breaking")
|
|
||||||
break
|
|
||||||
else:
|
|
||||||
assert False, f"unexpected reply from NickServ: {msg}"
|
|
||||||
else:
|
|
||||||
if time.time() > timeout:
|
|
||||||
raise Exception("Timeout while waiting for NickServ")
|
|
||||||
continue
|
continue
|
||||||
|
|
||||||
# If we're here, it means we broke from the for loop, so NickServ
|
|
||||||
# is available and we can break again
|
|
||||||
break
|
|
||||||
|
|
||||||
c.sendLine("QUIT")
|
|
||||||
c.getMessages()
|
|
||||||
c.disconnect()
|
|
||||||
self.services_up = True
|
|
||||||
|
|
||||||
def getNickServResponse(self, client: Any, timeout: int = 0) -> List[Message]:
|
|
||||||
"""Wrapper aroung getMessages() that waits longer, because NickServ
|
|
||||||
is queried asynchronously."""
|
|
||||||
msgs: List[Message] = []
|
|
||||||
start_time = time.time()
|
|
||||||
while not msgs and (not timeout or start_time + timeout > time.time()):
|
|
||||||
time.sleep(0.05)
|
|
||||||
msgs = client.getMessages()
|
|
||||||
return msgs
|
|
||||||
|
|
||||||
def registerUser(
|
|
||||||
self,
|
|
||||||
case: irctest.cases.BaseServerTestCase, # type: ignore
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
if not case.run_services:
|
|
||||||
raise ValueError(
|
|
||||||
"Attempted to register a nick, but `run_services` it not True."
|
|
||||||
)
|
|
||||||
assert password
|
|
||||||
client = case.addClient(show_io=True)
|
|
||||||
case.sendLine(client, "NICK " + username)
|
|
||||||
case.sendLine(client, "USER r e g :user")
|
|
||||||
while case.getRegistrationMessage(client).command != "001":
|
|
||||||
pass
|
|
||||||
case.getMessages(client)
|
|
||||||
case.sendLine(
|
|
||||||
client,
|
|
||||||
f"PRIVMSG {self.server_controller.nickserv} "
|
|
||||||
f":REGISTER {password} foo@example.org",
|
|
||||||
)
|
|
||||||
msgs = self.getNickServResponse(case.clients[client])
|
|
||||||
if self.server_controller.software_name == "inspircd":
|
|
||||||
assert "900" in {msg.command for msg in msgs}, msgs
|
|
||||||
assert "NOTICE" in {msg.command for msg in msgs}, msgs
|
|
||||||
case.sendLine(client, "QUIT")
|
|
||||||
case.assertDisconnected(client)
|
|
||||||
|
957
irctest/cases.py
957
irctest/cases.py
File diff suppressed because it is too large
Load Diff
@ -1,55 +1,36 @@
|
|||||||
import socket
|
|
||||||
import ssl
|
import ssl
|
||||||
import sys
|
import sys
|
||||||
import time
|
import time
|
||||||
from typing import Any, Callable, List, Optional, Union
|
import socket
|
||||||
|
|
||||||
from .exceptions import ConnectionClosed, NoMessageException
|
|
||||||
from .irc_utils import message_parser
|
from .irc_utils import message_parser
|
||||||
|
from .exceptions import NoMessageException, ConnectionClosed
|
||||||
|
|
||||||
class ClientMock:
|
class ClientMock:
|
||||||
def __init__(self, name: Any, show_io: bool):
|
def __init__(self, name, show_io):
|
||||||
self.name = name
|
self.name = name
|
||||||
self.show_io = show_io
|
self.show_io = show_io
|
||||||
self.inbuffer: List[message_parser.Message] = []
|
self.inbuffer = []
|
||||||
self.ssl = False
|
self.ssl = False
|
||||||
|
def connect(self, hostname, port):
|
||||||
def connect(self, hostname: str, port: int) -> None:
|
|
||||||
self.conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
self.conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
|
self.conn.settimeout(1) # TODO: configurable
|
||||||
# probably useful for test_buffering, as it relies on chunking
|
|
||||||
# the packets to be useful
|
|
||||||
self.conn.setsockopt(socket.SOL_TCP, socket.TCP_NODELAY, 1)
|
|
||||||
|
|
||||||
self.conn.settimeout(1) # TODO: configurable
|
|
||||||
self.conn.connect((hostname, port))
|
self.conn.connect((hostname, port))
|
||||||
if self.show_io:
|
if self.show_io:
|
||||||
print("{:.3f} {}: connects to server.".format(time.time(), self.name))
|
print('{:.3f} {}: connects to server.'.format(time.time(), self.name))
|
||||||
|
def disconnect(self):
|
||||||
def disconnect(self) -> None:
|
|
||||||
if self.show_io:
|
if self.show_io:
|
||||||
print("{:.3f} {}: disconnects from server.".format(time.time(), self.name))
|
print('{:.3f} {}: disconnects from server.'.format(time.time(), self.name))
|
||||||
self.conn.close()
|
self.conn.close()
|
||||||
|
def starttls(self):
|
||||||
def starttls(self) -> None:
|
assert not self.ssl, 'SSL already active.'
|
||||||
assert not self.ssl, "SSL already active."
|
|
||||||
self.conn = ssl.wrap_socket(self.conn)
|
self.conn = ssl.wrap_socket(self.conn)
|
||||||
self.ssl = True
|
self.ssl = True
|
||||||
|
def getMessages(self, synchronize=True, assert_get_one=False):
|
||||||
def getMessages(
|
|
||||||
self, synchronize: bool = True, assert_get_one: bool = False, raw: bool = False
|
|
||||||
) -> List[message_parser.Message]:
|
|
||||||
"""actually returns List[str] in the rare case where raw=True."""
|
|
||||||
__tracebackhide__ = True # Hide from pytest tracebacks on test failure.
|
|
||||||
token: Optional[str]
|
|
||||||
if synchronize:
|
if synchronize:
|
||||||
token = "synchronize{}".format(time.monotonic())
|
token = 'synchronize{}'.format(time.monotonic())
|
||||||
self.sendLine("PING {}".format(token))
|
self.sendLine('PING {}'.format(token))
|
||||||
else:
|
|
||||||
token = None
|
|
||||||
got_pong = False
|
got_pong = False
|
||||||
data = b""
|
data = b''
|
||||||
(self.inbuffer, messages) = ([], self.inbuffer)
|
(self.inbuffer, messages) = ([], self.inbuffer)
|
||||||
conn = self.conn
|
conn = self.conn
|
||||||
try:
|
try:
|
||||||
@ -57,11 +38,12 @@ class ClientMock:
|
|||||||
try:
|
try:
|
||||||
new_data = conn.recv(4096)
|
new_data = conn.recv(4096)
|
||||||
except socket.timeout:
|
except socket.timeout:
|
||||||
if not assert_get_one and not synchronize and data == b"":
|
if not assert_get_one and not synchronize and data == b'':
|
||||||
# Received nothing
|
# Received nothing
|
||||||
return []
|
return []
|
||||||
if self.show_io:
|
if self.show_io:
|
||||||
print("{:.3f} {}: waiting…".format(time.time(), self.name))
|
print('{:.3f} waiting…'.format(time.time()))
|
||||||
|
time.sleep(0.1)
|
||||||
continue
|
continue
|
||||||
except ConnectionResetError:
|
except ConnectionResetError:
|
||||||
raise ConnectionClosed()
|
raise ConnectionClosed()
|
||||||
@ -70,38 +52,26 @@ class ClientMock:
|
|||||||
# Connection closed
|
# Connection closed
|
||||||
raise ConnectionClosed()
|
raise ConnectionClosed()
|
||||||
data += new_data
|
data += new_data
|
||||||
if not new_data.endswith(b"\r\n"):
|
if not new_data.endswith(b'\r\n'):
|
||||||
|
time.sleep(0.1)
|
||||||
continue
|
continue
|
||||||
if not synchronize:
|
if not synchronize:
|
||||||
got_pong = True
|
got_pong = True
|
||||||
for line in data.decode().split("\r\n"):
|
for line in data.decode().split('\r\n'):
|
||||||
if line:
|
if line:
|
||||||
if self.show_io:
|
if self.show_io:
|
||||||
print(
|
print('{time:.3f}{ssl} S -> {client}: {line}'.format(
|
||||||
"{time:.3f}{ssl} S -> {client}: {line}".format(
|
time=time.time(),
|
||||||
time=time.time(),
|
ssl=' (ssl)' if self.ssl else '',
|
||||||
ssl=" (ssl)" if self.ssl else "",
|
client=self.name,
|
||||||
client=self.name,
|
line=line))
|
||||||
line=line,
|
message = message_parser.parse_message(line + '\r\n')
|
||||||
)
|
if message.command == 'PONG' and \
|
||||||
)
|
token in message.params:
|
||||||
message = message_parser.parse_message(line)
|
|
||||||
if message.command == "PONG" and token in message.params:
|
|
||||||
got_pong = True
|
got_pong = True
|
||||||
elif (
|
|
||||||
synchronize
|
|
||||||
and message.command == "451"
|
|
||||||
and message.params[1] == "PING"
|
|
||||||
):
|
|
||||||
raise ValueError(
|
|
||||||
"Got '451 * PONG'. Did you forget synchronize=False?"
|
|
||||||
)
|
|
||||||
else:
|
else:
|
||||||
if raw:
|
messages.append(message)
|
||||||
messages.append(line) # type: ignore
|
data = b''
|
||||||
else:
|
|
||||||
messages.append(message)
|
|
||||||
data = b""
|
|
||||||
except ConnectionClosed:
|
except ConnectionClosed:
|
||||||
if messages:
|
if messages:
|
||||||
return messages
|
return messages
|
||||||
@ -109,58 +79,31 @@ class ClientMock:
|
|||||||
raise
|
raise
|
||||||
else:
|
else:
|
||||||
return messages
|
return messages
|
||||||
|
def getMessage(self, filter_pred=None, synchronize=True):
|
||||||
def getMessage(
|
|
||||||
self,
|
|
||||||
filter_pred: Optional[Callable[[message_parser.Message], bool]] = None,
|
|
||||||
synchronize: bool = True,
|
|
||||||
raw: bool = False,
|
|
||||||
) -> message_parser.Message:
|
|
||||||
"""Returns str in the rare case where raw=True"""
|
|
||||||
__tracebackhide__ = True # Hide from pytest tracebacks on test failure.
|
|
||||||
while True:
|
while True:
|
||||||
if not self.inbuffer:
|
if not self.inbuffer:
|
||||||
self.inbuffer = self.getMessages(
|
self.inbuffer = self.getMessages(
|
||||||
synchronize=synchronize, assert_get_one=True, raw=raw
|
synchronize=synchronize, assert_get_one=True)
|
||||||
)
|
|
||||||
if not self.inbuffer:
|
if not self.inbuffer:
|
||||||
raise NoMessageException()
|
raise NoMessageException()
|
||||||
message = self.inbuffer.pop(0) # TODO: use dequeue
|
message = self.inbuffer.pop(0) # TODO: use dequeue
|
||||||
if not filter_pred or filter_pred(message):
|
if not filter_pred or filter_pred(message):
|
||||||
return message
|
return message
|
||||||
|
def sendLine(self, line):
|
||||||
def sendLine(self, line: Union[str, bytes]) -> None:
|
if not line.endswith('\r\n'):
|
||||||
if isinstance(line, str):
|
line += '\r\n'
|
||||||
encoded_line = line.encode()
|
encoded_line = line.encode()
|
||||||
elif isinstance(line, bytes):
|
|
||||||
encoded_line = line
|
|
||||||
else:
|
|
||||||
raise ValueError(line)
|
|
||||||
if not encoded_line.endswith(b"\r\n"):
|
|
||||||
encoded_line += b"\r\n"
|
|
||||||
try:
|
try:
|
||||||
ret = self.conn.sendall(encoded_line) # type: ignore
|
ret = self.conn.sendall(encoded_line)
|
||||||
except BrokenPipeError:
|
except BrokenPipeError:
|
||||||
raise ConnectionClosed()
|
raise ConnectionClosed()
|
||||||
if (
|
if sys.version_info <= (3, 6) and self.ssl: # https://bugs.python.org/issue25951
|
||||||
sys.version_info <= (3, 6) and self.ssl
|
|
||||||
): # https://bugs.python.org/issue25951
|
|
||||||
assert ret == len(encoded_line), (ret, repr(encoded_line))
|
assert ret == len(encoded_line), (ret, repr(encoded_line))
|
||||||
else:
|
else:
|
||||||
assert ret is None, ret
|
assert ret is None, ret
|
||||||
if self.show_io:
|
if self.show_io:
|
||||||
if isinstance(line, str):
|
print('{time:.3f}{ssl} {client} -> S: {line}'.format(
|
||||||
escaped_line = line
|
time=time.time(),
|
||||||
escaped = ""
|
ssl=' (ssl)' if self.ssl else '',
|
||||||
else:
|
client=self.name,
|
||||||
escaped_line = repr(line)
|
line=line.strip('\r\n')))
|
||||||
escaped = " (escaped)"
|
|
||||||
print(
|
|
||||||
"{time:.3f}{escaped}{ssl} {client} -> S: {line}".format(
|
|
||||||
time=time.time(),
|
|
||||||
escaped=escaped,
|
|
||||||
ssl=" (ssl)" if self.ssl else "",
|
|
||||||
client=self.name,
|
|
||||||
line=escaped_line.strip("\r\n"),
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
@ -1,284 +0,0 @@
|
|||||||
"""SASL authentication from clients, for all known mechanisms.
|
|
||||||
|
|
||||||
For now, only `SASLv3.1 <https://ircv3.net/specs/extensions/sasl-3.1>`_
|
|
||||||
is tested, not `SASLv3.2 <https://ircv3.net/specs/extensions/sasl-3.2>`_."""
|
|
||||||
|
|
||||||
import base64
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
try:
|
|
||||||
import ecdsa
|
|
||||||
from ecdsa.util import sigdecode_der
|
|
||||||
except ImportError:
|
|
||||||
ecdsa = None
|
|
||||||
|
|
||||||
from irctest import authentication, cases, scram
|
|
||||||
from irctest.irc_utils.message_parser import Message
|
|
||||||
|
|
||||||
ECDSA_KEY = """
|
|
||||||
-----BEGIN EC PARAMETERS-----
|
|
||||||
BggqhkjOPQMBBw==
|
|
||||||
-----END EC PARAMETERS-----
|
|
||||||
-----BEGIN EC PRIVATE KEY-----
|
|
||||||
MHcCAQEEIIJueQ3W2IrGbe9wKdOI75yGS7PYZSj6W4tg854hlsvmoAoGCCqGSM49
|
|
||||||
AwEHoUQDQgAEAZmaVhNSMmV5r8FXPvKuMnqDKyIA9pDHN5TNMfiF3mMeikGgK10W
|
|
||||||
IRX9cyi2wdYg9mUUYyh9GKdBCYHGUJAiCA==
|
|
||||||
-----END EC PRIVATE KEY-----
|
|
||||||
"""
|
|
||||||
|
|
||||||
CHALLENGE = bytes(range(32))
|
|
||||||
assert len(CHALLENGE) == 32
|
|
||||||
|
|
||||||
|
|
||||||
class IdentityHash:
|
|
||||||
def __init__(self, data):
|
|
||||||
self._data = data
|
|
||||||
|
|
||||||
def digest(self):
|
|
||||||
return self._data
|
|
||||||
|
|
||||||
|
|
||||||
class SaslTestCase(cases.BaseClientTestCase):
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
def testPlain(self):
|
|
||||||
"""Test PLAIN authentication with correct username/password."""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.plain],
|
|
||||||
username="jilles",
|
|
||||||
password="sesame",
|
|
||||||
)
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["PLAIN"]))
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(
|
|
||||||
m, Message({}, None, "AUTHENTICATE", ["amlsbGVzAGppbGxlcwBzZXNhbWU="])
|
|
||||||
)
|
|
||||||
self.sendLine("900 * * jilles :You are now logged in.")
|
|
||||||
self.sendLine("903 * :SASL authentication successful")
|
|
||||||
m = self.negotiateCapabilities(["sasl"], False)
|
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
|
||||||
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
@cases.xfailIfSoftware(["Sopel"], "Sopel requests SASL PLAIN even if not available")
|
|
||||||
def testPlainNotAvailable(self):
|
|
||||||
"""`sasl=EXTERNAL` is advertized, whereas the client is configured
|
|
||||||
to use PLAIN.
|
|
||||||
|
|
||||||
A client implementing sasl-3.2 can give up authentication immediately.
|
|
||||||
A client not implementing it will try authenticating, and will get
|
|
||||||
a 904.
|
|
||||||
"""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.plain],
|
|
||||||
username="jilles",
|
|
||||||
password="sesame",
|
|
||||||
)
|
|
||||||
m = self.negotiateCapabilities(["sasl=EXTERNAL"], auth=auth)
|
|
||||||
self.assertEqual(self.acked_capabilities, {"sasl"})
|
|
||||||
if m == Message({}, None, "CAP", ["END"]):
|
|
||||||
# IRCv3.2-style, for clients that skip authentication
|
|
||||||
# when unavailable (eg. Limnoria)
|
|
||||||
return
|
|
||||||
elif m.command == "QUIT":
|
|
||||||
# IRCv3.2-style, for clients that quit when unavailable
|
|
||||||
# (eg. Sopel)
|
|
||||||
return
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["PLAIN"]))
|
|
||||||
self.sendLine("904 {} :SASL auth failed".format(self.nick))
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertMessageMatch(m, command="CAP")
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("pattern", ["barbaz", "éèà"])
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
def testPlainLarge(self, pattern):
|
|
||||||
"""Test the client splits large AUTHENTICATE messages whose payload
|
|
||||||
is not a multiple of 400.
|
|
||||||
<http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>
|
|
||||||
"""
|
|
||||||
# TODO: authzid is optional
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.plain],
|
|
||||||
username="foo",
|
|
||||||
password=pattern * 100,
|
|
||||||
)
|
|
||||||
authstring = base64.b64encode(
|
|
||||||
b"\x00".join([b"foo", b"foo", pattern.encode() * 100])
|
|
||||||
).decode()
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["PLAIN"]))
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", [authstring[0:400]]), m)
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", [authstring[400:800]]))
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", [authstring[800:]]))
|
|
||||||
self.sendLine("900 * * {} :You are now logged in.".format("foo"))
|
|
||||||
self.sendLine("903 * :SASL authentication successful")
|
|
||||||
m = self.negotiateCapabilities(["sasl"], False)
|
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
|
||||||
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
@pytest.mark.parametrize("pattern", ["quux", "éè"])
|
|
||||||
def testPlainLargeMultiple(self, pattern):
|
|
||||||
"""Test the client splits large AUTHENTICATE messages whose payload
|
|
||||||
is a multiple of 400.
|
|
||||||
<http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>
|
|
||||||
"""
|
|
||||||
# TODO: authzid is optional
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.plain],
|
|
||||||
username="foo",
|
|
||||||
password=pattern * 148,
|
|
||||||
)
|
|
||||||
authstring = base64.b64encode(
|
|
||||||
b"\x00".join([b"foo", b"foo", pattern.encode() * 148])
|
|
||||||
).decode()
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["PLAIN"]))
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", [authstring[0:400]]), m)
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", [authstring[400:800]]))
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["+"]))
|
|
||||||
self.sendLine("900 * * {} :You are now logged in.".format("foo"))
|
|
||||||
self.sendLine("903 * :SASL authentication successful")
|
|
||||||
m = self.negotiateCapabilities(["sasl"], False)
|
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
|
||||||
|
|
||||||
@pytest.mark.skipif(ecdsa is None, reason="python3-ecdsa is not available")
|
|
||||||
@cases.skipUnlessHasMechanism("ECDSA-NIST256P-CHALLENGE")
|
|
||||||
def testEcdsa(self):
|
|
||||||
"""Test ECDSA authentication."""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.ecdsa_nist256p_challenge],
|
|
||||||
username="jilles",
|
|
||||||
ecdsa_key=ECDSA_KEY,
|
|
||||||
)
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(
|
|
||||||
m, Message({}, None, "AUTHENTICATE", ["ECDSA-NIST256P-CHALLENGE"])
|
|
||||||
)
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["amlsbGVz"])) # jilles
|
|
||||||
self.sendLine(
|
|
||||||
"AUTHENTICATE {}".format(base64.b64encode(CHALLENGE).decode("ascii"))
|
|
||||||
)
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertMessageMatch(m, command="AUTHENTICATE")
|
|
||||||
sk = ecdsa.SigningKey.from_pem(ECDSA_KEY)
|
|
||||||
vk = sk.get_verifying_key()
|
|
||||||
signature = base64.b64decode(m.params[0])
|
|
||||||
try:
|
|
||||||
vk.verify(
|
|
||||||
signature, CHALLENGE, hashfunc=IdentityHash, sigdecode=sigdecode_der
|
|
||||||
)
|
|
||||||
except ecdsa.BadSignatureError:
|
|
||||||
raise AssertionError("Bad signature")
|
|
||||||
self.sendLine("900 * * foo :You are now logged in.")
|
|
||||||
self.sendLine("903 * :SASL authentication successful")
|
|
||||||
m = self.negotiateCapabilities(["sasl"], False)
|
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
|
||||||
|
|
||||||
@cases.skipUnlessHasMechanism("SCRAM-SHA-256")
|
|
||||||
def testScram(self):
|
|
||||||
"""Test SCRAM-SHA-256 authentication."""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.scram_sha_256],
|
|
||||||
username="jilles",
|
|
||||||
password="sesame",
|
|
||||||
)
|
|
||||||
|
|
||||||
class PasswdDb:
|
|
||||||
def get_password(self, *args):
|
|
||||||
return ("sesame", "plain")
|
|
||||||
|
|
||||||
authenticator = scram.SCRAMServerAuthenticator(
|
|
||||||
"SHA-256", channel_binding=False, password_database=PasswdDb()
|
|
||||||
)
|
|
||||||
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["SCRAM-SHA-256"]))
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
|
||||||
client_first = base64.b64decode(m.params[0])
|
|
||||||
response = authenticator.start(properties={}, initial_response=client_first)
|
|
||||||
assert isinstance(response, bytes), response
|
|
||||||
self.sendLine("AUTHENTICATE :" + base64.b64encode(response).decode())
|
|
||||||
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
|
||||||
msg = base64.b64decode(m.params[0])
|
|
||||||
r = authenticator.response(msg)
|
|
||||||
assert isinstance(r, tuple), r
|
|
||||||
assert len(r) == 2, r
|
|
||||||
(properties, response) = r
|
|
||||||
self.sendLine("AUTHENTICATE :" + base64.b64encode(response).decode())
|
|
||||||
self.assertEqual(properties, {"authzid": None, "username": "jilles"})
|
|
||||||
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
|
||||||
self.assertEqual(m.params, ["+"], m)
|
|
||||||
|
|
||||||
@cases.skipUnlessHasMechanism("SCRAM-SHA-256")
|
|
||||||
def testScramBadPassword(self):
|
|
||||||
"""Test SCRAM-SHA-256 authentication with a bad password."""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.scram_sha_256],
|
|
||||||
username="jilles",
|
|
||||||
password="sesame",
|
|
||||||
)
|
|
||||||
|
|
||||||
class PasswdDb:
|
|
||||||
def get_password(self, *args):
|
|
||||||
return ("notsesame", "plain")
|
|
||||||
|
|
||||||
authenticator = scram.SCRAMServerAuthenticator(
|
|
||||||
"SHA-256", channel_binding=False, password_database=PasswdDb()
|
|
||||||
)
|
|
||||||
|
|
||||||
m = self.negotiateCapabilities(["sasl"], auth=auth)
|
|
||||||
self.assertEqual(m, Message({}, None, "AUTHENTICATE", ["SCRAM-SHA-256"]))
|
|
||||||
self.sendLine("AUTHENTICATE +")
|
|
||||||
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
|
||||||
client_first = base64.b64decode(m.params[0])
|
|
||||||
response = authenticator.start(properties={}, initial_response=client_first)
|
|
||||||
assert isinstance(response, bytes), response
|
|
||||||
self.sendLine("AUTHENTICATE :" + base64.b64encode(response).decode())
|
|
||||||
|
|
||||||
m = self.getMessage()
|
|
||||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
|
||||||
msg = base64.b64decode(m.params[0])
|
|
||||||
with self.assertRaises(scram.NotAuthorizedException):
|
|
||||||
authenticator.response(msg)
|
|
||||||
|
|
||||||
|
|
||||||
class Irc302SaslTestCase(cases.BaseClientTestCase):
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
def testPlainNotAvailable(self):
|
|
||||||
"""Test the client does not try to authenticate using a mechanism the
|
|
||||||
server does not advertise.
|
|
||||||
Actually, this is optional."""
|
|
||||||
auth = authentication.Authentication(
|
|
||||||
mechanisms=[authentication.Mechanisms.plain],
|
|
||||||
username="jilles",
|
|
||||||
password="sesame",
|
|
||||||
)
|
|
||||||
m = self.negotiateCapabilities(["sasl=EXTERNAL"], auth=auth)
|
|
||||||
self.assertEqual(self.acked_capabilities, {"sasl"})
|
|
||||||
|
|
||||||
if m.command == "QUIT":
|
|
||||||
# Some clients quit when it can't authenticate (eg. Sopel)
|
|
||||||
pass
|
|
||||||
else:
|
|
||||||
# Others will just skip authentication (eg. Limnoria)
|
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
|
@ -1,17 +1,14 @@
|
|||||||
"""Format of ``CAP LS`` sent by IRCv3 clients."""
|
|
||||||
|
|
||||||
from irctest import cases
|
from irctest import cases
|
||||||
from irctest.irc_utils.message_parser import Message
|
from irctest.irc_utils.message_parser import Message
|
||||||
|
|
||||||
|
class CapTestCase(cases.BaseClientTestCase, cases.ClientNegociationHelper):
|
||||||
class CapTestCase(cases.BaseClientTestCase):
|
@cases.SpecificationSelector.requiredBySpecification('IRCv3.1', 'IRCv3.2')
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testSendCap(self):
|
def testSendCap(self):
|
||||||
"""Send CAP LS 302 and read the result."""
|
"""Send CAP LS 302 and read the result."""
|
||||||
self.readCapLs()
|
self.readCapLs()
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
@cases.SpecificationSelector.requiredBySpecification('IRCv3.1', 'IRCv3.2')
|
||||||
def testEmptyCapLs(self):
|
def testEmptyCapLs(self):
|
||||||
"""Empty result to CAP LS. Client should send CAP END."""
|
"""Empty result to CAP LS. Client should send CAP END."""
|
||||||
m = self.negotiateCapabilities([])
|
m = self.negotiateCapabilities([])
|
||||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
257
irctest/client_tests/test_sasl.py
Normal file
257
irctest/client_tests/test_sasl.py
Normal file
@ -0,0 +1,257 @@
|
|||||||
|
import hashlib
|
||||||
|
|
||||||
|
import ecdsa
|
||||||
|
from ecdsa.util import sigencode_der, sigdecode_der
|
||||||
|
import base64
|
||||||
|
import pyxmpp2_scram as scram
|
||||||
|
|
||||||
|
from irctest import cases
|
||||||
|
from irctest import authentication
|
||||||
|
from irctest.irc_utils.message_parser import Message
|
||||||
|
|
||||||
|
ECDSA_KEY = """
|
||||||
|
-----BEGIN EC PARAMETERS-----
|
||||||
|
BggqhkjOPQMBBw==
|
||||||
|
-----END EC PARAMETERS-----
|
||||||
|
-----BEGIN EC PRIVATE KEY-----
|
||||||
|
MHcCAQEEIIJueQ3W2IrGbe9wKdOI75yGS7PYZSj6W4tg854hlsvmoAoGCCqGSM49
|
||||||
|
AwEHoUQDQgAEAZmaVhNSMmV5r8FXPvKuMnqDKyIA9pDHN5TNMfiF3mMeikGgK10W
|
||||||
|
IRX9cyi2wdYg9mUUYyh9GKdBCYHGUJAiCA==
|
||||||
|
-----END EC PRIVATE KEY-----
|
||||||
|
"""
|
||||||
|
|
||||||
|
CHALLENGE = bytes(range(32))
|
||||||
|
assert len(CHALLENGE) == 32
|
||||||
|
|
||||||
|
class IdentityHash:
|
||||||
|
def __init__(self, data):
|
||||||
|
self._data = data
|
||||||
|
|
||||||
|
def digest(self):
|
||||||
|
return self._data
|
||||||
|
|
||||||
|
class SaslTestCase(cases.BaseClientTestCase, cases.ClientNegociationHelper,
|
||||||
|
cases.OptionalityHelper):
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('PLAIN')
|
||||||
|
def testPlain(self):
|
||||||
|
"""Test PLAIN authentication with correct username/password."""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.plain],
|
||||||
|
username='jilles',
|
||||||
|
password='sesame',
|
||||||
|
)
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['PLAIN']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
['amlsbGVzAGppbGxlcwBzZXNhbWU=']))
|
||||||
|
self.sendLine('900 * * jilles :You are now logged in.')
|
||||||
|
self.sendLine('903 * :SASL authentication successful')
|
||||||
|
m = self.negotiateCapabilities(['sasl'], False)
|
||||||
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('PLAIN')
|
||||||
|
def testPlainNotAvailable(self):
|
||||||
|
"""`sasl=EXTERNAL` is advertized, whereas the client is configured
|
||||||
|
to use PLAIN.
|
||||||
|
|
||||||
|
A client implementing sasl-3.2 can give up authentication immediately.
|
||||||
|
A client not implementing it will try authenticating, and will get
|
||||||
|
a 904.
|
||||||
|
"""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.plain],
|
||||||
|
username='jilles',
|
||||||
|
password='sesame',
|
||||||
|
)
|
||||||
|
m = self.negotiateCapabilities(['sasl=EXTERNAL'], auth=auth)
|
||||||
|
self.assertEqual(self.acked_capabilities, {'sasl'})
|
||||||
|
if m == Message([], None, 'CAP', ['END']):
|
||||||
|
# IRCv3.2-style
|
||||||
|
return
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['PLAIN']))
|
||||||
|
self.sendLine('904 {} :SASL auth failed'.format(self.nick))
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertMessageEqual(m, command='CAP')
|
||||||
|
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('PLAIN')
|
||||||
|
def testPlainLarge(self):
|
||||||
|
"""Test the client splits large AUTHENTICATE messages whose payload
|
||||||
|
is not a multiple of 400.
|
||||||
|
<http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>
|
||||||
|
"""
|
||||||
|
# TODO: authzid is optional
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.plain],
|
||||||
|
username='foo',
|
||||||
|
password='bar'*200,
|
||||||
|
)
|
||||||
|
authstring = base64.b64encode(b'\x00'.join(
|
||||||
|
[b'foo', b'foo', b'bar'*200])).decode()
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['PLAIN']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
[authstring[0:400]]), m)
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
[authstring[400:800]]))
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
[authstring[800:]]))
|
||||||
|
self.sendLine('900 * * {} :You are now logged in.'.format('foo'))
|
||||||
|
self.sendLine('903 * :SASL authentication successful')
|
||||||
|
m = self.negotiateCapabilities(['sasl'], False)
|
||||||
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('PLAIN')
|
||||||
|
def testPlainLargeMultiple(self):
|
||||||
|
"""Test the client splits large AUTHENTICATE messages whose payload
|
||||||
|
is a multiple of 400.
|
||||||
|
<http://ircv3.net/specs/extensions/sasl-3.1.html#the-authenticate-command>
|
||||||
|
"""
|
||||||
|
# TODO: authzid is optional
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.plain],
|
||||||
|
username='foo',
|
||||||
|
password='quux'*148,
|
||||||
|
)
|
||||||
|
authstring = base64.b64encode(b'\x00'.join(
|
||||||
|
[b'foo', b'foo', b'quux'*148])).decode()
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['PLAIN']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
[authstring[0:400]]), m)
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
[authstring[400:800]]))
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
['+']))
|
||||||
|
self.sendLine('900 * * {} :You are now logged in.'.format('foo'))
|
||||||
|
self.sendLine('903 * :SASL authentication successful')
|
||||||
|
m = self.negotiateCapabilities(['sasl'], False)
|
||||||
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('ECDSA-NIST256P-CHALLENGE')
|
||||||
|
def testEcdsa(self):
|
||||||
|
"""Test ECDSA authentication.
|
||||||
|
"""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.ecdsa_nist256p_challenge],
|
||||||
|
username='jilles',
|
||||||
|
ecdsa_key=ECDSA_KEY,
|
||||||
|
)
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['ECDSA-NIST256P-CHALLENGE']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE',
|
||||||
|
['amlsbGVz'])) # jilles
|
||||||
|
self.sendLine('AUTHENTICATE {}'.format(base64.b64encode(CHALLENGE).decode('ascii')))
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertMessageEqual(m, command='AUTHENTICATE')
|
||||||
|
sk = ecdsa.SigningKey.from_pem(ECDSA_KEY)
|
||||||
|
vk = sk.get_verifying_key()
|
||||||
|
signature = base64.b64decode(m.params[0])
|
||||||
|
try:
|
||||||
|
vk.verify(signature, CHALLENGE, hashfunc=IdentityHash, sigdecode=sigdecode_der)
|
||||||
|
except ecdsa.BadSignatureError:
|
||||||
|
raise AssertionError('Bad signature')
|
||||||
|
self.sendLine('900 * * foo :You are now logged in.')
|
||||||
|
self.sendLine('903 * :SASL authentication successful')
|
||||||
|
m = self.negotiateCapabilities(['sasl'], False)
|
||||||
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('SCRAM-SHA-256')
|
||||||
|
def testScram(self):
|
||||||
|
"""Test SCRAM-SHA-256 authentication.
|
||||||
|
"""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.scram_sha_256],
|
||||||
|
username='jilles',
|
||||||
|
password='sesame',
|
||||||
|
)
|
||||||
|
class PasswdDb:
|
||||||
|
def get_password(self, *args):
|
||||||
|
return ('sesame', 'plain')
|
||||||
|
authenticator = scram.SCRAMServerAuthenticator('SHA-256',
|
||||||
|
channel_binding=False, password_database=PasswdDb())
|
||||||
|
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['SCRAM-SHA-256']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m.command, 'AUTHENTICATE', m)
|
||||||
|
client_first = base64.b64decode(m.params[0])
|
||||||
|
response = authenticator.start(properties={}, initial_response=client_first)
|
||||||
|
assert isinstance(response, bytes), response
|
||||||
|
self.sendLine('AUTHENTICATE :' + base64.b64encode(response).decode())
|
||||||
|
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m.command, 'AUTHENTICATE', m)
|
||||||
|
msg = base64.b64decode(m.params[0])
|
||||||
|
r = authenticator.response(msg)
|
||||||
|
assert isinstance(r, tuple), r
|
||||||
|
assert len(r) == 2, r
|
||||||
|
(properties, response) = r
|
||||||
|
self.sendLine('AUTHENTICATE :' + base64.b64encode(response).decode())
|
||||||
|
self.assertEqual(properties, {'authzid': None, 'username': 'jilles'})
|
||||||
|
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m.command, 'AUTHENTICATE', m)
|
||||||
|
self.assertEqual(m.params, ['+'], m)
|
||||||
|
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('SCRAM-SHA-256')
|
||||||
|
def testScramBadPassword(self):
|
||||||
|
"""Test SCRAM-SHA-256 authentication with a bad password.
|
||||||
|
"""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.scram_sha_256],
|
||||||
|
username='jilles',
|
||||||
|
password='sesame',
|
||||||
|
)
|
||||||
|
class PasswdDb:
|
||||||
|
def get_password(self, *args):
|
||||||
|
return ('notsesame', 'plain')
|
||||||
|
authenticator = scram.SCRAMServerAuthenticator('SHA-256',
|
||||||
|
channel_binding=False, password_database=PasswdDb())
|
||||||
|
|
||||||
|
m = self.negotiateCapabilities(['sasl'], auth=auth)
|
||||||
|
self.assertEqual(m, Message([], None, 'AUTHENTICATE', ['SCRAM-SHA-256']))
|
||||||
|
self.sendLine('AUTHENTICATE +')
|
||||||
|
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m.command, 'AUTHENTICATE', m)
|
||||||
|
client_first = base64.b64decode(m.params[0])
|
||||||
|
response = authenticator.start(properties={}, initial_response=client_first)
|
||||||
|
assert isinstance(response, bytes), response
|
||||||
|
self.sendLine('AUTHENTICATE :' + base64.b64encode(response).decode())
|
||||||
|
|
||||||
|
m = self.getMessage()
|
||||||
|
self.assertEqual(m.command, 'AUTHENTICATE', m)
|
||||||
|
msg = base64.b64decode(m.params[0])
|
||||||
|
with self.assertRaises(scram.NotAuthorizedException):
|
||||||
|
authenticator.response(msg)
|
||||||
|
|
||||||
|
class Irc302SaslTestCase(cases.BaseClientTestCase, cases.ClientNegociationHelper,
|
||||||
|
cases.OptionalityHelper):
|
||||||
|
@cases.OptionalityHelper.skipUnlessHasMechanism('PLAIN')
|
||||||
|
def testPlainNotAvailable(self):
|
||||||
|
"""Test the client does not try to authenticate using a mechanism the
|
||||||
|
server does not advertise.
|
||||||
|
Actually, this is optional."""
|
||||||
|
auth = authentication.Authentication(
|
||||||
|
mechanisms=[authentication.Mechanisms.plain],
|
||||||
|
username='jilles',
|
||||||
|
password='sesame',
|
||||||
|
)
|
||||||
|
m = self.negotiateCapabilities(['sasl=EXTERNAL'], auth=auth)
|
||||||
|
self.assertEqual(self.acked_capabilities, {'sasl'})
|
||||||
|
self.assertEqual(m, Message([], None, 'CAP', ['END']))
|
@ -1,13 +1,10 @@
|
|||||||
"""Clients should validate certificates; either with a CA or fingerprints."""
|
|
||||||
|
|
||||||
import socket
|
import socket
|
||||||
import ssl
|
import ssl
|
||||||
|
|
||||||
import pytest
|
from irctest import tls
|
||||||
|
from irctest import cases
|
||||||
from irctest import cases, runner, tls
|
|
||||||
from irctest.exceptions import ConnectionClosed
|
from irctest.exceptions import ConnectionClosed
|
||||||
from irctest.patma import ANYSTR
|
from irctest.irc_utils.message_parser import Message
|
||||||
|
|
||||||
BAD_CERT = """
|
BAD_CERT = """
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
@ -63,7 +60,7 @@ h4WuPDAI4yh24GjaCZYGR5xcqPCy5CNjMLxdA7HsP+Gcr3eY5XS7noBrbC6IaA0j
|
|||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
"""
|
"""
|
||||||
|
|
||||||
GOOD_FINGERPRINT = "E1EE6DE2DBC0D43E3B60407B5EE389AEC9D2C53178E0FB14CD51C3DFD544AA2B"
|
GOOD_FINGERPRINT = 'E1EE6DE2DBC0D43E3B60407B5EE389AEC9D2C53178E0FB14CD51C3DFD544AA2B'
|
||||||
GOOD_CERT = """
|
GOOD_CERT = """
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIIDXTCCAkWgAwIBAgIJAKtD9XMC1R0vMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV
|
MIIDXTCCAkWgAwIBAgIJAKtD9XMC1R0vMA0GCSqGSIb3DQEBCwUAMEUxCzAJBgNV
|
||||||
@ -118,78 +115,83 @@ El9iqRlAhgqaXc4Iz/Zxxhs=
|
|||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
class TlsTestCase(cases.BaseClientTestCase):
|
class TlsTestCase(cases.BaseClientTestCase):
|
||||||
def testTrustedCertificate(self):
|
def testTrustedCertificate(self):
|
||||||
tls_config = tls.TlsConfig(enable=True, trusted_fingerprints=[GOOD_FINGERPRINT])
|
tls_config = tls.TlsConfig(
|
||||||
|
enable=True,
|
||||||
|
trusted_fingerprints=[GOOD_FINGERPRINT])
|
||||||
(hostname, port) = self.server.getsockname()
|
(hostname, port) = self.server.getsockname()
|
||||||
self.controller.run(
|
self.controller.run(
|
||||||
hostname=hostname, port=port, auth=None, tls_config=tls_config
|
hostname=hostname,
|
||||||
)
|
port=port,
|
||||||
|
auth=None,
|
||||||
|
tls_config=tls_config,
|
||||||
|
)
|
||||||
self.acceptClient(tls_cert=GOOD_CERT, tls_key=GOOD_KEY)
|
self.acceptClient(tls_cert=GOOD_CERT, tls_key=GOOD_KEY)
|
||||||
self.getMessage()
|
m = self.getMessage()
|
||||||
|
|
||||||
def testUntrustedCertificate(self):
|
def testUntrustedCertificate(self):
|
||||||
tls_config = tls.TlsConfig(enable=True, trusted_fingerprints=[GOOD_FINGERPRINT])
|
tls_config = tls.TlsConfig(
|
||||||
|
enable=True,
|
||||||
|
trusted_fingerprints=[GOOD_FINGERPRINT])
|
||||||
(hostname, port) = self.server.getsockname()
|
(hostname, port) = self.server.getsockname()
|
||||||
self.controller.run(
|
self.controller.run(
|
||||||
hostname=hostname, port=port, auth=None, tls_config=tls_config
|
hostname=hostname,
|
||||||
)
|
port=port,
|
||||||
|
auth=None,
|
||||||
|
tls_config=tls_config,
|
||||||
|
)
|
||||||
self.acceptClient(tls_cert=BAD_CERT, tls_key=BAD_KEY)
|
self.acceptClient(tls_cert=BAD_CERT, tls_key=BAD_KEY)
|
||||||
with self.assertRaises((ConnectionClosed, ConnectionResetError)):
|
with self.assertRaises((ConnectionClosed, ConnectionResetError)):
|
||||||
self.getMessage()
|
m = self.getMessage()
|
||||||
|
|
||||||
|
|
||||||
class StsTestCase(cases.BaseClientTestCase):
|
class StsTestCase(cases.BaseClientTestCase, cases.OptionalityHelper):
|
||||||
def setUp(self):
|
def setUp(self):
|
||||||
super().setUp()
|
super().setUp()
|
||||||
self.insecure_server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
self.insecure_server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||||
self.insecure_server.bind(("", 0)) # Bind any free port
|
self.insecure_server.bind(('', 0)) # Bind any free port
|
||||||
self.insecure_server.listen(1)
|
self.insecure_server.listen(1)
|
||||||
|
|
||||||
def tearDown(self):
|
def tearDown(self):
|
||||||
self.insecure_server.close()
|
self.insecure_server.close()
|
||||||
super().tearDown()
|
super().tearDown()
|
||||||
|
|
||||||
@cases.mark_capabilities("sts")
|
@cases.OptionalityHelper.skipUnlessSupportsCapability('sts')
|
||||||
@pytest.mark.parametrize("portOnSecure", [False, True])
|
def testSts(self):
|
||||||
def testSts(self, portOnSecure):
|
|
||||||
if not self.controller.supports_sts:
|
|
||||||
raise runner.CapabilityNotSupported("sts")
|
|
||||||
tls_config = tls.TlsConfig(
|
tls_config = tls.TlsConfig(
|
||||||
enable=False, trusted_fingerprints=[GOOD_FINGERPRINT]
|
enable=False,
|
||||||
)
|
trusted_fingerprints=[GOOD_FINGERPRINT])
|
||||||
|
|
||||||
# Connect client to insecure server
|
# Connect client to insecure server
|
||||||
(hostname, port) = self.insecure_server.getsockname()
|
(hostname, port) = self.insecure_server.getsockname()
|
||||||
self.controller.run(
|
self.controller.run(
|
||||||
hostname=hostname, port=port, auth=None, tls_config=tls_config
|
hostname=hostname,
|
||||||
)
|
port=port,
|
||||||
|
auth=None,
|
||||||
|
tls_config=tls_config,
|
||||||
|
)
|
||||||
self.acceptClient(server=self.insecure_server)
|
self.acceptClient(server=self.insecure_server)
|
||||||
|
|
||||||
# Send STS policy to client
|
# Send STS policy to client
|
||||||
self.assertMessageMatch(
|
m = self.getMessage()
|
||||||
self.getMessage(),
|
self.assertEqual(m.command, 'CAP',
|
||||||
command="CAP",
|
'First message is not CAP LS.')
|
||||||
params=["LS", ANYSTR],
|
self.assertEqual(m.params[0], 'LS',
|
||||||
fail_msg="First message is not CAP LS: {got}",
|
'First message is not CAP LS.')
|
||||||
)
|
self.sendLine('CAP * LS :sts=port={}'.format(self.server.getsockname()[1]))
|
||||||
self.sendLine("CAP * LS :sts=port={}".format(self.server.getsockname()[1]))
|
|
||||||
|
|
||||||
# "If the client is not already connected securely to the server
|
# "If the client is not already connected securely to the server
|
||||||
# at the requested hostname, it MUST close the insecure connection
|
# at the requested hostname, it MUST close the insecure connection
|
||||||
# and reconnect securely on the stated port."
|
# and reconnect securely on the stated port."
|
||||||
self.acceptClient(tls_cert=GOOD_CERT, tls_key=GOOD_KEY)
|
self.acceptClient(tls_cert=GOOD_CERT, tls_key=GOOD_KEY)
|
||||||
|
|
||||||
# Send the STS policy, over secure connection this time.
|
# Send the STS policy, over secure connection this time
|
||||||
if portOnSecure:
|
self.sendLine('CAP * LS :sts=duration=10,port={}'.format(
|
||||||
# Should be ignored
|
self.server.getsockname()[1]))
|
||||||
self.sendLine("CAP * LS :sts=duration=10,port=12345")
|
|
||||||
else:
|
|
||||||
self.sendLine("CAP * LS :sts=duration=10")
|
|
||||||
|
|
||||||
# Make the client reconnect. It should reconnect to the secure server.
|
# Make the client reconnect. It should reconnect to the secure server.
|
||||||
self.sendLine("ERROR :closing link")
|
self.sendLine('ERROR :closing link')
|
||||||
self.acceptClient()
|
self.acceptClient()
|
||||||
|
|
||||||
# Kill the client
|
# Kill the client
|
||||||
@ -197,31 +199,34 @@ class StsTestCase(cases.BaseClientTestCase):
|
|||||||
|
|
||||||
# Run the client, still configured to connect to the insecure server
|
# Run the client, still configured to connect to the insecure server
|
||||||
self.controller.run(
|
self.controller.run(
|
||||||
hostname=hostname, port=port, auth=None, tls_config=tls_config
|
hostname=hostname,
|
||||||
)
|
port=port,
|
||||||
|
auth=None,
|
||||||
|
tls_config=tls_config,
|
||||||
|
)
|
||||||
|
|
||||||
# The client should remember the STS policy and connect to the secure
|
# The client should remember the STS policy and connect to the secure
|
||||||
# server
|
# server
|
||||||
self.acceptClient()
|
self.acceptClient()
|
||||||
|
|
||||||
@cases.mark_capabilities("sts")
|
@cases.OptionalityHelper.skipUnlessSupportsCapability('sts')
|
||||||
def testStsInvalidCertificate(self):
|
def testStsInvalidCertificate(self):
|
||||||
if not self.controller.supports_sts:
|
|
||||||
raise runner.CapabilityNotSupported("sts")
|
|
||||||
|
|
||||||
# Connect client to insecure server
|
# Connect client to insecure server
|
||||||
(hostname, port) = self.insecure_server.getsockname()
|
(hostname, port) = self.insecure_server.getsockname()
|
||||||
self.controller.run(hostname=hostname, port=port, auth=None)
|
self.controller.run(
|
||||||
|
hostname=hostname,
|
||||||
|
port=port,
|
||||||
|
auth=None,
|
||||||
|
)
|
||||||
self.acceptClient(server=self.insecure_server)
|
self.acceptClient(server=self.insecure_server)
|
||||||
|
|
||||||
# Send STS policy to client
|
# Send STS policy to client
|
||||||
self.assertMessageMatch(
|
m = self.getMessage()
|
||||||
self.getMessage(),
|
self.assertEqual(m.command, 'CAP',
|
||||||
command="CAP",
|
'First message is not CAP LS.')
|
||||||
params=["LS", ANYSTR],
|
self.assertEqual(m.params[0], 'LS',
|
||||||
fail_msg="First message is not CAP LS: {got}",
|
'First message is not CAP LS.')
|
||||||
)
|
self.sendLine('CAP * LS :sts=port={}'.format(self.server.getsockname()[1]))
|
||||||
self.sendLine("CAP * LS :sts=port={}".format(self.server.getsockname()[1]))
|
|
||||||
|
|
||||||
# The client will reconnect to the TLS port. Unfortunately, it does
|
# The client will reconnect to the TLS port. Unfortunately, it does
|
||||||
# not trust its fingerprint.
|
# not trust its fingerprint.
|
@ -1,125 +0,0 @@
|
|||||||
from pathlib import Path
|
|
||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServicesController, DirectoryBasedController
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
serverinfo {{
|
|
||||||
name = "services.example.org"
|
|
||||||
description = "Anope IRC Services"
|
|
||||||
numeric = "00A"
|
|
||||||
pid = "services.pid"
|
|
||||||
motd = "conf/empty_file"
|
|
||||||
}}
|
|
||||||
|
|
||||||
uplink {{
|
|
||||||
host = "{server_hostname}"
|
|
||||||
port = {server_port}
|
|
||||||
password = "password"
|
|
||||||
}}
|
|
||||||
|
|
||||||
module {{
|
|
||||||
name = "{protocol}"
|
|
||||||
}}
|
|
||||||
|
|
||||||
networkinfo {{
|
|
||||||
networkname = "testnet"
|
|
||||||
nicklen = 31
|
|
||||||
userlen = 10
|
|
||||||
hostlen = 64
|
|
||||||
chanlen = 32
|
|
||||||
}}
|
|
||||||
|
|
||||||
mail {{
|
|
||||||
usemail = no
|
|
||||||
}}
|
|
||||||
|
|
||||||
service {{
|
|
||||||
nick = "NickServ"
|
|
||||||
user = "services"
|
|
||||||
host = "services.host"
|
|
||||||
gecos = "Nickname Registration Service"
|
|
||||||
}}
|
|
||||||
|
|
||||||
module {{
|
|
||||||
name = "nickserv"
|
|
||||||
client = "NickServ"
|
|
||||||
forceemail = no
|
|
||||||
passlen = 1000 # Some tests need long passwords
|
|
||||||
}}
|
|
||||||
command {{ service = "NickServ"; name = "HELP"; command = "generic/help"; }}
|
|
||||||
|
|
||||||
module {{
|
|
||||||
name = "ns_register"
|
|
||||||
registration = "none"
|
|
||||||
}}
|
|
||||||
command {{ service = "NickServ"; name = "REGISTER"; command = "nickserv/register"; }}
|
|
||||||
|
|
||||||
options {{
|
|
||||||
casemap = "ascii"
|
|
||||||
readtimeout = 5s
|
|
||||||
warningtimeout = 4h
|
|
||||||
}}
|
|
||||||
|
|
||||||
module {{ name = "m_sasl" }}
|
|
||||||
module {{ name = "enc_sha256" }}
|
|
||||||
module {{ name = "ns_cert" }}
|
|
||||||
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class AnopeController(BaseServicesController, DirectoryBasedController):
|
|
||||||
"""Collaborator for server controllers that rely on Anope"""
|
|
||||||
|
|
||||||
software_name = "Anope"
|
|
||||||
|
|
||||||
def run(self, protocol: str, server_hostname: str, server_port: int) -> None:
|
|
||||||
self.create_config()
|
|
||||||
|
|
||||||
assert protocol in (
|
|
||||||
"bahamut",
|
|
||||||
"inspircd3",
|
|
||||||
"charybdis",
|
|
||||||
"hybrid",
|
|
||||||
"plexus",
|
|
||||||
"unreal4",
|
|
||||||
"ngircd",
|
|
||||||
)
|
|
||||||
|
|
||||||
with self.open_file("conf/services.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
protocol=protocol,
|
|
||||||
server_hostname=server_hostname,
|
|
||||||
server_port=server_port,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
with self.open_file("conf/empty_file") as fd:
|
|
||||||
pass
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
services_path = shutil.which("services")
|
|
||||||
assert services_path
|
|
||||||
|
|
||||||
# Config and code need to be in the same directory, *obviously*
|
|
||||||
(self.directory / "lib").symlink_to(Path(services_path).parent.parent / "lib")
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
"services",
|
|
||||||
"-n", # don't fork
|
|
||||||
"--config=services.conf", # can't be an absolute path
|
|
||||||
# "--logdir",
|
|
||||||
# f"/tmp/services-{server_port}.log",
|
|
||||||
],
|
|
||||||
cwd=self.directory,
|
|
||||||
# stdout=subprocess.DEVNULL,
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[AnopeController]:
|
|
||||||
return AnopeController
|
|
@ -1,111 +0,0 @@
|
|||||||
import subprocess
|
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
import irctest
|
|
||||||
from irctest.basecontrollers import BaseServicesController, DirectoryBasedController
|
|
||||||
import irctest.cases
|
|
||||||
import irctest.runner
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
loadmodule "modules/protocol/{protocol}";
|
|
||||||
loadmodule "modules/backend/opensex";
|
|
||||||
loadmodule "modules/crypto/pbkdf2";
|
|
||||||
|
|
||||||
loadmodule "modules/nickserv/main";
|
|
||||||
loadmodule "modules/nickserv/cert";
|
|
||||||
loadmodule "modules/nickserv/register";
|
|
||||||
loadmodule "modules/nickserv/verify";
|
|
||||||
|
|
||||||
loadmodule "modules/saslserv/main";
|
|
||||||
loadmodule "modules/saslserv/authcookie";
|
|
||||||
#loadmodule "modules/saslserv/ecdh-x25519-challenge";
|
|
||||||
loadmodule "modules/saslserv/ecdsa-nist256p-challenge";
|
|
||||||
loadmodule "modules/saslserv/external";
|
|
||||||
loadmodule "modules/saslserv/plain";
|
|
||||||
#loadmodule "modules/saslserv/scram";
|
|
||||||
|
|
||||||
serverinfo {{
|
|
||||||
name = "services.example.org";
|
|
||||||
desc = "Atheme IRC Services";
|
|
||||||
numeric = "00A";
|
|
||||||
netname = "testnet";
|
|
||||||
adminname = "no admin";
|
|
||||||
adminemail = "no-admin@example.org";
|
|
||||||
registeremail = "registration@example.org";
|
|
||||||
auth = none; // Disable email check
|
|
||||||
}};
|
|
||||||
|
|
||||||
general {{
|
|
||||||
commit_interval = 5;
|
|
||||||
}};
|
|
||||||
|
|
||||||
uplink "My.Little.Server" {{
|
|
||||||
host = "{server_hostname}";
|
|
||||||
port = {server_port};
|
|
||||||
send_password = "password";
|
|
||||||
receive_password = "password";
|
|
||||||
}};
|
|
||||||
|
|
||||||
saslserv {{
|
|
||||||
nick = "SaslServ";
|
|
||||||
}};
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class AthemeController(BaseServicesController, DirectoryBasedController):
|
|
||||||
"""Mixin for server controllers that rely on Atheme"""
|
|
||||||
|
|
||||||
software_name = "Atheme"
|
|
||||||
|
|
||||||
def run(self, protocol: str, server_hostname: str, server_port: int) -> None:
|
|
||||||
self.create_config()
|
|
||||||
|
|
||||||
if protocol == "inspircd3":
|
|
||||||
# That's the name used by Anope
|
|
||||||
protocol = "inspircd"
|
|
||||||
assert protocol in ("bahamut", "inspircd", "charybdis", "unreal4", "ngircd")
|
|
||||||
|
|
||||||
with self.open_file("services.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
protocol=protocol,
|
|
||||||
server_hostname=server_hostname,
|
|
||||||
server_port=server_port,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
"atheme-services",
|
|
||||||
"-n", # don't fork
|
|
||||||
"-c",
|
|
||||||
self.directory / "services.conf",
|
|
||||||
"-l",
|
|
||||||
f"/tmp/services-{server_port}.log",
|
|
||||||
"-p",
|
|
||||||
self.directory / "services.pid",
|
|
||||||
"-D",
|
|
||||||
self.directory,
|
|
||||||
],
|
|
||||||
# stdout=subprocess.DEVNULL,
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
def registerUser(
|
|
||||||
self,
|
|
||||||
case: irctest.cases.BaseServerTestCase,
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
assert password
|
|
||||||
if len(password.encode()) > 288:
|
|
||||||
# It's hardcoded at compile-time :(
|
|
||||||
# https://github.com/atheme/atheme/blob/4fa0e03bd3ce2cb6041a339f308616580c5aac29/include/atheme/constants.h#L51
|
|
||||||
raise irctest.runner.NotImplementedByController("Passwords over 288 bytes")
|
|
||||||
|
|
||||||
super().registerUser(case, username, password)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[AthemeController]:
|
|
||||||
return AthemeController
|
|
@ -1,176 +0,0 @@
|
|||||||
from pathlib import Path
|
|
||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Set, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
global {{
|
|
||||||
name My.Little.Server; # IRC name of the server
|
|
||||||
info "located on earth"; # A short info line
|
|
||||||
}};
|
|
||||||
|
|
||||||
options {{
|
|
||||||
network_name unconfigured;
|
|
||||||
allow_split_ops; # Give ops in empty channels
|
|
||||||
|
|
||||||
services_name services.example.org;
|
|
||||||
|
|
||||||
// if you need to link more than 1 server, uncomment the following line
|
|
||||||
servtype hub;
|
|
||||||
}};
|
|
||||||
|
|
||||||
/* where to listen for connections */
|
|
||||||
port {{
|
|
||||||
port {port};
|
|
||||||
bind {hostname};
|
|
||||||
}};
|
|
||||||
|
|
||||||
/* allow clients to connect */
|
|
||||||
allow {{
|
|
||||||
host *@*; # Allow anyone
|
|
||||||
class users; # Place them in the users class
|
|
||||||
flags T; # No throttling
|
|
||||||
{password_field}
|
|
||||||
}};
|
|
||||||
|
|
||||||
/* connection class for users */
|
|
||||||
class {{
|
|
||||||
name users; # Class name
|
|
||||||
maxusers 100; # Maximum connections
|
|
||||||
pingfreq 1000; # Check idle connections every N seconds
|
|
||||||
maxsendq 100000; # 100KB send buffer limit
|
|
||||||
}};
|
|
||||||
|
|
||||||
/* for services */
|
|
||||||
super {{
|
|
||||||
"services.example.org";
|
|
||||||
}};
|
|
||||||
|
|
||||||
|
|
||||||
/* class for services */
|
|
||||||
class {{
|
|
||||||
name services;
|
|
||||||
pingfreq 60; # Idle check every minute
|
|
||||||
maxsendq 5000000; # 5MB backlog buffer
|
|
||||||
}};
|
|
||||||
|
|
||||||
/* our services */
|
|
||||||
connect {{
|
|
||||||
name services.example.org;
|
|
||||||
host *@127.0.0.1; # unfortunately, masks aren't allowed here
|
|
||||||
apasswd password;
|
|
||||||
cpasswd password;
|
|
||||||
class services;
|
|
||||||
}};
|
|
||||||
|
|
||||||
oper {{
|
|
||||||
name operuser;
|
|
||||||
host *@*;
|
|
||||||
passwd operpassword;
|
|
||||||
access *Aa;
|
|
||||||
class users;
|
|
||||||
}};
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
def initialize_entropy(directory: Path) -> None:
|
|
||||||
# https://github.com/DALnet/bahamut/blob/7fc039d403f66a954225c5dc4ad1fe683aedd794/include/dh.h#L35-L38
|
|
||||||
nb_rand_bytes = 512 // 8
|
|
||||||
# https://github.com/DALnet/bahamut/blob/7fc039d403f66a954225c5dc4ad1fe683aedd794/src/dh.c#L186
|
|
||||||
entropy_file_size = nb_rand_bytes * 4
|
|
||||||
|
|
||||||
# Not actually random; but we don't care.
|
|
||||||
entropy = b"\x00" * entropy_file_size
|
|
||||||
|
|
||||||
with (directory / ".ircd.entropy").open("wb") as fd:
|
|
||||||
fd.write(entropy)
|
|
||||||
|
|
||||||
|
|
||||||
class BahamutController(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "Bahamut"
|
|
||||||
supported_sasl_mechanisms: Set[str] = set()
|
|
||||||
supports_sts = False
|
|
||||||
nickserv = "NickServ@services.example.org"
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
(unused_hostname, unused_port) = self.get_hostname_and_port()
|
|
||||||
(services_hostname, services_port) = self.get_hostname_and_port()
|
|
||||||
|
|
||||||
password_field = "passwd {};".format(password) if password else ""
|
|
||||||
|
|
||||||
self.gen_ssl()
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
# Bahamut reads some bytes from /dev/urandom on startup, which causes
|
|
||||||
# GitHub Actions to sometimes freeze and timeout.
|
|
||||||
# This initializes the entropy file so Bahamut does not need to do it itself.
|
|
||||||
initialize_entropy(self.directory)
|
|
||||||
|
|
||||||
# they are hardcoded... thankfully Bahamut reads them from the CWD.
|
|
||||||
shutil.copy(self.pem_path, self.directory / "ircd.crt")
|
|
||||||
shutil.copy(self.key_path, self.directory / "ircd.key")
|
|
||||||
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
services_hostname=services_hostname,
|
|
||||||
services_port=services_port,
|
|
||||||
password_field=password_field,
|
|
||||||
# key_path=self.key_path,
|
|
||||||
# pem_path=self.pem_path,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"ircd",
|
|
||||||
"-t", # don't fork
|
|
||||||
"-f",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
if run_services:
|
|
||||||
self.wait_for_port()
|
|
||||||
self.services_controller = self.services_controller_class(
|
|
||||||
self.test_config, self
|
|
||||||
)
|
|
||||||
self.services_controller.run(
|
|
||||||
protocol="bahamut",
|
|
||||||
server_hostname=hostname,
|
|
||||||
server_port=port,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[BahamutController]:
|
|
||||||
return BahamutController
|
|
@ -1,95 +0,0 @@
|
|||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
|
||||||
|
|
||||||
TEMPLATE_SSL_CONFIG = """
|
|
||||||
ssl_private_key = "{key_path}";
|
|
||||||
ssl_cert = "{pem_path}";
|
|
||||||
ssl_dh_params = "{dh_path}";
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class BaseHybridController(BaseServerController, DirectoryBasedController):
|
|
||||||
"""A base class for all controllers derived from ircd-hybrid (Hybrid itself,
|
|
||||||
Charybdis, Solanum, ...)"""
|
|
||||||
|
|
||||||
binary_name: str
|
|
||||||
services_protocol: str
|
|
||||||
|
|
||||||
supports_sts = False
|
|
||||||
extban_mute_char = None
|
|
||||||
|
|
||||||
template_config: str
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
(services_hostname, services_port) = self.get_hostname_and_port()
|
|
||||||
password_field = 'password = "{}";'.format(password) if password else ""
|
|
||||||
if ssl:
|
|
||||||
self.gen_ssl()
|
|
||||||
ssl_config = TEMPLATE_SSL_CONFIG.format(
|
|
||||||
key_path=self.key_path, pem_path=self.pem_path, dh_path=self.dh_path
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
ssl_config = ""
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
(self.template_config).format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
services_hostname=services_hostname,
|
|
||||||
services_port=services_port,
|
|
||||||
password_field=password_field,
|
|
||||||
ssl_config=ssl_config,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
self.binary_name,
|
|
||||||
"-foreground",
|
|
||||||
"-configfile",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
"-pidfile",
|
|
||||||
self.directory / "server.pid",
|
|
||||||
],
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
if run_services:
|
|
||||||
self.wait_for_port()
|
|
||||||
self.services_controller = self.services_controller_class(
|
|
||||||
self.test_config, self
|
|
||||||
)
|
|
||||||
self.services_controller.run(
|
|
||||||
protocol=self.services_protocol,
|
|
||||||
server_hostname=hostname,
|
|
||||||
server_port=services_port,
|
|
||||||
)
|
|
@ -1,6 +1,13 @@
|
|||||||
from typing import Type
|
import os
|
||||||
|
import time
|
||||||
|
import shutil
|
||||||
|
import tempfile
|
||||||
|
import subprocess
|
||||||
|
|
||||||
from .base_hybrid import BaseHybridController
|
from irctest import client_mock
|
||||||
|
from irctest import authentication
|
||||||
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
|
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
serverinfo {{
|
serverinfo {{
|
||||||
@ -9,79 +16,73 @@ serverinfo {{
|
|||||||
description = "test server";
|
description = "test server";
|
||||||
{ssl_config}
|
{ssl_config}
|
||||||
}};
|
}};
|
||||||
|
|
||||||
general {{
|
|
||||||
throttle_count = 100; # We need to connect lots of clients quickly
|
|
||||||
# disable throttling for LIST and similar:
|
|
||||||
pace_wait_simple = 0 second;
|
|
||||||
pace_wait = 0 second;
|
|
||||||
sasl_service = "SaslServ";
|
|
||||||
}};
|
|
||||||
|
|
||||||
class "server" {{
|
|
||||||
ping_time = 5 minutes;
|
|
||||||
connectfreq = 5 minutes;
|
|
||||||
}};
|
|
||||||
|
|
||||||
listen {{
|
listen {{
|
||||||
defer_accept = yes;
|
defer_accept = yes;
|
||||||
|
|
||||||
host = "{hostname}";
|
host = "{hostname}";
|
||||||
port = {port};
|
port = {port};
|
||||||
port = {services_port};
|
|
||||||
}};
|
}};
|
||||||
|
|
||||||
auth {{
|
auth {{
|
||||||
user = "*";
|
user = "*";
|
||||||
flags = exceed_limit;
|
flags = exceed_limit;
|
||||||
{password_field}
|
{password_field}
|
||||||
}};
|
}};
|
||||||
|
|
||||||
channel {{
|
channel {{
|
||||||
disable_local_channels = no;
|
disable_local_channels = no;
|
||||||
no_create_on_split = no;
|
no_create_on_split = no;
|
||||||
no_join_on_split = no;
|
no_join_on_split = no;
|
||||||
displayed_usercount = 0;
|
displayed_usercount = 0;
|
||||||
}};
|
}};
|
||||||
|
"""
|
||||||
|
|
||||||
connect "services.example.org" {{
|
TEMPLATE_SSL_CONFIG = """
|
||||||
host = "localhost"; # Used to validate incoming connection
|
ssl_private_key = "{key_path}";
|
||||||
port = 0; # We don't need servers to connect to services
|
ssl_cert = "{pem_path}";
|
||||||
send_password = "password";
|
ssl_dh_params = "{dh_path}";
|
||||||
accept_password = "password";
|
|
||||||
class = "server";
|
|
||||||
flags = topicburst;
|
|
||||||
}};
|
|
||||||
service {{
|
|
||||||
name = "services.example.org";
|
|
||||||
}};
|
|
||||||
|
|
||||||
privset "omnioper" {{
|
|
||||||
privs = oper:general, oper:privs, oper:testline, oper:kill, oper:operwall, oper:message,
|
|
||||||
oper:routing, oper:kline, oper:unkline, oper:xline,
|
|
||||||
oper:resv, oper:cmodes, oper:mass_notice, oper:wallops,
|
|
||||||
oper:remoteban,
|
|
||||||
usermode:servnotice, auspex:oper, auspex:hostname, auspex:umodes, auspex:cmodes,
|
|
||||||
oper:admin, oper:die, oper:rehash, oper:spy, oper:grant;
|
|
||||||
}};
|
|
||||||
operator "operuser" {{
|
|
||||||
user = "*@*";
|
|
||||||
password = "operpassword";
|
|
||||||
privset = "omnioper";
|
|
||||||
flags = ~encrypted;
|
|
||||||
}};
|
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
class CharybdisController(BaseHybridController):
|
class CharybdisController(BaseServerController, DirectoryBasedController):
|
||||||
software_name = "Charybdis"
|
software_name = 'Charybdis'
|
||||||
binary_name = "charybdis"
|
supported_sasl_mechanisms = set()
|
||||||
services_protocol = "charybdis"
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
def create_config(self):
|
||||||
|
super().create_config()
|
||||||
|
with self.open_file('server.conf'):
|
||||||
|
pass
|
||||||
|
|
||||||
supported_sasl_mechanisms = {"PLAIN"}
|
def run(self, hostname, port, password=None, ssl=False,
|
||||||
|
valid_metadata_keys=None, invalid_metadata_keys=None):
|
||||||
template_config = TEMPLATE_CONFIG
|
if valid_metadata_keys or invalid_metadata_keys:
|
||||||
|
raise NotImplementedByController(
|
||||||
|
'Defining valid and invalid METADATA keys.')
|
||||||
|
assert self.proc is None
|
||||||
|
self.create_config()
|
||||||
|
self.port = port
|
||||||
|
password_field = 'password = "{}";'.format(password) if password else ''
|
||||||
|
if ssl:
|
||||||
|
self.gen_ssl()
|
||||||
|
ssl_config = TEMPLATE_SSL_CONFIG.format(
|
||||||
|
key_path=self.key_path,
|
||||||
|
pem_path=self.pem_path,
|
||||||
|
dh_path=self.dh_path,
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
ssl_config = ''
|
||||||
|
with self.open_file('server.conf') as fd:
|
||||||
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
|
hostname=hostname,
|
||||||
|
port=port,
|
||||||
|
password_field=password_field,
|
||||||
|
ssl_config=ssl_config,
|
||||||
|
))
|
||||||
|
self.proc = subprocess.Popen(['charybdis', '-foreground',
|
||||||
|
'-configfile', os.path.join(self.directory, 'server.conf'),
|
||||||
|
'-pidfile', os.path.join(self.directory, 'server.pid'),
|
||||||
|
],
|
||||||
|
stderr=subprocess.DEVNULL
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[CharybdisController]:
|
def get_irctest_controller_class():
|
||||||
return CharybdisController
|
return CharybdisController
|
||||||
|
@ -1,245 +0,0 @@
|
|||||||
import os
|
|
||||||
from pathlib import Path
|
|
||||||
import secrets
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
import irctest
|
|
||||||
from irctest.basecontrollers import BaseServicesController, DirectoryBasedController
|
|
||||||
import irctest.cases
|
|
||||||
import irctest.runner
|
|
||||||
|
|
||||||
TEMPLATE_DLK_CONFIG = """\
|
|
||||||
info {{
|
|
||||||
SID "00A";
|
|
||||||
network-name "testnetwork";
|
|
||||||
services-name "services.example.org";
|
|
||||||
admin-email "admin@example.org";
|
|
||||||
}}
|
|
||||||
|
|
||||||
link {{
|
|
||||||
hostname "{server_hostname}";
|
|
||||||
port "{server_port}";
|
|
||||||
password "password";
|
|
||||||
}}
|
|
||||||
|
|
||||||
log {{
|
|
||||||
debug "yes";
|
|
||||||
}}
|
|
||||||
|
|
||||||
sql {{
|
|
||||||
port "3306";
|
|
||||||
username "pifpaf";
|
|
||||||
password "pifpaf";
|
|
||||||
database "pifpaf";
|
|
||||||
sockfile "{mysql_socket}";
|
|
||||||
prefix "{dlk_prefix}";
|
|
||||||
}}
|
|
||||||
|
|
||||||
wordpress {{
|
|
||||||
prefix "{wp_prefix}";
|
|
||||||
}}
|
|
||||||
|
|
||||||
"""
|
|
||||||
|
|
||||||
TEMPLATE_DLK_WP_CONFIG = """
|
|
||||||
<?php
|
|
||||||
|
|
||||||
global $wpconfig;
|
|
||||||
$wpconfig = [
|
|
||||||
|
|
||||||
"dbprefix" => "{wp_prefix}",
|
|
||||||
|
|
||||||
|
|
||||||
"default_avatar" => "https://valware.uk/wp-content/plugins/ultimate-member/assets/img/default_avatar.jpg",
|
|
||||||
"forumschan" => "#DLK-Support",
|
|
||||||
|
|
||||||
];
|
|
||||||
"""
|
|
||||||
|
|
||||||
TEMPLATE_WP_CONFIG = """
|
|
||||||
define( 'DB_NAME', 'pifpaf' );
|
|
||||||
define( 'DB_USER', 'pifpaf' );
|
|
||||||
define( 'DB_PASSWORD', 'pifpaf' );
|
|
||||||
define( 'DB_HOST', 'localhost:{mysql_socket}' );
|
|
||||||
define( 'DB_CHARSET', 'utf8' );
|
|
||||||
define( 'DB_COLLATE', '' );
|
|
||||||
|
|
||||||
define( 'AUTH_KEY', 'put your unique phrase here' );
|
|
||||||
define( 'SECURE_AUTH_KEY', 'put your unique phrase here' );
|
|
||||||
define( 'LOGGED_IN_KEY', 'put your unique phrase here' );
|
|
||||||
define( 'NONCE_KEY', 'put your unique phrase here' );
|
|
||||||
define( 'AUTH_SALT', 'put your unique phrase here' );
|
|
||||||
define( 'SECURE_AUTH_SALT', 'put your unique phrase here' );
|
|
||||||
define( 'LOGGED_IN_SALT', 'put your unique phrase here' );
|
|
||||||
define( 'NONCE_SALT', 'put your unique phrase here' );
|
|
||||||
|
|
||||||
$table_prefix = '{wp_prefix}';
|
|
||||||
|
|
||||||
define( 'WP_DEBUG', false );
|
|
||||||
|
|
||||||
if (!defined('ABSPATH')) {{
|
|
||||||
define( 'ABSPATH', '{wp_path}' );
|
|
||||||
}}
|
|
||||||
|
|
||||||
/* That's all, stop editing! Happy publishing. */
|
|
||||||
|
|
||||||
/** Absolute path to the WordPress directory. */
|
|
||||||
|
|
||||||
|
|
||||||
/** Sets up WordPress vars and included files. */
|
|
||||||
require_once ABSPATH . 'wp-settings.php';
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class DlkController(BaseServicesController, DirectoryBasedController):
|
|
||||||
"""Mixin for server controllers that rely on DLK"""
|
|
||||||
|
|
||||||
software_name = "Dlk-Services"
|
|
||||||
|
|
||||||
def run_sql(self, sql: str) -> None:
|
|
||||||
mysql_socket = os.environ["PIFPAF_MYSQL_SOCKET"]
|
|
||||||
subprocess.run(
|
|
||||||
["mysql", "-S", mysql_socket, "pifpaf"],
|
|
||||||
input=sql.encode(),
|
|
||||||
check=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
def run(self, protocol: str, server_hostname: str, server_port: int) -> None:
|
|
||||||
self.create_config()
|
|
||||||
|
|
||||||
if protocol == "unreal4":
|
|
||||||
protocol = "unreal5"
|
|
||||||
assert protocol in ("unreal5",), protocol
|
|
||||||
|
|
||||||
mysql_socket = os.environ["PIFPAF_MYSQL_SOCKET"]
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
try:
|
|
||||||
self.wp_cli_path = Path(os.environ["IRCTEST_WP_CLI_PATH"])
|
|
||||||
if not self.wp_cli_path.is_file():
|
|
||||||
raise KeyError()
|
|
||||||
except KeyError:
|
|
||||||
raise RuntimeError(
|
|
||||||
"$IRCTEST_WP_CLI_PATH must be set to a WP-CLI executable (eg. "
|
|
||||||
"downloaded from <https://raw.githubusercontent.com/wp-cli/builds/"
|
|
||||||
"gh-pages/phar/wp-cli.phar>)"
|
|
||||||
) from None
|
|
||||||
|
|
||||||
try:
|
|
||||||
self.dlk_path = Path(os.environ["IRCTEST_DLK_PATH"])
|
|
||||||
if not self.dlk_path.is_dir():
|
|
||||||
raise KeyError()
|
|
||||||
except KeyError:
|
|
||||||
raise RuntimeError("$IRCTEST_DLK_PATH is not set") from None
|
|
||||||
self.dlk_path = self.dlk_path.resolve()
|
|
||||||
|
|
||||||
# Unpack a fresh Wordpress install in the temporary directory.
|
|
||||||
# In theory we could have a common Wordpress install and only wp-config.php
|
|
||||||
# in the temporary directory; but wp-cli assumes wp-config.php must be
|
|
||||||
# in a Wordpress directory, and fails in various places if it isn't.
|
|
||||||
# Rather than symlinking everything to make it work, let's just copy
|
|
||||||
# the whole code, it's not that big.
|
|
||||||
try:
|
|
||||||
wp_zip_path = Path(os.environ["IRCTEST_WP_ZIP_PATH"])
|
|
||||||
if not wp_zip_path.is_file():
|
|
||||||
raise KeyError()
|
|
||||||
except KeyError:
|
|
||||||
raise RuntimeError(
|
|
||||||
"$IRCTEST_WP_ZIP_PATH must be set to a Wordpress source zipball "
|
|
||||||
"(eg. downloaded from <https://wordpress.org/latest.zip>)"
|
|
||||||
) from None
|
|
||||||
subprocess.run(
|
|
||||||
["unzip", wp_zip_path, "-d", self.directory], stdout=subprocess.DEVNULL
|
|
||||||
)
|
|
||||||
self.wp_path = self.directory / "wordpress"
|
|
||||||
|
|
||||||
rand_hex = secrets.token_hex(6)
|
|
||||||
self.wp_prefix = f"wp{rand_hex}_"
|
|
||||||
self.dlk_prefix = f"dlk{rand_hex}_"
|
|
||||||
template_vars = dict(
|
|
||||||
protocol=protocol,
|
|
||||||
server_hostname=server_hostname,
|
|
||||||
server_port=server_port,
|
|
||||||
mysql_socket=mysql_socket,
|
|
||||||
wp_path=self.wp_path,
|
|
||||||
wp_prefix=self.wp_prefix,
|
|
||||||
dlk_prefix=self.dlk_prefix,
|
|
||||||
)
|
|
||||||
|
|
||||||
# Configure Wordpress
|
|
||||||
wp_config_path = self.directory / "wp-config.php"
|
|
||||||
with open(wp_config_path, "w") as fd:
|
|
||||||
fd.write(TEMPLATE_WP_CONFIG.format(**template_vars))
|
|
||||||
|
|
||||||
subprocess.run(
|
|
||||||
[
|
|
||||||
"php",
|
|
||||||
self.wp_cli_path,
|
|
||||||
"core",
|
|
||||||
"install",
|
|
||||||
"--url=http://localhost/",
|
|
||||||
"--title=irctest site",
|
|
||||||
"--admin_user=adminuser",
|
|
||||||
"--admin_email=adminuser@example.org",
|
|
||||||
f"--path={self.wp_path}",
|
|
||||||
],
|
|
||||||
check=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
# Configure Dlk
|
|
||||||
dlk_log_dir = self.directory / "logs"
|
|
||||||
dlk_conf_dir = self.directory / "conf"
|
|
||||||
dlk_conf_path = dlk_conf_dir / "dalek.conf"
|
|
||||||
os.mkdir(dlk_conf_dir)
|
|
||||||
with open(dlk_conf_path, "w") as fd:
|
|
||||||
fd.write(TEMPLATE_DLK_CONFIG.format(**template_vars))
|
|
||||||
dlk_wp_config_path = dlk_conf_dir / "wordpress.conf"
|
|
||||||
with open(dlk_wp_config_path, "w") as fd:
|
|
||||||
fd.write(TEMPLATE_DLK_WP_CONFIG.format(**template_vars))
|
|
||||||
(dlk_conf_dir / "modules.conf").symlink_to(self.dlk_path / "conf/modules.conf")
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
"php",
|
|
||||||
"src/dalek",
|
|
||||||
],
|
|
||||||
cwd=self.dlk_path,
|
|
||||||
env={
|
|
||||||
**os.environ,
|
|
||||||
"DALEK_CONF_DIR": str(dlk_conf_dir),
|
|
||||||
"DALEK_LOG_DIR": str(dlk_log_dir),
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
def terminate(self) -> None:
|
|
||||||
super().terminate()
|
|
||||||
|
|
||||||
def kill(self) -> None:
|
|
||||||
super().kill()
|
|
||||||
|
|
||||||
def registerUser(
|
|
||||||
self,
|
|
||||||
case: irctest.cases.BaseServerTestCase,
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
assert password
|
|
||||||
subprocess.run(
|
|
||||||
[
|
|
||||||
"php",
|
|
||||||
self.wp_cli_path,
|
|
||||||
"user",
|
|
||||||
"create",
|
|
||||||
username,
|
|
||||||
f"{username}@example.org",
|
|
||||||
f"--user_pass={password}",
|
|
||||||
f"--path={self.wp_path}",
|
|
||||||
],
|
|
||||||
check=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[DlkController]:
|
|
||||||
return DlkController
|
|
@ -1,303 +0,0 @@
|
|||||||
import copy
|
|
||||||
import json
|
|
||||||
import os
|
|
||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Any, Dict, Optional, Type, Union
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
|
||||||
from irctest.cases import BaseServerTestCase
|
|
||||||
|
|
||||||
BASE_CONFIG = {
|
|
||||||
"network": {"name": "ErgoTest"},
|
|
||||||
"server": {
|
|
||||||
"name": "My.Little.Server",
|
|
||||||
"listeners": {},
|
|
||||||
"max-sendq": "16k",
|
|
||||||
"connection-limits": {
|
|
||||||
"enabled": True,
|
|
||||||
"cidr-len-ipv4": 32,
|
|
||||||
"cidr-len-ipv6": 64,
|
|
||||||
"ips-per-subnet": 1,
|
|
||||||
"exempted": ["localhost"],
|
|
||||||
},
|
|
||||||
"connection-throttling": {
|
|
||||||
"enabled": True,
|
|
||||||
"cidr-len-ipv4": 32,
|
|
||||||
"cidr-len-ipv6": 64,
|
|
||||||
"ips-per-subnet": 16,
|
|
||||||
"duration": "10m",
|
|
||||||
"max-connections": 1,
|
|
||||||
"ban-duration": "10m",
|
|
||||||
"ban-message": "Try again later",
|
|
||||||
"exempted": ["localhost"],
|
|
||||||
},
|
|
||||||
"lookup-hostnames": False,
|
|
||||||
"enforce-utf8": True,
|
|
||||||
"relaymsg": {"enabled": True, "separators": "/", "available-to-chanops": True},
|
|
||||||
"compatibility": {
|
|
||||||
"allow-truncation": False,
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"accounts": {
|
|
||||||
"authentication-enabled": True,
|
|
||||||
"advertise-scram": True,
|
|
||||||
"multiclient": {
|
|
||||||
"allowed-by-default": True,
|
|
||||||
"enabled": True,
|
|
||||||
"always-on": "disabled",
|
|
||||||
},
|
|
||||||
"registration": {
|
|
||||||
"bcrypt-cost": 4,
|
|
||||||
"enabled": True,
|
|
||||||
"enabled-callbacks": ["none"],
|
|
||||||
"verify-timeout": "120h",
|
|
||||||
},
|
|
||||||
"nick-reservation": {
|
|
||||||
"enabled": True,
|
|
||||||
"method": "strict",
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"channels": {"registration": {"enabled": True}},
|
|
||||||
"datastore": {"path": None},
|
|
||||||
"limits": {
|
|
||||||
"awaylen": 200,
|
|
||||||
"chan-list-modes": 60,
|
|
||||||
"channellen": 64,
|
|
||||||
"kicklen": 390,
|
|
||||||
"linelen": {"rest": 2048},
|
|
||||||
"monitor-entries": 100,
|
|
||||||
"nicklen": 32,
|
|
||||||
"topiclen": 390,
|
|
||||||
"whowas-entries": 100,
|
|
||||||
"multiline": {"max-bytes": 4096, "max-lines": 32},
|
|
||||||
},
|
|
||||||
"history": {
|
|
||||||
"enabled": True,
|
|
||||||
"channel-length": 128,
|
|
||||||
"client-length": 128,
|
|
||||||
"chathistory-maxmessages": 100,
|
|
||||||
"retention": {
|
|
||||||
"allow-individual-delete": True,
|
|
||||||
},
|
|
||||||
"tagmsg-storage": {
|
|
||||||
"default": False,
|
|
||||||
"whitelist": ["+draft/persist", "+persist"],
|
|
||||||
},
|
|
||||||
},
|
|
||||||
"oper-classes": {
|
|
||||||
"server-admin": {
|
|
||||||
"title": "Server Admin",
|
|
||||||
"capabilities": [
|
|
||||||
"oper:local_kill",
|
|
||||||
"oper:local_ban",
|
|
||||||
"oper:local_unban",
|
|
||||||
"nofakelag",
|
|
||||||
"oper:remote_kill",
|
|
||||||
"oper:remote_ban",
|
|
||||||
"oper:remote_unban",
|
|
||||||
"oper:rehash",
|
|
||||||
"oper:die",
|
|
||||||
"accreg",
|
|
||||||
"sajoin",
|
|
||||||
"samode",
|
|
||||||
"vhosts",
|
|
||||||
"chanreg",
|
|
||||||
"relaymsg",
|
|
||||||
],
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"opers": {
|
|
||||||
"operuser": {
|
|
||||||
"class": "server-admin",
|
|
||||||
"whois-line": "is a server admin",
|
|
||||||
# "operpassword"
|
|
||||||
"password": "$2a$04$bKb6k5A6yuFA2wx.iJtxcuT2dojHQAjHd5ZPK/I2sjJml7p4spxjG",
|
|
||||||
}
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
LOGGING_CONFIG = {"logging": [{"method": "stderr", "level": "debug", "type": "*"}]}
|
|
||||||
|
|
||||||
|
|
||||||
def hash_password(password: Union[str, bytes]) -> str:
|
|
||||||
if isinstance(password, str):
|
|
||||||
password = password.encode("utf-8")
|
|
||||||
# simulate entry of password and confirmation:
|
|
||||||
input_ = password + b"\n" + password + b"\n"
|
|
||||||
p = subprocess.Popen(
|
|
||||||
["ergo", "genpasswd"], stdin=subprocess.PIPE, stdout=subprocess.PIPE
|
|
||||||
)
|
|
||||||
out, _ = p.communicate(input_)
|
|
||||||
return out.decode("utf-8").strip()
|
|
||||||
|
|
||||||
|
|
||||||
class ErgoController(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "Ergo"
|
|
||||||
_port_wait_interval = 0.01
|
|
||||||
supported_sasl_mechanisms = {"PLAIN", "SCRAM-SHA-256"}
|
|
||||||
supports_sts = True
|
|
||||||
extban_mute_char = "m"
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("ircd.yaml"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
config: Optional[Any] = None,
|
|
||||||
) -> None:
|
|
||||||
self.create_config()
|
|
||||||
if config is None:
|
|
||||||
config = copy.deepcopy(BASE_CONFIG)
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
enable_chathistory = self.test_config.chathistory
|
|
||||||
enable_roleplay = self.test_config.ergo_roleplay
|
|
||||||
if enable_chathistory or enable_roleplay:
|
|
||||||
config = self.addMysqlToConfig(config)
|
|
||||||
|
|
||||||
if enable_roleplay:
|
|
||||||
config["roleplay"] = {"enabled": True}
|
|
||||||
|
|
||||||
if self.test_config.ergo_config:
|
|
||||||
self.test_config.ergo_config(config)
|
|
||||||
|
|
||||||
self.port = port
|
|
||||||
bind_address = "127.0.0.1:%s" % (port,)
|
|
||||||
listener_conf = None # plaintext
|
|
||||||
if ssl:
|
|
||||||
self.key_path = self.directory / "ssl.key"
|
|
||||||
self.pem_path = self.directory / "ssl.pem"
|
|
||||||
listener_conf = {"tls": {"cert": self.pem_path, "key": self.key_path}}
|
|
||||||
config["server"]["listeners"][bind_address] = listener_conf # type: ignore
|
|
||||||
|
|
||||||
config["datastore"]["path"] = str(self.directory / "ircd.db") # type: ignore
|
|
||||||
|
|
||||||
if password is not None:
|
|
||||||
config["server"]["password"] = hash_password(password) # type: ignore
|
|
||||||
|
|
||||||
assert self.proc is None
|
|
||||||
|
|
||||||
self._config_path = self.directory / "server.yml"
|
|
||||||
self._config = config
|
|
||||||
self._write_config()
|
|
||||||
subprocess.call(["ergo", "initdb", "--conf", self._config_path, "--quiet"])
|
|
||||||
subprocess.call(["ergo", "mkcerts", "--conf", self._config_path, "--quiet"])
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[*faketime_cmd, "ergo", "run", "--conf", self._config_path, "--quiet"]
|
|
||||||
)
|
|
||||||
|
|
||||||
def wait_for_services(self) -> None:
|
|
||||||
# Nothing to wait for, they start at the same time as Ergo.
|
|
||||||
pass
|
|
||||||
|
|
||||||
def registerUser(
|
|
||||||
self,
|
|
||||||
case: BaseServerTestCase,
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
# XXX: Move this somewhere else when
|
|
||||||
# https://github.com/ircv3/ircv3-specifications/pull/152 becomes
|
|
||||||
# part of the specification
|
|
||||||
if not case.run_services:
|
|
||||||
# Ergo does not actually need this, but other controllers do, so we
|
|
||||||
# are checking it here as well for tests that aren't tested with other
|
|
||||||
# controllers.
|
|
||||||
raise ValueError(
|
|
||||||
"Attempted to register a nick, but `run_services` it not True."
|
|
||||||
)
|
|
||||||
client = case.addClient(show_io=False)
|
|
||||||
case.sendLine(client, "CAP LS 302")
|
|
||||||
case.sendLine(client, "NICK " + username)
|
|
||||||
case.sendLine(client, "USER r e g :user")
|
|
||||||
case.sendLine(client, "CAP END")
|
|
||||||
while case.getRegistrationMessage(client).command != "001":
|
|
||||||
pass
|
|
||||||
case.getMessages(client)
|
|
||||||
assert password
|
|
||||||
case.sendLine(client, "NS REGISTER " + password)
|
|
||||||
msg = case.getMessage(client)
|
|
||||||
assert msg.params == [username, "Account created"]
|
|
||||||
case.sendLine(client, "QUIT")
|
|
||||||
case.assertDisconnected(client)
|
|
||||||
|
|
||||||
def _write_config(self) -> None:
|
|
||||||
with open(self._config_path, "w") as fd:
|
|
||||||
json.dump(self._config, fd)
|
|
||||||
|
|
||||||
def baseConfig(self) -> Dict:
|
|
||||||
return copy.deepcopy(BASE_CONFIG)
|
|
||||||
|
|
||||||
def getConfig(self) -> Dict:
|
|
||||||
return copy.deepcopy(self._config)
|
|
||||||
|
|
||||||
def addLoggingToConfig(self, config: Optional[Dict] = None) -> Dict:
|
|
||||||
if config is None:
|
|
||||||
config = self.baseConfig()
|
|
||||||
config.update(LOGGING_CONFIG)
|
|
||||||
return config
|
|
||||||
|
|
||||||
def addMysqlToConfig(self, config: Optional[Dict] = None) -> Dict:
|
|
||||||
mysql_password = os.getenv("MYSQL_PASSWORD")
|
|
||||||
if config is None:
|
|
||||||
config = self.baseConfig()
|
|
||||||
if not mysql_password:
|
|
||||||
return config
|
|
||||||
config["datastore"]["mysql"] = {
|
|
||||||
"enabled": True,
|
|
||||||
"host": "localhost",
|
|
||||||
"user": "ergo",
|
|
||||||
"password": mysql_password,
|
|
||||||
"history-database": "ergo_history",
|
|
||||||
"timeout": "3s",
|
|
||||||
}
|
|
||||||
config["accounts"]["multiclient"] = {
|
|
||||||
"enabled": True,
|
|
||||||
"allowed-by-default": True,
|
|
||||||
"always-on": "disabled",
|
|
||||||
}
|
|
||||||
config["history"]["persistent"] = {
|
|
||||||
"enabled": True,
|
|
||||||
"unregistered-channels": True,
|
|
||||||
"registered-channels": "opt-out",
|
|
||||||
"direct-messages": "opt-out",
|
|
||||||
}
|
|
||||||
return config
|
|
||||||
|
|
||||||
def rehash(self, case: BaseServerTestCase, config: Dict) -> None:
|
|
||||||
self._config = config
|
|
||||||
self._write_config()
|
|
||||||
client = "operator_for_rehash"
|
|
||||||
case.connectClient(nick=client, name=client)
|
|
||||||
case.sendLine(client, "OPER operuser operpassword")
|
|
||||||
case.sendLine(client, "REHASH")
|
|
||||||
case.getMessages(client)
|
|
||||||
case.sendLine(client, "QUIT")
|
|
||||||
case.assertDisconnected(client)
|
|
||||||
|
|
||||||
def enable_debug_logging(self, case: BaseServerTestCase) -> None:
|
|
||||||
config = self.getConfig()
|
|
||||||
config.update(LOGGING_CONFIG)
|
|
||||||
self.rehash(case, config)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[ErgoController]:
|
|
||||||
return ErgoController
|
|
@ -1,48 +0,0 @@
|
|||||||
import os
|
|
||||||
from typing import Optional, Tuple, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController
|
|
||||||
|
|
||||||
|
|
||||||
class ExternalServerController(BaseServerController):
|
|
||||||
"""Dummy controller that doesn't run a server.
|
|
||||||
Instead, it allows connecting to servers ran outside irctest."""
|
|
||||||
|
|
||||||
software_name = "unknown external server"
|
|
||||||
supported_sasl_mechanisms = set(
|
|
||||||
os.environ.get("IRCTEST_SERVER_SASL_MECHS", "").split()
|
|
||||||
)
|
|
||||||
|
|
||||||
def check_is_alive(self) -> None:
|
|
||||||
pass
|
|
||||||
|
|
||||||
def kill_proc(self) -> None:
|
|
||||||
pass
|
|
||||||
|
|
||||||
def wait_for_port(self) -> None:
|
|
||||||
pass
|
|
||||||
|
|
||||||
def get_hostname_and_port(self) -> Tuple[str, int]:
|
|
||||||
hostname = os.environ.get("IRCTEST_SERVER_HOSTNAME")
|
|
||||||
port = os.environ.get("IRCTEST_SERVER_PORT")
|
|
||||||
if not hostname or not port:
|
|
||||||
raise RuntimeError(
|
|
||||||
"Please set IRCTEST_SERVER_HOSTNAME and IRCTEST_SERVER_PORT."
|
|
||||||
)
|
|
||||||
return (hostname, int(port))
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[ExternalServerController]:
|
|
||||||
return ExternalServerController
|
|
@ -1,38 +1,45 @@
|
|||||||
import subprocess
|
import subprocess
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
from irctest import authentication, tls
|
from irctest.basecontrollers import BaseClientController, NotImplementedByController
|
||||||
from irctest.basecontrollers import (
|
|
||||||
BaseClientController,
|
|
||||||
DirectoryBasedController,
|
|
||||||
NotImplementedByController,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
class GircController(BaseClientController):
|
||||||
|
software_name = 'gIRC'
|
||||||
|
supported_sasl_mechanisms = ['PLAIN']
|
||||||
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
|
||||||
class GircController(BaseClientController, DirectoryBasedController):
|
def __init__(self):
|
||||||
software_name = "gIRC"
|
super().__init__()
|
||||||
supported_sasl_mechanisms = {"PLAIN"}
|
self.directory = None
|
||||||
|
self.proc = None
|
||||||
|
|
||||||
def run(
|
def kill(self):
|
||||||
self,
|
if self.proc:
|
||||||
hostname: str,
|
self.proc.terminate()
|
||||||
port: int,
|
try:
|
||||||
auth: Optional[authentication.Authentication],
|
self.proc.wait(5)
|
||||||
tls_config: Optional[tls.TlsConfig] = None,
|
except subprocess.TimeoutExpired:
|
||||||
) -> None:
|
self.proc.kill()
|
||||||
|
self.proc = None
|
||||||
|
|
||||||
|
def __del__(self):
|
||||||
|
if self.proc:
|
||||||
|
self.proc.kill()
|
||||||
|
if self.directory:
|
||||||
|
self.directory.cleanup()
|
||||||
|
|
||||||
|
def run(self, hostname, port, auth, tls_config):
|
||||||
if tls_config:
|
if tls_config:
|
||||||
print(tls_config)
|
print(tls_config)
|
||||||
raise NotImplementedByController("TLS options")
|
raise NotImplementedByController('TLS options')
|
||||||
args = ["--host", hostname, "--port", str(port), "--quiet"]
|
args = ['--host', hostname, '--port', str(port), '--quiet']
|
||||||
|
|
||||||
if auth and auth.username and auth.password:
|
if auth and auth.username and auth.password:
|
||||||
args += ["--sasl-name", auth.username]
|
args += ['--sasl-name', auth.username]
|
||||||
args += ["--sasl-pass", auth.password]
|
args += ['--sasl-pass', auth.password]
|
||||||
args += ["--sasl-fail-is-ok"]
|
args += ['--sasl-fail-is-ok']
|
||||||
|
|
||||||
# Runs a client with the config given as arguments
|
# Runs a client with the config given as arguments
|
||||||
self.proc = subprocess.Popen(["girc_test", "connect"] + args)
|
self.proc = subprocess.Popen(['girc_test', 'connect'] + args)
|
||||||
|
|
||||||
|
def get_irctest_controller_class():
|
||||||
def get_irctest_controller_class() -> Type[GircController]:
|
|
||||||
return GircController
|
return GircController
|
||||||
|
@ -1,82 +1,88 @@
|
|||||||
from typing import Set, Type
|
import os
|
||||||
|
import time
|
||||||
|
import shutil
|
||||||
|
import tempfile
|
||||||
|
import subprocess
|
||||||
|
|
||||||
from .base_hybrid import BaseHybridController
|
from irctest import client_mock
|
||||||
|
from irctest import authentication
|
||||||
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
|
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
serverinfo {{
|
serverinfo {{
|
||||||
name = "My.Little.Server";
|
name = "My.Little.Server";
|
||||||
sid = "42X";
|
sid = "42X";
|
||||||
description = "test server";
|
description = "test server";
|
||||||
|
|
||||||
# Hybrid defaults to 9
|
|
||||||
max_nick_length = 20;
|
|
||||||
{ssl_config}
|
{ssl_config}
|
||||||
}};
|
}};
|
||||||
|
|
||||||
general {{
|
|
||||||
throttle_count = 100; # We need to connect lots of clients quickly
|
|
||||||
sasl_service = "SaslServ";
|
|
||||||
|
|
||||||
# Allow PART/QUIT reasons quickly
|
|
||||||
anti_spam_exit_message_time = 0;
|
|
||||||
|
|
||||||
# Allow all commands quickly
|
|
||||||
pace_wait_simple = 0;
|
|
||||||
pace_wait = 0;
|
|
||||||
}};
|
|
||||||
|
|
||||||
listen {{
|
listen {{
|
||||||
defer_accept = yes;
|
|
||||||
|
|
||||||
host = "{hostname}";
|
host = "{hostname}";
|
||||||
port = {port};
|
port = {port};
|
||||||
port = {services_port};
|
|
||||||
}};
|
}};
|
||||||
|
general {{
|
||||||
class {{
|
disable_auth = yes;
|
||||||
name = "server";
|
anti_nick_flood = no;
|
||||||
ping_time = 5 minutes;
|
max_nick_changes = 256;
|
||||||
connectfreq = 5 minutes;
|
throttle_count = 512;
|
||||||
}};
|
}};
|
||||||
connect {{
|
|
||||||
name = "services.example.org";
|
|
||||||
host = "127.0.0.1"; # Used to validate incoming connection
|
|
||||||
port = 0; # We don't need servers to connect to services
|
|
||||||
send_password = "password";
|
|
||||||
accept_password = "password";
|
|
||||||
class = "server";
|
|
||||||
}};
|
|
||||||
service {{
|
|
||||||
name = "services.example.org";
|
|
||||||
}};
|
|
||||||
|
|
||||||
auth {{
|
auth {{
|
||||||
user = "*";
|
user = "*";
|
||||||
flags = exceed_limit;
|
flags = exceed_limit;
|
||||||
{password_field}
|
{password_field}
|
||||||
}};
|
}};
|
||||||
|
"""
|
||||||
|
|
||||||
operator {{
|
TEMPLATE_SSL_CONFIG = """
|
||||||
name = "operuser";
|
rsa_private_key_file = "{key_path}";
|
||||||
user = "*@*";
|
ssl_certificate_file = "{pem_path}";
|
||||||
password = "operpassword";
|
ssl_dh_param_file = "{dh_path}";
|
||||||
encrypted = no;
|
|
||||||
umodes = locops, servnotice, wallop;
|
|
||||||
flags = admin, connect, connect:remote, die, globops, kill, kill:remote,
|
|
||||||
kline, module, rehash, restart, set, unkline, unxline, wallops, xline;
|
|
||||||
}};
|
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
class HybridController(BaseHybridController):
|
class HybridController(BaseServerController, DirectoryBasedController):
|
||||||
software_name = "Hybrid"
|
software_name = 'Hybrid'
|
||||||
binary_name = "ircd"
|
supported_sasl_mechanisms = set()
|
||||||
services_protocol = "hybrid"
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
|
||||||
supported_sasl_mechanisms: Set[str] = set()
|
def create_config(self):
|
||||||
|
super().create_config()
|
||||||
|
with self.open_file('server.conf'):
|
||||||
|
pass
|
||||||
|
|
||||||
template_config = TEMPLATE_CONFIG
|
def run(self, hostname, port, password=None, ssl=False,
|
||||||
|
valid_metadata_keys=None, invalid_metadata_keys=None):
|
||||||
|
if valid_metadata_keys or invalid_metadata_keys:
|
||||||
|
raise NotImplementedByController(
|
||||||
|
'Defining valid and invalid METADATA keys.')
|
||||||
|
assert self.proc is None
|
||||||
|
self.create_config()
|
||||||
|
self.port = port
|
||||||
|
password_field = 'password = "{}";'.format(password) if password else ''
|
||||||
|
if ssl:
|
||||||
|
self.gen_ssl()
|
||||||
|
ssl_config = TEMPLATE_SSL_CONFIG.format(
|
||||||
|
key_path=self.key_path,
|
||||||
|
pem_path=self.pem_path,
|
||||||
|
dh_path=self.dh_path,
|
||||||
|
)
|
||||||
|
else:
|
||||||
|
ssl_config = ''
|
||||||
|
with self.open_file('server.conf') as fd:
|
||||||
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
|
hostname=hostname,
|
||||||
|
port=port,
|
||||||
|
password_field=password_field,
|
||||||
|
ssl_config=ssl_config,
|
||||||
|
))
|
||||||
|
self.proc = subprocess.Popen(['ircd', '-foreground',
|
||||||
|
'-configfile', os.path.join(self.directory, 'server.conf'),
|
||||||
|
'-pidfile', os.path.join(self.directory, 'server.pid'),
|
||||||
|
],
|
||||||
|
stdout=subprocess.DEVNULL,
|
||||||
|
stderr=subprocess.DEVNULL
|
||||||
|
)
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[HybridController]:
|
def get_irctest_controller_class():
|
||||||
return HybridController
|
return HybridController
|
||||||
|
@ -1,87 +1,25 @@
|
|||||||
import functools
|
import os
|
||||||
|
import time
|
||||||
import shutil
|
import shutil
|
||||||
|
import tempfile
|
||||||
import subprocess
|
import subprocess
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
|
from irctest import authentication
|
||||||
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
# Clients:
|
|
||||||
<bind address="{hostname}" port="{port}" type="clients">
|
<bind address="{hostname}" port="{port}" type="clients">
|
||||||
{ssl_config}
|
{ssl_config}
|
||||||
|
<module name="cap">
|
||||||
|
<module name="ircv3">
|
||||||
|
<module name="ircv3_capnotify">
|
||||||
|
<module name="ircv3_echomessage">
|
||||||
|
<module name="namesx"> # For multi-prefix
|
||||||
<connect allow="*"
|
<connect allow="*"
|
||||||
resolvehostnames="no" # Faster
|
resolvehostnames="no" # Faster
|
||||||
recvq="40960" # Needs to be larger than a valid message with tags
|
|
||||||
timeout="10" # So tests don't hang too long
|
|
||||||
localmax="1000"
|
|
||||||
globalmax="1000"
|
|
||||||
{password_field}>
|
{password_field}>
|
||||||
|
|
||||||
<class
|
|
||||||
name="ServerOperators"
|
|
||||||
commands="WALLOPS GLOBOPS"
|
|
||||||
privs="channels/auspex users/auspex channels/auspex servers/auspex"
|
|
||||||
>
|
|
||||||
<type
|
|
||||||
name="NetAdmin"
|
|
||||||
classes="ServerOperators"
|
|
||||||
>
|
|
||||||
<oper name="operuser"
|
|
||||||
password="operpassword"
|
|
||||||
host="*@*"
|
|
||||||
type="NetAdmin"
|
|
||||||
class="ServerOperators"
|
|
||||||
>
|
|
||||||
|
|
||||||
<options casemapping="ascii">
|
|
||||||
|
|
||||||
# Disable 'NOTICE #chan :*** foo invited bar into the channel-
|
|
||||||
<security announceinvites="none">
|
|
||||||
|
|
||||||
# Services:
|
|
||||||
<bind address="{services_hostname}" port="{services_port}" type="servers">
|
|
||||||
<link name="services.example.org"
|
|
||||||
ipaddr="{services_hostname}"
|
|
||||||
port="{services_port}"
|
|
||||||
allowmask="*"
|
|
||||||
recvpass="password"
|
|
||||||
sendpass="password"
|
|
||||||
>
|
|
||||||
<module name="spanningtree">
|
|
||||||
<module name="services_account">
|
|
||||||
<module name="hidechans"> # Anope errors when missing
|
|
||||||
<module name="svshold"> # Atheme raises a warning when missing
|
|
||||||
<sasl requiressl="no"
|
|
||||||
target="services.example.org">
|
|
||||||
|
|
||||||
# Protocol:
|
|
||||||
<module name="banexception">
|
|
||||||
<module name="botmode">
|
|
||||||
<module name="cap">
|
|
||||||
<module name="inviteexception">
|
|
||||||
<module name="ircv3">
|
|
||||||
<module name="ircv3_accounttag">
|
|
||||||
<module name="ircv3_batch">
|
|
||||||
<module name="ircv3_capnotify">
|
|
||||||
<module name="ircv3_ctctags">
|
|
||||||
<module name="ircv3_echomessage">
|
|
||||||
<module name="ircv3_invitenotify">
|
|
||||||
<module name="ircv3_labeledresponse">
|
|
||||||
<module name="ircv3_msgid">
|
|
||||||
<module name="ircv3_servertime">
|
|
||||||
<module name="monitor">
|
|
||||||
<module name="m_muteban"> # for testing mute extbans
|
|
||||||
<module name="namesx"> # For multi-prefix
|
|
||||||
<module name="sasl">
|
|
||||||
|
|
||||||
# HELP/HELPOP
|
|
||||||
<module name="alias"> # for the HELP alias
|
|
||||||
<module name="{help_module_name}">
|
|
||||||
<include file="examples/{help_module_name}.conf.example">
|
|
||||||
|
|
||||||
# Misc:
|
|
||||||
<log method="file" type="*" level="debug" target="/tmp/ircd-{port}.log">
|
<log method="file" type="*" level="debug" target="/tmp/ircd-{port}.log">
|
||||||
<server name="My.Little.Server" description="test server" id="000" network="testnet">
|
|
||||||
"""
|
"""
|
||||||
|
|
||||||
TEMPLATE_SSL_CONFIG = """
|
TEMPLATE_SSL_CONFIG = """
|
||||||
@ -89,104 +27,47 @@ TEMPLATE_SSL_CONFIG = """
|
|||||||
<openssl certfile="{pem_path}" keyfile="{key_path}" dhfile="{dh_path}" hash="sha1">
|
<openssl certfile="{pem_path}" keyfile="{key_path}" dhfile="{dh_path}" hash="sha1">
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
@functools.lru_cache()
|
|
||||||
def installed_version() -> int:
|
|
||||||
output = subprocess.check_output(["inspircd", "--version"], universal_newlines=True)
|
|
||||||
if output.startswith("InspIRCd-3"):
|
|
||||||
return 3
|
|
||||||
if output.startswith("InspIRCd-4"):
|
|
||||||
return 4
|
|
||||||
else:
|
|
||||||
assert False, f"unexpected version: {output}"
|
|
||||||
|
|
||||||
|
|
||||||
class InspircdController(BaseServerController, DirectoryBasedController):
|
class InspircdController(BaseServerController, DirectoryBasedController):
|
||||||
software_name = "InspIRCd"
|
software_name = 'InspIRCd'
|
||||||
supported_sasl_mechanisms = {"PLAIN"}
|
supported_sasl_mechanisms = set()
|
||||||
supports_sts = False
|
supported_capabilities = set() # Not exhaustive
|
||||||
extban_mute_char = "m"
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
def create_config(self):
|
||||||
super().create_config()
|
super().create_config()
|
||||||
with self.open_file("server.conf"):
|
with self.open_file('server.conf'):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def run(
|
def run(self, hostname, port, password=None, ssl=False,
|
||||||
self,
|
restricted_metadata_keys=None,
|
||||||
hostname: str,
|
valid_metadata_keys=None, invalid_metadata_keys=None):
|
||||||
port: int,
|
if valid_metadata_keys or invalid_metadata_keys:
|
||||||
*,
|
raise NotImplementedByController(
|
||||||
password: Optional[str],
|
'Defining valid and invalid METADATA keys.')
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
assert self.proc is None
|
assert self.proc is None
|
||||||
self.port = port
|
self.port = port
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
self.create_config()
|
||||||
(services_hostname, services_port) = self.get_hostname_and_port()
|
password_field = 'password="{}"'.format(password) if password else ''
|
||||||
|
|
||||||
password_field = 'password="{}"'.format(password) if password else ""
|
|
||||||
|
|
||||||
if ssl:
|
if ssl:
|
||||||
self.gen_ssl()
|
self.gen_ssl()
|
||||||
ssl_config = TEMPLATE_SSL_CONFIG.format(
|
ssl_config = TEMPLATE_SSL_CONFIG.format(
|
||||||
key_path=self.key_path, pem_path=self.pem_path, dh_path=self.dh_path
|
key_path=self.key_path,
|
||||||
)
|
pem_path=self.pem_path,
|
||||||
|
dh_path=self.dh_path,
|
||||||
|
)
|
||||||
else:
|
else:
|
||||||
ssl_config = ""
|
ssl_config = ''
|
||||||
|
with self.open_file('server.conf') as fd:
|
||||||
if installed_version() == 3:
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
help_module_name = "helpop"
|
hostname=hostname,
|
||||||
elif installed_version() == 4:
|
port=port,
|
||||||
help_module_name = "help"
|
password_field=password_field,
|
||||||
else:
|
ssl_config=ssl_config
|
||||||
assert False, f"unexpected version: {installed_version()}"
|
))
|
||||||
|
self.proc = subprocess.Popen(['inspircd', '--nofork', '--config',
|
||||||
with self.open_file("server.conf") as fd:
|
os.path.join(self.directory, 'server.conf')],
|
||||||
fd.write(
|
stdout=subprocess.DEVNULL
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
services_hostname=services_hostname,
|
|
||||||
services_port=services_port,
|
|
||||||
password_field=password_field,
|
|
||||||
ssl_config=ssl_config,
|
|
||||||
help_module_name=help_module_name,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"inspircd",
|
|
||||||
"--nofork",
|
|
||||||
"--config",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
],
|
|
||||||
stdout=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
if run_services:
|
|
||||||
self.wait_for_port()
|
|
||||||
self.services_controller = self.services_controller_class(
|
|
||||||
self.test_config, self
|
|
||||||
)
|
|
||||||
self.services_controller.run(
|
|
||||||
protocol="inspircd3",
|
|
||||||
server_hostname=services_hostname,
|
|
||||||
server_port=services_port,
|
|
||||||
)
|
)
|
||||||
|
|
||||||
|
def get_irctest_controller_class():
|
||||||
def get_irctest_controller_class() -> Type[InspircdController]:
|
|
||||||
return InspircdController
|
return InspircdController
|
||||||
|
|
||||||
|
@ -1,96 +0,0 @@
|
|||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import (
|
|
||||||
BaseServerController,
|
|
||||||
DirectoryBasedController,
|
|
||||||
NotImplementedByController,
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
# M:<Server NAME>:<YOUR Internet IP#>:<Geographic Location>:<Port>:<SID>:
|
|
||||||
M:My.Little.Server:{hostname}:test server:{port}:0042:
|
|
||||||
|
|
||||||
# A:<Your Name/Location>:<Your E-Mail Addr>:<other info>::<network name>:
|
|
||||||
A:Organization, IRC dept.:Daemon <ircd@example.irc.org>:Client Server::IRCnet:
|
|
||||||
|
|
||||||
# P:<YOUR Internet IP#>:<*>::<Port>:<Flags>
|
|
||||||
P::::{port}::
|
|
||||||
|
|
||||||
# Y:<Class>:<Ping Frequency>::<Max Links>:<SendQ>:<Local Limit>:<Global Limit>:
|
|
||||||
Y:10:90::100:512000:100.100:100.100:
|
|
||||||
|
|
||||||
# I:<TARGET Host Addr>:<Password>:<TARGET Hosts NAME>:<Port>:<Class>:<Flags>:
|
|
||||||
I::{password_field}:::10::
|
|
||||||
|
|
||||||
# O:<TARGET Host NAME>:<Password>:<Nickname>:<Port>:<Class>:<Flags>:
|
|
||||||
O:*:operpassword:operuser::::
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class Irc2Controller(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "irc2"
|
|
||||||
services_protocol: str
|
|
||||||
|
|
||||||
supports_sts = False
|
|
||||||
extban_mute_char = None
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
if ssl:
|
|
||||||
raise NotImplementedByController("TLS")
|
|
||||||
if run_services:
|
|
||||||
raise NotImplementedByController("Services")
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
password_field = password if password else ""
|
|
||||||
assert self.directory
|
|
||||||
pidfile = self.directory / "ircd.pid"
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
password_field=password_field,
|
|
||||||
pidfile=pidfile,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"ircd",
|
|
||||||
"-s", # no iauth
|
|
||||||
"-p",
|
|
||||||
"on",
|
|
||||||
"-f",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
],
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[Irc2Controller]:
|
|
||||||
return Irc2Controller
|
|
@ -1,115 +0,0 @@
|
|||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import (
|
|
||||||
BaseServerController,
|
|
||||||
DirectoryBasedController,
|
|
||||||
NotImplementedByController,
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
General {{
|
|
||||||
name = "My.Little.Server";
|
|
||||||
numeric = 42;
|
|
||||||
description = "test server";
|
|
||||||
}};
|
|
||||||
|
|
||||||
Port {{
|
|
||||||
vhost = "{hostname}";
|
|
||||||
port = {port};
|
|
||||||
}};
|
|
||||||
|
|
||||||
Class {{
|
|
||||||
name = "Client";
|
|
||||||
pingfreq = 5 minutes;
|
|
||||||
sendq = 160000;
|
|
||||||
maxlinks = 1024;
|
|
||||||
}};
|
|
||||||
|
|
||||||
Client {{
|
|
||||||
username = "*";
|
|
||||||
class = "Client";
|
|
||||||
{password_field}
|
|
||||||
}};
|
|
||||||
|
|
||||||
Operator {{
|
|
||||||
local = no;
|
|
||||||
host = "*@*";
|
|
||||||
password = "$PLAIN$operpassword";
|
|
||||||
name = "operuser";
|
|
||||||
class = "Client";
|
|
||||||
}};
|
|
||||||
|
|
||||||
features {{
|
|
||||||
"PPATH" = "{pidfile}";
|
|
||||||
|
|
||||||
# workaround for whois tests, checking the server name
|
|
||||||
"HIS_SERVERNAME" = "My.Little.Server";
|
|
||||||
}};
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class Ircu2Controller(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "ircu2"
|
|
||||||
supports_sts = False
|
|
||||||
extban_mute_char = None
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
if ssl:
|
|
||||||
raise NotImplementedByController("TLS")
|
|
||||||
if run_services:
|
|
||||||
raise NotImplementedByController("Services")
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
password_field = 'password = "{}";'.format(password) if password else ""
|
|
||||||
assert self.directory
|
|
||||||
pidfile = self.directory / "ircd.pid"
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
password_field=password_field,
|
|
||||||
pidfile=pidfile,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"ircd",
|
|
||||||
"-n", # don't detach
|
|
||||||
"-f",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
"-x",
|
|
||||||
"DEBUG",
|
|
||||||
],
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[Ircu2Controller]:
|
|
||||||
return Ircu2Controller
|
|
@ -1,7 +1,9 @@
|
|||||||
|
import os
|
||||||
import subprocess
|
import subprocess
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
from irctest import authentication, tls
|
from irctest import authentication
|
||||||
|
from irctest import tls
|
||||||
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
from irctest.basecontrollers import BaseClientController, DirectoryBasedController
|
from irctest.basecontrollers import BaseClientController, DirectoryBasedController
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
@ -24,68 +26,50 @@ supybot.networks.testnet.sasl.ecdsa_key: {directory}/ecdsa_key.pem
|
|||||||
supybot.networks.testnet.sasl.mechanisms: {mechanisms}
|
supybot.networks.testnet.sasl.mechanisms: {mechanisms}
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
class LimnoriaController(BaseClientController, DirectoryBasedController):
|
class LimnoriaController(BaseClientController, DirectoryBasedController):
|
||||||
software_name = "Limnoria"
|
software_name = 'Limnoria'
|
||||||
supported_sasl_mechanisms = {
|
supported_sasl_mechanisms = {
|
||||||
"PLAIN",
|
'PLAIN', 'ECDSA-NIST256P-CHALLENGE', 'SCRAM-SHA-256', 'EXTERNAL',
|
||||||
"ECDSA-NIST256P-CHALLENGE",
|
}
|
||||||
"SCRAM-SHA-256",
|
supported_capabilities = set(['sts']) # Not exhaustive
|
||||||
"EXTERNAL",
|
|
||||||
}
|
|
||||||
supports_sts = True
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
def create_config(self):
|
||||||
super().create_config()
|
create_config = super().create_config()
|
||||||
with self.open_file("bot.conf"):
|
if create_config:
|
||||||
pass
|
with self.open_file('bot.conf'):
|
||||||
with self.open_file("conf/users.conf"):
|
pass
|
||||||
pass
|
with self.open_file('conf/users.conf'):
|
||||||
|
pass
|
||||||
|
|
||||||
def run(
|
def run(self, hostname, port, auth, tls_config=None):
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
auth: Optional[authentication.Authentication],
|
|
||||||
tls_config: Optional[tls.TlsConfig] = None,
|
|
||||||
) -> None:
|
|
||||||
if tls_config is None:
|
if tls_config is None:
|
||||||
tls_config = tls.TlsConfig(enable=False, trusted_fingerprints=[])
|
tls_config = tls.TlsConfig(enable=False, trusted_fingerprints=[])
|
||||||
# Runs a client with the config given as arguments
|
# Runs a client with the config given as arguments
|
||||||
assert self.proc is None
|
assert self.proc is None
|
||||||
self.create_config()
|
self.create_config()
|
||||||
|
|
||||||
username = password = ""
|
|
||||||
mechanisms = ""
|
|
||||||
if auth:
|
if auth:
|
||||||
mechanisms = " ".join(mech.to_string() for mech in auth.mechanisms)
|
mechanisms = ' '.join(map(authentication.Mechanisms.as_string,
|
||||||
|
auth.mechanisms))
|
||||||
if auth.ecdsa_key:
|
if auth.ecdsa_key:
|
||||||
with self.open_file("ecdsa_key.pem") as fd:
|
with self.open_file('ecdsa_key.pem') as fd:
|
||||||
fd.write(auth.ecdsa_key)
|
fd.write(auth.ecdsa_key)
|
||||||
|
else:
|
||||||
|
mechanisms = ''
|
||||||
|
with self.open_file('bot.conf') as fd:
|
||||||
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
|
directory=self.directory,
|
||||||
|
loglevel='CRITICAL',
|
||||||
|
hostname=hostname,
|
||||||
|
port=port,
|
||||||
|
username=auth.username if auth else '',
|
||||||
|
password=auth.password if auth else '',
|
||||||
|
mechanisms=mechanisms.lower(),
|
||||||
|
enable_tls=tls_config.enable if tls_config else 'False',
|
||||||
|
trusted_fingerprints=' '.join(tls_config.trusted_fingerprints) if tls_config else '',
|
||||||
|
))
|
||||||
|
self.proc = subprocess.Popen(['supybot',
|
||||||
|
os.path.join(self.directory, 'bot.conf')],
|
||||||
|
stderr=subprocess.STDOUT)
|
||||||
|
|
||||||
if auth.username:
|
def get_irctest_controller_class():
|
||||||
username = auth.username.encode("unicode_escape").decode()
|
|
||||||
if auth.password:
|
|
||||||
password = auth.password.encode("unicode_escape").decode()
|
|
||||||
with self.open_file("bot.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
directory=self.directory,
|
|
||||||
loglevel="CRITICAL",
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
username=username,
|
|
||||||
password=password,
|
|
||||||
mechanisms=mechanisms.lower(),
|
|
||||||
enable_tls=tls_config.enable if tls_config else "False",
|
|
||||||
trusted_fingerprints=" ".join(tls_config.trusted_fingerprints)
|
|
||||||
if tls_config
|
|
||||||
else "",
|
|
||||||
)
|
|
||||||
)
|
|
||||||
assert self.directory
|
|
||||||
self.proc = subprocess.Popen(["supybot", self.directory / "bot.conf"])
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[LimnoriaController]:
|
|
||||||
return LimnoriaController
|
return LimnoriaController
|
||||||
|
@ -1,13 +1,9 @@
|
|||||||
import shutil
|
import os
|
||||||
|
import time
|
||||||
import subprocess
|
import subprocess
|
||||||
from typing import Optional, Set, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import (
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
BaseServerController,
|
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
||||||
DirectoryBasedController,
|
|
||||||
NotImplementedByController,
|
|
||||||
)
|
|
||||||
from irctest.cases import BaseServerTestCase
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
clients:
|
clients:
|
||||||
@ -33,10 +29,10 @@ extensions:
|
|||||||
- mammon.ext.ircv3.sasl
|
- mammon.ext.ircv3.sasl
|
||||||
- mammon.ext.misc.nopost
|
- mammon.ext.misc.nopost
|
||||||
metadata:
|
metadata:
|
||||||
restricted_keys: []
|
restricted_keys:
|
||||||
|
{restricted_keys}
|
||||||
whitelist:
|
whitelist:
|
||||||
- display-name
|
{authorized_keys}
|
||||||
- avatar
|
|
||||||
monitor:
|
monitor:
|
||||||
limit: 20
|
limit: 20
|
||||||
motd:
|
motd:
|
||||||
@ -62,93 +58,66 @@ server:
|
|||||||
recvq_len: 20
|
recvq_len: 20
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
def make_list(l):
|
||||||
def make_list(list_: Set[str]) -> str:
|
return '\n'.join(map(' - {}'.format, l))
|
||||||
return "\n".join(map(" - {}".format, list_))
|
|
||||||
|
|
||||||
|
|
||||||
class MammonController(BaseServerController, DirectoryBasedController):
|
class MammonController(BaseServerController, DirectoryBasedController):
|
||||||
software_name = "Mammon"
|
software_name = 'Mammon'
|
||||||
supported_sasl_mechanisms = {"PLAIN", "ECDSA-NIST256P-CHALLENGE"}
|
supported_sasl_mechanisms = {
|
||||||
|
'PLAIN', 'ECDSA-NIST256P-CHALLENGE',
|
||||||
|
}
|
||||||
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
|
||||||
def create_config(self) -> None:
|
def create_config(self):
|
||||||
super().create_config()
|
super().create_config()
|
||||||
with self.open_file("server.conf"):
|
with self.open_file('server.conf'):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def kill_proc(self) -> None:
|
def kill_proc(self):
|
||||||
# Mammon does not seem to handle SIGTERM very well
|
# Mammon does not seem to handle SIGTERM very well
|
||||||
assert self.proc
|
|
||||||
self.proc.kill()
|
self.proc.kill()
|
||||||
|
|
||||||
def run(
|
def run(self, hostname, port, password=None, ssl=False,
|
||||||
self,
|
restricted_metadata_keys=(),
|
||||||
hostname: str,
|
valid_metadata_keys=(), invalid_metadata_keys=()):
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
if password is not None:
|
if password is not None:
|
||||||
raise NotImplementedByController("PASS command")
|
raise NotImplementedByController('PASS command')
|
||||||
if ssl:
|
if ssl:
|
||||||
raise NotImplementedByController("SSL")
|
raise NotImplementedByController('SSL')
|
||||||
assert self.proc is None
|
assert self.proc is None
|
||||||
self.port = port
|
self.port = port
|
||||||
self.create_config()
|
self.create_config()
|
||||||
with self.open_file("server.yml") as fd:
|
with self.open_file('server.yml') as fd:
|
||||||
fd.write(
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
TEMPLATE_CONFIG.format(
|
directory=self.directory,
|
||||||
directory=self.directory,
|
hostname=hostname,
|
||||||
hostname=hostname,
|
port=port,
|
||||||
port=port,
|
authorized_keys=make_list(valid_metadata_keys),
|
||||||
)
|
restricted_keys=make_list(restricted_metadata_keys),
|
||||||
)
|
))
|
||||||
# with self.open_file('server.yml', 'r') as fd:
|
#with self.open_file('server.yml', 'r') as fd:
|
||||||
# print(fd.read())
|
# print(fd.read())
|
||||||
assert self.directory
|
self.proc = subprocess.Popen(['mammond', '--nofork', #'--debug',
|
||||||
|
'--config', os.path.join(self.directory, 'server.yml')])
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
def registerUser(self, case, username, password=None):
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"mammond",
|
|
||||||
"--nofork", # '--debug',
|
|
||||||
"--config",
|
|
||||||
self.directory / "server.yml",
|
|
||||||
]
|
|
||||||
)
|
|
||||||
|
|
||||||
def registerUser(
|
|
||||||
self,
|
|
||||||
case: BaseServerTestCase,
|
|
||||||
username: str,
|
|
||||||
password: Optional[str] = None,
|
|
||||||
) -> None:
|
|
||||||
# XXX: Move this somewhere else when
|
# XXX: Move this somewhere else when
|
||||||
# https://github.com/ircv3/ircv3-specifications/pull/152 becomes
|
# https://github.com/ircv3/ircv3-specifications/pull/152 becomes
|
||||||
# part of the specification
|
# part of the specification
|
||||||
client = case.addClient(show_io=False)
|
client = case.addClient(show_io=False)
|
||||||
case.sendLine(client, "CAP LS 302")
|
case.sendLine(client, 'CAP LS 302')
|
||||||
case.sendLine(client, "NICK registration_user")
|
case.sendLine(client, 'NICK registration_user')
|
||||||
case.sendLine(client, "USER r e g :user")
|
case.sendLine(client, 'USER r e g :user')
|
||||||
case.sendLine(client, "CAP END")
|
case.sendLine(client, 'CAP END')
|
||||||
while case.getRegistrationMessage(client).command != "001":
|
while case.getRegistrationMessage(client).command != '001':
|
||||||
pass
|
pass
|
||||||
list(case.getMessages(client))
|
list(case.getMessages(client))
|
||||||
case.sendLine(client, "REG CREATE {} passphrase {}".format(username, password))
|
case.sendLine(client, 'REG CREATE {} passphrase {}'.format(
|
||||||
|
username, password))
|
||||||
msg = case.getMessage(client)
|
msg = case.getMessage(client)
|
||||||
assert msg.command == "920", msg
|
assert msg.command == '920', msg
|
||||||
list(case.getMessages(client))
|
list(case.getMessages(client))
|
||||||
case.removeClient(client)
|
case.removeClient(client)
|
||||||
|
|
||||||
|
def get_irctest_controller_class():
|
||||||
def get_irctest_controller_class() -> Type[MammonController]:
|
|
||||||
return MammonController
|
return MammonController
|
||||||
|
@ -1,11 +0,0 @@
|
|||||||
from typing import Type
|
|
||||||
|
|
||||||
from .ircu2 import Ircu2Controller
|
|
||||||
|
|
||||||
|
|
||||||
class NefariousController(Ircu2Controller):
|
|
||||||
software_name = "Nefarious"
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[NefariousController]:
|
|
||||||
return NefariousController
|
|
@ -1,118 +0,0 @@
|
|||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Set, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
[Global]
|
|
||||||
Name = My.Little.Server
|
|
||||||
Info = test server
|
|
||||||
Bind = {hostname}
|
|
||||||
Ports = {port}
|
|
||||||
AdminInfo1 = Bob Smith
|
|
||||||
AdminEMail = email@example.org
|
|
||||||
{password_field}
|
|
||||||
|
|
||||||
[Server]
|
|
||||||
Name = services.example.org
|
|
||||||
MyPassword = password
|
|
||||||
PeerPassword = password
|
|
||||||
Passive = yes # don't connect to it
|
|
||||||
ServiceMask = *Serv
|
|
||||||
|
|
||||||
[Options]
|
|
||||||
MorePrivacy = no # by default, always replies to WHOWAS with ERR_WASNOSUCHNICK
|
|
||||||
|
|
||||||
[Operator]
|
|
||||||
Name = operuser
|
|
||||||
Password = operpassword
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class NgircdController(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "ngIRCd"
|
|
||||||
supported_sasl_mechanisms: Set[str] = set()
|
|
||||||
supports_sts = False
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
(unused_hostname, unused_port) = self.get_hostname_and_port()
|
|
||||||
|
|
||||||
password_field = "Password = {}".format(password) if password else ""
|
|
||||||
|
|
||||||
self.gen_ssl()
|
|
||||||
if ssl:
|
|
||||||
(tls_hostname, tls_port) = (hostname, port)
|
|
||||||
(hostname, port) = (unused_hostname, unused_port)
|
|
||||||
else:
|
|
||||||
# Unreal refuses to start without TLS enabled
|
|
||||||
(tls_hostname, tls_port) = (unused_hostname, unused_port)
|
|
||||||
|
|
||||||
with self.open_file("empty.txt") as fd:
|
|
||||||
fd.write("\n")
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
tls_hostname=tls_hostname,
|
|
||||||
tls_port=tls_port,
|
|
||||||
password_field=password_field,
|
|
||||||
key_path=self.key_path,
|
|
||||||
pem_path=self.pem_path,
|
|
||||||
empty_file=self.directory / "empty.txt",
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"ngircd",
|
|
||||||
"--nodaemon",
|
|
||||||
"--config",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
],
|
|
||||||
# stdout=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
if run_services:
|
|
||||||
self.wait_for_port()
|
|
||||||
self.services_controller = self.services_controller_class(
|
|
||||||
self.test_config, self
|
|
||||||
)
|
|
||||||
self.services_controller.run(
|
|
||||||
protocol="ngircd",
|
|
||||||
server_hostname=hostname,
|
|
||||||
server_port=port,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[NgircdController]:
|
|
||||||
return NgircdController
|
|
144
irctest/controllers/oragono.py
Normal file
144
irctest/controllers/oragono.py
Normal file
@ -0,0 +1,144 @@
|
|||||||
|
import os
|
||||||
|
import subprocess
|
||||||
|
|
||||||
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
|
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
||||||
|
|
||||||
|
TEMPLATE_CONFIG = """
|
||||||
|
network:
|
||||||
|
name: OragonoTest
|
||||||
|
|
||||||
|
server:
|
||||||
|
name: oragono.test
|
||||||
|
listen:
|
||||||
|
- "{hostname}:{port}"
|
||||||
|
{tls}
|
||||||
|
|
||||||
|
check-ident: false
|
||||||
|
|
||||||
|
max-sendq: 16k
|
||||||
|
|
||||||
|
connection-limits:
|
||||||
|
cidr-len-ipv4: 24
|
||||||
|
cidr-len-ipv6: 120
|
||||||
|
ips-per-subnet: 16
|
||||||
|
|
||||||
|
exempted:
|
||||||
|
- "127.0.0.1/8"
|
||||||
|
- "::1/128"
|
||||||
|
|
||||||
|
connection-throttling:
|
||||||
|
enabled: true
|
||||||
|
cidr-len-ipv4: 32
|
||||||
|
cidr-len-ipv6: 128
|
||||||
|
duration: 10m
|
||||||
|
max-connections: 12
|
||||||
|
ban-duration: 10m
|
||||||
|
ban-message: You have attempted to connect too many times within a short duration. Wait a while, and you will be able to connect.
|
||||||
|
|
||||||
|
exempted:
|
||||||
|
- "127.0.0.1/8"
|
||||||
|
- "::1/128"
|
||||||
|
|
||||||
|
accounts:
|
||||||
|
registration:
|
||||||
|
enabled: true
|
||||||
|
verify-timeout: "120h"
|
||||||
|
enabled-callbacks:
|
||||||
|
- none # no verification needed, will instantly register successfully
|
||||||
|
allow-multiple-per-connection: true
|
||||||
|
|
||||||
|
authentication-enabled: true
|
||||||
|
|
||||||
|
channels:
|
||||||
|
registration:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
datastore:
|
||||||
|
path: {directory}/ircd.db
|
||||||
|
|
||||||
|
limits:
|
||||||
|
nicklen: 32
|
||||||
|
channellen: 64
|
||||||
|
awaylen: 200
|
||||||
|
kicklen: 390
|
||||||
|
topiclen: 390
|
||||||
|
monitor-entries: 100
|
||||||
|
whowas-entries: 100
|
||||||
|
chan-list-modes: 60
|
||||||
|
linelen:
|
||||||
|
tags: 2048
|
||||||
|
rest: 2048
|
||||||
|
"""
|
||||||
|
|
||||||
|
class OragonoController(BaseServerController, DirectoryBasedController):
|
||||||
|
software_name = 'Oragono'
|
||||||
|
supported_sasl_mechanisms = {
|
||||||
|
'PLAIN',
|
||||||
|
}
|
||||||
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
|
||||||
|
def create_config(self):
|
||||||
|
super().create_config()
|
||||||
|
with self.open_file('ircd.yaml'):
|
||||||
|
pass
|
||||||
|
|
||||||
|
def kill_proc(self):
|
||||||
|
self.proc.kill()
|
||||||
|
|
||||||
|
def run(self, hostname, port, password=None, ssl=False,
|
||||||
|
restricted_metadata_keys=None,
|
||||||
|
valid_metadata_keys=None, invalid_metadata_keys=None):
|
||||||
|
if valid_metadata_keys or invalid_metadata_keys:
|
||||||
|
raise NotImplementedByController(
|
||||||
|
'Defining valid and invalid METADATA keys.')
|
||||||
|
if password is not None:
|
||||||
|
#TODO(dan): fix dis
|
||||||
|
raise NotImplementedByController('PASS command')
|
||||||
|
self.create_config()
|
||||||
|
tls_config = ""
|
||||||
|
if ssl:
|
||||||
|
self.key_path = os.path.join(self.directory, 'ssl.key')
|
||||||
|
self.pem_path = os.path.join(self.directory, 'ssl.pem')
|
||||||
|
tls_config = 'tls-listeners:\n ":{port}":\n key: {key}\n cert: {pem}'.format(
|
||||||
|
port=port,
|
||||||
|
key=self.key_path,
|
||||||
|
pem=self.pem_path,
|
||||||
|
)
|
||||||
|
assert self.proc is None
|
||||||
|
self.port = port
|
||||||
|
with self.open_file('server.yml') as fd:
|
||||||
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
|
directory=self.directory,
|
||||||
|
hostname=hostname,
|
||||||
|
port=port,
|
||||||
|
tls=tls_config,
|
||||||
|
))
|
||||||
|
subprocess.call(['oragono', 'initdb',
|
||||||
|
'--conf', os.path.join(self.directory, 'server.yml'), '--quiet'])
|
||||||
|
subprocess.call(['oragono', 'mkcerts',
|
||||||
|
'--conf', os.path.join(self.directory, 'server.yml'), '--quiet'])
|
||||||
|
self.proc = subprocess.Popen(['oragono', 'run',
|
||||||
|
'--conf', os.path.join(self.directory, 'server.yml'), '--quiet'])
|
||||||
|
|
||||||
|
def registerUser(self, case, username, password=None):
|
||||||
|
# XXX: Move this somewhere else when
|
||||||
|
# https://github.com/ircv3/ircv3-specifications/pull/152 becomes
|
||||||
|
# part of the specification
|
||||||
|
client = case.addClient(show_io=False)
|
||||||
|
case.sendLine(client, 'CAP LS 302')
|
||||||
|
case.sendLine(client, 'NICK registration_user')
|
||||||
|
case.sendLine(client, 'USER r e g :user')
|
||||||
|
case.sendLine(client, 'CAP END')
|
||||||
|
while case.getRegistrationMessage(client).command != '001':
|
||||||
|
pass
|
||||||
|
case.getMessages(client)
|
||||||
|
case.sendLine(client, 'ACC REGISTER {} * {}'.format(
|
||||||
|
username, password))
|
||||||
|
msg = case.getMessage(client)
|
||||||
|
assert msg.command == '920', msg
|
||||||
|
case.sendLine(client, 'QUIT')
|
||||||
|
case.assertDisconnected(client)
|
||||||
|
|
||||||
|
def get_irctest_controller_class():
|
||||||
|
return OragonoController
|
@ -1,87 +0,0 @@
|
|||||||
from typing import Set, Type
|
|
||||||
|
|
||||||
from .base_hybrid import BaseHybridController
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
serverinfo {{
|
|
||||||
name = "My.Little.Server";
|
|
||||||
sid = "42X";
|
|
||||||
description = "test server";
|
|
||||||
|
|
||||||
# Hybrid defaults to 9
|
|
||||||
max_nick_length = 20;
|
|
||||||
{ssl_config}
|
|
||||||
}};
|
|
||||||
|
|
||||||
general {{
|
|
||||||
throttle_count = 100; # We need to connect lots of clients quickly
|
|
||||||
sasl_service = "SaslServ";
|
|
||||||
|
|
||||||
# Allow connections quickly
|
|
||||||
throttle_num = 100;
|
|
||||||
|
|
||||||
# Allow PART/QUIT reasons quickly
|
|
||||||
anti_spam_exit_message_time = 0;
|
|
||||||
|
|
||||||
# Allow all commands quickly
|
|
||||||
pace_wait_simple = 0;
|
|
||||||
pace_wait = 0;
|
|
||||||
}};
|
|
||||||
|
|
||||||
listen {{
|
|
||||||
defer_accept = yes;
|
|
||||||
|
|
||||||
host = "{hostname}";
|
|
||||||
port = {port};
|
|
||||||
|
|
||||||
flags = server;
|
|
||||||
port = {services_port};
|
|
||||||
}};
|
|
||||||
|
|
||||||
class {{
|
|
||||||
name = "server";
|
|
||||||
ping_time = 5 minutes;
|
|
||||||
connectfreq = 5 minutes;
|
|
||||||
}};
|
|
||||||
connect {{
|
|
||||||
name = "services.example.org";
|
|
||||||
host = "127.0.0.1"; # Used to validate incoming connection
|
|
||||||
port = 0; # We don't need servers to connect to services
|
|
||||||
send_password = "password";
|
|
||||||
accept_password = "password";
|
|
||||||
class = "server";
|
|
||||||
}};
|
|
||||||
service {{
|
|
||||||
name = "services.example.org";
|
|
||||||
}};
|
|
||||||
|
|
||||||
auth {{
|
|
||||||
user = "*";
|
|
||||||
flags = exceed_limit;
|
|
||||||
{password_field}
|
|
||||||
}};
|
|
||||||
|
|
||||||
operator {{
|
|
||||||
name = "operuser";
|
|
||||||
user = "*@*";
|
|
||||||
password = "operpassword";
|
|
||||||
encrypted = no;
|
|
||||||
umodes = locops, servnotice, wallop;
|
|
||||||
flags = admin, connect, connect:remote, die, globops, kill, kill:remote,
|
|
||||||
kline, module, rehash, restart, set, unkline, unxline, wallops, xline;
|
|
||||||
}};
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class Plexus4Controller(BaseHybridController):
|
|
||||||
software_name = "Plexus4"
|
|
||||||
binary_name = "ircd"
|
|
||||||
services_protocol = "plexus"
|
|
||||||
|
|
||||||
supported_sasl_mechanisms: Set[str] = set()
|
|
||||||
|
|
||||||
template_config = TEMPLATE_CONFIG
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[Plexus4Controller]:
|
|
||||||
return Plexus4Controller
|
|
@ -1,114 +0,0 @@
|
|||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
from typing import Optional, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import (
|
|
||||||
BaseServerController,
|
|
||||||
DirectoryBasedController,
|
|
||||||
NotImplementedByController,
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
General {{
|
|
||||||
name = "My.Little.Server";
|
|
||||||
numeric = 42;
|
|
||||||
description = "test server";
|
|
||||||
}};
|
|
||||||
|
|
||||||
Port {{
|
|
||||||
vhost = "{hostname}";
|
|
||||||
port = {port};
|
|
||||||
}};
|
|
||||||
|
|
||||||
Class {{
|
|
||||||
name = "Client";
|
|
||||||
pingfreq = 5 minutes;
|
|
||||||
sendq = 160000;
|
|
||||||
maxlinks = 1024;
|
|
||||||
}};
|
|
||||||
|
|
||||||
Client {{
|
|
||||||
username = "*";
|
|
||||||
class = "Client";
|
|
||||||
{password_field}
|
|
||||||
}};
|
|
||||||
|
|
||||||
Operator {{
|
|
||||||
local = no;
|
|
||||||
host = "*@*";
|
|
||||||
password = "$PLAIN$operpassword";
|
|
||||||
name = "operuser";
|
|
||||||
class = "Client";
|
|
||||||
}};
|
|
||||||
|
|
||||||
features {{
|
|
||||||
"PPATH" = "{pidfile}";
|
|
||||||
|
|
||||||
# don't block notices by default, wtf
|
|
||||||
"AUTOCHANMODES_LIST" = "+tnC";
|
|
||||||
}};
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class SnircdController(BaseServerController, DirectoryBasedController):
|
|
||||||
supports_sts = False
|
|
||||||
extban_mute_char = None
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
if ssl:
|
|
||||||
raise NotImplementedByController("TLS")
|
|
||||||
if run_services:
|
|
||||||
raise NotImplementedByController("Services")
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
password_field = 'password = "{}";'.format(password) if password else ""
|
|
||||||
assert self.directory
|
|
||||||
pidfile = self.directory / "ircd.pid"
|
|
||||||
with self.open_file("server.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
password_field=password_field,
|
|
||||||
pidfile=pidfile,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"ircd",
|
|
||||||
"-n", # don't detach
|
|
||||||
"-f",
|
|
||||||
self.directory / "server.conf",
|
|
||||||
"-x",
|
|
||||||
"DEBUG",
|
|
||||||
],
|
|
||||||
# stderr=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[SnircdController]:
|
|
||||||
return SnircdController
|
|
@ -1,12 +0,0 @@
|
|||||||
from typing import Type
|
|
||||||
|
|
||||||
from .charybdis import CharybdisController
|
|
||||||
|
|
||||||
|
|
||||||
class SolanumController(CharybdisController):
|
|
||||||
software_name = "Solanum"
|
|
||||||
binary_name = "solanum"
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[SolanumController]:
|
|
||||||
return SolanumController
|
|
@ -1,14 +1,9 @@
|
|||||||
from pathlib import Path
|
import os
|
||||||
import subprocess
|
|
||||||
import tempfile
|
import tempfile
|
||||||
from typing import Optional, TextIO, Type, cast
|
import subprocess
|
||||||
|
|
||||||
from irctest import authentication, tls
|
from irctest.basecontrollers import BaseClientController
|
||||||
from irctest.basecontrollers import (
|
from irctest.basecontrollers import NotImplementedByController
|
||||||
BaseClientController,
|
|
||||||
NotImplementedByController,
|
|
||||||
TestCaseControllerConfig,
|
|
||||||
)
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
TEMPLATE_CONFIG = """
|
||||||
[core]
|
[core]
|
||||||
@ -17,64 +12,59 @@ host = {hostname}
|
|||||||
use_ssl = false
|
use_ssl = false
|
||||||
port = {port}
|
port = {port}
|
||||||
owner = me
|
owner = me
|
||||||
channels =
|
channels =
|
||||||
timeout = 5
|
timeout = 5
|
||||||
auth_username = {username}
|
auth_username = {username}
|
||||||
auth_password = {password}
|
auth_password = {password}
|
||||||
{auth_method}
|
{auth_method}
|
||||||
"""
|
"""
|
||||||
|
|
||||||
|
|
||||||
class SopelController(BaseClientController):
|
class SopelController(BaseClientController):
|
||||||
software_name = "Sopel"
|
software_name = 'Sopel'
|
||||||
supported_sasl_mechanisms = {"PLAIN"}
|
supported_sasl_mechanisms = {
|
||||||
supports_sts = False
|
'PLAIN',
|
||||||
|
}
|
||||||
|
supported_capabilities = set() # Not exhaustive
|
||||||
|
|
||||||
def __init__(self, test_config: TestCaseControllerConfig):
|
def __init__(self):
|
||||||
super().__init__(test_config)
|
super().__init__()
|
||||||
self.filename = next(tempfile._get_candidate_names()) + ".cfg" # type: ignore
|
self.filename = next(tempfile._get_candidate_names()) + '.cfg'
|
||||||
|
self.proc = None
|
||||||
def kill(self) -> None:
|
def kill(self):
|
||||||
super().kill()
|
if self.proc:
|
||||||
|
self.proc.kill()
|
||||||
if self.filename:
|
if self.filename:
|
||||||
try:
|
try:
|
||||||
(Path("~/.sopel/").expanduser() / self.filename).unlink()
|
os.unlink(os.path.join(os.path.expanduser('~/.sopel/'),
|
||||||
except OSError: # File does not exist
|
self.filename))
|
||||||
|
except OSError: # File does not exist
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def open_file(self, filename: str, mode: str = "a") -> TextIO:
|
def open_file(self, filename, mode='a'):
|
||||||
dir_path = Path("~/.sopel/").expanduser()
|
return open(os.path.join(os.path.expanduser('~/.sopel/'), filename),
|
||||||
dir_path.mkdir(parents=True, exist_ok=True)
|
mode)
|
||||||
return cast(TextIO, (dir_path / filename).open(mode))
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
def create_config(self):
|
||||||
with self.open_file(self.filename):
|
with self.open_file(self.filename) as fd:
|
||||||
pass
|
pass
|
||||||
|
|
||||||
def run(
|
def run(self, hostname, port, auth, tls_config):
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
auth: Optional[authentication.Authentication],
|
|
||||||
tls_config: Optional[tls.TlsConfig] = None,
|
|
||||||
) -> None:
|
|
||||||
# Runs a client with the config given as arguments
|
# Runs a client with the config given as arguments
|
||||||
if tls_config is not None:
|
if tls_config is not None:
|
||||||
raise NotImplementedByController("TLS configuration")
|
raise NotImplementedByController(
|
||||||
|
'TLS configuration')
|
||||||
assert self.proc is None
|
assert self.proc is None
|
||||||
self.create_config()
|
self.create_config()
|
||||||
with self.open_file(self.filename) as fd:
|
with self.open_file(self.filename) as fd:
|
||||||
fd.write(
|
fd.write(TEMPLATE_CONFIG.format(
|
||||||
TEMPLATE_CONFIG.format(
|
hostname=hostname,
|
||||||
hostname=hostname,
|
port=port,
|
||||||
port=port,
|
username=auth.username if auth else '',
|
||||||
username=auth.username if auth else "",
|
password=auth.password if auth else '',
|
||||||
password=auth.password if auth else "",
|
auth_method='auth_method = sasl' if auth else '',
|
||||||
auth_method="auth_method = sasl" if auth else "",
|
))
|
||||||
)
|
self.proc = subprocess.Popen(['sopel', '--quiet', '-c', self.filename])
|
||||||
)
|
|
||||||
self.proc = subprocess.Popen(["sopel", "-c", self.filename])
|
|
||||||
|
|
||||||
|
def get_irctest_controller_class():
|
||||||
def get_irctest_controller_class() -> Type[SopelController]:
|
|
||||||
return SopelController
|
return SopelController
|
||||||
|
|
||||||
|
@ -1,303 +0,0 @@
|
|||||||
import contextlib
|
|
||||||
import fcntl
|
|
||||||
import functools
|
|
||||||
from pathlib import Path
|
|
||||||
import shutil
|
|
||||||
import subprocess
|
|
||||||
import textwrap
|
|
||||||
from typing import Callable, ContextManager, Iterator, Optional, Type
|
|
||||||
|
|
||||||
from irctest.basecontrollers import BaseServerController, DirectoryBasedController
|
|
||||||
|
|
||||||
TEMPLATE_CONFIG = """
|
|
||||||
include "modules.default.conf";
|
|
||||||
include "operclass.default.conf";
|
|
||||||
{extras}
|
|
||||||
loadmodule "third/redact";
|
|
||||||
include "help/help.conf";
|
|
||||||
|
|
||||||
me {{
|
|
||||||
name "My.Little.Server";
|
|
||||||
info "test server";
|
|
||||||
sid "001";
|
|
||||||
}}
|
|
||||||
admin {{
|
|
||||||
"Bob Smith";
|
|
||||||
"bob";
|
|
||||||
"email@example.org";
|
|
||||||
}}
|
|
||||||
class clients {{
|
|
||||||
pingfreq 90;
|
|
||||||
maxclients 1000;
|
|
||||||
sendq 200k;
|
|
||||||
recvq 8000;
|
|
||||||
}}
|
|
||||||
class servers {{
|
|
||||||
pingfreq 60;
|
|
||||||
connfreq 15; /* try to connect every 15 seconds */
|
|
||||||
maxclients 10; /* max servers */
|
|
||||||
sendq 20M;
|
|
||||||
}}
|
|
||||||
allow {{
|
|
||||||
mask *;
|
|
||||||
class clients;
|
|
||||||
maxperip 50;
|
|
||||||
{password_field}
|
|
||||||
}}
|
|
||||||
listen {{
|
|
||||||
ip {hostname};
|
|
||||||
port {port};
|
|
||||||
}}
|
|
||||||
listen {{
|
|
||||||
ip {tls_hostname};
|
|
||||||
port {tls_port};
|
|
||||||
options {{ tls; }}
|
|
||||||
tls-options {{
|
|
||||||
certificate "{pem_path}";
|
|
||||||
key "{key_path}";
|
|
||||||
}};
|
|
||||||
}}
|
|
||||||
|
|
||||||
/* Special SSL/TLS servers-only port for linking */
|
|
||||||
listen {{
|
|
||||||
ip {services_hostname};
|
|
||||||
port {services_port};
|
|
||||||
options {{ serversonly; }}
|
|
||||||
}}
|
|
||||||
|
|
||||||
link services.example.org {{
|
|
||||||
incoming {{
|
|
||||||
mask *;
|
|
||||||
}}
|
|
||||||
password "password";
|
|
||||||
class servers;
|
|
||||||
}}
|
|
||||||
ulines {{
|
|
||||||
services.example.org;
|
|
||||||
}}
|
|
||||||
|
|
||||||
set {{
|
|
||||||
sasl-server services.example.org;
|
|
||||||
kline-address "example@example.org";
|
|
||||||
network-name "ExampleNET";
|
|
||||||
default-server "irc.example.org";
|
|
||||||
help-channel "#Help";
|
|
||||||
cloak-keys {{ "aaaA1"; "bbbB2"; "cccC3"; }}
|
|
||||||
options {{
|
|
||||||
identd-check; // Disable it, so it doesn't prefix idents with a tilde
|
|
||||||
}}
|
|
||||||
anti-flood {{
|
|
||||||
// Prevent throttling, especially test_buffering.py which
|
|
||||||
// triggers anti-flood with its very long lines
|
|
||||||
unknown-users {{
|
|
||||||
nick-flood 255:10;
|
|
||||||
lag-penalty 1;
|
|
||||||
lag-penalty-bytes 10000;
|
|
||||||
}}
|
|
||||||
}}
|
|
||||||
modes-on-join "+H 100:1d"; // Enables CHATHISTORY
|
|
||||||
|
|
||||||
redacters {{
|
|
||||||
op;
|
|
||||||
sender;
|
|
||||||
}}
|
|
||||||
|
|
||||||
{set_v6only}
|
|
||||||
|
|
||||||
}}
|
|
||||||
|
|
||||||
tld {{
|
|
||||||
mask *;
|
|
||||||
motd "{empty_file}";
|
|
||||||
botmotd "{empty_file}";
|
|
||||||
rules "{empty_file}";
|
|
||||||
}}
|
|
||||||
|
|
||||||
files {{
|
|
||||||
tunefile "{empty_file}";
|
|
||||||
}}
|
|
||||||
|
|
||||||
oper "operuser" {{
|
|
||||||
password = "operpassword";
|
|
||||||
mask *;
|
|
||||||
class clients;
|
|
||||||
operclass netadmin;
|
|
||||||
}}
|
|
||||||
"""
|
|
||||||
|
|
||||||
SET_V6ONLY = """
|
|
||||||
// Remove RPL_WHOISSPECIAL used to advertise security groups
|
|
||||||
whois-details {
|
|
||||||
security-groups { everyone none; self none; oper none; }
|
|
||||||
}
|
|
||||||
|
|
||||||
plaintext-policy {
|
|
||||||
server warn; // https://www.unrealircd.org/docs/FAQ#server-requires-tls
|
|
||||||
oper warn; // https://www.unrealircd.org/docs/FAQ#oper-requires-tls
|
|
||||||
}
|
|
||||||
|
|
||||||
anti-flood {
|
|
||||||
everyone {
|
|
||||||
connect-flood 255:10;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
def _filelock(path: Path) -> Callable[[], ContextManager]:
|
|
||||||
"""Alternative to :cls:`multiprocessing.Lock` that works with pytest-xdist"""
|
|
||||||
|
|
||||||
@contextlib.contextmanager
|
|
||||||
def f() -> Iterator[None]:
|
|
||||||
with open(path, "a") as fd:
|
|
||||||
fcntl.flock(fd, fcntl.LOCK_EX)
|
|
||||||
yield
|
|
||||||
|
|
||||||
return f
|
|
||||||
|
|
||||||
|
|
||||||
_UNREALIRCD_BIN = shutil.which("unrealircd")
|
|
||||||
if _UNREALIRCD_BIN:
|
|
||||||
_UNREALIRCD_PREFIX = Path(_UNREALIRCD_BIN).parent.parent
|
|
||||||
|
|
||||||
# Try to keep that lock file specific to this Unrealircd instance
|
|
||||||
_LOCK_PATH = _UNREALIRCD_PREFIX / "irctest-unrealircd-startstop.lock"
|
|
||||||
else:
|
|
||||||
# unrealircd not found; we are probably going to crash later anyway...
|
|
||||||
_LOCK_PATH = Path("/tmp/irctest-unrealircd-startstop.lock")
|
|
||||||
|
|
||||||
_STARTSTOP_LOCK = _filelock(_LOCK_PATH)
|
|
||||||
"""
|
|
||||||
Unreal cleans its tmp/ directory after each run, which prevents
|
|
||||||
multiple processes from starting/stopping at the same time.
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
@functools.lru_cache()
|
|
||||||
def installed_version() -> int:
|
|
||||||
output = subprocess.check_output(["unrealircd", "-v"], universal_newlines=True)
|
|
||||||
if output.startswith("UnrealIRCd-5."):
|
|
||||||
return 5
|
|
||||||
elif output.startswith("UnrealIRCd-6."):
|
|
||||||
return 6
|
|
||||||
else:
|
|
||||||
assert False, f"unexpected version: {output}"
|
|
||||||
|
|
||||||
|
|
||||||
class UnrealircdController(BaseServerController, DirectoryBasedController):
|
|
||||||
software_name = "UnrealIRCd"
|
|
||||||
supported_sasl_mechanisms = {"PLAIN"}
|
|
||||||
supports_sts = False
|
|
||||||
|
|
||||||
extban_mute_char = "quiet" if installed_version() >= 6 else "q"
|
|
||||||
software_version = installed_version()
|
|
||||||
|
|
||||||
def create_config(self) -> None:
|
|
||||||
super().create_config()
|
|
||||||
with self.open_file("server.conf"):
|
|
||||||
pass
|
|
||||||
|
|
||||||
def run(
|
|
||||||
self,
|
|
||||||
hostname: str,
|
|
||||||
port: int,
|
|
||||||
*,
|
|
||||||
password: Optional[str],
|
|
||||||
ssl: bool,
|
|
||||||
run_services: bool,
|
|
||||||
faketime: Optional[str],
|
|
||||||
) -> None:
|
|
||||||
assert self.proc is None
|
|
||||||
self.port = port
|
|
||||||
self.hostname = hostname
|
|
||||||
self.create_config()
|
|
||||||
|
|
||||||
if installed_version() >= 6:
|
|
||||||
extras = textwrap.dedent(
|
|
||||||
"""
|
|
||||||
include "snomasks.default.conf";
|
|
||||||
loadmodule "cloak_md5";
|
|
||||||
"""
|
|
||||||
)
|
|
||||||
set_v6only = SET_V6ONLY
|
|
||||||
else:
|
|
||||||
extras = ""
|
|
||||||
set_v6only = ""
|
|
||||||
|
|
||||||
with self.open_file("empty.txt") as fd:
|
|
||||||
fd.write("\n")
|
|
||||||
|
|
||||||
password_field = 'password "{}";'.format(password) if password else ""
|
|
||||||
|
|
||||||
(services_hostname, services_port) = self.get_hostname_and_port()
|
|
||||||
(unused_hostname, unused_port) = self.get_hostname_and_port()
|
|
||||||
|
|
||||||
self.gen_ssl()
|
|
||||||
if ssl:
|
|
||||||
(tls_hostname, tls_port) = (hostname, port)
|
|
||||||
(hostname, port) = (unused_hostname, unused_port)
|
|
||||||
else:
|
|
||||||
# Unreal refuses to start without TLS enabled
|
|
||||||
(tls_hostname, tls_port) = (unused_hostname, unused_port)
|
|
||||||
|
|
||||||
assert self.directory
|
|
||||||
|
|
||||||
with self.open_file("unrealircd.conf") as fd:
|
|
||||||
fd.write(
|
|
||||||
TEMPLATE_CONFIG.format(
|
|
||||||
hostname=hostname,
|
|
||||||
port=port,
|
|
||||||
services_hostname=services_hostname,
|
|
||||||
services_port=services_port,
|
|
||||||
tls_hostname=tls_hostname,
|
|
||||||
tls_port=tls_port,
|
|
||||||
password_field=password_field,
|
|
||||||
key_path=self.key_path,
|
|
||||||
pem_path=self.pem_path,
|
|
||||||
empty_file=self.directory / "empty.txt",
|
|
||||||
set_v6only=set_v6only,
|
|
||||||
extras=extras,
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
if faketime and shutil.which("faketime"):
|
|
||||||
faketime_cmd = ["faketime", "-f", faketime]
|
|
||||||
self.faketime_enabled = True
|
|
||||||
else:
|
|
||||||
faketime_cmd = []
|
|
||||||
|
|
||||||
with _STARTSTOP_LOCK():
|
|
||||||
self.proc = subprocess.Popen(
|
|
||||||
[
|
|
||||||
*faketime_cmd,
|
|
||||||
"unrealircd",
|
|
||||||
"-t",
|
|
||||||
"-F", # BOOT_NOFORK
|
|
||||||
"-f",
|
|
||||||
self.directory / "unrealircd.conf",
|
|
||||||
],
|
|
||||||
# stdout=subprocess.DEVNULL,
|
|
||||||
)
|
|
||||||
self.wait_for_port()
|
|
||||||
|
|
||||||
if run_services:
|
|
||||||
self.services_controller = self.services_controller_class(
|
|
||||||
self.test_config, self
|
|
||||||
)
|
|
||||||
self.services_controller.run(
|
|
||||||
protocol="unreal4",
|
|
||||||
server_hostname=services_hostname,
|
|
||||||
server_port=services_port,
|
|
||||||
)
|
|
||||||
|
|
||||||
def kill_proc(self) -> None:
|
|
||||||
assert self.proc
|
|
||||||
|
|
||||||
with _STARTSTOP_LOCK():
|
|
||||||
self.proc.kill()
|
|
||||||
self.proc.wait(5) # wait for it to actually die
|
|
||||||
self.proc = None
|
|
||||||
|
|
||||||
|
|
||||||
def get_irctest_controller_class() -> Type[UnrealircdController]:
|
|
||||||
return UnrealircdController
|
|
@ -1,449 +0,0 @@
|
|||||||
import base64
|
|
||||||
import dataclasses
|
|
||||||
import gzip
|
|
||||||
import hashlib
|
|
||||||
import importlib
|
|
||||||
from pathlib import Path
|
|
||||||
import re
|
|
||||||
import sys
|
|
||||||
from typing import (
|
|
||||||
IO,
|
|
||||||
Callable,
|
|
||||||
Dict,
|
|
||||||
Iterable,
|
|
||||||
Iterator,
|
|
||||||
List,
|
|
||||||
Optional,
|
|
||||||
Tuple,
|
|
||||||
TypeVar,
|
|
||||||
)
|
|
||||||
import xml.etree.ElementTree as ET
|
|
||||||
|
|
||||||
from defusedxml.ElementTree import parse as parse_xml
|
|
||||||
import docutils.core
|
|
||||||
|
|
||||||
NETLIFY_CHAR_BLACKLIST = frozenset('":<>|*?\r\n#')
|
|
||||||
"""Characters not allowed in output filenames"""
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass
|
|
||||||
class CaseResult:
|
|
||||||
module_name: str
|
|
||||||
class_name: str
|
|
||||||
test_name: str
|
|
||||||
job: str
|
|
||||||
success: bool
|
|
||||||
skipped: bool
|
|
||||||
system_out: Optional[str]
|
|
||||||
details: Optional[str] = None
|
|
||||||
type: Optional[str] = None
|
|
||||||
message: Optional[str] = None
|
|
||||||
|
|
||||||
def output_filename(self) -> str:
|
|
||||||
test_name = self.test_name
|
|
||||||
if len(test_name) > 50 or set(test_name) & NETLIFY_CHAR_BLACKLIST:
|
|
||||||
# File name too long or otherwise invalid. This should be good enough:
|
|
||||||
m = re.match(r"(?P<function_name>\w+?)\[(?P<params>.+)\]", test_name)
|
|
||||||
assert m, "File name is too long but has no parameter."
|
|
||||||
test_name = f'{m.group("function_name")}[{md5sum(m.group("params"))}]'
|
|
||||||
return f"{self.job}_{self.module_name}.{self.class_name}.{test_name}.txt"
|
|
||||||
|
|
||||||
|
|
||||||
TK = TypeVar("TK")
|
|
||||||
TV = TypeVar("TV")
|
|
||||||
|
|
||||||
|
|
||||||
def md5sum(text: str) -> str:
|
|
||||||
return base64.urlsafe_b64encode(hashlib.md5(text.encode()).digest()).decode()
|
|
||||||
|
|
||||||
|
|
||||||
def group_by(list_: Iterable[TV], key: Callable[[TV], TK]) -> Dict[TK, List[TV]]:
|
|
||||||
groups: Dict[TK, List[TV]] = {}
|
|
||||||
for value in list_:
|
|
||||||
groups.setdefault(key(value), []).append(value)
|
|
||||||
|
|
||||||
return groups
|
|
||||||
|
|
||||||
|
|
||||||
def iter_job_results(job_file_name: Path, job: ET.ElementTree) -> Iterator[CaseResult]:
|
|
||||||
(suite,) = job.getroot()
|
|
||||||
for case in suite:
|
|
||||||
if "name" not in case.attrib:
|
|
||||||
continue
|
|
||||||
|
|
||||||
success = True
|
|
||||||
skipped = False
|
|
||||||
details = None
|
|
||||||
system_out = None
|
|
||||||
extra: Dict[str, str] = {}
|
|
||||||
for child in case:
|
|
||||||
if child.tag == "skipped":
|
|
||||||
success = True
|
|
||||||
skipped = True
|
|
||||||
details = None
|
|
||||||
extra = child.attrib
|
|
||||||
elif child.tag in ("failure", "error"):
|
|
||||||
success = False
|
|
||||||
skipped = False
|
|
||||||
details = child.text
|
|
||||||
extra = child.attrib
|
|
||||||
elif child.tag == "system-out":
|
|
||||||
assert (
|
|
||||||
system_out is None
|
|
||||||
# for some reason, skipped tests have two system-out;
|
|
||||||
# and the second one contains test teardown
|
|
||||||
or child.text.startswith(system_out.rstrip())
|
|
||||||
), ("Duplicate system-out tag", repr(system_out), repr(child.text))
|
|
||||||
system_out = child.text
|
|
||||||
else:
|
|
||||||
assert False, child
|
|
||||||
|
|
||||||
(module_name, class_name) = case.attrib["classname"].rsplit(".", 1)
|
|
||||||
m = re.match(
|
|
||||||
r"(.*/)?pytest[ -]results[ _](?P<name>.*)"
|
|
||||||
r"[ _][(]?(stable|release|devel|devel_release)[)]?/pytest.xml(.gz)?",
|
|
||||||
str(job_file_name),
|
|
||||||
)
|
|
||||||
assert m, job_file_name
|
|
||||||
yield CaseResult(
|
|
||||||
module_name=module_name,
|
|
||||||
class_name=class_name,
|
|
||||||
test_name=case.attrib["name"],
|
|
||||||
job=m.group("name"),
|
|
||||||
success=success,
|
|
||||||
skipped=skipped,
|
|
||||||
details=details,
|
|
||||||
system_out=system_out,
|
|
||||||
**extra,
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def rst_to_element(s: str) -> ET.Element:
|
|
||||||
html = docutils.core.publish_parts(s, writer_name="xhtml")["html_body"]
|
|
||||||
htmltree = ET.fromstring(html)
|
|
||||||
return htmltree
|
|
||||||
|
|
||||||
|
|
||||||
def append_docstring(element: ET.Element, obj: object) -> None:
|
|
||||||
if obj.__doc__ is None:
|
|
||||||
return
|
|
||||||
|
|
||||||
element.append(rst_to_element(obj.__doc__))
|
|
||||||
|
|
||||||
|
|
||||||
def build_job_html(job: str, results: List[CaseResult]) -> ET.Element:
|
|
||||||
jobs = sorted({result.job for result in results})
|
|
||||||
root = ET.Element("html")
|
|
||||||
head = ET.SubElement(root, "head")
|
|
||||||
ET.SubElement(head, "title").text = job
|
|
||||||
ET.SubElement(head, "link", rel="stylesheet", type="text/css", href="./style.css")
|
|
||||||
|
|
||||||
body = ET.SubElement(root, "body")
|
|
||||||
|
|
||||||
ET.SubElement(body, "h1").text = job
|
|
||||||
|
|
||||||
table = build_test_table(jobs, results)
|
|
||||||
table.set("class", "job-results test-matrix")
|
|
||||||
body.append(table)
|
|
||||||
|
|
||||||
return root
|
|
||||||
|
|
||||||
|
|
||||||
def build_module_html(
|
|
||||||
jobs: List[str], results: List[CaseResult], module_name: str
|
|
||||||
) -> ET.Element:
|
|
||||||
module = importlib.import_module(module_name)
|
|
||||||
|
|
||||||
root = ET.Element("html")
|
|
||||||
head = ET.SubElement(root, "head")
|
|
||||||
ET.SubElement(head, "title").text = module_name
|
|
||||||
ET.SubElement(head, "link", rel="stylesheet", type="text/css", href="./style.css")
|
|
||||||
|
|
||||||
body = ET.SubElement(root, "body")
|
|
||||||
|
|
||||||
ET.SubElement(body, "h1").text = module_name
|
|
||||||
|
|
||||||
append_docstring(body, module)
|
|
||||||
|
|
||||||
table = build_test_table(jobs, results)
|
|
||||||
table.set("class", "module-results test-matrix")
|
|
||||||
body.append(table)
|
|
||||||
|
|
||||||
return root
|
|
||||||
|
|
||||||
|
|
||||||
def build_test_table(jobs: List[str], results: List[CaseResult]) -> ET.Element:
|
|
||||||
multiple_modules = len({r.module_name for r in results}) > 1
|
|
||||||
results_by_module_and_class = group_by(
|
|
||||||
results, lambda r: (r.module_name, r.class_name)
|
|
||||||
)
|
|
||||||
|
|
||||||
table = ET.Element("table")
|
|
||||||
|
|
||||||
job_row = ET.Element("tr")
|
|
||||||
ET.SubElement(job_row, "th") # column of case name
|
|
||||||
for job in jobs:
|
|
||||||
cell = ET.SubElement(job_row, "th")
|
|
||||||
ET.SubElement(ET.SubElement(cell, "div"), "span").text = job
|
|
||||||
cell.set("class", "job-name")
|
|
||||||
|
|
||||||
for (module_name, class_name), class_results in sorted(
|
|
||||||
results_by_module_and_class.items()
|
|
||||||
):
|
|
||||||
if multiple_modules:
|
|
||||||
# if the page shows classes from various modules, use the fully-qualified
|
|
||||||
# name in order to disambiguate and be clearer (eg. show
|
|
||||||
# "irctest.server_tests.extended_join.MetadataTestCase" instead of just
|
|
||||||
# "MetadataTestCase" which looks like it's about IRCv3's METADATA spec.
|
|
||||||
qualified_class_name = f"{module_name}.{class_name}"
|
|
||||||
else:
|
|
||||||
# otherwise, it's not needed, so let's not display it
|
|
||||||
qualified_class_name = class_name
|
|
||||||
|
|
||||||
module = importlib.import_module(module_name)
|
|
||||||
|
|
||||||
# Header row: class name
|
|
||||||
header_row = ET.SubElement(table, "tr")
|
|
||||||
th = ET.SubElement(header_row, "th", colspan=str(len(jobs) + 1))
|
|
||||||
row_anchor = f"{qualified_class_name}"
|
|
||||||
section_header = ET.SubElement(
|
|
||||||
ET.SubElement(th, "h2"),
|
|
||||||
"a",
|
|
||||||
href=f"#{row_anchor}",
|
|
||||||
id=row_anchor,
|
|
||||||
)
|
|
||||||
section_header.text = qualified_class_name
|
|
||||||
append_docstring(th, getattr(module, class_name))
|
|
||||||
|
|
||||||
# Header row: one column for each implementation
|
|
||||||
table.append(job_row)
|
|
||||||
|
|
||||||
# One row for each test:
|
|
||||||
results_by_test = group_by(class_results, key=lambda r: r.test_name)
|
|
||||||
for test_name, test_results in sorted(results_by_test.items()):
|
|
||||||
row_anchor = f"{qualified_class_name}.{test_name}"
|
|
||||||
if len(row_anchor) >= 50:
|
|
||||||
# Too long; give up on generating readable URL
|
|
||||||
# TODO: only hash test parameter
|
|
||||||
row_anchor = md5sum(row_anchor)
|
|
||||||
|
|
||||||
row = ET.SubElement(table, "tr", id=row_anchor)
|
|
||||||
|
|
||||||
cell = ET.SubElement(row, "th")
|
|
||||||
cell.set("class", "test-name")
|
|
||||||
cell_link = ET.SubElement(cell, "a", href=f"#{row_anchor}")
|
|
||||||
cell_link.text = test_name
|
|
||||||
|
|
||||||
results_by_job = group_by(test_results, key=lambda r: r.job)
|
|
||||||
for job_name in jobs:
|
|
||||||
cell = ET.SubElement(row, "td")
|
|
||||||
try:
|
|
||||||
(result,) = results_by_job[job_name]
|
|
||||||
except KeyError:
|
|
||||||
cell.set("class", "deselected")
|
|
||||||
cell.text = "d"
|
|
||||||
continue
|
|
||||||
|
|
||||||
text: Optional[str]
|
|
||||||
|
|
||||||
if result.skipped:
|
|
||||||
cell.set("class", "skipped")
|
|
||||||
if result.type == "pytest.skip":
|
|
||||||
text = "s"
|
|
||||||
elif result.type == "pytest.xfail":
|
|
||||||
text = "X"
|
|
||||||
cell.set("class", "expected-failure")
|
|
||||||
else:
|
|
||||||
text = result.type
|
|
||||||
elif result.success:
|
|
||||||
cell.set("class", "success")
|
|
||||||
if result.type:
|
|
||||||
# dead code?
|
|
||||||
text = result.type
|
|
||||||
else:
|
|
||||||
text = "."
|
|
||||||
else:
|
|
||||||
cell.set("class", "failure")
|
|
||||||
if result.type:
|
|
||||||
# dead code?
|
|
||||||
text = result.type
|
|
||||||
else:
|
|
||||||
text = "f"
|
|
||||||
|
|
||||||
if result.system_out:
|
|
||||||
# There is a log file; link to it.
|
|
||||||
a = ET.SubElement(cell, "a", href=f"./{result.output_filename()}")
|
|
||||||
a.text = text or "?"
|
|
||||||
else:
|
|
||||||
cell.text = text or "?"
|
|
||||||
if result.message:
|
|
||||||
cell.set("title", result.message)
|
|
||||||
|
|
||||||
return table
|
|
||||||
|
|
||||||
|
|
||||||
def write_html_pages(
|
|
||||||
output_dir: Path, results: List[CaseResult]
|
|
||||||
) -> List[Tuple[str, str, str]]:
|
|
||||||
"""Returns the list of (module_name, file_name)."""
|
|
||||||
output_dir.mkdir(parents=True, exist_ok=True)
|
|
||||||
results_by_module = group_by(results, lambda r: r.module_name)
|
|
||||||
|
|
||||||
# used as columns
|
|
||||||
jobs = list(sorted({r.job for r in results}))
|
|
||||||
|
|
||||||
job_categories = {}
|
|
||||||
for job in jobs:
|
|
||||||
is_client = any(
|
|
||||||
"client_tests" in result.module_name and result.job == job
|
|
||||||
for result in results
|
|
||||||
)
|
|
||||||
is_server = any(
|
|
||||||
"server_tests" in result.module_name and result.job == job
|
|
||||||
for result in results
|
|
||||||
)
|
|
||||||
assert is_client != is_server, (job, is_client, is_server)
|
|
||||||
if job.endswith(("-atheme", "-anope", "-dlk")):
|
|
||||||
assert is_server
|
|
||||||
job_categories[job] = "server-with-services"
|
|
||||||
elif is_server:
|
|
||||||
job_categories[job] = "server" # with or without services
|
|
||||||
else:
|
|
||||||
assert is_client
|
|
||||||
job_categories[job] = "client"
|
|
||||||
|
|
||||||
pages = []
|
|
||||||
|
|
||||||
for module_name, module_results in sorted(results_by_module.items()):
|
|
||||||
# Filter out client jobs if this is a server test module, and vice versa
|
|
||||||
module_categories = {
|
|
||||||
job_categories[result.job]
|
|
||||||
for result in results
|
|
||||||
if result.module_name == module_name and not result.skipped
|
|
||||||
}
|
|
||||||
|
|
||||||
module_jobs = [job for job in jobs if job_categories[job] in module_categories]
|
|
||||||
|
|
||||||
root = build_module_html(module_jobs, module_results, module_name)
|
|
||||||
file_name = f"{module_name}.xhtml"
|
|
||||||
write_xml_file(output_dir / file_name, root)
|
|
||||||
pages.append(("module", module_name, file_name))
|
|
||||||
|
|
||||||
for category in ("server", "client"):
|
|
||||||
for job in [job for job in job_categories if job_categories[job] == category]:
|
|
||||||
job_results = [
|
|
||||||
result
|
|
||||||
for result in results
|
|
||||||
if result.job == job or result.job.startswith(job + "-")
|
|
||||||
]
|
|
||||||
root = build_job_html(job, job_results)
|
|
||||||
file_name = f"{job}.xhtml"
|
|
||||||
write_xml_file(output_dir / file_name, root)
|
|
||||||
pages.append(("job", job, file_name))
|
|
||||||
|
|
||||||
return pages
|
|
||||||
|
|
||||||
|
|
||||||
def write_test_outputs(output_dir: Path, results: List[CaseResult]) -> None:
|
|
||||||
"""Writes stdout files of each test."""
|
|
||||||
for result in results:
|
|
||||||
if result.system_out is None:
|
|
||||||
continue
|
|
||||||
output_file = output_dir / result.output_filename()
|
|
||||||
with output_file.open("wt") as fd:
|
|
||||||
fd.write(result.system_out)
|
|
||||||
|
|
||||||
|
|
||||||
def write_html_index(output_dir: Path, pages: List[Tuple[str, str, str]]) -> None:
|
|
||||||
root = ET.Element("html")
|
|
||||||
head = ET.SubElement(root, "head")
|
|
||||||
ET.SubElement(head, "title").text = "irctest dashboard"
|
|
||||||
ET.SubElement(head, "link", rel="stylesheet", type="text/css", href="./style.css")
|
|
||||||
|
|
||||||
body = ET.SubElement(root, "body")
|
|
||||||
|
|
||||||
ET.SubElement(body, "h1").text = "irctest dashboard"
|
|
||||||
|
|
||||||
module_pages = []
|
|
||||||
job_pages = []
|
|
||||||
for page_type, title, file_name in sorted(pages):
|
|
||||||
if page_type == "module":
|
|
||||||
module_pages.append((title, file_name))
|
|
||||||
elif page_type == "job":
|
|
||||||
job_pages.append((title, file_name))
|
|
||||||
else:
|
|
||||||
assert False, page_type
|
|
||||||
|
|
||||||
ET.SubElement(body, "h2").text = "Tests by command/specification"
|
|
||||||
|
|
||||||
dl = ET.SubElement(body, "dl")
|
|
||||||
dl.set("class", "module-index")
|
|
||||||
|
|
||||||
for module_name, file_name in sorted(module_pages):
|
|
||||||
module = importlib.import_module(module_name)
|
|
||||||
|
|
||||||
link = ET.SubElement(ET.SubElement(dl, "dt"), "a", href=f"./{file_name}")
|
|
||||||
link.text = module_name
|
|
||||||
append_docstring(ET.SubElement(dl, "dd"), module)
|
|
||||||
|
|
||||||
ET.SubElement(body, "h2").text = "Tests by implementation"
|
|
||||||
|
|
||||||
ul = ET.SubElement(body, "ul")
|
|
||||||
ul.set("class", "job-index")
|
|
||||||
|
|
||||||
for job, file_name in sorted(job_pages):
|
|
||||||
link = ET.SubElement(ET.SubElement(ul, "li"), "a", href=f"./{file_name}")
|
|
||||||
link.text = job
|
|
||||||
|
|
||||||
write_xml_file(output_dir / "index.xhtml", root)
|
|
||||||
|
|
||||||
|
|
||||||
def write_assets(output_dir: Path) -> None:
|
|
||||||
css_path = output_dir / "style.css"
|
|
||||||
source_css_path = Path(__file__).parent / "style.css"
|
|
||||||
with css_path.open("wt") as fd:
|
|
||||||
with source_css_path.open() as source_fd:
|
|
||||||
fd.write(source_fd.read())
|
|
||||||
|
|
||||||
|
|
||||||
def write_xml_file(filename: Path, root: ET.Element) -> None:
|
|
||||||
# Hacky: ET expects the namespace to be present in every tag we create instead;
|
|
||||||
# but it would be excessively verbose.
|
|
||||||
root.set("xmlns", "http://www.w3.org/1999/xhtml")
|
|
||||||
|
|
||||||
# Serialize
|
|
||||||
s = ET.tostring(root)
|
|
||||||
|
|
||||||
with filename.open("wb") as fd:
|
|
||||||
fd.write(s)
|
|
||||||
|
|
||||||
|
|
||||||
def parse_xml_file(filename: Path) -> ET.ElementTree:
|
|
||||||
fd: IO
|
|
||||||
if filename.suffix == ".gz":
|
|
||||||
with gzip.open(filename, "rb") as fd: # type: ignore
|
|
||||||
return parse_xml(fd) # type: ignore
|
|
||||||
else:
|
|
||||||
with open(filename) as fd:
|
|
||||||
return parse_xml(fd) # type: ignore
|
|
||||||
|
|
||||||
|
|
||||||
def main(output_path: Path, filenames: List[Path]) -> int:
|
|
||||||
results = [
|
|
||||||
result
|
|
||||||
for filename in filenames
|
|
||||||
for result in iter_job_results(filename, parse_xml_file(filename))
|
|
||||||
]
|
|
||||||
|
|
||||||
pages = write_html_pages(output_path, results)
|
|
||||||
|
|
||||||
write_html_index(output_path, pages)
|
|
||||||
write_test_outputs(output_path, results)
|
|
||||||
write_assets(output_path)
|
|
||||||
|
|
||||||
return 0
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
(_, output_path, *filenames) = sys.argv
|
|
||||||
exit(main(Path(output_path), list(map(Path, filenames))))
|
|
@ -1,87 +0,0 @@
|
|||||||
import dataclasses
|
|
||||||
import gzip
|
|
||||||
import io
|
|
||||||
import json
|
|
||||||
from pathlib import Path
|
|
||||||
import sys
|
|
||||||
from typing import Iterator
|
|
||||||
import urllib.parse
|
|
||||||
import urllib.request
|
|
||||||
import zipfile
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass
|
|
||||||
class Artifact:
|
|
||||||
repo: str
|
|
||||||
run_id: int
|
|
||||||
name: str
|
|
||||||
download_url: str
|
|
||||||
|
|
||||||
@property
|
|
||||||
def public_download_url(self) -> str:
|
|
||||||
# GitHub API is not available publicly for artifacts, we need to use
|
|
||||||
# a third-party proxy to access it...
|
|
||||||
name = urllib.parse.quote(self.name)
|
|
||||||
return f"https://nightly.link/{repo}/actions/runs/{self.run_id}/{name}.zip"
|
|
||||||
|
|
||||||
|
|
||||||
def iter_run_artifacts(repo: str, run_id: int) -> Iterator[Artifact]:
|
|
||||||
request = urllib.request.Request(
|
|
||||||
f"https://api.github.com/repos/{repo}/actions/runs/{run_id}/artifacts"
|
|
||||||
"?per_page=100",
|
|
||||||
headers={"Accept": "application/vnd.github.v3+json"},
|
|
||||||
)
|
|
||||||
|
|
||||||
response = urllib.request.urlopen(request)
|
|
||||||
|
|
||||||
for artifact in json.load(response)["artifacts"]:
|
|
||||||
if not artifact["name"].startswith(("pytest-results_", "pytest results ")):
|
|
||||||
continue
|
|
||||||
if artifact["expired"]:
|
|
||||||
continue
|
|
||||||
yield Artifact(
|
|
||||||
repo=repo,
|
|
||||||
run_id=run_id,
|
|
||||||
name=artifact["name"],
|
|
||||||
download_url=artifact["archive_download_url"],
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def download_artifact(output_name: Path, url: str) -> None:
|
|
||||||
if output_name.exists():
|
|
||||||
return
|
|
||||||
response = urllib.request.urlopen(url)
|
|
||||||
archive_bytes = response.read() # Can't stream it, it's a ZIP
|
|
||||||
with zipfile.ZipFile(io.BytesIO(archive_bytes)) as archive:
|
|
||||||
with archive.open("pytest.xml") as input_fd:
|
|
||||||
pytest_xml = input_fd.read()
|
|
||||||
|
|
||||||
tmp_output_path = output_name.with_suffix(".tmp")
|
|
||||||
with gzip.open(tmp_output_path, "wb") as output_fd:
|
|
||||||
output_fd.write(pytest_xml)
|
|
||||||
|
|
||||||
# Atomically write to the output path, so that we don't write partial files in case
|
|
||||||
# the download process is interrupted
|
|
||||||
tmp_output_path.rename(output_name)
|
|
||||||
|
|
||||||
|
|
||||||
def main(output_dir: Path, repo: str, run_id: int) -> int:
|
|
||||||
output_dir.mkdir(parents=True, exist_ok=True)
|
|
||||||
run_path = output_dir / str(run_id)
|
|
||||||
run_path.mkdir(exist_ok=True)
|
|
||||||
|
|
||||||
for artifact in iter_run_artifacts(repo, run_id):
|
|
||||||
artifact_path = run_path / artifact.name / "pytest.xml.gz"
|
|
||||||
artifact_path.parent.mkdir(exist_ok=True)
|
|
||||||
try:
|
|
||||||
download_artifact(artifact_path, artifact.download_url)
|
|
||||||
except Exception:
|
|
||||||
download_artifact(artifact_path, artifact.public_download_url)
|
|
||||||
print("downloaded", artifact.name)
|
|
||||||
|
|
||||||
return 0
|
|
||||||
|
|
||||||
|
|
||||||
if __name__ == "__main__":
|
|
||||||
(_, output_path, repo, run_id) = sys.argv
|
|
||||||
exit(main(Path(output_path), repo, int(run_id)))
|
|
@ -1,67 +0,0 @@
|
|||||||
@media (prefers-color-scheme: dark) {
|
|
||||||
body {
|
|
||||||
background-color: #121212;
|
|
||||||
color: rgba(255, 255, 255, 0.87);
|
|
||||||
}
|
|
||||||
a {
|
|
||||||
filter: invert(0.85) hue-rotate(180deg);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
dl.module-index {
|
|
||||||
column-width: 40em; /* Magic constant for 2 columns on average laptop/desktop */
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Only 1px solid border between cells */
|
|
||||||
table.test-matrix {
|
|
||||||
border-spacing: 0;
|
|
||||||
border-collapse: collapse;
|
|
||||||
}
|
|
||||||
table.test-matrix td {
|
|
||||||
text-align: center;
|
|
||||||
border: 1px solid grey;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Make link take the whole cell */
|
|
||||||
table.test-matrix td a {
|
|
||||||
display: block;
|
|
||||||
margin: 0;
|
|
||||||
padding: 0;
|
|
||||||
width: 100%;
|
|
||||||
height: 100%;
|
|
||||||
color: black;
|
|
||||||
text-decoration: none;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Test matrix colors */
|
|
||||||
table.test-matrix .deselected {
|
|
||||||
background-color: grey;
|
|
||||||
}
|
|
||||||
table.test-matrix .success {
|
|
||||||
background-color: green;
|
|
||||||
}
|
|
||||||
table.test-matrix .skipped {
|
|
||||||
background-color: yellow;
|
|
||||||
}
|
|
||||||
table.test-matrix .failure {
|
|
||||||
background-color: red;
|
|
||||||
}
|
|
||||||
table.test-matrix .expected-failure {
|
|
||||||
background-color: orange;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* Rotate headers, thanks to https://css-tricks.com/rotated-table-column-headers/ */
|
|
||||||
table.module-results th.job-name {
|
|
||||||
height: 140px;
|
|
||||||
white-space: nowrap;
|
|
||||||
}
|
|
||||||
table.module-results th.job-name > div {
|
|
||||||
transform:
|
|
||||||
translate(28px, 50px)
|
|
||||||
rotate(315deg);
|
|
||||||
width: 40px;
|
|
||||||
}
|
|
||||||
table.module-results th.job-name > div > span {
|
|
||||||
border-bottom: 1px solid grey;
|
|
||||||
padding-left: 0px;
|
|
||||||
}
|
|
@ -1,6 +1,6 @@
|
|||||||
class NoMessageException(AssertionError):
|
class NoMessageException(AssertionError):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
|
||||||
class ConnectionClosed(Exception):
|
class ConnectionClosed(Exception):
|
||||||
pass
|
pass
|
||||||
|
|
||||||
|
@ -2,10 +2,7 @@
|
|||||||
Handles ambiguities of RFCs.
|
Handles ambiguities of RFCs.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
from typing import List
|
def normalize_namreply_params(params):
|
||||||
|
|
||||||
|
|
||||||
def normalize_namreply_params(params: List[str]) -> List[str]:
|
|
||||||
# So… RFC 2812 says:
|
# So… RFC 2812 says:
|
||||||
# "( "=" / "*" / "@" ) <channel>
|
# "( "=" / "*" / "@" ) <channel>
|
||||||
# :[ "@" / "+" ] <nick> *( " " [ "@" / "+" ] <nick> )
|
# :[ "@" / "+" ] <nick> *( " " [ "@" / "+" ] <nick> )
|
||||||
@ -14,10 +11,9 @@ def normalize_namreply_params(params: List[str]) -> List[str]:
|
|||||||
# prefix.
|
# prefix.
|
||||||
# So let's normalize this to “with space”, and strip spaces at the
|
# So let's normalize this to “with space”, and strip spaces at the
|
||||||
# end of the nick list.
|
# end of the nick list.
|
||||||
params = list(params) # copy the list
|
|
||||||
if len(params) == 3:
|
if len(params) == 3:
|
||||||
assert params[1][0] in "=*@", params
|
assert params[1][0] in '=*@', params
|
||||||
params.insert(1, params[1][0])
|
params.insert(1), params[1][0]
|
||||||
params[2] = params[2][1:]
|
params[2] = params[2][1:]
|
||||||
params[3] = params[3].rstrip()
|
params[3] = params[3].rstrip()
|
||||||
return params
|
return params
|
||||||
|
@ -1,12 +1,10 @@
|
|||||||
from typing import Dict, List, Optional
|
def cap_list_to_dict(l):
|
||||||
|
d = {}
|
||||||
|
for cap in l:
|
||||||
def cap_list_to_dict(caps: List[str]) -> Dict[str, Optional[str]]:
|
if '=' in cap:
|
||||||
d: Dict[str, Optional[str]] = {}
|
(key, value) = cap.split('=', 1)
|
||||||
for cap in caps:
|
|
||||||
if "=" in cap:
|
|
||||||
(key, value) = cap.split("=", 1)
|
|
||||||
d[key] = value
|
|
||||||
else:
|
else:
|
||||||
d[cap] = None
|
key = cap
|
||||||
|
value = None
|
||||||
|
d[key] = value
|
||||||
return d
|
return d
|
||||||
|
@ -1,46 +0,0 @@
|
|||||||
import datetime
|
|
||||||
import re
|
|
||||||
import secrets
|
|
||||||
import socket
|
|
||||||
from typing import Dict, Tuple
|
|
||||||
|
|
||||||
# thanks jess!
|
|
||||||
IRCV3_FORMAT_STRFTIME = "%Y-%m-%dT%H:%M:%S.%f%z"
|
|
||||||
|
|
||||||
|
|
||||||
def ircv3_timestamp_to_unixtime(timestamp: str) -> float:
|
|
||||||
return datetime.datetime.strptime(timestamp, IRCV3_FORMAT_STRFTIME).timestamp()
|
|
||||||
|
|
||||||
|
|
||||||
def random_name(base: str) -> str:
|
|
||||||
return base + "-" + secrets.token_hex(8)
|
|
||||||
|
|
||||||
|
|
||||||
def find_hostname_and_port() -> Tuple[str, int]:
|
|
||||||
"""Find available hostname/port to listen on."""
|
|
||||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
|
||||||
s.bind(("", 0))
|
|
||||||
(hostname, port) = s.getsockname()
|
|
||||||
s.close()
|
|
||||||
return (hostname, port)
|
|
||||||
|
|
||||||
|
|
||||||
"""
|
|
||||||
Stolen from supybot:
|
|
||||||
"""
|
|
||||||
|
|
||||||
|
|
||||||
class MultipleReplacer:
|
|
||||||
"""Return a callable that replaces all dict keys by the associated
|
|
||||||
value. More efficient than multiple .replace()."""
|
|
||||||
|
|
||||||
# We use an object instead of a lambda function because it avoids the
|
|
||||||
# need for using the staticmethod() on the lambda function if assigning
|
|
||||||
# it to a class in Python 3.
|
|
||||||
def __init__(self, dict_: Dict[str, str]):
|
|
||||||
self._dict = dict_
|
|
||||||
dict_ = dict([(re.escape(key), val) for key, val in dict_.items()])
|
|
||||||
self._matcher = re.compile("|".join(dict_.keys()))
|
|
||||||
|
|
||||||
def __call__(self, s: str) -> str:
|
|
||||||
return self._matcher.sub(lambda m: self._dict[m.group(0)], s)
|
|
@ -1,76 +1,62 @@
|
|||||||
import dataclasses
|
|
||||||
import re
|
import re
|
||||||
from typing import Any, Dict, List, Optional
|
import collections
|
||||||
|
import supybot.utils
|
||||||
from .junkdrawer import MultipleReplacer
|
|
||||||
|
|
||||||
# http://ircv3.net/specs/core/message-tags-3.2.html#escaping-values
|
# http://ircv3.net/specs/core/message-tags-3.2.html#escaping-values
|
||||||
TAG_ESCAPE = [
|
TAG_ESCAPE = [
|
||||||
("\\", "\\\\"), # \ -> \\
|
('\\', '\\\\'), # \ -> \\
|
||||||
(" ", r"\s"),
|
(' ', r'\s'),
|
||||||
(";", r"\:"),
|
(';', r'\:'),
|
||||||
("\r", r"\r"),
|
('\r', r'\r'),
|
||||||
("\n", r"\n"),
|
('\n', r'\n'),
|
||||||
]
|
]
|
||||||
unescape_tag_value = MultipleReplacer(dict(map(lambda x: (x[1], x[0]), TAG_ESCAPE)))
|
unescape_tag_value = supybot.utils.str.MultipleReplacer(
|
||||||
|
dict(map(lambda x:(x[1],x[0]), TAG_ESCAPE)))
|
||||||
|
|
||||||
# TODO: validate host
|
# TODO: validate host
|
||||||
tag_key_validator = re.compile(r"\+?(\S+/)?[a-zA-Z0-9-]+")
|
tag_key_validator = re.compile('(\S+/)?[a-zA-Z0-9-]+')
|
||||||
|
|
||||||
|
def parse_tags(s):
|
||||||
def parse_tags(s: str) -> Dict[str, Optional[str]]:
|
tags = {}
|
||||||
tags: Dict[str, Optional[str]] = {}
|
for tag in s.split(';'):
|
||||||
for tag in s.split(";"):
|
if '=' not in tag:
|
||||||
if "=" not in tag:
|
|
||||||
tags[tag] = None
|
tags[tag] = None
|
||||||
else:
|
else:
|
||||||
(key, value) = tag.split("=", 1)
|
(key, value) = tag.split('=', 1)
|
||||||
assert tag_key_validator.match(key), "Invalid tag key: {}".format(key)
|
assert tag_key_validator.match(key), \
|
||||||
|
'Invalid tag key: {}'.format(key)
|
||||||
tags[key] = unescape_tag_value(value)
|
tags[key] = unescape_tag_value(value)
|
||||||
return tags
|
return tags
|
||||||
|
|
||||||
|
Message = collections.namedtuple('Message',
|
||||||
|
'tags prefix command params')
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
def parse_message(s):
|
||||||
class HistoryMessage:
|
|
||||||
time: Any
|
|
||||||
msgid: Optional[str]
|
|
||||||
target: str
|
|
||||||
text: str
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class Message:
|
|
||||||
tags: Dict[str, Optional[str]]
|
|
||||||
prefix: Optional[str]
|
|
||||||
command: str
|
|
||||||
params: List[str]
|
|
||||||
|
|
||||||
def to_history_message(self) -> HistoryMessage:
|
|
||||||
return HistoryMessage(
|
|
||||||
time=self.tags.get("time"),
|
|
||||||
msgid=self.tags.get("msgid"),
|
|
||||||
target=self.params[0],
|
|
||||||
text=self.params[1],
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def parse_message(s: str) -> Message:
|
|
||||||
"""Parse a message according to
|
"""Parse a message according to
|
||||||
http://tools.ietf.org/html/rfc1459#section-2.3.1
|
http://tools.ietf.org/html/rfc1459#section-2.3.1
|
||||||
and
|
and
|
||||||
http://ircv3.net/specs/core/message-tags-3.2.html"""
|
http://ircv3.net/specs/core/message-tags-3.2.html"""
|
||||||
s = s.rstrip("\r\n")
|
assert s.endswith('\r\n'), 'Message does not end with CR LF: {!r}'.format(s)
|
||||||
if s.startswith("@"):
|
s = s[0:-2]
|
||||||
(tags_str, s) = s.split(" ", 1)
|
if s.startswith('@'):
|
||||||
tags = parse_tags(tags_str[1:])
|
(tags, s) = s.split(' ', 1)
|
||||||
|
tags = parse_tags(tags[1:])
|
||||||
else:
|
else:
|
||||||
tags = {}
|
tags = {}
|
||||||
if " :" in s:
|
if ' :' in s:
|
||||||
(other_tokens, trailing_param) = s.split(" :", 1)
|
(other_tokens, trailing_param) = s.split(' :', 1)
|
||||||
tokens = list(filter(bool, other_tokens.split(" "))) + [trailing_param]
|
tokens = list(filter(bool, other_tokens.split(' '))) + [trailing_param]
|
||||||
else:
|
else:
|
||||||
tokens = list(filter(bool, s.split(" ")))
|
tokens = list(filter(bool, s.split(' ')))
|
||||||
prefix = prefix = tokens.pop(0)[1:] if tokens[0].startswith(":") else None
|
if tokens[0].startswith(':'):
|
||||||
|
prefix = tokens.pop(0)[1:]
|
||||||
|
else:
|
||||||
|
prefix = None
|
||||||
command = tokens.pop(0)
|
command = tokens.pop(0)
|
||||||
params = tokens
|
params = tokens
|
||||||
return Message(tags=tags, prefix=prefix, command=command, params=params)
|
return Message(
|
||||||
|
tags=tags,
|
||||||
|
prefix=prefix,
|
||||||
|
command=command,
|
||||||
|
params=params,
|
||||||
|
)
|
||||||
|
@ -1,15 +0,0 @@
|
|||||||
import base64
|
|
||||||
|
|
||||||
|
|
||||||
def sasl_plain_blob(username: str, passphrase: str) -> str:
|
|
||||||
blob = base64.b64encode(
|
|
||||||
b"\x00".join(
|
|
||||||
(
|
|
||||||
username.encode("utf-8"),
|
|
||||||
username.encode("utf-8"),
|
|
||||||
passphrase.encode("utf-8"),
|
|
||||||
)
|
|
||||||
)
|
|
||||||
)
|
|
||||||
blobstr = blob.decode("ascii")
|
|
||||||
return f"AUTHENTICATE {blobstr}"
|
|
@ -9,200 +9,185 @@
|
|||||||
# They're intended to represent a relatively-standard cross-section of the IRC
|
# They're intended to represent a relatively-standard cross-section of the IRC
|
||||||
# server ecosystem out there. Custom numerics will be marked as such.
|
# server ecosystem out there. Custom numerics will be marked as such.
|
||||||
|
|
||||||
RPL_WELCOME = "001"
|
RPL_WELCOME = "001"
|
||||||
RPL_YOURHOST = "002"
|
RPL_YOURHOST = "002"
|
||||||
RPL_CREATED = "003"
|
RPL_CREATED = "003"
|
||||||
RPL_MYINFO = "004"
|
RPL_MYINFO = "004"
|
||||||
RPL_ISUPPORT = "005"
|
RPL_ISUPPORT = "005"
|
||||||
RPL_SNOMASKIS = "008"
|
RPL_SNOMASKIS = "008"
|
||||||
RPL_BOUNCE = "010"
|
RPL_BOUNCE = "010"
|
||||||
RPL_HELLO = "020"
|
RPL_TRACELINK = "200"
|
||||||
RPL_TRACELINK = "200"
|
RPL_TRACECONNECTING = "201"
|
||||||
RPL_TRACECONNECTING = "201"
|
RPL_TRACEHANDSHAKE = "202"
|
||||||
RPL_TRACEHANDSHAKE = "202"
|
RPL_TRACEUNKNOWN = "203"
|
||||||
RPL_TRACEUNKNOWN = "203"
|
RPL_TRACEOPERATOR = "204"
|
||||||
RPL_TRACEOPERATOR = "204"
|
RPL_TRACEUSER = "205"
|
||||||
RPL_TRACEUSER = "205"
|
RPL_TRACESERVER = "206"
|
||||||
RPL_TRACESERVER = "206"
|
RPL_TRACESERVICE = "207"
|
||||||
RPL_TRACESERVICE = "207"
|
RPL_TRACENEWTYPE = "208"
|
||||||
RPL_TRACENEWTYPE = "208"
|
RPL_TRACECLASS = "209"
|
||||||
RPL_TRACECLASS = "209"
|
RPL_TRACERECONNECT = "210"
|
||||||
RPL_TRACERECONNECT = "210"
|
RPL_STATSLINKINFO = "211"
|
||||||
RPL_STATSLINKINFO = "211"
|
RPL_STATSCOMMANDS = "212"
|
||||||
RPL_STATSCOMMANDS = "212"
|
RPL_ENDOFSTATS = "219"
|
||||||
RPL_ENDOFSTATS = "219"
|
RPL_UMODEIS = "221"
|
||||||
RPL_UMODEIS = "221"
|
RPL_SERVLIST = "234"
|
||||||
RPL_SERVLIST = "234"
|
RPL_SERVLISTEND = "235"
|
||||||
RPL_SERVLISTEND = "235"
|
RPL_STATSUPTIME = "242"
|
||||||
RPL_STATSUPTIME = "242"
|
RPL_STATSOLINE = "243"
|
||||||
RPL_STATSOLINE = "243"
|
RPL_LUSERCLIENT = "251"
|
||||||
RPL_LUSERCLIENT = "251"
|
RPL_LUSEROP = "252"
|
||||||
RPL_LUSEROP = "252"
|
RPL_LUSERUNKNOWN = "253"
|
||||||
RPL_LUSERUNKNOWN = "253"
|
RPL_LUSERCHANNELS = "254"
|
||||||
RPL_LUSERCHANNELS = "254"
|
RPL_LUSERME = "255"
|
||||||
RPL_LUSERME = "255"
|
RPL_ADMINME = "256"
|
||||||
RPL_ADMINME = "256"
|
RPL_ADMINLOC1 = "257"
|
||||||
RPL_ADMINLOC1 = "257"
|
RPL_ADMINLOC2 = "258"
|
||||||
RPL_ADMINLOC2 = "258"
|
RPL_ADMINEMAIL = "259"
|
||||||
RPL_ADMINEMAIL = "259"
|
RPL_TRACELOG = "261"
|
||||||
RPL_TRACELOG = "261"
|
RPL_TRACEEND = "262"
|
||||||
RPL_TRACEEND = "262"
|
RPL_TRYAGAIN = "263"
|
||||||
RPL_TRYAGAIN = "263"
|
RPL_WHOISCERTFP = "276"
|
||||||
RPL_LOCALUSERS = "265"
|
RPL_AWAY = "301"
|
||||||
RPL_GLOBALUSERS = "266"
|
RPL_USERHOST = "302"
|
||||||
RPL_WHOISCERTFP = "276"
|
RPL_ISON = "303"
|
||||||
RPL_AWAY = "301"
|
RPL_UNAWAY = "305"
|
||||||
RPL_USERHOST = "302"
|
RPL_NOWAWAY = "306"
|
||||||
RPL_ISON = "303"
|
RPL_WHOISUSER = "311"
|
||||||
RPL_UNAWAY = "305"
|
RPL_WHOISSERVER = "312"
|
||||||
RPL_NOWAWAY = "306"
|
RPL_WHOISOPERATOR = "313"
|
||||||
RPL_WHOISREGNICK = "307"
|
RPL_WHOWASUSER = "314"
|
||||||
RPL_WHOISUSER = "311"
|
RPL_ENDOFWHO = "315"
|
||||||
RPL_WHOISSERVER = "312"
|
RPL_WHOISIDLE = "317"
|
||||||
RPL_WHOISOPERATOR = "313"
|
RPL_ENDOFWHOIS = "318"
|
||||||
RPL_WHOWASUSER = "314"
|
RPL_WHOISCHANNELS = "319"
|
||||||
RPL_ENDOFWHO = "315"
|
RPL_LIST = "322"
|
||||||
RPL_WHOISIDLE = "317"
|
RPL_LISTEND = "323"
|
||||||
RPL_ENDOFWHOIS = "318"
|
RPL_CHANNELMODEIS = "324"
|
||||||
RPL_WHOISCHANNELS = "319"
|
RPL_UNIQOPIS = "325"
|
||||||
RPL_WHOISSPECIAL = "320"
|
RPL_CHANNELCREATED = "329"
|
||||||
RPL_LISTSTART = "321"
|
RPL_WHOISACCOUNT = "330"
|
||||||
RPL_LIST = "322"
|
RPL_NOTOPIC = "331"
|
||||||
RPL_LISTEND = "323"
|
RPL_TOPIC = "332"
|
||||||
RPL_CHANNELMODEIS = "324"
|
RPL_TOPICTIME = "333"
|
||||||
RPL_UNIQOPIS = "325"
|
RPL_WHOISBOT = "335"
|
||||||
RPL_CHANNELCREATED = "329"
|
RPL_WHOISACTUALLY = "338"
|
||||||
RPL_WHOISACCOUNT = "330"
|
RPL_INVITING = "341"
|
||||||
RPL_NOTOPIC = "331"
|
RPL_SUMMONING = "342"
|
||||||
RPL_TOPIC = "332"
|
RPL_INVITELIST = "346"
|
||||||
RPL_TOPICTIME = "333"
|
RPL_ENDOFINVITELIST = "347"
|
||||||
RPL_WHOISBOT = "335"
|
RPL_EXCEPTLIST = "348"
|
||||||
RPL_WHOISACTUALLY = "338"
|
RPL_ENDOFEXCEPTLIST = "349"
|
||||||
RPL_INVITING = "341"
|
RPL_VERSION = "351"
|
||||||
RPL_SUMMONING = "342"
|
RPL_WHOREPLY = "352"
|
||||||
RPL_INVITELIST = "346"
|
RPL_NAMREPLY = "353"
|
||||||
RPL_ENDOFINVITELIST = "347"
|
RPL_LINKS = "364"
|
||||||
RPL_EXCEPTLIST = "348"
|
RPL_ENDOFLINKS = "365"
|
||||||
RPL_ENDOFEXCEPTLIST = "349"
|
RPL_ENDOFNAMES = "366"
|
||||||
RPL_VERSION = "351"
|
RPL_BANLIST = "367"
|
||||||
RPL_WHOREPLY = "352"
|
RPL_ENDOFBANLIST = "368"
|
||||||
RPL_NAMREPLY = "353"
|
RPL_ENDOFWHOWAS = "369"
|
||||||
RPL_WHOSPCRPL = "354"
|
RPL_INFO = "371"
|
||||||
RPL_LINKS = "364"
|
RPL_MOTD = "372"
|
||||||
RPL_ENDOFLINKS = "365"
|
RPL_ENDOFINFO = "374"
|
||||||
RPL_ENDOFNAMES = "366"
|
RPL_MOTDSTART = "375"
|
||||||
RPL_BANLIST = "367"
|
RPL_ENDOFMOTD = "376"
|
||||||
RPL_ENDOFBANLIST = "368"
|
RPL_YOUREOPER = "381"
|
||||||
RPL_ENDOFWHOWAS = "369"
|
RPL_REHASHING = "382"
|
||||||
RPL_INFO = "371"
|
RPL_YOURESERVICE = "383"
|
||||||
RPL_MOTD = "372"
|
RPL_TIME = "391"
|
||||||
RPL_ENDOFINFO = "374"
|
RPL_USERSSTART = "392"
|
||||||
RPL_MOTDSTART = "375"
|
RPL_USERS = "393"
|
||||||
RPL_ENDOFMOTD = "376"
|
RPL_ENDOFUSERS = "394"
|
||||||
RPL_WHOISHOST = "378"
|
RPL_NOUSERS = "395"
|
||||||
RPL_WHOISMODES = "379"
|
ERR_UNKNOWNERROR = "400"
|
||||||
RPL_YOUREOPER = "381"
|
ERR_NOSUCHNICK = "401"
|
||||||
RPL_REHASHING = "382"
|
ERR_NOSUCHSERVER = "402"
|
||||||
RPL_YOURESERVICE = "383"
|
ERR_NOSUCHCHANNEL = "403"
|
||||||
RPL_TIME = "391"
|
ERR_CANNOTSENDTOCHAN = "404"
|
||||||
RPL_USERSSTART = "392"
|
ERR_TOOMANYCHANNELS = "405"
|
||||||
RPL_USERS = "393"
|
ERR_WASNOSUCHNICK = "406"
|
||||||
RPL_ENDOFUSERS = "394"
|
ERR_TOOMANYTARGETS = "407"
|
||||||
RPL_NOUSERS = "395"
|
ERR_NOSUCHSERVICE = "408"
|
||||||
ERR_UNKNOWNERROR = "400"
|
ERR_NOORIGIN = "409"
|
||||||
ERR_NOSUCHNICK = "401"
|
ERR_INVALIDCAPCMD = "410"
|
||||||
ERR_NOSUCHSERVER = "402"
|
ERR_NORECIPIENT = "411"
|
||||||
ERR_NOSUCHCHANNEL = "403"
|
ERR_NOTEXTTOSEND = "412"
|
||||||
ERR_CANNOTSENDTOCHAN = "404"
|
ERR_NOTOPLEVEL = "413"
|
||||||
ERR_TOOMANYCHANNELS = "405"
|
ERR_WILDTOPLEVEL = "414"
|
||||||
ERR_WASNOSUCHNICK = "406"
|
ERR_BADMASK = "415"
|
||||||
ERR_TOOMANYTARGETS = "407"
|
ERR_UNKNOWNCOMMAND = "421"
|
||||||
ERR_NOSUCHSERVICE = "408"
|
ERR_NOMOTD = "422"
|
||||||
ERR_NOORIGIN = "409"
|
ERR_NOADMININFO = "423"
|
||||||
ERR_INVALIDCAPCMD = "410"
|
ERR_FILEERROR = "424"
|
||||||
ERR_NORECIPIENT = "411"
|
ERR_NONICKNAMEGIVEN = "431"
|
||||||
ERR_NOTEXTTOSEND = "412"
|
ERR_ERRONEUSNICKNAME = "432"
|
||||||
ERR_NOTOPLEVEL = "413"
|
ERR_NICKNAMEINUSE = "433"
|
||||||
ERR_WILDTOPLEVEL = "414"
|
ERR_NICKCOLLISION = "436"
|
||||||
ERR_BADMASK = "415"
|
ERR_UNAVAILRESOURCE = "437"
|
||||||
ERR_INPUTTOOLONG = "417"
|
ERR_REG_UNAVAILABLE = "440"
|
||||||
ERR_UNKNOWNCOMMAND = "421"
|
ERR_USERNOTINCHANNEL = "441"
|
||||||
ERR_NOMOTD = "422"
|
ERR_NOTONCHANNEL = "442"
|
||||||
ERR_NOADMININFO = "423"
|
ERR_USERONCHANNEL = "443"
|
||||||
ERR_FILEERROR = "424"
|
ERR_NOLOGIN = "444"
|
||||||
ERR_NONICKNAMEGIVEN = "431"
|
ERR_SUMMONDISABLED = "445"
|
||||||
ERR_ERRONEUSNICKNAME = "432"
|
ERR_USERSDISABLED = "446"
|
||||||
ERR_NICKNAMEINUSE = "433"
|
ERR_NOTREGISTERED = "451"
|
||||||
ERR_NICKCOLLISION = "436"
|
ERR_NEEDMOREPARAMS = "461"
|
||||||
ERR_UNAVAILRESOURCE = "437"
|
ERR_ALREADYREGISTRED = "462"
|
||||||
ERR_REG_UNAVAILABLE = "440"
|
ERR_NOPERMFORHOST = "463"
|
||||||
ERR_USERNOTINCHANNEL = "441"
|
ERR_PASSWDMISMATCH = "464"
|
||||||
ERR_NOTONCHANNEL = "442"
|
ERR_YOUREBANNEDCREEP = "465"
|
||||||
ERR_USERONCHANNEL = "443"
|
ERR_YOUWILLBEBANNED = "466"
|
||||||
ERR_NOLOGIN = "444"
|
ERR_KEYSET = "467"
|
||||||
ERR_SUMMONDISABLED = "445"
|
ERR_INVALIDUSERNAME = "468"
|
||||||
ERR_USERSDISABLED = "446"
|
ERR_CHANNELISFULL = "471"
|
||||||
ERR_FORBIDDENCHANNEL = "448"
|
ERR_UNKNOWNMODE = "472"
|
||||||
ERR_NOTREGISTERED = "451"
|
ERR_INVITEONLYCHAN = "473"
|
||||||
ERR_NEEDMOREPARAMS = "461"
|
ERR_BANNEDFROMCHAN = "474"
|
||||||
ERR_ALREADYREGISTRED = "462"
|
ERR_BADCHANNELKEY = "475"
|
||||||
ERR_NOPERMFORHOST = "463"
|
ERR_BADCHANMASK = "476"
|
||||||
ERR_PASSWDMISMATCH = "464"
|
ERR_NOCHANMODES = "477"
|
||||||
ERR_YOUREBANNEDCREEP = "465"
|
ERR_BANLISTFULL = "478"
|
||||||
ERR_YOUWILLBEBANNED = "466"
|
ERR_NOPRIVILEGES = "481"
|
||||||
ERR_KEYSET = "467"
|
ERR_CHANOPRIVSNEEDED = "482"
|
||||||
ERR_INVALIDUSERNAME = "468"
|
ERR_CANTKILLSERVER = "483"
|
||||||
ERR_LINKCHANNEL = "470"
|
ERR_RESTRICTED = "484"
|
||||||
ERR_CHANNELISFULL = "471"
|
ERR_UNIQOPPRIVSNEEDED = "485"
|
||||||
ERR_UNKNOWNMODE = "472"
|
ERR_NOOPERHOST = "491"
|
||||||
ERR_INVITEONLYCHAN = "473"
|
ERR_UMODEUNKNOWNFLAG = "501"
|
||||||
ERR_BANNEDFROMCHAN = "474"
|
ERR_USERSDONTMATCH = "502"
|
||||||
ERR_BADCHANNELKEY = "475"
|
ERR_HELPNOTFOUND = "524"
|
||||||
ERR_BADCHANMASK = "476"
|
ERR_CANNOTSENDRP = "573"
|
||||||
ERR_NOCHANMODES = "477"
|
RPL_WHOISSECURE = "671"
|
||||||
ERR_NEEDREGGEDNICK = "477"
|
RPL_YOURLANGUAGESARE = "687"
|
||||||
ERR_BANLISTFULL = "478"
|
RPL_WHOISLANGUAGE = "690"
|
||||||
ERR_NOPRIVILEGES = "481"
|
RPL_HELPSTART = "704"
|
||||||
ERR_CHANOPRIVSNEEDED = "482"
|
RPL_HELPTXT = "705"
|
||||||
ERR_CANTKILLSERVER = "483"
|
RPL_ENDOFHELP = "706"
|
||||||
ERR_RESTRICTED = "484"
|
ERR_NOPRIVS = "723"
|
||||||
ERR_UNIQOPPRIVSNEEDED = "485"
|
RPL_MONONLINE = "730"
|
||||||
ERR_NOOPERHOST = "491"
|
RPL_MONOFFLINE = "731"
|
||||||
ERR_UMODEUNKNOWNFLAG = "501"
|
RPL_MONLIST = "732"
|
||||||
ERR_USERSDONTMATCH = "502"
|
RPL_ENDOFMONLIST = "733"
|
||||||
ERR_HELPNOTFOUND = "524"
|
ERR_MONLISTFULL = "734"
|
||||||
ERR_INVALIDKEY = "525"
|
RPL_LOGGEDIN = "900"
|
||||||
ERR_CANNOTSENDRP = "573"
|
RPL_LOGGEDOUT = "901"
|
||||||
RPL_WHOISSECURE = "671"
|
ERR_NICKLOCKED = "902"
|
||||||
RPL_YOURLANGUAGESARE = "687"
|
RPL_SASLSUCCESS = "903"
|
||||||
RPL_WHOISLANGUAGE = "690"
|
ERR_SASLFAIL = "904"
|
||||||
ERR_INVALIDMODEPARAM = "696"
|
ERR_SASLTOOLONG = "905"
|
||||||
RPL_HELPSTART = "704"
|
ERR_SASLABORTED = "906"
|
||||||
RPL_HELPTXT = "705"
|
ERR_SASLALREADY = "907"
|
||||||
RPL_ENDOFHELP = "706"
|
RPL_SASLMECHS = "908"
|
||||||
ERR_NOPRIVS = "723"
|
RPL_REGISTRATION_SUCCESS = "920"
|
||||||
RPL_MONONLINE = "730"
|
ERR_ACCOUNT_ALREADY_EXISTS = "921"
|
||||||
RPL_MONOFFLINE = "731"
|
ERR_REG_UNSPECIFIED_ERROR = "922"
|
||||||
RPL_MONLIST = "732"
|
RPL_VERIFYSUCCESS = "923"
|
||||||
RPL_ENDOFMONLIST = "733"
|
ERR_ACCOUNT_ALREADY_VERIFIED = "924"
|
||||||
ERR_MONLISTFULL = "734"
|
|
||||||
RPL_LOGGEDIN = "900"
|
|
||||||
RPL_LOGGEDOUT = "901"
|
|
||||||
ERR_NICKLOCKED = "902"
|
|
||||||
RPL_SASLSUCCESS = "903"
|
|
||||||
ERR_SASLFAIL = "904"
|
|
||||||
ERR_SASLTOOLONG = "905"
|
|
||||||
ERR_SASLABORTED = "906"
|
|
||||||
ERR_SASLALREADY = "907"
|
|
||||||
RPL_SASLMECHS = "908"
|
|
||||||
RPL_REGISTRATION_SUCCESS = "920"
|
|
||||||
ERR_ACCOUNT_ALREADY_EXISTS = "921"
|
|
||||||
ERR_REG_UNSPECIFIED_ERROR = "922"
|
|
||||||
RPL_VERIFYSUCCESS = "923"
|
|
||||||
ERR_ACCOUNT_ALREADY_VERIFIED = "924"
|
|
||||||
ERR_ACCOUNT_INVALID_VERIFY_CODE = "925"
|
ERR_ACCOUNT_INVALID_VERIFY_CODE = "925"
|
||||||
RPL_REG_VERIFICATION_REQUIRED = "927"
|
RPL_REG_VERIFICATION_REQUIRED = "927"
|
||||||
ERR_REG_INVALID_CRED_TYPE = "928"
|
ERR_REG_INVALID_CRED_TYPE = "928"
|
||||||
ERR_REG_INVALID_CALLBACK = "929"
|
ERR_REG_INVALID_CALLBACK = "929"
|
||||||
ERR_TOOMANYLANGUAGES = "981"
|
ERR_TOOMANYLANGUAGES = "981"
|
||||||
ERR_NOLANGUAGE = "982"
|
ERR_NOLANGUAGE = "982"
|
||||||
|
180
irctest/patma.py
180
irctest/patma.py
@ -1,180 +0,0 @@
|
|||||||
"""Pattern-matching utilities"""
|
|
||||||
|
|
||||||
import dataclasses
|
|
||||||
import re
|
|
||||||
from typing import Dict, List, Optional, Union
|
|
||||||
|
|
||||||
|
|
||||||
class Operator:
|
|
||||||
"""Used as a wildcards and operators when matching message arguments
|
|
||||||
(see assertMessageMatch and match_list)"""
|
|
||||||
|
|
||||||
def __init__(self) -> None:
|
|
||||||
pass
|
|
||||||
|
|
||||||
|
|
||||||
class _AnyStr(Operator):
|
|
||||||
"""Wildcard matching any string"""
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return "ANYSTR"
|
|
||||||
|
|
||||||
|
|
||||||
class _AnyOptStr(Operator):
|
|
||||||
"""Wildcard matching any string as well as None"""
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return "ANYOPTSTR"
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class StrRe(Operator):
|
|
||||||
regexp: str
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return f"StrRe(r'{self.regexp}')"
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class NotStrRe(Operator):
|
|
||||||
regexp: str
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return f"NotStrRe(r'{self.regexp}')"
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class InsensitiveStr(Operator):
|
|
||||||
string: str
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return f"InsensitiveStr({self.string!r})"
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class RemainingKeys(Operator):
|
|
||||||
"""Used in a dict pattern to match all remaining keys.
|
|
||||||
May only be present once."""
|
|
||||||
|
|
||||||
key: Operator
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
return f"RemainingKeys({self.key!r})"
|
|
||||||
|
|
||||||
|
|
||||||
ANYSTR = _AnyStr()
|
|
||||||
"""Singleton, spares two characters"""
|
|
||||||
|
|
||||||
ANYOPTSTR = _AnyOptStr()
|
|
||||||
"""Singleton, spares two characters"""
|
|
||||||
|
|
||||||
ANYDICT = {RemainingKeys(ANYSTR): ANYOPTSTR}
|
|
||||||
"""Matches any dictionary; useful to compare tags dict, eg.
|
|
||||||
`match_dict(got_tags, {"label": "foo", **ANYDICT})`"""
|
|
||||||
|
|
||||||
|
|
||||||
@dataclasses.dataclass(frozen=True)
|
|
||||||
class ListRemainder:
|
|
||||||
item: Operator
|
|
||||||
min_length: int = 0
|
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
|
||||||
if self.min_length:
|
|
||||||
return f"ListRemainder({self.item!r}, min_length={self.min_length})"
|
|
||||||
elif self.item is ANYSTR:
|
|
||||||
return "*ANYLIST"
|
|
||||||
else:
|
|
||||||
return f"ListRemainder({self.item!r})"
|
|
||||||
|
|
||||||
|
|
||||||
ANYLIST = [ListRemainder(ANYSTR)]
|
|
||||||
"""Matches any list remainder"""
|
|
||||||
|
|
||||||
|
|
||||||
def match_string(got: Optional[str], expected: Union[str, Operator, None]) -> bool:
|
|
||||||
if isinstance(expected, _AnyOptStr):
|
|
||||||
return True
|
|
||||||
elif isinstance(expected, _AnyStr) and got is not None:
|
|
||||||
return True
|
|
||||||
elif isinstance(expected, StrRe):
|
|
||||||
if got is None or not re.match(expected.regexp, got):
|
|
||||||
return False
|
|
||||||
elif isinstance(expected, NotStrRe):
|
|
||||||
if got is None or re.match(expected.regexp, got):
|
|
||||||
return False
|
|
||||||
elif isinstance(expected, InsensitiveStr):
|
|
||||||
if got is None or got.lower() != expected.string.lower():
|
|
||||||
return False
|
|
||||||
elif isinstance(expected, Operator):
|
|
||||||
raise NotImplementedError(f"Unsupported operator: {expected}")
|
|
||||||
elif got != expected:
|
|
||||||
return False
|
|
||||||
|
|
||||||
return True
|
|
||||||
|
|
||||||
|
|
||||||
def match_list(
|
|
||||||
got: List[Optional[str]], expected: List[Union[str, None, Operator]]
|
|
||||||
) -> bool:
|
|
||||||
"""Returns True iff the list are equal.
|
|
||||||
|
|
||||||
The ANYSTR operator can be used on the 'expected' side as a wildcard,
|
|
||||||
matching any *single* value; and StrRe("<regexp>") can be used to match regular
|
|
||||||
expressions"""
|
|
||||||
if expected and isinstance(expected[-1], ListRemainder):
|
|
||||||
# Expand the 'expected' list to have as many items as the 'got' list
|
|
||||||
expected = list(expected) # copy
|
|
||||||
remainder = expected.pop()
|
|
||||||
nb_remaining_items = len(got) - len(expected)
|
|
||||||
expected += [remainder.item] * max(nb_remaining_items, remainder.min_length)
|
|
||||||
|
|
||||||
if len(got) != len(expected):
|
|
||||||
return False
|
|
||||||
return all(
|
|
||||||
match_string(got_value, expected_value)
|
|
||||||
for (got_value, expected_value) in zip(got, expected)
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
def match_dict(
|
|
||||||
got: Dict[str, Optional[str]],
|
|
||||||
expected: Dict[Union[str, Operator], Union[str, Operator, None]],
|
|
||||||
) -> bool:
|
|
||||||
"""Returns True iff the list are equal.
|
|
||||||
|
|
||||||
The ANYSTR operator can be used on the 'expected' side as a wildcard,
|
|
||||||
matching any *single* value; and StrRe("<regexp>") can be used to match regular
|
|
||||||
expressions
|
|
||||||
Additionally, the Keys() operator can be used to match remaining keys, and
|
|
||||||
ANYDICT to match any remaining dict"""
|
|
||||||
got = dict(got) # shallow copy, as we will remove keys
|
|
||||||
|
|
||||||
# Set to not-None if we find a Keys() operator in the dict keys
|
|
||||||
remaining_keys_wildcard = None
|
|
||||||
|
|
||||||
for expected_key, expected_value in expected.items():
|
|
||||||
if isinstance(expected_key, RemainingKeys):
|
|
||||||
remaining_keys_wildcard = (expected_key.key, expected_value)
|
|
||||||
else:
|
|
||||||
for key in got:
|
|
||||||
if match_string(key, expected_key) and match_string(
|
|
||||||
got[key], expected_value
|
|
||||||
):
|
|
||||||
got.pop(key)
|
|
||||||
break
|
|
||||||
else:
|
|
||||||
# Found no (key, value) pair matching the request
|
|
||||||
return False
|
|
||||||
|
|
||||||
if remaining_keys_wildcard:
|
|
||||||
(expected_key, expected_value) = remaining_keys_wildcard
|
|
||||||
for key, value in got.items():
|
|
||||||
if not match_string(key, expected_key):
|
|
||||||
return False
|
|
||||||
if not match_string(value, expected_value):
|
|
||||||
return False
|
|
||||||
|
|
||||||
return True
|
|
||||||
else:
|
|
||||||
# There should be nothing left unmatched in the dict
|
|
||||||
return got == {}
|
|
@ -1,59 +1,60 @@
|
|||||||
import unittest
|
import unittest
|
||||||
|
import operator
|
||||||
|
import collections
|
||||||
|
|
||||||
class NotImplementedByController(unittest.SkipTest, NotImplementedError):
|
class NotImplementedByController(unittest.SkipTest, NotImplementedError):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Not implemented by controller: {}".format(self.args[0])
|
return 'Not implemented by controller: {}'.format(self.args[0])
|
||||||
|
|
||||||
|
|
||||||
class ImplementationChoice(unittest.SkipTest):
|
class ImplementationChoice(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return (
|
return 'Choice in the implementation makes it impossible to ' \
|
||||||
"Choice in the implementation makes it impossible to "
|
'perform a test: {}'.format(self.args[0])
|
||||||
"perform a test: {}".format(self.args[0])
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class OptionalCommandNotSupported(unittest.SkipTest):
|
|
||||||
def __str__(self) -> str:
|
|
||||||
return "Unsupported command: {}".format(self.args[0])
|
|
||||||
|
|
||||||
|
|
||||||
class OptionalExtensionNotSupported(unittest.SkipTest):
|
class OptionalExtensionNotSupported(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Unsupported extension: {}".format(self.args[0])
|
return 'Unsupported extension: {}'.format(self.args[0])
|
||||||
|
|
||||||
|
|
||||||
class OptionalSaslMechanismNotSupported(unittest.SkipTest):
|
class OptionalSaslMechanismNotSupported(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Unsupported SASL mechanism: {}".format(self.args[0])
|
return 'Unsupported SASL mechanism: {}'.format(self.args[0])
|
||||||
|
|
||||||
|
|
||||||
class CapabilityNotSupported(unittest.SkipTest):
|
class CapabilityNotSupported(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Unsupported capability: {}".format(self.args[0])
|
return 'Unsupported capability: {}'.format(self.args[0])
|
||||||
|
|
||||||
|
|
||||||
class IsupportTokenNotSupported(unittest.SkipTest):
|
|
||||||
def __str__(self) -> str:
|
|
||||||
return "Unsupported ISUPPORT token: {}".format(self.args[0])
|
|
||||||
|
|
||||||
|
|
||||||
class ChannelModeNotSupported(unittest.SkipTest):
|
|
||||||
def __str__(self) -> str:
|
|
||||||
return "Unsupported channel mode: {} ({})".format(self.args[0], self.args[1])
|
|
||||||
|
|
||||||
|
|
||||||
class ExtbanNotSupported(unittest.SkipTest):
|
|
||||||
def __str__(self) -> str:
|
|
||||||
return "Unsupported extban: {} ({})".format(self.args[0], self.args[1])
|
|
||||||
|
|
||||||
|
|
||||||
class NotRequiredBySpecifications(unittest.SkipTest):
|
class NotRequiredBySpecifications(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Tests not required by the set of tested specification(s)."
|
return 'Tests not required by the set of tested specification(s).'
|
||||||
|
|
||||||
|
|
||||||
class SkipStrictTest(unittest.SkipTest):
|
class SkipStrictTest(unittest.SkipTest):
|
||||||
def __str__(self) -> str:
|
def __str__(self):
|
||||||
return "Tests not required because strict tests are disabled."
|
return 'Tests not required because strict tests are disabled.'
|
||||||
|
|
||||||
|
class TextTestResult(unittest.TextTestResult):
|
||||||
|
def getDescription(self, test):
|
||||||
|
if hasattr(test, 'description'):
|
||||||
|
doc_first_lines = test.description()
|
||||||
|
else:
|
||||||
|
doc_first_lines = test.shortDescription()
|
||||||
|
return '\n'.join((str(test), doc_first_lines or ''))
|
||||||
|
|
||||||
|
class TextTestRunner(unittest.TextTestRunner):
|
||||||
|
"""Small wrapper around unittest.TextTestRunner that reports the
|
||||||
|
number of tests that were skipped because the software does not support
|
||||||
|
an optional feature."""
|
||||||
|
resultclass = TextTestResult
|
||||||
|
|
||||||
|
def run(self, test):
|
||||||
|
result = super().run(test)
|
||||||
|
assert self.resultclass is TextTestResult
|
||||||
|
if result.skipped:
|
||||||
|
print()
|
||||||
|
print('Some tests were skipped because the following optional '
|
||||||
|
'specifications/mechanisms are not supported:')
|
||||||
|
msg_to_count = collections.defaultdict(lambda: 0)
|
||||||
|
for (test, msg) in result.skipped:
|
||||||
|
msg_to_count[msg] += 1
|
||||||
|
for (msg, count) in sorted(msg_to_count.items()):
|
||||||
|
print('\t{} ({} test(s))'.format(msg, count))
|
||||||
|
return result
|
||||||
|
@ -1,2 +0,0 @@
|
|||||||
from .scram import *
|
|
||||||
from .exceptions import *
|
|
@ -1,9 +0,0 @@
|
|||||||
import uuid
|
|
||||||
|
|
||||||
def default_nonce_factory():
|
|
||||||
"""Generate a random string for digest authentication challenges.
|
|
||||||
The string should be cryptographicaly secure random pattern.
|
|
||||||
:return: the string generated.
|
|
||||||
:returntype: `bytes`
|
|
||||||
"""
|
|
||||||
return uuid.uuid4().hex.encode("us-ascii")
|
|
@ -1,17 +0,0 @@
|
|||||||
class ScramException(Exception):
|
|
||||||
pass
|
|
||||||
|
|
||||||
class BadChallengeException(ScramException):
|
|
||||||
pass
|
|
||||||
|
|
||||||
class ExtraChallengeException(ScramException):
|
|
||||||
pass
|
|
||||||
|
|
||||||
class ServerScramError(ScramException):
|
|
||||||
pass
|
|
||||||
|
|
||||||
class BadSuccessException(ScramException):
|
|
||||||
pass
|
|
||||||
|
|
||||||
class NotAuthorizedException(ScramException):
|
|
||||||
pass
|
|
@ -1,561 +0,0 @@
|
|||||||
#
|
|
||||||
# (C) Copyright 2011 Jacek Konieczny <jajcus@jajcus.net>
|
|
||||||
#
|
|
||||||
# This program is free software; you can redistribute it and/or modify
|
|
||||||
# it under the terms of the GNU Lesser General Public License Version
|
|
||||||
# 2.1 as published by the Free Software Foundation.
|
|
||||||
#
|
|
||||||
# This program is distributed in the hope that it will be useful,
|
|
||||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
||||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
||||||
# GNU Lesser General Public License for more details.
|
|
||||||
#
|
|
||||||
# You should have received a copy of the GNU Lesser General Public
|
|
||||||
# License along with this program; if not, write to the Free Software
|
|
||||||
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
||||||
#
|
|
||||||
"""SCRAM authentication mechanisms for PyXMPP SASL implementation.
|
|
||||||
|
|
||||||
Normative reference:
|
|
||||||
- :RFC:`5802`
|
|
||||||
"""
|
|
||||||
|
|
||||||
from __future__ import absolute_import, division, unicode_literals
|
|
||||||
|
|
||||||
__docformat__ = "restructuredtext en"
|
|
||||||
|
|
||||||
import sys
|
|
||||||
import re
|
|
||||||
import logging
|
|
||||||
import hashlib
|
|
||||||
import hmac
|
|
||||||
|
|
||||||
from binascii import a2b_base64
|
|
||||||
from base64 import standard_b64encode
|
|
||||||
|
|
||||||
from .core import default_nonce_factory
|
|
||||||
from .exceptions import BadChallengeException, \
|
|
||||||
ExtraChallengeException, ServerScramError, BadSuccessException, \
|
|
||||||
NotAuthorizedException
|
|
||||||
|
|
||||||
|
|
||||||
logger = logging.getLogger("pyxmpp2_scram")
|
|
||||||
|
|
||||||
HASH_FACTORIES = {
|
|
||||||
"SHA-1": hashlib.sha1, # pylint: disable=E1101
|
|
||||||
"SHA-224": hashlib.sha224, # pylint: disable=E1101
|
|
||||||
"SHA-256": hashlib.sha256, # pylint: disable=E1101
|
|
||||||
"SHA-384": hashlib.sha384, # pylint: disable=E1101
|
|
||||||
"SHA-512": hashlib.sha512, # pylint: disable=E1101
|
|
||||||
"MD-5": hashlib.md5, # pylint: disable=E1101
|
|
||||||
}
|
|
||||||
|
|
||||||
VALUE_CHARS_RE = re.compile(br"^[\x21-\x2B\x2D-\x7E]+$")
|
|
||||||
_QUOTED_VALUE_RE = br"(?:[\x21-\x2B\x2D-\x7E]|=2C|=3D)+"
|
|
||||||
|
|
||||||
CLIENT_FIRST_MESSAGE_RE = re.compile(
|
|
||||||
br"^(?P<gs2_header>(?:y|n|p=(?P<cb_name>[a-zA-z0-9.-]+)),"
|
|
||||||
br"(?:a=(?P<authzid>" + _QUOTED_VALUE_RE + br"))?,)"
|
|
||||||
br"(?P<client_first_bare>(?P<mext>m=[^\000=]+,)?"
|
|
||||||
br"n=(?P<username>" + _QUOTED_VALUE_RE + br"),"
|
|
||||||
br"r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+)"
|
|
||||||
br"(?:,.*)?)$"
|
|
||||||
)
|
|
||||||
|
|
||||||
SERVER_FIRST_MESSAGE_RE = re.compile(
|
|
||||||
br"^(?P<mext>m=[^\000=]+,)?"
|
|
||||||
br"r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+),"
|
|
||||||
br"s=(?P<salt>[a-zA-Z0-9/+=]+),"
|
|
||||||
br"i=(?P<iteration_count>\d+)"
|
|
||||||
br"(?:,.*)?$"
|
|
||||||
)
|
|
||||||
|
|
||||||
CLIENT_FINAL_MESSAGE_RE = re.compile(
|
|
||||||
br"(?P<without_proof>c=(?P<cb>[a-zA-Z0-9/+=]+),"
|
|
||||||
br"(?:r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+))"
|
|
||||||
br"(?:,.*)?)"
|
|
||||||
br",p=(?P<proof>[a-zA-Z0-9/+=]+)$"
|
|
||||||
)
|
|
||||||
|
|
||||||
SERVER_FINAL_MESSAGE_RE = re.compile(
|
|
||||||
br"^(?:e=(?P<error>[^,]+)|v=(?P<verifier>[a-zA-Z0-9/+=]+)(?:,.*)?)$")
|
|
||||||
|
|
||||||
class SCRAMOperations(object):
|
|
||||||
"""Functions used during SCRAM authentication and defined in the RFC.
|
|
||||||
|
|
||||||
"""
|
|
||||||
def __init__(self, hash_function_name):
|
|
||||||
self.hash_function_name = hash_function_name
|
|
||||||
self.hash_factory = HASH_FACTORIES[hash_function_name]
|
|
||||||
self.digest_size = self.hash_factory().digest_size
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def Normalize(str_):
|
|
||||||
"""The Normalize(str) function.
|
|
||||||
|
|
||||||
This one also accepts Unicode string input (in the RFC only UTF-8
|
|
||||||
strings are used).
|
|
||||||
"""
|
|
||||||
# pylint: disable=C0103
|
|
||||||
if isinstance(str_, bytes):
|
|
||||||
str_ = str_.decode("utf-8")
|
|
||||||
return str_.encode("utf-8")
|
|
||||||
|
|
||||||
def HMAC(self, key, str_):
|
|
||||||
"""The HMAC(key, str) function."""
|
|
||||||
# pylint: disable=C0103
|
|
||||||
return hmac.new(key, str_, self.hash_factory).digest()
|
|
||||||
|
|
||||||
def H(self, str_):
|
|
||||||
"""The H(str) function."""
|
|
||||||
# pylint: disable=C0103
|
|
||||||
return self.hash_factory(str_).digest()
|
|
||||||
|
|
||||||
if sys.version_info.major >= 3:
|
|
||||||
@staticmethod
|
|
||||||
# pylint: disable=C0103
|
|
||||||
def XOR(str1, str2):
|
|
||||||
"""The XOR operator for two byte strings."""
|
|
||||||
return bytes(a ^ b for a, b in zip(str1, str2))
|
|
||||||
else:
|
|
||||||
@staticmethod
|
|
||||||
# pylint: disable=C0103
|
|
||||||
def XOR(str1, str2):
|
|
||||||
"""The XOR operator for two byte strings."""
|
|
||||||
return "".join(chr(ord(a) ^ ord(b)) for a, b in zip(str1, str2))
|
|
||||||
|
|
||||||
def Hi(self, str_, salt, i):
|
|
||||||
"""The Hi(str, salt, i) function."""
|
|
||||||
# pylint: disable=C0103
|
|
||||||
Uj = self.HMAC(str_, salt + b"\000\000\000\001") # U1
|
|
||||||
result = Uj
|
|
||||||
for _ in range(2, i + 1):
|
|
||||||
Uj = self.HMAC(str_, Uj) # Uj = HMAC(str, Uj-1)
|
|
||||||
result = self.XOR(result, Uj) # ... XOR Uj-1 XOR Uj
|
|
||||||
return result
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def escape(data):
|
|
||||||
"""Escape the ',' and '=' characters for 'a=' and 'n=' attributes.
|
|
||||||
|
|
||||||
Replaces '=' with '=3D' and ',' with '=2C'.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `data`: string to escape
|
|
||||||
:Types:
|
|
||||||
- `data`: `bytes`
|
|
||||||
"""
|
|
||||||
return data.replace(b'=', b'=3D').replace(b',', b'=2C')
|
|
||||||
|
|
||||||
@staticmethod
|
|
||||||
def unescape(data):
|
|
||||||
"""Unescape the ',' and '=' characters for 'a=' and 'n=' attributes.
|
|
||||||
|
|
||||||
Reverse of `escape`.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `data`: string to unescape
|
|
||||||
:Types:
|
|
||||||
- `data`: `bytes`
|
|
||||||
"""
|
|
||||||
return data.replace(b'=2C', b',').replace(b'=3D', b'=')
|
|
||||||
|
|
||||||
class SCRAMClientAuthenticator(SCRAMOperations):
|
|
||||||
"""Provides SCRAM SASL authentication for a client.
|
|
||||||
|
|
||||||
:Ivariables:
|
|
||||||
- `password`: current authentication password
|
|
||||||
- `pformat`: current authentication password format
|
|
||||||
- `realm`: current authentication realm
|
|
||||||
"""
|
|
||||||
# pylint: disable-msg=R0902
|
|
||||||
def __init__(self, hash_name, channel_binding):
|
|
||||||
"""Initialize a `SCRAMClientAuthenticator` object.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `hash_function_name`: hash function name, e.g. ``"SHA-1"``
|
|
||||||
- `channel_binding`: `True` to enable channel binding
|
|
||||||
:Types:
|
|
||||||
- `hash_function_name`: `unicode`
|
|
||||||
- `channel_binding`: `bool`
|
|
||||||
"""
|
|
||||||
SCRAMOperations.__init__(self, hash_name)
|
|
||||||
self.name = "SCRAM-{0}".format(hash_name)
|
|
||||||
if channel_binding:
|
|
||||||
self.name += "-PLUS"
|
|
||||||
self.channel_binding = channel_binding
|
|
||||||
self.username = None
|
|
||||||
self.password = None
|
|
||||||
self.authzid = None
|
|
||||||
self._c_nonce = None
|
|
||||||
self._server_first_message = False
|
|
||||||
self._client_first_message_bare = False
|
|
||||||
self._gs2_header = None
|
|
||||||
self._finished = False
|
|
||||||
self._auth_message = None
|
|
||||||
self._salted_password = None
|
|
||||||
self._cb_data = None
|
|
||||||
|
|
||||||
@classmethod
|
|
||||||
def are_properties_sufficient(cls, properties):
|
|
||||||
return "username" in properties and "password" in properties
|
|
||||||
|
|
||||||
def start(self, properties):
|
|
||||||
self.username = properties["username"]
|
|
||||||
self.password = properties["password"]
|
|
||||||
self.authzid = properties.get("authzid", "")
|
|
||||||
c_nonce = properties.get("nonce_factory", default_nonce_factory)()
|
|
||||||
if not VALUE_CHARS_RE.match(c_nonce):
|
|
||||||
c_nonce = standard_b64encode(c_nonce)
|
|
||||||
self._c_nonce = c_nonce
|
|
||||||
|
|
||||||
if self.channel_binding:
|
|
||||||
cb_data = properties.get("channel-binding")
|
|
||||||
if not cb_data:
|
|
||||||
raise ValueError("No channel binding data provided")
|
|
||||||
if "tls-unique" in cb_data:
|
|
||||||
cb_type = "tls-unique"
|
|
||||||
elif "tls-server-end-point" in cb_data:
|
|
||||||
cb_type = "tls-server-end-point"
|
|
||||||
elif cb_data:
|
|
||||||
cb_type = cb_data.keys()[0]
|
|
||||||
self._cb_data = cb_data[cb_type]
|
|
||||||
cb_flag = b"p=" + cb_type.encode("utf-8")
|
|
||||||
else:
|
|
||||||
plus_name = self.name + "-PLUS"
|
|
||||||
if plus_name in properties.get("enabled_mechanisms", []):
|
|
||||||
# -PLUS is enabled (supported) on our side,
|
|
||||||
# but was not selected - that means it was not included
|
|
||||||
# in the server features
|
|
||||||
cb_flag = b"y"
|
|
||||||
else:
|
|
||||||
cb_flag = b"n"
|
|
||||||
|
|
||||||
if self.authzid:
|
|
||||||
authzid = b"a=" + self.escape(self.authzid.encode("utf-8"))
|
|
||||||
else:
|
|
||||||
authzid = b""
|
|
||||||
gs2_header = cb_flag + b"," + authzid + b","
|
|
||||||
self._gs2_header = gs2_header
|
|
||||||
nonce = b"r=" + c_nonce
|
|
||||||
client_first_message_bare = (b"n=" +
|
|
||||||
self.escape(self.username.encode("utf-8")) + b"," + nonce)
|
|
||||||
self._client_first_message_bare = client_first_message_bare
|
|
||||||
client_first_message = gs2_header + client_first_message_bare
|
|
||||||
return client_first_message
|
|
||||||
|
|
||||||
def challenge(self, challenge):
|
|
||||||
"""Process a challenge and return the response.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `challenge`: the challenge from server.
|
|
||||||
:Types:
|
|
||||||
- `challenge`: `bytes`
|
|
||||||
|
|
||||||
:return: the response
|
|
||||||
:returntype: bytes
|
|
||||||
:raises: `BadChallengeException`
|
|
||||||
"""
|
|
||||||
# pylint: disable=R0911
|
|
||||||
if not challenge:
|
|
||||||
raise BadChallengeException('Empty challenge')
|
|
||||||
|
|
||||||
if self._server_first_message:
|
|
||||||
return self._final_challenge(challenge)
|
|
||||||
|
|
||||||
match = SERVER_FIRST_MESSAGE_RE.match(challenge)
|
|
||||||
if not match:
|
|
||||||
raise BadChallengeException("Bad challenge syntax: {0!r}".format(challenge))
|
|
||||||
|
|
||||||
self._server_first_message = challenge
|
|
||||||
|
|
||||||
mext = match.group("mext")
|
|
||||||
if mext:
|
|
||||||
raise BadChallengeException("Unsupported extension received: {0!r}".format(mext))
|
|
||||||
|
|
||||||
nonce = match.group("nonce")
|
|
||||||
if not nonce.startswith(self._c_nonce):
|
|
||||||
raise BadChallengeException("Nonce does not start with our nonce")
|
|
||||||
|
|
||||||
salt = match.group("salt")
|
|
||||||
try:
|
|
||||||
salt = a2b_base64(salt)
|
|
||||||
except ValueError:
|
|
||||||
raise BadChallengeException("Bad base64 encoding for salt: {0!r}".format(salt))
|
|
||||||
|
|
||||||
iteration_count = match.group("iteration_count")
|
|
||||||
try:
|
|
||||||
iteration_count = int(iteration_count)
|
|
||||||
except ValueError:
|
|
||||||
raise BadChallengeException("Bad iteration_count: {0!r}".format(iteration_count))
|
|
||||||
|
|
||||||
return self._make_response(nonce, salt, iteration_count)
|
|
||||||
|
|
||||||
def _make_response(self, nonce, salt, iteration_count):
|
|
||||||
"""Make a response for the first challenge from the server.
|
|
||||||
|
|
||||||
:return: the response
|
|
||||||
:returntype: bytes
|
|
||||||
"""
|
|
||||||
self._salted_password = self.Hi(self.Normalize(self.password), salt,
|
|
||||||
iteration_count)
|
|
||||||
self.password = None # not needed any more
|
|
||||||
if self.channel_binding:
|
|
||||||
channel_binding = b"c=" + standard_b64encode(self._gs2_header +
|
|
||||||
self._cb_data)
|
|
||||||
else:
|
|
||||||
channel_binding = b"c=" + standard_b64encode(self._gs2_header)
|
|
||||||
|
|
||||||
# pylint: disable=C0103
|
|
||||||
client_final_message_without_proof = (channel_binding + b",r=" + nonce)
|
|
||||||
|
|
||||||
client_key = self.HMAC(self._salted_password, b"Client Key")
|
|
||||||
stored_key = self.H(client_key)
|
|
||||||
auth_message = ( self._client_first_message_bare + b"," +
|
|
||||||
self._server_first_message + b"," +
|
|
||||||
client_final_message_without_proof )
|
|
||||||
self._auth_message = auth_message
|
|
||||||
client_signature = self.HMAC(stored_key, auth_message)
|
|
||||||
client_proof = self.XOR(client_key, client_signature)
|
|
||||||
proof = b"p=" + standard_b64encode(client_proof)
|
|
||||||
client_final_message = (client_final_message_without_proof + b"," +
|
|
||||||
proof)
|
|
||||||
return client_final_message
|
|
||||||
|
|
||||||
def _final_challenge(self, challenge):
|
|
||||||
"""Process the second challenge from the server and return the
|
|
||||||
response.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `challenge`: the challenge from server.
|
|
||||||
:Types:
|
|
||||||
- `challenge`: `bytes`
|
|
||||||
|
|
||||||
:raises: `ExtraChallengeException`, `BadChallengeException`, `ServerScramError`, or `BadSuccessException`
|
|
||||||
"""
|
|
||||||
if self._finished:
|
|
||||||
return ExtraChallengeException()
|
|
||||||
|
|
||||||
match = SERVER_FINAL_MESSAGE_RE.match(challenge)
|
|
||||||
if not match:
|
|
||||||
raise BadChallengeException("Bad final message syntax: {0!r}".format(challenge))
|
|
||||||
|
|
||||||
error = match.group("error")
|
|
||||||
if error:
|
|
||||||
raise ServerScramError("{0!r}".format(error))
|
|
||||||
|
|
||||||
verifier = match.group("verifier")
|
|
||||||
if not verifier:
|
|
||||||
raise BadSuccessException("No verifier value in the final message")
|
|
||||||
|
|
||||||
server_key = self.HMAC(self._salted_password, b"Server Key")
|
|
||||||
server_signature = self.HMAC(server_key, self._auth_message)
|
|
||||||
if server_signature != a2b_base64(verifier):
|
|
||||||
raise BadSuccessException("Server verifier does not match")
|
|
||||||
|
|
||||||
self._finished = True
|
|
||||||
|
|
||||||
def finish(self, data):
|
|
||||||
"""Process success indicator from the server.
|
|
||||||
|
|
||||||
Process any addiitional data passed with the success.
|
|
||||||
Fail if the server was not authenticated.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `data`: an optional additional data with success.
|
|
||||||
:Types:
|
|
||||||
- `data`: `bytes`
|
|
||||||
|
|
||||||
:return: username and authzid
|
|
||||||
:returntype: `dict`
|
|
||||||
:raises: `BadSuccessException`"""
|
|
||||||
if not self._server_first_message:
|
|
||||||
raise BadSuccessException("Got success too early")
|
|
||||||
if self._finished:
|
|
||||||
return {"username": self.username, "authzid": self.authzid}
|
|
||||||
else:
|
|
||||||
self._final_challenge(data)
|
|
||||||
if self._finished:
|
|
||||||
return {"username": self.username,
|
|
||||||
"authzid": self.authzid}
|
|
||||||
else:
|
|
||||||
raise BadSuccessException("Something went wrong when processing additional"
|
|
||||||
" data with success?")
|
|
||||||
|
|
||||||
class SCRAMServerAuthenticator(SCRAMOperations):
|
|
||||||
"""Provides SCRAM SASL authentication for a server.
|
|
||||||
"""
|
|
||||||
def __init__(self, hash_name, channel_binding, password_database):
|
|
||||||
"""Initialize a `SCRAMClientAuthenticator` object.
|
|
||||||
|
|
||||||
:Parameters:
|
|
||||||
- `hash_function_name`: hash function name, e.g. ``"SHA-1"``
|
|
||||||
- `channel_binding`: `True` to enable channel binding
|
|
||||||
:Types:
|
|
||||||
- `hash_function_name`: `unicode`
|
|
||||||
- `channel_binding`: `bool`
|
|
||||||
"""
|
|
||||||
SCRAMOperations.__init__(self, hash_name)
|
|
||||||
self.name = "SCRAM-{0}".format(hash_name)
|
|
||||||
if channel_binding:
|
|
||||||
self.name += "-PLUS"
|
|
||||||
self.channel_binding = channel_binding
|
|
||||||
self.properties = None
|
|
||||||
self.out_properties = None
|
|
||||||
self.password_database = password_database
|
|
||||||
self._client_first_message_bare = None
|
|
||||||
self._stored_key = None
|
|
||||||
self._server_key = None
|
|
||||||
|
|
||||||
def start(self, properties, initial_response):
|
|
||||||
self.properties = properties
|
|
||||||
self._client_first_message_bare = None
|
|
||||||
self.out_properties = {}
|
|
||||||
if not initial_response:
|
|
||||||
return b""
|
|
||||||
return self.response(initial_response)
|
|
||||||
|
|
||||||
def response(self, response):
|
|
||||||
if self._client_first_message_bare:
|
|
||||||
logger.debug("Client final message: {0!r}".format(response))
|
|
||||||
return self._handle_final_response(response)
|
|
||||||
else:
|
|
||||||
logger.debug("Client first message: {0!r}".format(response))
|
|
||||||
return self._handle_first_response(response)
|
|
||||||
|
|
||||||
def _handle_first_response(self, response):
|
|
||||||
match = CLIENT_FIRST_MESSAGE_RE.match(response)
|
|
||||||
if not match:
|
|
||||||
raise NotAuthorizedException("Bad response syntax: {0!r}".format(response))
|
|
||||||
|
|
||||||
mext = match.group("mext")
|
|
||||||
if mext:
|
|
||||||
raise NotAuthorizedException("Unsupported extension received: {0!r}".format(mext))
|
|
||||||
|
|
||||||
gs2_header = match.group("gs2_header")
|
|
||||||
cb_name = match.group("cb_name")
|
|
||||||
if self.channel_binding:
|
|
||||||
if not cb_name:
|
|
||||||
raise NotAuthorizedException("{0!r} used with no channel-binding"
|
|
||||||
.format(self.name))
|
|
||||||
cb_name = cb_name.decode("utf-8")
|
|
||||||
if cb_name not in self.properties["channel-binding"]:
|
|
||||||
raise NotAuthorizedException("Channel binding data type {0!r} not available"
|
|
||||||
.format(cb_name))
|
|
||||||
else:
|
|
||||||
if gs2_header.startswith(b'y'):
|
|
||||||
plus_name = self.name + "-PLUS"
|
|
||||||
if plus_name in self.properties.get("enabled_mechanisms", []):
|
|
||||||
raise NotAuthorizedException("Channel binding downgrade attack detected")
|
|
||||||
elif gs2_header.startswith(b'p'):
|
|
||||||
# is this really an error?
|
|
||||||
raise NotAuthorizedException("Channel binding requested for {0!r}"
|
|
||||||
.format(self.name))
|
|
||||||
|
|
||||||
authzid = match.group("authzid")
|
|
||||||
if authzid:
|
|
||||||
self.out_properties['authzid'] = self.unescape(authzid
|
|
||||||
).decode("utf-8")
|
|
||||||
else:
|
|
||||||
self.out_properties['authzid'] = None
|
|
||||||
username = self.unescape(match.group("username")).decode("utf-8")
|
|
||||||
self.out_properties['username'] = username
|
|
||||||
|
|
||||||
nonce_factory = self.properties.get("nonce_factory",
|
|
||||||
default_nonce_factory)
|
|
||||||
|
|
||||||
properties = dict(self.properties)
|
|
||||||
properties.update(self.out_properties)
|
|
||||||
|
|
||||||
s_pformat = "SCRAM-{0}-SaltedPassword".format(self.hash_function_name)
|
|
||||||
k_pformat = "SCRAM-{0}-Keys".format(self.hash_function_name)
|
|
||||||
password, pformat = self.password_database.get_password(username,
|
|
||||||
(s_pformat, "plain"), properties)
|
|
||||||
if pformat == s_pformat:
|
|
||||||
if password is not None:
|
|
||||||
salt, iteration_count, salted_password = password
|
|
||||||
else:
|
|
||||||
logger.debug("No password for user {0!r}".format(username))
|
|
||||||
elif pformat != k_pformat:
|
|
||||||
salt = self.properties.get("SCRAM-salt")
|
|
||||||
if not salt:
|
|
||||||
salt = nonce_factory()
|
|
||||||
iteration_count = self.properties.get("SCRAM-iteration-count", 4096)
|
|
||||||
if pformat == "plain" and password is not None:
|
|
||||||
salted_password = self.Hi(self.Normalize(password), salt,
|
|
||||||
iteration_count)
|
|
||||||
else:
|
|
||||||
logger.debug("No password for user {0!r}".format(username))
|
|
||||||
password = None
|
|
||||||
# to prevent timing attack, compute the key anyway
|
|
||||||
salted_password = self.Hi(self.Normalize(""), salt,
|
|
||||||
iteration_count)
|
|
||||||
if pformat == k_pformat:
|
|
||||||
salt, iteration_count, stored_key, server_key = password
|
|
||||||
else:
|
|
||||||
client_key = self.HMAC(salted_password, b"Client Key")
|
|
||||||
stored_key = self.H(client_key)
|
|
||||||
server_key = self.HMAC(salted_password, b"Server Key")
|
|
||||||
|
|
||||||
if password is not None:
|
|
||||||
self._stored_key = stored_key
|
|
||||||
self._server_key = server_key
|
|
||||||
else:
|
|
||||||
self._stored_key = None
|
|
||||||
self._server_key = None
|
|
||||||
|
|
||||||
c_nonce = match.group("nonce")
|
|
||||||
s_nonce = nonce_factory()
|
|
||||||
if not VALUE_CHARS_RE.match(s_nonce):
|
|
||||||
s_nonce = standard_b64encode(s_nonce)
|
|
||||||
nonce = c_nonce + s_nonce
|
|
||||||
server_first_message = (
|
|
||||||
b"r=" + nonce
|
|
||||||
+ b",s=" + standard_b64encode(salt)
|
|
||||||
+ b",i=" + str(iteration_count).encode("utf-8")
|
|
||||||
)
|
|
||||||
self._nonce = nonce
|
|
||||||
self._cb_name = cb_name
|
|
||||||
self._gs2_header = gs2_header
|
|
||||||
self._client_first_message_bare = match.group("client_first_bare")
|
|
||||||
self._server_first_message = server_first_message
|
|
||||||
return server_first_message
|
|
||||||
|
|
||||||
def _handle_final_response(self, response):
|
|
||||||
match = CLIENT_FINAL_MESSAGE_RE.match(response)
|
|
||||||
if not match:
|
|
||||||
raise NotAuthorizedException("Bad response syntax: {0!r}".format(response))
|
|
||||||
if match.group("nonce") != self._nonce:
|
|
||||||
raise NotAuthorizedException("Bad nonce in the final client response")
|
|
||||||
cb_input = a2b_base64(match.group("cb"))
|
|
||||||
if not cb_input.startswith(self._gs2_header):
|
|
||||||
raise NotAuthorizedException("GS2 header in the final response ({0!r}) doesn't"
|
|
||||||
" match the one sent in the first message ({1!r})"
|
|
||||||
.format(cb_input, self._gs2_header))
|
|
||||||
if self._cb_name:
|
|
||||||
cb_data = cb_input[len(self._gs2_header):]
|
|
||||||
if cb_data != self.properties["channel-binding"][self._cb_name]:
|
|
||||||
raise NotAuthorizedException("Channel binding data doesn't match")
|
|
||||||
|
|
||||||
proof = a2b_base64(match.group("proof"))
|
|
||||||
|
|
||||||
auth_message = (self._client_first_message_bare + b"," +
|
|
||||||
self._server_first_message + b"," +
|
|
||||||
match.group("without_proof"))
|
|
||||||
if self._stored_key is None:
|
|
||||||
# compute something to prevent timing attack
|
|
||||||
client_signature = self.HMAC(b"", auth_message)
|
|
||||||
client_key = self.XOR(client_signature, proof)
|
|
||||||
self.H(client_key)
|
|
||||||
raise NotAuthorizedException("Authentication failed (bad username)")
|
|
||||||
|
|
||||||
client_signature = self.HMAC(self._stored_key, auth_message)
|
|
||||||
client_key = self.XOR(client_signature, proof)
|
|
||||||
if self.H(client_key) != self._stored_key:
|
|
||||||
raise NotAuthorizedException("Authentication failed")
|
|
||||||
|
|
||||||
server_signature = self.HMAC(self._server_key, auth_message)
|
|
||||||
server_final_message = b"v=" + standard_b64encode(server_signature)
|
|
||||||
return (self.out_properties, server_final_message)
|
|
||||||
|
|
||||||
|
|
@ -1,369 +0,0 @@
|
|||||||
"""Internal checks of assertion implementations."""
|
|
||||||
|
|
||||||
from typing import Dict, List, Tuple
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.irc_utils.message_parser import parse_message
|
|
||||||
from irctest.patma import (
|
|
||||||
ANYDICT,
|
|
||||||
ANYLIST,
|
|
||||||
ANYOPTSTR,
|
|
||||||
ANYSTR,
|
|
||||||
ListRemainder,
|
|
||||||
NotStrRe,
|
|
||||||
RemainingKeys,
|
|
||||||
StrRe,
|
|
||||||
)
|
|
||||||
|
|
||||||
# fmt: off
|
|
||||||
MESSAGE_SPECS: List[Tuple[Dict, List[str], List[str], List[str]]] = [
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "hello"],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"PRIVMSG #chan hello",
|
|
||||||
"PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMSG #chan hello2",
|
|
||||||
"PRIVMSG #chan2 hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan', 'hello2']",
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan2', 'hello']",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", StrRe("hello.*")],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"PRIVMSG #chan hello",
|
|
||||||
"PRIVMSG #chan :hello",
|
|
||||||
"PRIVMSG #chan hello2",
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMSG #chan :hi",
|
|
||||||
"PRIVMSG #chan2 hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected params to match ['#chan', StrRe(r'hello.*')], got ['#chan', 'hi']",
|
|
||||||
"expected params to match ['#chan', StrRe(r'hello.*')], got ['#chan2', 'hello']",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
nick="foo",
|
|
||||||
command="PRIVMSG",
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMSG #chan :hi",
|
|
||||||
":foo2!baz@qux PRIVMSG #chan hello",
|
|
||||||
"@tag1=bar :foo2!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected nick to be foo, got None instead",
|
|
||||||
"expected nick to be foo, got foo2 instead",
|
|
||||||
"expected nick to be foo, got foo2 instead",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
tags={"tag1": "bar"},
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "hello"],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"@tag1=value1 PRIVMSG #chan :hello",
|
|
||||||
"PRIVMSG #chan hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected tags to match {'tag1': 'bar'}, got {'tag1': 'bar', 'tag2': ''}",
|
|
||||||
"expected tags to match {'tag1': 'bar'}, got {'tag1': 'value1'}",
|
|
||||||
"expected tags to match {'tag1': 'bar'}, got {}",
|
|
||||||
"expected tags to match {'tag1': 'bar'}, got {}",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
tags={"tag1": ANYSTR},
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", ANYSTR],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=value1 PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"PRIVMSG #chan hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected tags to match {'tag1': ANYSTR}, got {'tag1': 'bar', 'tag2': ''}",
|
|
||||||
"expected tags to match {'tag1': ANYSTR}, got {}",
|
|
||||||
"expected tags to match {'tag1': ANYSTR}, got {}",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
tags={"tag1": "bar", **ANYDICT},
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "hello"],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMG #chan :hello",
|
|
||||||
"@tag1=value1 PRIVMSG #chan :hello",
|
|
||||||
"PRIVMSG #chan hello2",
|
|
||||||
"PRIVMSG #chan2 hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected command to be PRIVMSG, got PRIVMG",
|
|
||||||
"expected tags to match {'tag1': 'bar', RemainingKeys(ANYSTR): ANYOPTSTR}, got {'tag1': 'value1'}",
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan', 'hello2']",
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan2', 'hello']",
|
|
||||||
"expected tags to match {'tag1': 'bar', RemainingKeys(ANYSTR): ANYOPTSTR}, got {}",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
tags={StrRe("tag[12]"): "bar", **ANYDICT},
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "hello"],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
"@tag2=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"@tag1=;tag2=bar PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMG #chan :hello",
|
|
||||||
"@tag1=value1 PRIVMSG #chan :hello",
|
|
||||||
"PRIVMSG #chan hello2",
|
|
||||||
"PRIVMSG #chan2 hello",
|
|
||||||
":foo!baz@qux PRIVMSG #chan hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected command to be PRIVMSG, got PRIVMG",
|
|
||||||
"expected tags to match {StrRe(r'tag[12]'): 'bar', RemainingKeys(ANYSTR): ANYOPTSTR}, got {'tag1': 'value1'}",
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan', 'hello2']",
|
|
||||||
"expected params to match ['#chan', 'hello'], got ['#chan2', 'hello']",
|
|
||||||
"expected tags to match {StrRe(r'tag[12]'): 'bar', RemainingKeys(ANYSTR): ANYOPTSTR}, got {}",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
tags={"tag1": "bar", RemainingKeys(NotStrRe("tag2")): ANYOPTSTR},
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "hello"],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"@tag1=bar PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar :foo!baz@qux PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag3= PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PRIVMG #chan :hello",
|
|
||||||
"@tag1=value1 PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2= PRIVMSG #chan :hello",
|
|
||||||
"@tag1=bar;tag2=baz PRIVMSG #chan :hello",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected command to be PRIVMSG, got PRIVMG",
|
|
||||||
"expected tags to match {'tag1': 'bar', RemainingKeys(NotStrRe(r'tag2')): ANYOPTSTR}, got {'tag1': 'value1'}",
|
|
||||||
"expected tags to match {'tag1': 'bar', RemainingKeys(NotStrRe(r'tag2')): ANYOPTSTR}, got {'tag1': 'bar', 'tag2': ''}",
|
|
||||||
"expected tags to match {'tag1': 'bar', RemainingKeys(NotStrRe(r'tag2')): ANYOPTSTR}, got {'tag1': 'bar', 'tag2': 'baz'}",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="005",
|
|
||||||
params=["nick", "FOO=1", *ANYLIST],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"005 nick FOO=1",
|
|
||||||
"005 nick FOO=1 BAR=2",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"005 nick",
|
|
||||||
"005 nick BAR=2",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected params to match ['nick', 'FOO=1', *ANYLIST], got ['nick']",
|
|
||||||
"expected params to match ['nick', 'FOO=1', *ANYLIST], got ['nick', 'BAR=2']",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="005",
|
|
||||||
params=["nick", ListRemainder(ANYSTR, min_length=1)],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"005 nick FOO=1",
|
|
||||||
"005 nick FOO=1 BAR=2",
|
|
||||||
"005 nick BAR=2",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"005 nick",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected params to match ['nick', ListRemainder(ANYSTR, min_length=1)], got ['nick']",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="005",
|
|
||||||
params=["nick", ListRemainder(StrRe("[A-Z]+=.*"), min_length=1)],
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"005 nick FOO=1",
|
|
||||||
"005 nick FOO=1 BAR=2",
|
|
||||||
"005 nick BAR=2",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"005 nick",
|
|
||||||
"005 nick foo=1",
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected params to match ['nick', ListRemainder(StrRe(r'[A-Z]+=.*'), min_length=1)], got ['nick']",
|
|
||||||
"expected params to match ['nick', ListRemainder(StrRe(r'[A-Z]+=.*'), min_length=1)], got ['nick', 'foo=1']",
|
|
||||||
]
|
|
||||||
),
|
|
||||||
(
|
|
||||||
# the specification:
|
|
||||||
dict(
|
|
||||||
command="PING",
|
|
||||||
params=["abc"]
|
|
||||||
),
|
|
||||||
# matches:
|
|
||||||
[
|
|
||||||
"PING abc",
|
|
||||||
],
|
|
||||||
# and does not match:
|
|
||||||
[
|
|
||||||
"PONG def"
|
|
||||||
],
|
|
||||||
# and they each error with:
|
|
||||||
[
|
|
||||||
"expected command to be PING, got PONG"
|
|
||||||
]
|
|
||||||
),
|
|
||||||
]
|
|
||||||
# fmt: on
|
|
||||||
|
|
||||||
|
|
||||||
class IrcTestCaseTestCase(cases._IrcTestCase):
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"spec,msg",
|
|
||||||
[
|
|
||||||
pytest.param(spec, msg, id=f"{spec}-{msg}")
|
|
||||||
for (spec, positive_matches, _, _) in MESSAGE_SPECS
|
|
||||||
for msg in positive_matches
|
|
||||||
],
|
|
||||||
)
|
|
||||||
def test_message_matching_positive(self, spec, msg):
|
|
||||||
assert not self.messageDiffers(parse_message(msg), **spec), msg
|
|
||||||
assert self.messageEqual(parse_message(msg), **spec), msg
|
|
||||||
self.assertMessageMatch(parse_message(msg), **spec), msg
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"spec,msg",
|
|
||||||
[
|
|
||||||
pytest.param(spec, msg, id=f"{spec}-{msg}")
|
|
||||||
for (spec, _, negative_matches, _) in MESSAGE_SPECS
|
|
||||||
for msg in negative_matches
|
|
||||||
],
|
|
||||||
)
|
|
||||||
def test_message_matching_negative(self, spec, msg):
|
|
||||||
assert self.messageDiffers(parse_message(msg), **spec), msg
|
|
||||||
assert not self.messageEqual(parse_message(msg), **spec), msg
|
|
||||||
with pytest.raises(AssertionError):
|
|
||||||
self.assertMessageMatch(parse_message(msg), **spec), msg
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"spec,msg,error_string",
|
|
||||||
[
|
|
||||||
pytest.param(spec, msg, error_string, id=error_string)
|
|
||||||
for (spec, _, negative_matches, error_stringgexps) in MESSAGE_SPECS
|
|
||||||
for (msg, error_string) in zip(negative_matches, error_stringgexps)
|
|
||||||
],
|
|
||||||
)
|
|
||||||
def test_message_matching_negative_message(self, spec, msg, error_string):
|
|
||||||
self.assertIn(error_string, self.messageDiffers(parse_message(msg), **spec))
|
|
@ -1,141 +0,0 @@
|
|||||||
"""
|
|
||||||
`Draft IRCv3 account-registration
|
|
||||||
<https://ircv3.net/specs/extensions/account-registration>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
REGISTER_CAP_NAME = "draft/account-registration"
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
class RegisterBeforeConnectTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(
|
|
||||||
ergo_config=lambda config: config["accounts"]["registration"].update(
|
|
||||||
{"allow-before-connect": True}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
def testBeforeConnect(self):
|
|
||||||
self.addClient("bar")
|
|
||||||
self.requestCapabilities("bar", [REGISTER_CAP_NAME], skip_if_cap_nak=True)
|
|
||||||
self.sendLine("bar", "CAP LS 302")
|
|
||||||
caps = self.getCapLs("bar")
|
|
||||||
self.assertIn(REGISTER_CAP_NAME, caps)
|
|
||||||
self.assertIn("before-connect", caps[REGISTER_CAP_NAME])
|
|
||||||
self.sendLine("bar", "NICK bar")
|
|
||||||
self.sendLine("bar", "REGISTER * * shivarampassphrase")
|
|
||||||
msgs = self.getMessages("bar")
|
|
||||||
register_response = [msg for msg in msgs if msg.command == "REGISTER"][0]
|
|
||||||
self.assertMessageMatch(register_response, params=["SUCCESS", ANYSTR, ANYSTR])
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
class RegisterBeforeConnectDisallowedTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(
|
|
||||||
ergo_config=lambda config: config["accounts"]["registration"].update(
|
|
||||||
{"allow-before-connect": False}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
def testBeforeConnect(self):
|
|
||||||
self.addClient("bar")
|
|
||||||
self.requestCapabilities("bar", [REGISTER_CAP_NAME], skip_if_cap_nak=True)
|
|
||||||
self.sendLine("bar", "CAP LS 302")
|
|
||||||
caps = self.getCapLs("bar")
|
|
||||||
self.assertIn(REGISTER_CAP_NAME, caps)
|
|
||||||
self.assertEqual(caps[REGISTER_CAP_NAME], None)
|
|
||||||
self.sendLine("bar", "NICK bar")
|
|
||||||
self.sendLine("bar", "REGISTER * * shivarampassphrase")
|
|
||||||
msgs = self.getMessages("bar")
|
|
||||||
fail_response = [msg for msg in msgs if msg.command == "FAIL"][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
fail_response,
|
|
||||||
params=["REGISTER", "COMPLETE_CONNECTION_REQUIRED", ANYSTR, ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
class RegisterEmailVerifiedTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(
|
|
||||||
ergo_config=lambda config: config["accounts"]["registration"].update(
|
|
||||||
{
|
|
||||||
"email-verification": {
|
|
||||||
"enabled": True,
|
|
||||||
"sender": "test@example.com",
|
|
||||||
"require-tls": True,
|
|
||||||
"helo-domain": "example.com",
|
|
||||||
},
|
|
||||||
"allow-before-connect": True,
|
|
||||||
}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
def testBeforeConnect(self):
|
|
||||||
self.addClient("bar")
|
|
||||||
self.requestCapabilities(
|
|
||||||
"bar", capabilities=[REGISTER_CAP_NAME], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
self.sendLine("bar", "CAP LS 302")
|
|
||||||
caps = self.getCapLs("bar")
|
|
||||||
self.assertIn(REGISTER_CAP_NAME, caps)
|
|
||||||
self.assertEqual(
|
|
||||||
set(caps[REGISTER_CAP_NAME].split(",")),
|
|
||||||
{"before-connect", "email-required"},
|
|
||||||
)
|
|
||||||
self.sendLine("bar", "NICK bar")
|
|
||||||
self.sendLine("bar", "REGISTER * * shivarampassphrase")
|
|
||||||
msgs = self.getMessages("bar")
|
|
||||||
fail_response = [msg for msg in msgs if msg.command == "FAIL"][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
fail_response, params=["REGISTER", "INVALID_EMAIL", ANYSTR, ANYSTR]
|
|
||||||
)
|
|
||||||
|
|
||||||
def testAfterConnect(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar", name="bar", capabilities=[REGISTER_CAP_NAME], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
self.sendLine("bar", "REGISTER * * shivarampassphrase")
|
|
||||||
msgs = self.getMessages("bar")
|
|
||||||
fail_response = [msg for msg in msgs if msg.command == "FAIL"][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
fail_response, params=["REGISTER", "INVALID_EMAIL", ANYSTR, ANYSTR]
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
@cases.mark_specifications("IRCv3", "Ergo")
|
|
||||||
class RegisterNoLandGrabsTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(
|
|
||||||
ergo_config=lambda config: config["accounts"]["registration"].update(
|
|
||||||
{"allow-before-connect": True}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
def testBeforeConnect(self):
|
|
||||||
# have an anonymous client take the 'root' username:
|
|
||||||
self.connectClient(
|
|
||||||
"root", name="root", capabilities=[REGISTER_CAP_NAME], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
|
|
||||||
# cannot register it out from under the anonymous nick holder:
|
|
||||||
self.addClient("bar")
|
|
||||||
self.sendLine("bar", "NICK root")
|
|
||||||
self.sendLine("bar", "REGISTER * * shivarampassphrase")
|
|
||||||
msgs = self.getMessages("bar")
|
|
||||||
fail_response = [msg for msg in msgs if msg.command == "FAIL"][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
fail_response, params=["REGISTER", "USERNAME_EXISTS", ANYSTR, ANYSTR]
|
|
||||||
)
|
|
@ -1,73 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 account-tag <https://ircv3.net/specs/extensions/account-tag>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
class AccountTagTestCase(cases.BaseServerTestCase):
|
|
||||||
def connectRegisteredClient(self, nick):
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(2, "CAP LS 302")
|
|
||||||
capabilities = self.getCapLs(2)
|
|
||||||
assert "sasl" in capabilities
|
|
||||||
|
|
||||||
self.sendLine(2, "USER f * * :Realname")
|
|
||||||
self.sendLine(2, "NICK {}".format(nick))
|
|
||||||
self.sendLine(2, "CAP REQ :sasl")
|
|
||||||
self.getRegistrationMessage(2)
|
|
||||||
|
|
||||||
self.sendLine(2, "AUTHENTICATE PLAIN")
|
|
||||||
m = self.getRegistrationMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="AUTHENTICATE",
|
|
||||||
params=["+"],
|
|
||||||
fail_msg="Sent “AUTHENTICATE PLAIN”, server should have "
|
|
||||||
"replied with “AUTHENTICATE +”, but instead sent: {msg}",
|
|
||||||
)
|
|
||||||
self.sendLine(2, "AUTHENTICATE amlsbGVzAGppbGxlcwBzZXNhbWU=")
|
|
||||||
m = self.getRegistrationMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="900",
|
|
||||||
fail_msg="Did not send 900 after correct SASL authentication.",
|
|
||||||
)
|
|
||||||
self.sendLine(2, "USER f * * :Realname")
|
|
||||||
self.sendLine(2, "NICK {}".format(nick))
|
|
||||||
self.sendLine(2, "CAP END")
|
|
||||||
self.skipToWelcome(2)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("account-tag")
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
def testPrivmsg(self):
|
|
||||||
self.connectClient("foo", capabilities=["account-tag"], skip_if_cap_nak=True)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.controller.registerUser(self, "jilles", "sesame")
|
|
||||||
self.connectRegisteredClient("bar")
|
|
||||||
self.sendLine(2, "PRIVMSG foo :hi")
|
|
||||||
self.getMessages(2)
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="PRIVMSG", params=["foo", "hi"], tags={"account": "jilles"}
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("account-tag")
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Charybdis"], "https://github.com/solanum-ircd/solanum/issues/166"
|
|
||||||
)
|
|
||||||
def testInvite(self):
|
|
||||||
self.connectClient("foo", capabilities=["account-tag"], skip_if_cap_nak=True)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.controller.registerUser(self, "jilles", "sesame")
|
|
||||||
self.connectRegisteredClient("bar")
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.sendLine(2, "INVITE foo #chan")
|
|
||||||
self.getMessages(2)
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="INVITE", params=["foo", "#chan"], tags={"account": "jilles"}
|
|
||||||
)
|
|
@ -1,177 +0,0 @@
|
|||||||
"""
|
|
||||||
AWAY command (`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-4.1>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#away-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import (
|
|
||||||
RPL_AWAY,
|
|
||||||
RPL_NOWAWAY,
|
|
||||||
RPL_UNAWAY,
|
|
||||||
RPL_USERHOST,
|
|
||||||
RPL_WHOISUSER,
|
|
||||||
)
|
|
||||||
from irctest.patma import StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class AwayTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern")
|
|
||||||
def testAway(self):
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.sendLine(1, "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.connectClient("qux")
|
|
||||||
self.sendLine(2, "PRIVMSG bar :what's up")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(2),
|
|
||||||
command=RPL_AWAY,
|
|
||||||
params=["qux", "bar", "I'm not here right now"],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "AWAY")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_UNAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.sendLine(2, "PRIVMSG bar :what's up")
|
|
||||||
replies = self.getMessages(2)
|
|
||||||
self.assertEqual(len(replies), 0)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testAwayAck(self):
|
|
||||||
"""
|
|
||||||
"The server acknowledges the change in away status by returning the
|
|
||||||
`RPL_NOWAWAY` and `RPL_UNAWAY` numerics."
|
|
||||||
-- https://modern.ircdocs.horse/#away-message
|
|
||||||
"""
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.sendLine(1, "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.sendLine(1, "AWAY")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_UNAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testAwayPrivmsg(self):
|
|
||||||
"""
|
|
||||||
"Servers SHOULD notify clients when a user they're interacting with
|
|
||||||
is away when relevant"
|
|
||||||
-- https://modern.ircdocs.horse/#away-message
|
|
||||||
|
|
||||||
"<client> <nick> :<message>"
|
|
||||||
-- https://modern.ircdocs.horse/#rplaway-301
|
|
||||||
"""
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.connectClient("qux")
|
|
||||||
|
|
||||||
self.sendLine(2, "PRIVMSG bar :what's up")
|
|
||||||
self.assertEqual(self.getMessages(2), [])
|
|
||||||
|
|
||||||
self.sendLine(1, "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.sendLine(2, "PRIVMSG bar :what's up")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(2),
|
|
||||||
command=RPL_AWAY,
|
|
||||||
params=["qux", "bar", "I'm not here right now"],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testAwayWhois(self):
|
|
||||||
"""
|
|
||||||
"Servers SHOULD notify clients when a user they're interacting with
|
|
||||||
is away when relevant"
|
|
||||||
-- https://modern.ircdocs.horse/#away-message
|
|
||||||
|
|
||||||
"<client> <nick> :<message>"
|
|
||||||
-- https://modern.ircdocs.horse/#rplaway-301
|
|
||||||
"""
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.connectClient("qux")
|
|
||||||
|
|
||||||
self.sendLine(2, "WHOIS bar")
|
|
||||||
msgs = [msg for msg in self.getMessages(2) if msg.command == RPL_AWAY]
|
|
||||||
self.assertEqual(
|
|
||||||
len(msgs),
|
|
||||||
0,
|
|
||||||
fail_msg="Expected no RPL_AWAY (301), got: {}",
|
|
||||||
extra_format=(msgs,),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.sendLine(2, "WHOIS bar")
|
|
||||||
msgs = [msg for msg in self.getMessages(2) if msg.command == RPL_AWAY]
|
|
||||||
self.assertEqual(
|
|
||||||
len(msgs),
|
|
||||||
1,
|
|
||||||
fail_msg="Expected one RPL_AWAY (301), got: {}",
|
|
||||||
extra_format=(msgs,),
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msgs[0], command=RPL_AWAY, params=["qux", "bar", "I'm not here right now"]
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testAwayUserhost(self):
|
|
||||||
"""
|
|
||||||
"Servers SHOULD notify clients when a user they're interacting with
|
|
||||||
is away when relevant"
|
|
||||||
-- https://modern.ircdocs.horse/#away-message
|
|
||||||
|
|
||||||
"<client> <nick> :<message>"
|
|
||||||
-- https://modern.ircdocs.horse/#rplaway-301
|
|
||||||
"""
|
|
||||||
self.connectClient("bar")
|
|
||||||
|
|
||||||
self.connectClient("qux")
|
|
||||||
self.sendLine(2, "USERHOST bar")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(2), command=RPL_USERHOST, params=["qux", StrRe(r"bar=\+.*")]
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
self.sendLine(2, "USERHOST bar")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(2), command=RPL_USERHOST, params=["qux", StrRe(r"bar=-.*")]
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testAwayEmptyMessage(self):
|
|
||||||
"""
|
|
||||||
"If [AWAY] is sent with a nonempty parameter (the 'away message')
|
|
||||||
then the user is set to be away. If this command is sent with no
|
|
||||||
parameters, or with the empty string as the parameter, the user is no
|
|
||||||
longer away."
|
|
||||||
-- https://modern.ircdocs.horse/#away-message
|
|
||||||
"""
|
|
||||||
self.connectClient("bar", name="bar")
|
|
||||||
self.connectClient("qux", name="qux")
|
|
||||||
|
|
||||||
self.sendLine("bar", "AWAY :I'm not here right now")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
self.assertIn(RPL_NOWAWAY, [msg.command for msg in replies])
|
|
||||||
self.sendLine("qux", "WHOIS bar")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
self.assertIn(RPL_WHOISUSER, [msg.command for msg in replies])
|
|
||||||
self.assertIn(RPL_AWAY, [msg.command for msg in replies])
|
|
||||||
|
|
||||||
# empty final parameter to AWAY is treated the same as no parameter,
|
|
||||||
# i.e., the client is considered to be no longer away
|
|
||||||
self.sendLine("bar", "AWAY :")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
self.assertIn(RPL_UNAWAY, [msg.command for msg in replies])
|
|
||||||
self.sendLine("qux", "WHOIS bar")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
self.assertIn(RPL_WHOISUSER, [msg.command for msg in replies])
|
|
||||||
self.assertNotIn(RPL_AWAY, [msg.command for msg in replies])
|
|
@ -1,62 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 away-notify <https://ircv3.net/specs/extensions/away-notify>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
|
|
||||||
|
|
||||||
class AwayNotifyTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_capabilities("away-notify")
|
|
||||||
def testAwayNotify(self):
|
|
||||||
"""Basic away-notify test."""
|
|
||||||
self.connectClient("foo", capabilities=["away-notify"], skip_if_cap_nak=True)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(2, "AWAY :i'm going away")
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
awayNotify = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(awayNotify, command="AWAY", params=["i'm going away"])
|
|
||||||
self.assertTrue(
|
|
||||||
awayNotify.prefix.startswith("bar!"),
|
|
||||||
"Unexpected away-notify source: %s" % (awayNotify.prefix,),
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("away-notify")
|
|
||||||
def testAwayNotifyOnJoin(self):
|
|
||||||
"""The away-notify specification states:
|
|
||||||
"Clients will be sent an AWAY message [...] when a user joins
|
|
||||||
and has an away message set."
|
|
||||||
"""
|
|
||||||
self.connectClient("foo", capabilities=["away-notify"], skip_if_cap_nak=True)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.sendLine(2, "AWAY :i'm already away")
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
messages = [msg for msg in self.getMessages(1) if msg.command == "AWAY"]
|
|
||||||
self.assertEqual(
|
|
||||||
len(messages),
|
|
||||||
1,
|
|
||||||
"Someone away joined a channel, "
|
|
||||||
"but users in the channel did not get AWAY messages.",
|
|
||||||
)
|
|
||||||
awayNotify = messages[0]
|
|
||||||
self.assertMessageMatch(awayNotify, command="AWAY", params=["i'm already away"])
|
|
||||||
self.assertTrue(
|
|
||||||
awayNotify.prefix.startswith("bar!"),
|
|
||||||
"Unexpected away-notify source: %s" % (awayNotify.prefix,),
|
|
||||||
)
|
|
@ -1,160 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 bot mode <https://ircv3.net/specs/extensions/bot-mode>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.numerics import RPL_WHOISBOT
|
|
||||||
from irctest.patma import ANYDICT, ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
@cases.mark_isupport("BOT")
|
|
||||||
class BotModeTestCase(cases.BaseServerTestCase):
|
|
||||||
def setUp(self):
|
|
||||||
super().setUp()
|
|
||||||
self.connectClient("modegettr")
|
|
||||||
if "BOT" not in self.server_support:
|
|
||||||
raise runner.IsupportTokenNotSupported("BOT")
|
|
||||||
self._mode_char = self.server_support["BOT"]
|
|
||||||
|
|
||||||
def _initBot(self):
|
|
||||||
self.assertEqual(
|
|
||||||
len(self._mode_char),
|
|
||||||
1,
|
|
||||||
fail_msg=(
|
|
||||||
f"BOT ISUPPORT token should be exactly one character, "
|
|
||||||
f"but is: {self._mode_char!r}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.connectClient("botnick", "bot")
|
|
||||||
|
|
||||||
self.sendLine("bot", f"MODE botnick +{self._mode_char}")
|
|
||||||
|
|
||||||
# Check echoed mode
|
|
||||||
while True:
|
|
||||||
msg = self.getMessage("bot")
|
|
||||||
if msg.command != "NOTICE":
|
|
||||||
# Unreal sends the BOTMOTD here
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msg,
|
|
||||||
command="MODE",
|
|
||||||
params=["botnick", StrRe(r"\+?" + self._mode_char)],
|
|
||||||
)
|
|
||||||
break
|
|
||||||
|
|
||||||
def testBotMode(self):
|
|
||||||
self._initBot()
|
|
||||||
|
|
||||||
def testBotWhois(self):
|
|
||||||
self._initBot()
|
|
||||||
|
|
||||||
self.connectClient("usernick", "user")
|
|
||||||
self.sendLine("user", "WHOIS botnick")
|
|
||||||
messages = self.getMessages("user")
|
|
||||||
messages = [msg for msg in messages if msg.command == RPL_WHOISBOT]
|
|
||||||
self.assertEqual(
|
|
||||||
len(messages),
|
|
||||||
1,
|
|
||||||
msg=(
|
|
||||||
f"Expected exactly one RPL_WHOISBOT ({RPL_WHOISBOT}), "
|
|
||||||
f"got: {messages}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
(message,) = messages
|
|
||||||
self.assertMessageMatch(
|
|
||||||
message, command=RPL_WHOISBOT, params=["usernick", "botnick", ANYSTR]
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["InspIRCd"],
|
|
||||||
"Uses only vendor tags for now: https://github.com/inspircd/inspircd/pull/1910",
|
|
||||||
)
|
|
||||||
def testBotPrivateMessage(self):
|
|
||||||
self._initBot()
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"usernick", "user", capabilities=["message-tags"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine("bot", "PRIVMSG usernick :beep boop")
|
|
||||||
self.getMessages("bot") # Synchronizes
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage("user"),
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["usernick", "beep boop"],
|
|
||||||
tags={StrRe("(draft/)?bot"): None, **ANYDICT},
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["InspIRCd"],
|
|
||||||
"Uses only vendor tags for now: https://github.com/inspircd/inspircd/pull/1910",
|
|
||||||
)
|
|
||||||
def testBotChannelMessage(self):
|
|
||||||
self._initBot()
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"usernick", "user", capabilities=["message-tags"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine("bot", "JOIN #chan")
|
|
||||||
self.sendLine("user", "JOIN #chan")
|
|
||||||
self.getMessages("bot")
|
|
||||||
self.getMessages("user")
|
|
||||||
|
|
||||||
self.sendLine("bot", "PRIVMSG #chan :beep boop")
|
|
||||||
self.getMessages("bot") # Synchronizes
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage("user"),
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=["#chan", "beep boop"],
|
|
||||||
tags={StrRe("(draft/)?bot"): None, **ANYDICT},
|
|
||||||
)
|
|
||||||
|
|
||||||
def testBotWhox(self):
|
|
||||||
self._initBot()
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"usernick", "user", capabilities=["message-tags"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine("bot", "JOIN #chan")
|
|
||||||
self.sendLine("user", "JOIN #chan")
|
|
||||||
self.getMessages("bot")
|
|
||||||
self.getMessages("user")
|
|
||||||
|
|
||||||
self.sendLine("user", "WHO #chan")
|
|
||||||
msg1 = self.getMessage("user")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msg1, command="352", fail_msg="Expected WHO response (352), got: {msg}"
|
|
||||||
)
|
|
||||||
msg2 = self.getMessage("user")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msg2, command="352", fail_msg="Expected WHO response (352), got: {msg}"
|
|
||||||
)
|
|
||||||
|
|
||||||
if msg1.params[5] == "botnick":
|
|
||||||
msg = msg1
|
|
||||||
elif msg2.params[5] == "botnick":
|
|
||||||
msg = msg2
|
|
||||||
else:
|
|
||||||
assert False, "No WHO response contained botnick"
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msg,
|
|
||||||
command="352",
|
|
||||||
params=[
|
|
||||||
"usernick",
|
|
||||||
"#chan",
|
|
||||||
ANYSTR, # ident
|
|
||||||
ANYSTR, # hostname
|
|
||||||
ANYSTR, # server
|
|
||||||
"botnick",
|
|
||||||
StrRe(f".*{self._mode_char}.*"),
|
|
||||||
ANYSTR, # realname
|
|
||||||
],
|
|
||||||
fail_msg="Expected WHO response with bot flag, got: {msg}",
|
|
||||||
)
|
|
@ -1,166 +0,0 @@
|
|||||||
"""
|
|
||||||
`Ergo <https://ergo.chat/>`_-specific tests of
|
|
||||||
`multiclient features
|
|
||||||
<https://github.com/ergochat/ergo/blob/master/docs/MANUAL.md#multiclient-bouncer>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.irc_utils.sasl import sasl_plain_blob
|
|
||||||
from irctest.numerics import ERR_NICKNAMEINUSE, RPL_WELCOME
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
class BouncerTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testBouncer(self):
|
|
||||||
"""Test basic bouncer functionality."""
|
|
||||||
self.controller.registerUser(self, "observer", "observerpassword")
|
|
||||||
self.controller.registerUser(self, "testuser", "mypassword")
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"observer", password="observerpassword", capabilities=["sasl"]
|
|
||||||
)
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.sendLine(1, "CAP REQ :message-tags server-time")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(2, "CAP LS 302")
|
|
||||||
self.sendLine(2, "AUTHENTICATE PLAIN")
|
|
||||||
self.sendLine(2, sasl_plain_blob("testuser", "mypassword"))
|
|
||||||
self.sendLine(2, "NICK testnick")
|
|
||||||
self.sendLine(2, "USER a 0 * a")
|
|
||||||
self.sendLine(2, "CAP REQ :server-time message-tags")
|
|
||||||
self.sendLine(2, "CAP END")
|
|
||||||
messages = self.getMessages(2)
|
|
||||||
welcomes = [message for message in messages if message.command == RPL_WELCOME]
|
|
||||||
self.assertEqual(len(welcomes), 1)
|
|
||||||
# should see a regburst for testnick
|
|
||||||
self.assertMessageMatch(welcomes[0], params=["testnick", ANYSTR])
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(3, "CAP LS 302")
|
|
||||||
self.sendLine(3, "AUTHENTICATE PLAIN")
|
|
||||||
self.sendLine(3, sasl_plain_blob("testuser", "mypassword"))
|
|
||||||
self.sendLine(3, "NICK testnick")
|
|
||||||
self.sendLine(3, "USER a 0 * a")
|
|
||||||
self.sendLine(3, "CAP REQ :server-time message-tags account-tag")
|
|
||||||
self.sendLine(3, "CAP END")
|
|
||||||
messages = self.getMessages(3)
|
|
||||||
welcomes = [message for message in messages if message.command == RPL_WELCOME]
|
|
||||||
self.assertEqual(len(welcomes), 1)
|
|
||||||
# should see the *same* regburst for testnick
|
|
||||||
self.assertMessageMatch(welcomes[0], params=["testnick", ANYSTR])
|
|
||||||
joins = [message for message in messages if message.command == "JOIN"]
|
|
||||||
# we should be automatically joined to #chan
|
|
||||||
self.assertMessageMatch(joins[0], params=["#chan"])
|
|
||||||
|
|
||||||
# disable multiclient in nickserv
|
|
||||||
self.sendLine(3, "NS SET MULTICLIENT OFF")
|
|
||||||
self.getMessages(3)
|
|
||||||
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(4, "CAP LS 302")
|
|
||||||
self.sendLine(4, "AUTHENTICATE PLAIN")
|
|
||||||
self.sendLine(4, sasl_plain_blob("testuser", "mypassword"))
|
|
||||||
self.sendLine(4, "NICK testnick")
|
|
||||||
self.sendLine(4, "USER a 0 * a")
|
|
||||||
self.sendLine(4, "CAP REQ :server-time message-tags")
|
|
||||||
self.sendLine(4, "CAP END")
|
|
||||||
# with multiclient disabled, we should not be able to attach to the nick
|
|
||||||
messages = self.getMessages(4)
|
|
||||||
welcomes = [message for message in messages if message.command == RPL_WELCOME]
|
|
||||||
self.assertEqual(len(welcomes), 0)
|
|
||||||
errors = [
|
|
||||||
message for message in messages if message.command == ERR_NICKNAMEINUSE
|
|
||||||
]
|
|
||||||
self.assertEqual(len(errors), 1)
|
|
||||||
|
|
||||||
self.sendLine(3, "NS SET MULTICLIENT ON")
|
|
||||||
self.getMessages(3)
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(5, "CAP LS 302")
|
|
||||||
self.sendLine(5, "AUTHENTICATE PLAIN")
|
|
||||||
self.sendLine(5, sasl_plain_blob("testuser", "mypassword"))
|
|
||||||
self.sendLine(5, "NICK testnick")
|
|
||||||
self.sendLine(5, "USER a 0 * a")
|
|
||||||
self.sendLine(5, "CAP REQ server-time")
|
|
||||||
self.sendLine(5, "CAP END")
|
|
||||||
messages = self.getMessages(5)
|
|
||||||
welcomes = [message for message in messages if message.command == RPL_WELCOME]
|
|
||||||
self.assertEqual(len(welcomes), 1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@+clientOnlyTag=Value PRIVMSG #chan :hey")
|
|
||||||
self.getMessages(1)
|
|
||||||
messagesfortwo = [
|
|
||||||
msg for msg in self.getMessages(2) if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
messagesforthree = [
|
|
||||||
msg for msg in self.getMessages(3) if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(messagesfortwo), 1)
|
|
||||||
self.assertEqual(len(messagesforthree), 1)
|
|
||||||
messagefortwo = messagesfortwo[0]
|
|
||||||
messageforthree = messagesforthree[0]
|
|
||||||
messageforfive = self.getMessage(5)
|
|
||||||
self.assertMessageMatch(messagefortwo, params=["#chan", "hey"])
|
|
||||||
self.assertMessageMatch(messageforthree, params=["#chan", "hey"])
|
|
||||||
self.assertMessageMatch(messageforfive, params=["#chan", "hey"])
|
|
||||||
self.assertIn("time", messagefortwo.tags)
|
|
||||||
self.assertIn("time", messageforthree.tags)
|
|
||||||
self.assertIn("time", messageforfive.tags)
|
|
||||||
# 3 has account-tag
|
|
||||||
self.assertIn("account", messageforthree.tags)
|
|
||||||
# should get same msgid
|
|
||||||
self.assertEqual(messagefortwo.tags["msgid"], messageforthree.tags["msgid"])
|
|
||||||
# 5 only has server-time, shouldn't get account or msgid tags
|
|
||||||
self.assertNotIn("account", messageforfive.tags)
|
|
||||||
self.assertNotIn("msgid", messageforfive.tags)
|
|
||||||
|
|
||||||
# test that copies of sent messages go out to other sessions
|
|
||||||
self.sendLine(2, "PRIVMSG observer :this is a direct message")
|
|
||||||
self.getMessages(2)
|
|
||||||
messageForRecipient = [
|
|
||||||
msg for msg in self.getMessages(1) if msg.command == "PRIVMSG"
|
|
||||||
][0]
|
|
||||||
copyForOtherSession = [
|
|
||||||
msg for msg in self.getMessages(3) if msg.command == "PRIVMSG"
|
|
||||||
][0]
|
|
||||||
self.assertEqual(messageForRecipient.params, copyForOtherSession.params)
|
|
||||||
self.assertEqual(
|
|
||||||
messageForRecipient.tags["msgid"], copyForOtherSession.tags["msgid"]
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(2, "QUIT :two out")
|
|
||||||
quitLines = [msg for msg in self.getMessages(2) if msg.command == "QUIT"]
|
|
||||||
self.assertEqual(len(quitLines), 1)
|
|
||||||
self.assertMessageMatch(quitLines[0], params=[StrRe(".*two out.*")])
|
|
||||||
# neither the observer nor the other attached session should see a quit here
|
|
||||||
quitLines = [msg for msg in self.getMessages(1) if msg.command == "QUIT"]
|
|
||||||
self.assertEqual(quitLines, [])
|
|
||||||
quitLines = [msg for msg in self.getMessages(3) if msg.command == "QUIT"]
|
|
||||||
self.assertEqual(quitLines, [])
|
|
||||||
|
|
||||||
# session 3 should be untouched at this point
|
|
||||||
self.sendLine(1, "@+clientOnlyTag=Value PRIVMSG #chan :hey again")
|
|
||||||
self.getMessages(1)
|
|
||||||
messagesforthree = [
|
|
||||||
msg for msg in self.getMessages(3) if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(messagesforthree), 1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messagesforthree[0], command="PRIVMSG", params=["#chan", "hey again"]
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(5, "QUIT :five out")
|
|
||||||
self.getMessages(5)
|
|
||||||
self.sendLine(3, "QUIT :three out")
|
|
||||||
quitLines = [msg for msg in self.getMessages(3) if msg.command == "QUIT"]
|
|
||||||
self.assertEqual(len(quitLines), 1)
|
|
||||||
self.assertMessageMatch(quitLines[0], params=[StrRe(".*three out.*")])
|
|
||||||
# observer should see *this* quit
|
|
||||||
quitLines = [msg for msg in self.getMessages(1) if msg.command == "QUIT"]
|
|
||||||
self.assertEqual(len(quitLines), 1)
|
|
||||||
self.assertMessageMatch(quitLines[0], params=[StrRe(".*three out.*")])
|
|
@ -1,146 +0,0 @@
|
|||||||
"""
|
|
||||||
Sends packets with various length to check the server reassembles them
|
|
||||||
correctly. Also checks truncation.
|
|
||||||
"""
|
|
||||||
|
|
||||||
import socket
|
|
||||||
import time
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.irc_utils import message_parser
|
|
||||||
from irctest.numerics import ERR_INPUTTOOLONG
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
|
|
||||||
def _sendWhole(self, line):
|
|
||||||
print("(repr) 1 -> S", repr(line.encode()))
|
|
||||||
self.clients[1].conn.sendall(line.encode())
|
|
||||||
|
|
||||||
|
|
||||||
def _sendCharPerChar(self, line):
|
|
||||||
print("(repr) 1 -> S", repr(line.encode()))
|
|
||||||
for char in line:
|
|
||||||
self.clients[1].conn.sendall(char.encode())
|
|
||||||
|
|
||||||
|
|
||||||
def _sendBytePerByte(self, line):
|
|
||||||
print("(repr) 1 -> S", repr(line.encode()))
|
|
||||||
for byte in line.encode():
|
|
||||||
self.clients[1].conn.sendall(bytes([byte]))
|
|
||||||
|
|
||||||
|
|
||||||
class BufferingTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Bahamut"],
|
|
||||||
"cannot pass because of issues with UTF-8 handling: "
|
|
||||||
"https://github.com/DALnet/bahamut/issues/196",
|
|
||||||
)
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["ircu2", "Nefarious", "snircd"],
|
|
||||||
"ircu2 discards the whole buffer on long lines "
|
|
||||||
"(TODO: refine how we exclude these tests)",
|
|
||||||
)
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"sender_function,colon",
|
|
||||||
[
|
|
||||||
pytest.param(_sendWhole, "", id="whole-no colon"),
|
|
||||||
pytest.param(_sendCharPerChar, "", id="charperchar-no colon"),
|
|
||||||
pytest.param(_sendBytePerByte, "", id="byteperbyte-no colon"),
|
|
||||||
pytest.param(_sendWhole, ":", id="whole-colon"),
|
|
||||||
pytest.param(_sendCharPerChar, ":", id="charperchar-colon"),
|
|
||||||
pytest.param(_sendBytePerByte, ":", id="byteperbyte-colon"),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
def testNoTags(self, sender_function, colon):
|
|
||||||
self.connectClient("nick1")
|
|
||||||
self.connectClient("nick2")
|
|
||||||
|
|
||||||
overhead = self.get_overhead(1, 2, colon=colon)
|
|
||||||
print(f"overhead is {overhead}")
|
|
||||||
|
|
||||||
line = f"PRIVMSG nick2 {colon}"
|
|
||||||
remaining_size = 512 - len(line) - len("\r\n")
|
|
||||||
emoji_size = len("😃".encode())
|
|
||||||
payloads = [
|
|
||||||
# one byte:
|
|
||||||
"a",
|
|
||||||
# one multi-byte char:
|
|
||||||
"😃",
|
|
||||||
# full payload, will be truncated
|
|
||||||
"a" * remaining_size,
|
|
||||||
"a" * (remaining_size - emoji_size) + "😃",
|
|
||||||
# full payload to recipient:
|
|
||||||
"a" * (remaining_size - overhead),
|
|
||||||
"a" * (remaining_size - emoji_size - overhead) + "😃",
|
|
||||||
# full payload to recipient plus one byte:
|
|
||||||
"a" * (remaining_size - overhead + 1),
|
|
||||||
"a" * (remaining_size - emoji_size - overhead + 1) + "😃",
|
|
||||||
# full payload to recipient plus two bytes:
|
|
||||||
"a" * (remaining_size - emoji_size - overhead + 1) + "😃",
|
|
||||||
]
|
|
||||||
for payload in payloads:
|
|
||||||
sender_function(self, line + payload + "\r\n")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
if messages and ERR_INPUTTOOLONG in (m.command for m in messages):
|
|
||||||
# https://defs.ircdocs.horse/defs/numerics.html#err-inputtoolong-417
|
|
||||||
self.assertGreater(
|
|
||||||
len(line + payload + "\r\n"),
|
|
||||||
512 - overhead,
|
|
||||||
"Got ERR_INPUTTOOLONG for a messag that should fit "
|
|
||||||
"withing 512 characters.",
|
|
||||||
)
|
|
||||||
continue
|
|
||||||
|
|
||||||
received_line = self._getLine(2)
|
|
||||||
print("(repr) S -> 2", repr(received_line))
|
|
||||||
try:
|
|
||||||
decoded_line = received_line.decode()
|
|
||||||
except UnicodeDecodeError:
|
|
||||||
# server truncated a byte off the emoji at the end
|
|
||||||
if "UTF8ONLY" in self.server_support:
|
|
||||||
# https://github.com/ircv3/ircv3-specifications/pull/432
|
|
||||||
raise self.failureException(
|
|
||||||
f"Server advertizes UTF8ONLY, but sent an invalid UTF8 "
|
|
||||||
f"message: {received_line!r}"
|
|
||||||
)
|
|
||||||
payload_intact = False
|
|
||||||
else:
|
|
||||||
msg = message_parser.parse_message(decoded_line)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msg, command="PRIVMSG", params=["nick2", ANYSTR]
|
|
||||||
)
|
|
||||||
payload_intact = msg.params[1] == payload
|
|
||||||
if not payload_intact:
|
|
||||||
# truncated
|
|
||||||
self.assertLessEqual(len(received_line), 512, received_line)
|
|
||||||
if received_line.endswith(b"[CUT]\r\n"):
|
|
||||||
# ngircd
|
|
||||||
received_line = received_line[0:-7] + b"\r\n"
|
|
||||||
self.assertTrue(
|
|
||||||
payload.encode().startswith(
|
|
||||||
received_line.split(b" ")[-1].strip().lstrip(b":")
|
|
||||||
),
|
|
||||||
f"expected payload to be a prefix of {payload!r}, "
|
|
||||||
f"but got {payload!r}",
|
|
||||||
)
|
|
||||||
|
|
||||||
def get_overhead(self, client1, client2, colon):
|
|
||||||
self.sendLine(client1, f"PRIVMSG nick2 {colon}a\r\n")
|
|
||||||
line = self._getLine(client2)
|
|
||||||
return len(line) - len(f"PRIVMSG nick2 {colon}a\r\n")
|
|
||||||
|
|
||||||
def _getLine(self, client) -> bytes:
|
|
||||||
line = b""
|
|
||||||
for _ in range(30):
|
|
||||||
try:
|
|
||||||
data = self.clients[client].conn.recv(4096)
|
|
||||||
except socket.timeout:
|
|
||||||
data = b""
|
|
||||||
line += data
|
|
||||||
if data.endswith(b"\r\n"):
|
|
||||||
return line
|
|
||||||
time.sleep(0.1)
|
|
||||||
print(f"{client}: Waiting...")
|
|
||||||
return line
|
|
@ -1,244 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 Capability negotiation
|
|
||||||
<https://ircv3.net/specs/extensions/capability-negotiation>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
from irctest.runner import CapabilityNotSupported, ImplementationChoice
|
|
||||||
|
|
||||||
|
|
||||||
class CapTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testNoReq(self):
|
|
||||||
"""Test the server handles gracefully clients which do not send
|
|
||||||
REQs.
|
|
||||||
|
|
||||||
“Clients that support capabilities but do not wish to enter
|
|
||||||
negotiation SHOULD send CAP END upon connection to the server.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.1.html#the-cap-end-subcommand>
|
|
||||||
""" # noqa
|
|
||||||
self.addClient(1)
|
|
||||||
self.sendLine(1, "CAP LS 302")
|
|
||||||
self.getCapLs(1)
|
|
||||||
self.sendLine(1, "USER foo foo foo :foo")
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "CAP END")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="001", fail_msg="Expected 001 after sending CAP END, got {msg}."
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testReqUnavailable(self):
|
|
||||||
"""Test the server handles gracefully clients which request
|
|
||||||
capabilities that are not available.
|
|
||||||
<http://ircv3.net/specs/core/capability-negotiation-3.1.html>
|
|
||||||
"""
|
|
||||||
self.addClient(1)
|
|
||||||
self.sendLine(1, "CAP LS 302")
|
|
||||||
self.getCapLs(1)
|
|
||||||
self.sendLine(1, "USER foo foo foo :foo")
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "CAP REQ :foo")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "NAK", "foo"],
|
|
||||||
fail_msg="Expected CAP NAK after requesting non-existing "
|
|
||||||
"capability, got {msg}.",
|
|
||||||
)
|
|
||||||
self.sendLine(1, "CAP END")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="001", fail_msg="Expected 001 after sending CAP END, got {msg}."
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testNakExactString(self):
|
|
||||||
"""“The argument of the NAK subcommand MUST consist of at least the
|
|
||||||
first 100 characters of the capability list in the REQ subcommand which
|
|
||||||
triggered the NAK.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.1.html#the-cap-nak-subcommand>
|
|
||||||
""" # noqa
|
|
||||||
self.addClient(1)
|
|
||||||
self.sendLine(1, "CAP LS 302")
|
|
||||||
self.getCapLs(1)
|
|
||||||
# Five should be enough to check there is no reordering, even
|
|
||||||
# alphabetical
|
|
||||||
self.sendLine(1, "CAP REQ :foo qux bar baz qux quux")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "NAK", "foo qux bar baz qux quux"],
|
|
||||||
fail_msg="Expected “CAP NAK :foo qux bar baz qux quux” after "
|
|
||||||
"sending “CAP REQ :foo qux bar baz qux quux”, but got {msg}.",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["UnrealIRCd"],
|
|
||||||
"UnrealIRCd sends a trailing space on CAP NAK: https://github.com/unrealircd/unrealircd/pull/148",
|
|
||||||
)
|
|
||||||
def testNakWhole(self):
|
|
||||||
"""“The capability identifier set must be accepted as a whole, or
|
|
||||||
rejected entirely.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.1.html#the-cap-req-subcommand>
|
|
||||||
""" # noqa
|
|
||||||
self.addClient(1)
|
|
||||||
self.sendLine(1, "CAP LS 302")
|
|
||||||
self.assertIn("multi-prefix", self.getCapLs(1))
|
|
||||||
self.sendLine(1, "CAP REQ :foo multi-prefix bar")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "NAK", "foo multi-prefix bar"],
|
|
||||||
fail_msg="Expected “CAP NAK :foo multi-prefix bar” after "
|
|
||||||
"sending “CAP REQ :foo multi-prefix bar”, but got {msg}.",
|
|
||||||
)
|
|
||||||
self.sendLine(1, "CAP REQ :multi-prefix bar")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "NAK", "multi-prefix bar"],
|
|
||||||
fail_msg="Expected “CAP NAK :multi-prefix bar” after "
|
|
||||||
"sending “CAP REQ :multi-prefix bar”, but got {msg}.",
|
|
||||||
)
|
|
||||||
self.sendLine(1, "CAP REQ :foo multi-prefix")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "NAK", "foo multi-prefix"],
|
|
||||||
fail_msg="Expected “CAP NAK :foo multi-prefix” after "
|
|
||||||
"sending “CAP REQ :foo multi-prefix”, but got {msg}.",
|
|
||||||
)
|
|
||||||
# TODO: make sure multi-prefix is not enabled at this point
|
|
||||||
self.sendLine(1, "CAP REQ :multi-prefix")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=[ANYSTR, "ACK", "multi-prefix"],
|
|
||||||
fail_msg="Expected “CAP ACK :multi-prefix” after "
|
|
||||||
"sending “CAP REQ :multi-prefix”, but got {msg}.",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["UnrealIRCd"],
|
|
||||||
"UnrealIRCd sends a trailing space on CAP NAK: https://github.com/unrealircd/unrealircd/pull/148",
|
|
||||||
)
|
|
||||||
def testCapRemovalByClient(self):
|
|
||||||
"""Test CAP LIST and removal of caps via CAP REQ :-tagname."""
|
|
||||||
cap1 = "echo-message"
|
|
||||||
cap2 = "server-time"
|
|
||||||
self.addClient(1)
|
|
||||||
self.connectClient("sender")
|
|
||||||
self.sendLine(1, "CAP LS 302")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
if not ({cap1, cap2} <= set(m.params[2].split())):
|
|
||||||
raise CapabilityNotSupported(f"{cap1} or {cap2}")
|
|
||||||
self.sendLine(1, f"CAP REQ :{cap1} {cap2}")
|
|
||||||
self.sendLine(1, "nick bar")
|
|
||||||
self.sendLine(1, "user user 0 * realname")
|
|
||||||
self.sendLine(1, "CAP END")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(m, command="CAP", params=[ANYSTR, "ACK", ANYSTR])
|
|
||||||
self.assertEqual(
|
|
||||||
set(m.params[2].split()), {cap1, cap2}, "Didn't ACK both REQed caps"
|
|
||||||
)
|
|
||||||
self.skipToWelcome(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "CAP LIST")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
cap_list = [m for m in messages if m.command == "CAP"][0]
|
|
||||||
enabled_caps = set(cap_list.params[2].split())
|
|
||||||
enabled_caps.discard("cap-notify") # implicitly added by some impls
|
|
||||||
self.assertEqual(enabled_caps, {cap1, cap2})
|
|
||||||
|
|
||||||
self.sendLine(2, "PRIVMSG bar :hi")
|
|
||||||
self.getMessages(2) # Synchronize
|
|
||||||
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertIn("time", m.tags, m)
|
|
||||||
|
|
||||||
# remove the server-time cap
|
|
||||||
self.sendLine(1, f"CAP REQ :-{cap2}")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
# Must be either ACK or NAK
|
|
||||||
if self.messageDiffers(m, command="CAP", params=[ANYSTR, "ACK", f"-{cap2}"]):
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="CAP", params=[ANYSTR, "NAK", f"-{cap2}"]
|
|
||||||
)
|
|
||||||
raise ImplementationChoice(f"Does not support CAP REQ -{cap2}")
|
|
||||||
|
|
||||||
# server-time should be disabled
|
|
||||||
self.sendLine(1, "CAP LIST")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
cap_list = [m for m in messages if m.command == "CAP"][0]
|
|
||||||
enabled_caps = set(cap_list.params[2].split())
|
|
||||||
enabled_caps.discard("cap-notify") # implicitly added by some impls
|
|
||||||
self.assertEqual(enabled_caps, {cap1})
|
|
||||||
self.assertNotIn("time", cap_list.tags)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testIrc301CapLs(self):
|
|
||||||
"""
|
|
||||||
Current version:
|
|
||||||
|
|
||||||
"The LS subcommand is used to list the capabilities supported by the server.
|
|
||||||
The client should send an LS subcommand with no other arguments to solicit
|
|
||||||
a list of all capabilities."
|
|
||||||
|
|
||||||
"If a client has not indicated support for CAP LS 302 features,
|
|
||||||
the server MUST NOT send these new features to the client."
|
|
||||||
-- <https://ircv3.net/specs/core/capability-negotiation.html>
|
|
||||||
|
|
||||||
Before the v3.1 / v3.2 merge:
|
|
||||||
|
|
||||||
IRCv3.1: “The LS subcommand is used to list the capabilities
|
|
||||||
supported by the server. The client should send an LS subcommand with
|
|
||||||
no other arguments to solicit a list of all capabilities.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.1.html#the-cap-ls-subcommand>
|
|
||||||
|
|
||||||
IRCv3.2: “Servers MUST NOT send messages described by this document if
|
|
||||||
the client only supports version 3.1.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.2.html#version-in-cap-ls>
|
|
||||||
""" # noqa
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "CAP LS")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertNotEqual(
|
|
||||||
m.params[2],
|
|
||||||
"*",
|
|
||||||
m,
|
|
||||||
fail_msg="Server replied with multi-line CAP LS to a "
|
|
||||||
"“CAP LS” (ie. IRCv3.1) request: {msg}",
|
|
||||||
)
|
|
||||||
self.assertFalse(
|
|
||||||
any("=" in cap for cap in m.params[2].split()),
|
|
||||||
"Server replied with a name-value capability in "
|
|
||||||
"CAP LS reply as a response to “CAP LS” (ie. IRCv3.1) "
|
|
||||||
"request: {}".format(m),
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
def testEmptyCapList(self):
|
|
||||||
"""“If no capabilities are active, an empty parameter must be sent.”
|
|
||||||
-- <http://ircv3.net/specs/core/capability-negotiation-3.1.html#the-cap-list-subcommand>
|
|
||||||
""" # noqa
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "CAP LIST")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="CAP",
|
|
||||||
params=["*", "LIST", ""],
|
|
||||||
fail_msg="Sending “CAP LIST” as first message got a reply "
|
|
||||||
"that is not “CAP * LIST :”: {msg}",
|
|
||||||
)
|
|
@ -1,65 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel casemapping
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases, client_mock, runner
|
|
||||||
|
|
||||||
|
|
||||||
class ChannelCaseSensitivityTestCase(cases.BaseServerTestCase):
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"casemapping,name1,name2",
|
|
||||||
[
|
|
||||||
("ascii", "#Foo", "#foo"),
|
|
||||||
("rfc1459", "#Foo", "#foo"),
|
|
||||||
("rfc1459", "#F]|oo{", "#f}\\oo["),
|
|
||||||
("rfc1459", "#F}o\\o[", "#f]o|o{"),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", strict=True)
|
|
||||||
def testChannelsEquivalent(self, casemapping, name1, name2):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
if self.server_support["CASEMAPPING"] != casemapping:
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"Casemapping {} not implemented".format(casemapping)
|
|
||||||
)
|
|
||||||
self.joinClient(1, name1)
|
|
||||||
self.joinClient(2, name2)
|
|
||||||
try:
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(m, command="JOIN", nick="bar")
|
|
||||||
except client_mock.NoMessageException:
|
|
||||||
raise AssertionError(
|
|
||||||
"Channel names {} and {} are not equivalent.".format(name1, name2)
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"casemapping,name1,name2",
|
|
||||||
[
|
|
||||||
("ascii", "#Foo", "#fooa"),
|
|
||||||
("rfc1459", "#Foo", "#fooa"),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", strict=True)
|
|
||||||
def testChannelsNotEquivalent(self, casemapping, name1, name2):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
if self.server_support["CASEMAPPING"] != casemapping:
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"Casemapping {} not implemented".format(casemapping)
|
|
||||||
)
|
|
||||||
self.joinClient(1, name1)
|
|
||||||
self.joinClient(2, name2)
|
|
||||||
try:
|
|
||||||
m = self.getMessage(1)
|
|
||||||
except client_mock.NoMessageException:
|
|
||||||
pass
|
|
||||||
else:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="JOIN", nick="bar"
|
|
||||||
) # This should always be true
|
|
||||||
raise AssertionError(
|
|
||||||
"Channel names {} and {} are equivalent.".format(name1, name2)
|
|
||||||
)
|
|
@ -1,58 +0,0 @@
|
|||||||
"""
|
|
||||||
`Ergo <https://ergo.chat/>`_-specific tests of channel forwarding
|
|
||||||
|
|
||||||
TODO: Should be extended to other servers, once a specification is written.
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_CHANOPRIVSNEEDED, ERR_INVALIDMODEPARAM, ERR_LINKCHANNEL
|
|
||||||
|
|
||||||
MODERN_CAPS = [
|
|
||||||
"server-time",
|
|
||||||
"message-tags",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"echo-message",
|
|
||||||
"account-tag",
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
class ChannelForwardingTestCase(cases.BaseServerTestCase):
|
|
||||||
"""Test the +f channel forwarding mode."""
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testChannelForwarding(self):
|
|
||||||
self.connectClient("bar", name="bar", capabilities=MODERN_CAPS)
|
|
||||||
self.connectClient("baz", name="baz", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("bar", "#bar")
|
|
||||||
self.joinChannel("bar", "#bar_two")
|
|
||||||
self.joinChannel("baz", "#baz")
|
|
||||||
|
|
||||||
self.sendLine("bar", "MODE #bar +f #nonexistent")
|
|
||||||
msg = self.getMessage("bar")
|
|
||||||
self.assertMessageMatch(msg, command=ERR_INVALIDMODEPARAM)
|
|
||||||
|
|
||||||
# need chanops in the target channel as well
|
|
||||||
self.sendLine("bar", "MODE #bar +f #baz")
|
|
||||||
responses = set(msg.command for msg in self.getMessages("bar"))
|
|
||||||
self.assertIn(ERR_CHANOPRIVSNEEDED, responses)
|
|
||||||
|
|
||||||
self.sendLine("bar", "MODE #bar +f #bar_two")
|
|
||||||
msg = self.getMessage("bar")
|
|
||||||
self.assertMessageMatch(msg, command="MODE", params=["#bar", "+f", "#bar_two"])
|
|
||||||
|
|
||||||
# can still join the channel fine
|
|
||||||
self.joinChannel("baz", "#bar")
|
|
||||||
self.sendLine("baz", "PART #bar")
|
|
||||||
self.getMessages("baz")
|
|
||||||
|
|
||||||
# now make it invite-only, which should cause forwarding
|
|
||||||
self.sendLine("bar", "MODE #bar +i")
|
|
||||||
self.getMessages("bar")
|
|
||||||
|
|
||||||
self.sendLine("baz", "JOIN #bar")
|
|
||||||
msgs = self.getMessages("baz")
|
|
||||||
forward = [msg for msg in msgs if msg.command == ERR_LINKCHANNEL]
|
|
||||||
self.assertEqual(forward[0].params[:3], ["baz", "#bar", "#bar_two"])
|
|
||||||
join = [msg for msg in msgs if msg.command == "JOIN"]
|
|
||||||
self.assertMessageMatch(join[0], params=["#bar_two"])
|
|
@ -1,57 +0,0 @@
|
|||||||
"""
|
|
||||||
`Draft IRCv3 channel-rename <https://ircv3.net/specs/extensions/channel-rename>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_CHANOPRIVSNEEDED
|
|
||||||
|
|
||||||
RENAME_CAP = "draft/channel-rename"
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
class ChannelRenameTestCase(cases.BaseServerTestCase):
|
|
||||||
"""Basic tests for channel-rename."""
|
|
||||||
|
|
||||||
def testChannelRename(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar", name="bar", capabilities=[RENAME_CAP], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
self.connectClient("baz", name="baz")
|
|
||||||
self.joinChannel("bar", "#bar")
|
|
||||||
self.joinChannel("baz", "#bar")
|
|
||||||
self.getMessages("bar")
|
|
||||||
self.getMessages("baz")
|
|
||||||
|
|
||||||
self.sendLine("bar", "RENAME #bar #qux :no reason")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage("bar"),
|
|
||||||
command="RENAME",
|
|
||||||
params=["#bar", "#qux", "no reason"],
|
|
||||||
)
|
|
||||||
legacy_responses = self.getMessages("baz")
|
|
||||||
self.assertEqual(
|
|
||||||
1,
|
|
||||||
len(
|
|
||||||
[
|
|
||||||
msg
|
|
||||||
for msg in legacy_responses
|
|
||||||
if msg.command == "PART" and msg.params[0] == "#bar"
|
|
||||||
]
|
|
||||||
),
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
1,
|
|
||||||
len(
|
|
||||||
[
|
|
||||||
msg
|
|
||||||
for msg in legacy_responses
|
|
||||||
if msg.command == "JOIN" and msg.params == ["#qux"]
|
|
||||||
]
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.joinChannel("baz", "#bar")
|
|
||||||
self.sendLine("baz", "MODE #bar +k beer")
|
|
||||||
self.assertNotIn(
|
|
||||||
ERR_CHANOPRIVSNEEDED, [msg.command for msg in self.getMessages("baz")]
|
|
||||||
)
|
|
@ -1,740 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 draft chathistory <https://ircv3.net/specs/extensions/chathistory>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
import functools
|
|
||||||
import secrets
|
|
||||||
import time
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.irc_utils.junkdrawer import random_name
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
CHATHISTORY_CAP = "draft/chathistory"
|
|
||||||
EVENT_PLAYBACK_CAP = "draft/event-playback"
|
|
||||||
|
|
||||||
# Keep this in sync with validate_chathistory()
|
|
||||||
SUBCOMMANDS = ["LATEST", "BEFORE", "AFTER", "BETWEEN", "AROUND"]
|
|
||||||
|
|
||||||
MYSQL_PASSWORD = ""
|
|
||||||
|
|
||||||
|
|
||||||
def validate_chathistory_batch(msgs):
|
|
||||||
batch_tag = None
|
|
||||||
closed_batch_tag = None
|
|
||||||
result = []
|
|
||||||
for msg in msgs:
|
|
||||||
if msg.command == "BATCH":
|
|
||||||
batch_param = msg.params[0]
|
|
||||||
if batch_tag is None and batch_param[0] == "+":
|
|
||||||
batch_tag = batch_param[1:]
|
|
||||||
elif batch_param[0] == "-":
|
|
||||||
closed_batch_tag = batch_param[1:]
|
|
||||||
elif (
|
|
||||||
msg.command == "PRIVMSG"
|
|
||||||
and batch_tag is not None
|
|
||||||
and msg.tags.get("batch") == batch_tag
|
|
||||||
):
|
|
||||||
if not msg.prefix.startswith("HistServ!"): # FIXME: ergo-specific
|
|
||||||
result.append(msg.to_history_message())
|
|
||||||
assert batch_tag == closed_batch_tag
|
|
||||||
return result
|
|
||||||
|
|
||||||
|
|
||||||
def skip_ngircd(f):
|
|
||||||
@functools.wraps(f)
|
|
||||||
def newf(self, *args, **kwargs):
|
|
||||||
if self.controller.software_name == "ngIRCd":
|
|
||||||
raise runner.OptionalExtensionNotSupported("nicks longer 9 characters")
|
|
||||||
return f(self, *args, **kwargs)
|
|
||||||
|
|
||||||
return newf
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_specifications("IRCv3")
|
|
||||||
@cases.mark_services
|
|
||||||
class ChathistoryTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(chathistory=True)
|
|
||||||
|
|
||||||
@skip_ngircd
|
|
||||||
def testInvalidTargets(self):
|
|
||||||
bar, pw = random_name("bar"), random_name("pw")
|
|
||||||
self.controller.registerUser(self, bar, pw)
|
|
||||||
self.connectClient(
|
|
||||||
bar,
|
|
||||||
name=bar,
|
|
||||||
capabilities=[
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password=pw,
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(bar)
|
|
||||||
|
|
||||||
qux = random_name("qux")
|
|
||||||
real_chname = random_name("#real_channel")
|
|
||||||
self.connectClient(qux, name=qux)
|
|
||||||
self.joinChannel(qux, real_chname)
|
|
||||||
self.getMessages(qux)
|
|
||||||
|
|
||||||
# test a nonexistent channel
|
|
||||||
self.sendLine(bar, "CHATHISTORY LATEST #nonexistent_channel * 10")
|
|
||||||
msgs = self.getMessages(bar)
|
|
||||||
msgs = [msg for msg in msgs if msg.command != "MODE"] # :NickServ MODE +r
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msgs[0],
|
|
||||||
command="FAIL",
|
|
||||||
params=["CHATHISTORY", "INVALID_TARGET", "LATEST", ANYSTR, ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
# as should a real channel to which one is not joined:
|
|
||||||
self.sendLine(bar, "CHATHISTORY LATEST %s * 10" % (real_chname,))
|
|
||||||
msgs = self.getMessages(bar)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
msgs[0],
|
|
||||||
command="FAIL",
|
|
||||||
params=["CHATHISTORY", "INVALID_TARGET", "LATEST", ANYSTR, ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.private_chathistory
|
|
||||||
@skip_ngircd
|
|
||||||
def testMessagesToSelf(self):
|
|
||||||
bar, pw = random_name("bar"), random_name("pw")
|
|
||||||
self.controller.registerUser(self, bar, pw)
|
|
||||||
self.connectClient(
|
|
||||||
bar,
|
|
||||||
name=bar,
|
|
||||||
capabilities=[
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"message-tags",
|
|
||||||
"sasl",
|
|
||||||
"server-time",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password=pw,
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(bar)
|
|
||||||
|
|
||||||
messages = []
|
|
||||||
|
|
||||||
self.sendLine(bar, "PRIVMSG %s :this is a privmsg sent to myself" % (bar,))
|
|
||||||
replies = [msg for msg in self.getMessages(bar) if msg.command == "PRIVMSG"]
|
|
||||||
self.assertEqual(len(replies), 1)
|
|
||||||
msg = replies[0]
|
|
||||||
self.assertMessageMatch(msg, params=[bar, "this is a privmsg sent to myself"])
|
|
||||||
messages.append(msg.to_history_message())
|
|
||||||
|
|
||||||
self.sendLine(bar, "CAP REQ echo-message")
|
|
||||||
self.getMessages(bar)
|
|
||||||
self.sendLine(
|
|
||||||
bar, "PRIVMSG %s :this is a second privmsg sent to myself" % (bar,)
|
|
||||||
)
|
|
||||||
replies = [msg for msg in self.getMessages(bar) if msg.command == "PRIVMSG"]
|
|
||||||
# two messages, the echo and the delivery
|
|
||||||
self.assertEqual(len(replies), 2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
replies[0], params=[bar, "this is a second privmsg sent to myself"]
|
|
||||||
)
|
|
||||||
messages.append(replies[0].to_history_message())
|
|
||||||
# messages should be otherwise identical
|
|
||||||
self.assertEqual(
|
|
||||||
replies[0].to_history_message(), replies[1].to_history_message()
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
bar,
|
|
||||||
"@label=xyz PRIVMSG %s :this is a third privmsg sent to myself" % (bar,),
|
|
||||||
)
|
|
||||||
replies = [msg for msg in self.getMessages(bar) if msg.command == "PRIVMSG"]
|
|
||||||
self.assertEqual(len(replies), 2)
|
|
||||||
# exactly one of the replies MUST be labeled
|
|
||||||
echo = [msg for msg in replies if msg.tags.get("label") == "xyz"][0]
|
|
||||||
delivery = [msg for msg in replies if msg.tags.get("label") is None][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
echo, params=[bar, "this is a third privmsg sent to myself"]
|
|
||||||
)
|
|
||||||
messages.append(echo.to_history_message())
|
|
||||||
self.assertEqual(echo.to_history_message(), delivery.to_history_message())
|
|
||||||
|
|
||||||
self.sendLine(bar, "CHATHISTORY LATEST %s * 10" % (bar,))
|
|
||||||
replies = [msg for msg in self.getMessages(bar) if msg.command == "PRIVMSG"]
|
|
||||||
self.assertEqual([msg.to_history_message() for msg in replies], messages)
|
|
||||||
|
|
||||||
def validate_echo_messages(self, num_messages, echo_messages):
|
|
||||||
# sanity checks: should have received the correct number of echo messages,
|
|
||||||
# all with distinct time tags (because we slept) and msgids
|
|
||||||
self.assertEqual(len(echo_messages), num_messages)
|
|
||||||
self.assertEqual(len(set(msg.msgid for msg in echo_messages)), num_messages)
|
|
||||||
self.assertEqual(len(set(msg.time for msg in echo_messages)), num_messages)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("subcommand", SUBCOMMANDS)
|
|
||||||
@skip_ngircd
|
|
||||||
def testChathistory(self, subcommand):
|
|
||||||
if subcommand == "BETWEEN" and self.controller.software_name == "UnrealIRCd":
|
|
||||||
pytest.xfail(
|
|
||||||
"CHATHISTORY BETWEEN does not apply bounds correct "
|
|
||||||
"https://bugs.unrealircd.org/view.php?id=5952"
|
|
||||||
)
|
|
||||||
if subcommand == "AROUND" and self.controller.software_name == "UnrealIRCd":
|
|
||||||
pytest.xfail(
|
|
||||||
"CHATHISTORY AROUND excludes 'central' messages "
|
|
||||||
"https://bugs.unrealircd.org/view.php?id=5953"
|
|
||||||
)
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
chname = "#chan" + secrets.token_hex(12)
|
|
||||||
self.joinChannel(1, chname)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
NUM_MESSAGES = 10
|
|
||||||
echo_messages = []
|
|
||||||
for i in range(NUM_MESSAGES):
|
|
||||||
self.sendLine(1, "PRIVMSG %s :this is message %d" % (chname, i))
|
|
||||||
echo_messages.extend(
|
|
||||||
msg.to_history_message() for msg in self.getMessages(1)
|
|
||||||
)
|
|
||||||
time.sleep(0.002)
|
|
||||||
|
|
||||||
self.validate_echo_messages(NUM_MESSAGES, echo_messages)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 1, chname)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("subcommand", SUBCOMMANDS)
|
|
||||||
@skip_ngircd
|
|
||||||
def testChathistoryEventPlayback(self, subcommand):
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
EVENT_PLAYBACK_CAP,
|
|
||||||
],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
chname = "#chan" + secrets.token_hex(12)
|
|
||||||
self.joinChannel(1, chname)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
NUM_MESSAGES = 10
|
|
||||||
echo_messages = []
|
|
||||||
for i in range(NUM_MESSAGES):
|
|
||||||
self.sendLine(1, "PRIVMSG %s :this is message %d" % (chname, i))
|
|
||||||
echo_messages.extend(
|
|
||||||
msg.to_history_message() for msg in self.getMessages(1)
|
|
||||||
)
|
|
||||||
time.sleep(0.002)
|
|
||||||
|
|
||||||
self.validate_echo_messages(NUM_MESSAGES, echo_messages)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 1, chname)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("subcommand", SUBCOMMANDS)
|
|
||||||
@pytest.mark.private_chathistory
|
|
||||||
@skip_ngircd
|
|
||||||
def testChathistoryDMs(self, subcommand):
|
|
||||||
c1 = "foo" + secrets.token_hex(12)
|
|
||||||
c2 = "bar" + secrets.token_hex(12)
|
|
||||||
self.controller.registerUser(self, c1, "sesame1")
|
|
||||||
self.controller.registerUser(self, c2, "sesame2")
|
|
||||||
self.connectClient(
|
|
||||||
c1,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame1",
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.connectClient(
|
|
||||||
c2,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame2",
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
NUM_MESSAGES = 10
|
|
||||||
echo_messages = []
|
|
||||||
for i in range(NUM_MESSAGES):
|
|
||||||
user = (i % 2) + 1
|
|
||||||
if user == 1:
|
|
||||||
target = c2
|
|
||||||
else:
|
|
||||||
target = c1
|
|
||||||
self.getMessages(user)
|
|
||||||
self.sendLine(user, "PRIVMSG %s :this is message %d" % (target, i))
|
|
||||||
echo_messages.extend(
|
|
||||||
msg.to_history_message() for msg in self.getMessages(user)
|
|
||||||
)
|
|
||||||
time.sleep(0.002)
|
|
||||||
|
|
||||||
self.validate_echo_messages(NUM_MESSAGES, echo_messages)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 1, c2)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 2, c1)
|
|
||||||
|
|
||||||
c3 = "baz" + secrets.token_hex(12)
|
|
||||||
self.connectClient(
|
|
||||||
c3,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.sendLine(
|
|
||||||
1, "PRIVMSG %s :this is a message in a separate conversation" % (c3,)
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(
|
|
||||||
3, "PRIVMSG %s :i agree that this is a separate conversation" % (c1,)
|
|
||||||
)
|
|
||||||
# 3 received the first message as a delivery and the second as an echo
|
|
||||||
new_convo = [
|
|
||||||
msg.to_history_message()
|
|
||||||
for msg in self.getMessages(3)
|
|
||||||
if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(
|
|
||||||
[msg.text for msg in new_convo],
|
|
||||||
[
|
|
||||||
"this is a message in a separate conversation",
|
|
||||||
"i agree that this is a separate conversation",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
# messages should be stored and retrievable by c1,
|
|
||||||
# even though c3 is not registered
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "CHATHISTORY LATEST %s * 10" % (c3,))
|
|
||||||
results = [
|
|
||||||
msg.to_history_message()
|
|
||||||
for msg in self.getMessages(1)
|
|
||||||
if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(results, new_convo)
|
|
||||||
|
|
||||||
# additional messages with c3 should not show up in the c1-c2 history:
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 1, c2)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 2, c1)
|
|
||||||
self.validate_chathistory(subcommand, echo_messages, 2, c1.upper())
|
|
||||||
|
|
||||||
# regression test for #833
|
|
||||||
self.sendLine(3, "QUIT")
|
|
||||||
self.assertDisconnected(3)
|
|
||||||
# register c3 as an account, then attempt to retrieve
|
|
||||||
# the conversation history with c1
|
|
||||||
self.controller.registerUser(self, c3, "sesame3")
|
|
||||||
self.connectClient(
|
|
||||||
c3,
|
|
||||||
name=c3,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame3",
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(c3)
|
|
||||||
self.sendLine(c3, "CHATHISTORY LATEST %s * 10" % (c1,))
|
|
||||||
results = [
|
|
||||||
msg.to_history_message()
|
|
||||||
for msg in self.getMessages(c3)
|
|
||||||
if msg.command == "PRIVMSG"
|
|
||||||
]
|
|
||||||
# should get nothing
|
|
||||||
self.assertEqual(results, [])
|
|
||||||
|
|
||||||
def validate_chathistory(self, subcommand, echo_messages, user, chname):
|
|
||||||
# Keep this list of subcommands in sync with the SUBCOMMANDS global
|
|
||||||
method = getattr(self, f"_validate_chathistory_{subcommand}")
|
|
||||||
method(echo_messages, user, chname)
|
|
||||||
|
|
||||||
def _validate_chathistory_LATEST(self, echo_messages, user, chname):
|
|
||||||
INCLUSIVE_LIMIT = len(echo_messages) * 2
|
|
||||||
self.sendLine(user, "CHATHISTORY LATEST %s * %d" % (chname, INCLUSIVE_LIMIT))
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages, result)
|
|
||||||
|
|
||||||
self.sendLine(user, "CHATHISTORY LATEST %s * %d" % (chname, 5))
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[-5:], result)
|
|
||||||
|
|
||||||
self.sendLine(user, "CHATHISTORY LATEST %s * %d" % (chname, 1))
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[-1:], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY LATEST %s msgid=%s %d"
|
|
||||||
% (chname, echo_messages[4].msgid, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[5:], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY LATEST %s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[4].time, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[5:], result)
|
|
||||||
|
|
||||||
def _validate_chathistory_BEFORE(self, echo_messages, user, chname):
|
|
||||||
INCLUSIVE_LIMIT = len(echo_messages) * 2
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BEFORE %s msgid=%s %d"
|
|
||||||
% (chname, echo_messages[6].msgid, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[:6], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BEFORE %s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[6].time, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[:6], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BEFORE %s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[6].time, 2),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[4:6], result)
|
|
||||||
|
|
||||||
def _validate_chathistory_AFTER(self, echo_messages, user, chname):
|
|
||||||
INCLUSIVE_LIMIT = len(echo_messages) * 2
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AFTER %s msgid=%s %d"
|
|
||||||
% (chname, echo_messages[3].msgid, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[4:], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AFTER %s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[3].time, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[4:], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AFTER %s timestamp=%s %d" % (chname, echo_messages[3].time, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[4:7], result)
|
|
||||||
|
|
||||||
def _validate_chathistory_BETWEEN(self, echo_messages, user, chname):
|
|
||||||
INCLUSIVE_LIMIT = len(echo_messages) * 2
|
|
||||||
# BETWEEN forwards and backwards
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s msgid=%s msgid=%s %d"
|
|
||||||
% (
|
|
||||||
chname,
|
|
||||||
echo_messages[0].msgid,
|
|
||||||
echo_messages[-1].msgid,
|
|
||||||
INCLUSIVE_LIMIT,
|
|
||||||
),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:-1], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s msgid=%s msgid=%s %d"
|
|
||||||
% (
|
|
||||||
chname,
|
|
||||||
echo_messages[-1].msgid,
|
|
||||||
echo_messages[0].msgid,
|
|
||||||
INCLUSIVE_LIMIT,
|
|
||||||
),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:-1], result)
|
|
||||||
|
|
||||||
# BETWEEN forwards and backwards with a limit, should get
|
|
||||||
# different results this time
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s msgid=%s msgid=%s %d"
|
|
||||||
% (chname, echo_messages[0].msgid, echo_messages[-1].msgid, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:4], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s msgid=%s msgid=%s %d"
|
|
||||||
% (chname, echo_messages[-1].msgid, echo_messages[0].msgid, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[-4:-1], result)
|
|
||||||
|
|
||||||
# same stuff again but with timestamps
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s timestamp=%s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[0].time, echo_messages[-1].time, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:-1], result)
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s timestamp=%s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[-1].time, echo_messages[0].time, INCLUSIVE_LIMIT),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:-1], result)
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s timestamp=%s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[0].time, echo_messages[-1].time, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[1:4], result)
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY BETWEEN %s timestamp=%s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[-1].time, echo_messages[0].time, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[-4:-1], result)
|
|
||||||
|
|
||||||
def _validate_chathistory_AROUND(self, echo_messages, user, chname):
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AROUND %s msgid=%s %d" % (chname, echo_messages[7].msgid, 1),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual([echo_messages[7]], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AROUND %s msgid=%s %d" % (chname, echo_messages[7].msgid, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertEqual(echo_messages[6:9], result)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
user,
|
|
||||||
"CHATHISTORY AROUND %s timestamp=%s %d"
|
|
||||||
% (chname, echo_messages[7].time, 3),
|
|
||||||
)
|
|
||||||
result = validate_chathistory_batch(self.getMessages(user))
|
|
||||||
self.assertIn(echo_messages[7], result)
|
|
||||||
|
|
||||||
@pytest.mark.arbitrary_client_tags
|
|
||||||
@skip_ngircd
|
|
||||||
def testChathistoryTagmsg(self):
|
|
||||||
c1 = "foo" + secrets.token_hex(12)
|
|
||||||
c2 = "bar" + secrets.token_hex(12)
|
|
||||||
chname = "#chan" + secrets.token_hex(12)
|
|
||||||
self.controller.registerUser(self, c1, "sesame1")
|
|
||||||
self.controller.registerUser(self, c2, "sesame2")
|
|
||||||
self.connectClient(
|
|
||||||
c1,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
EVENT_PLAYBACK_CAP,
|
|
||||||
],
|
|
||||||
password="sesame1",
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.connectClient(
|
|
||||||
c2,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame2",
|
|
||||||
)
|
|
||||||
self.joinChannel(1, chname)
|
|
||||||
self.joinChannel(2, chname)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, "@+client-only-tag-test=success;+draft/persist TAGMSG %s" % (chname,)
|
|
||||||
)
|
|
||||||
echo = self.getMessages(1)[0]
|
|
||||||
msgid = echo.tags["msgid"]
|
|
||||||
|
|
||||||
def validate_tagmsg(msg, target, msgid):
|
|
||||||
self.assertMessageMatch(msg, command="TAGMSG", params=[target])
|
|
||||||
self.assertEqual(msg.tags["+client-only-tag-test"], "success")
|
|
||||||
self.assertEqual(msg.tags["msgid"], msgid)
|
|
||||||
|
|
||||||
validate_tagmsg(echo, chname, msgid)
|
|
||||||
|
|
||||||
relay = self.getMessages(2)
|
|
||||||
self.assertEqual(len(relay), 1)
|
|
||||||
validate_tagmsg(relay[0], chname, msgid)
|
|
||||||
|
|
||||||
self.sendLine(1, "CHATHISTORY LATEST %s * 10" % (chname,))
|
|
||||||
history_tagmsgs = [
|
|
||||||
msg for msg in self.getMessages(1) if msg.command == "TAGMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(history_tagmsgs), 1)
|
|
||||||
validate_tagmsg(history_tagmsgs[0], chname, msgid)
|
|
||||||
|
|
||||||
# c2 doesn't have event-playback and MUST NOT receive replayed tagmsg
|
|
||||||
self.sendLine(2, "CHATHISTORY LATEST %s * 10" % (chname,))
|
|
||||||
history_tagmsgs = [
|
|
||||||
msg for msg in self.getMessages(2) if msg.command == "TAGMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(history_tagmsgs), 0)
|
|
||||||
|
|
||||||
# now try a DM
|
|
||||||
self.sendLine(
|
|
||||||
1, "@+client-only-tag-test=success;+draft/persist TAGMSG %s" % (c2,)
|
|
||||||
)
|
|
||||||
echo = self.getMessages(1)[0]
|
|
||||||
msgid = echo.tags["msgid"]
|
|
||||||
validate_tagmsg(echo, c2, msgid)
|
|
||||||
|
|
||||||
relay = self.getMessages(2)
|
|
||||||
self.assertEqual(len(relay), 1)
|
|
||||||
validate_tagmsg(relay[0], c2, msgid)
|
|
||||||
|
|
||||||
self.sendLine(1, "CHATHISTORY LATEST %s * 10" % (c2,))
|
|
||||||
history_tagmsgs = [
|
|
||||||
msg for msg in self.getMessages(1) if msg.command == "TAGMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(history_tagmsgs), 1)
|
|
||||||
validate_tagmsg(history_tagmsgs[0], c2, msgid)
|
|
||||||
|
|
||||||
# c2 doesn't have event-playback and MUST NOT receive replayed tagmsg
|
|
||||||
self.sendLine(2, "CHATHISTORY LATEST %s * 10" % (c1,))
|
|
||||||
history_tagmsgs = [
|
|
||||||
msg for msg in self.getMessages(2) if msg.command == "TAGMSG"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(history_tagmsgs), 0)
|
|
||||||
|
|
||||||
@pytest.mark.arbitrary_client_tags
|
|
||||||
@pytest.mark.private_chathistory
|
|
||||||
@skip_ngircd
|
|
||||||
def testChathistoryDMClientOnlyTags(self):
|
|
||||||
# regression test for Ergo #1411
|
|
||||||
c1 = "foo" + secrets.token_hex(12)
|
|
||||||
c2 = "bar" + secrets.token_hex(12)
|
|
||||||
self.controller.registerUser(self, c1, "sesame1")
|
|
||||||
self.controller.registerUser(self, c2, "sesame2")
|
|
||||||
self.connectClient(
|
|
||||||
c1,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame1",
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.connectClient(
|
|
||||||
c2,
|
|
||||||
capabilities=[
|
|
||||||
"message-tags",
|
|
||||||
"server-time",
|
|
||||||
"echo-message",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"sasl",
|
|
||||||
CHATHISTORY_CAP,
|
|
||||||
],
|
|
||||||
password="sesame2",
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
echo_msgid = None
|
|
||||||
|
|
||||||
def validate_msg(msg):
|
|
||||||
self.assertMessageMatch(msg, command="PRIVMSG", params=[c2, "hi"])
|
|
||||||
self.assertEqual(msg.tags["+client-only-tag-test"], "success")
|
|
||||||
self.assertEqual(msg.tags["msgid"], echo_msgid)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, "@+client-only-tag-test=success;+draft/persist PRIVMSG %s hi" % (c2,)
|
|
||||||
)
|
|
||||||
echo = self.getMessage(1)
|
|
||||||
echo_msgid = echo.tags["msgid"]
|
|
||||||
validate_msg(echo)
|
|
||||||
relay = self.getMessage(2)
|
|
||||||
validate_msg(relay)
|
|
||||||
|
|
||||||
|
|
||||||
assert {f"_validate_chathistory_{cmd}" for cmd in SUBCOMMANDS} == {
|
|
||||||
meth_name
|
|
||||||
for meth_name in dir(ChathistoryTestCase)
|
|
||||||
if meth_name.startswith("_validate_chathistory_")
|
|
||||||
}, "ChathistoryTestCase.validate_chathistory and SUBCOMMANDS are out of sync"
|
|
@ -1,133 +0,0 @@
|
|||||||
"""
|
|
||||||
`Ergo <https://ergo.chat/>`_-specific tests of auditorium mode
|
|
||||||
|
|
||||||
TODO: Should be extended to other servers, once a specification is written.
|
|
||||||
"""
|
|
||||||
|
|
||||||
import math
|
|
||||||
import time
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.irc_utils.junkdrawer import ircv3_timestamp_to_unixtime
|
|
||||||
from irctest.numerics import RPL_NAMREPLY
|
|
||||||
|
|
||||||
MODERN_CAPS = [
|
|
||||||
"server-time",
|
|
||||||
"message-tags",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"echo-message",
|
|
||||||
"account-tag",
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
class AuditoriumTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testAuditorium(self):
|
|
||||||
self.connectClient("bar", name="bar", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("bar", "#auditorium")
|
|
||||||
self.getMessages("bar")
|
|
||||||
self.sendLine("bar", "MODE #auditorium +u")
|
|
||||||
modelines = [msg for msg in self.getMessages("bar") if msg.command == "MODE"]
|
|
||||||
self.assertEqual(len(modelines), 1)
|
|
||||||
self.assertMessageMatch(modelines[0], params=["#auditorium", "+u"])
|
|
||||||
|
|
||||||
self.connectClient("guest1", name="guest1", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("guest1", "#auditorium")
|
|
||||||
self.getMessages("guest1")
|
|
||||||
# chanop should get a JOIN message
|
|
||||||
join_msgs = [msg for msg in self.getMessages("bar") if msg.command == "JOIN"]
|
|
||||||
self.assertEqual(len(join_msgs), 1)
|
|
||||||
self.assertMessageMatch(join_msgs[0], nick="guest1", params=["#auditorium"])
|
|
||||||
|
|
||||||
self.connectClient("guest2", name="guest2", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("guest2", "#auditorium")
|
|
||||||
self.getMessages("guest2")
|
|
||||||
# chanop should get a JOIN message
|
|
||||||
join_msgs = [msg for msg in self.getMessages("bar") if msg.command == "JOIN"]
|
|
||||||
self.assertEqual(len(join_msgs), 1)
|
|
||||||
join_msg = join_msgs[0]
|
|
||||||
self.assertMessageMatch(join_msg, nick="guest2", params=["#auditorium"])
|
|
||||||
# oragono/oragono#1642 ; msgid should be populated,
|
|
||||||
# and the time tag should be sane
|
|
||||||
self.assertTrue(join_msg.tags.get("msgid"))
|
|
||||||
self.assertLessEqual(
|
|
||||||
math.fabs(time.time() - ircv3_timestamp_to_unixtime(join_msg.tags["time"])),
|
|
||||||
60.0,
|
|
||||||
)
|
|
||||||
# fellow unvoiced participant should not
|
|
||||||
unvoiced_join_msgs = [
|
|
||||||
msg for msg in self.getMessages("guest1") if msg.command == "JOIN"
|
|
||||||
]
|
|
||||||
self.assertEqual(len(unvoiced_join_msgs), 0)
|
|
||||||
|
|
||||||
self.connectClient("guest3", name="guest3", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("guest3", "#auditorium")
|
|
||||||
self.getMessages("guest3")
|
|
||||||
|
|
||||||
self.sendLine("bar", "PRIVMSG #auditorium hi")
|
|
||||||
echo_message = [
|
|
||||||
msg for msg in self.getMessages("bar") if msg.command == "PRIVMSG"
|
|
||||||
][0]
|
|
||||||
self.assertEqual(echo_message, self.getMessages("guest1")[0])
|
|
||||||
self.assertEqual(echo_message, self.getMessages("guest2")[0])
|
|
||||||
self.assertEqual(echo_message, self.getMessages("guest3")[0])
|
|
||||||
|
|
||||||
# unvoiced users can speak
|
|
||||||
self.sendLine("guest1", "PRIVMSG #auditorium :hi you")
|
|
||||||
echo_message = [
|
|
||||||
msg for msg in self.getMessages("guest1") if msg.command == "PRIVMSG"
|
|
||||||
][0]
|
|
||||||
self.assertEqual(self.getMessages("bar"), [echo_message])
|
|
||||||
self.assertEqual(self.getMessages("guest2"), [echo_message])
|
|
||||||
self.assertEqual(self.getMessages("guest3"), [echo_message])
|
|
||||||
|
|
||||||
def names(client):
|
|
||||||
self.sendLine(client, "NAMES #auditorium")
|
|
||||||
result = set()
|
|
||||||
for msg in self.getMessages(client):
|
|
||||||
if msg.command == RPL_NAMREPLY:
|
|
||||||
result.update(msg.params[-1].split())
|
|
||||||
return result
|
|
||||||
|
|
||||||
self.assertEqual(names("bar"), {"@bar", "guest1", "guest2", "guest3"})
|
|
||||||
self.assertEqual(names("guest1"), {"@bar"})
|
|
||||||
self.assertEqual(names("guest2"), {"@bar"})
|
|
||||||
self.assertEqual(names("guest3"), {"@bar"})
|
|
||||||
|
|
||||||
self.sendLine("bar", "MODE #auditorium +v guest1")
|
|
||||||
modeLine = [msg for msg in self.getMessages("bar") if msg.command == "MODE"][0]
|
|
||||||
self.assertEqual(self.getMessages("guest1"), [modeLine])
|
|
||||||
self.assertEqual(self.getMessages("guest2"), [modeLine])
|
|
||||||
self.assertEqual(self.getMessages("guest3"), [modeLine])
|
|
||||||
self.assertEqual(names("bar"), {"@bar", "+guest1", "guest2", "guest3"})
|
|
||||||
self.assertEqual(names("guest2"), {"@bar", "+guest1"})
|
|
||||||
self.assertEqual(names("guest3"), {"@bar", "+guest1"})
|
|
||||||
|
|
||||||
self.sendLine("guest1", "PART #auditorium")
|
|
||||||
part = [msg for msg in self.getMessages("guest1") if msg.command == "PART"][0]
|
|
||||||
# everyone should see voiced PART
|
|
||||||
self.assertEqual(self.getMessages("bar")[0], part)
|
|
||||||
self.assertEqual(self.getMessages("guest2")[0], part)
|
|
||||||
self.assertEqual(self.getMessages("guest3")[0], part)
|
|
||||||
|
|
||||||
self.joinChannel("guest1", "#auditorium")
|
|
||||||
self.getMessages("guest1")
|
|
||||||
self.getMessages("bar")
|
|
||||||
|
|
||||||
self.sendLine("guest2", "PART #auditorium")
|
|
||||||
part = [msg for msg in self.getMessages("guest2") if msg.command == "PART"][0]
|
|
||||||
self.assertEqual(self.getMessages("bar"), [part])
|
|
||||||
# part should be hidden from unvoiced participants
|
|
||||||
self.assertEqual(self.getMessages("guest1"), [])
|
|
||||||
self.assertEqual(self.getMessages("guest3"), [])
|
|
||||||
|
|
||||||
self.sendLine("guest3", "QUIT")
|
|
||||||
self.assertDisconnected("guest3")
|
|
||||||
# quit should be hidden from unvoiced participants
|
|
||||||
self.assertEqual(
|
|
||||||
len([msg for msg in self.getMessages("bar") if msg.command == "QUIT"]), 1
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
len([msg for msg in self.getMessages("guest1") if msg.command == "QUIT"]), 0
|
|
||||||
)
|
|
@ -1,159 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel ban (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.3.1>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.3>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#ban-channel-mode>`__)
|
|
||||||
and ban exception (`Modern <https://modern.ircdocs.horse/#exception-channel-mode>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.numerics import ERR_BANNEDFROMCHAN, RPL_BANLIST, RPL_ENDOFBANLIST
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class BanModeTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern")
|
|
||||||
def testBan(self):
|
|
||||||
"""Basic ban operation"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +b bar!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage("chanop"), command="MODE")
|
|
||||||
|
|
||||||
self.connectClient("Bar", name="bar")
|
|
||||||
self.getMessages("bar")
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command=ERR_BANNEDFROMCHAN)
|
|
||||||
|
|
||||||
self.sendLine("chanop", "MODE #chan -b bar!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage("chanop"), command="MODE")
|
|
||||||
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command="JOIN")
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testBanList(self):
|
|
||||||
"""`RPL_BANLIST <https://modern.ircdocs.horse/#rplbanlist-367>`_"""
|
|
||||||
self.connectClient("chanop")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "MODE #chan +b bar!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage(1), command="MODE")
|
|
||||||
|
|
||||||
self.sendLine(1, "MODE #chan +b")
|
|
||||||
|
|
||||||
m = self.getMessage(1)
|
|
||||||
if len(m.params) == 3:
|
|
||||||
# Old format
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command=RPL_BANLIST,
|
|
||||||
params=[
|
|
||||||
"chanop",
|
|
||||||
"#chan",
|
|
||||||
"bar!*@*",
|
|
||||||
],
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command=RPL_BANLIST,
|
|
||||||
params=[
|
|
||||||
"chanop",
|
|
||||||
"#chan",
|
|
||||||
"bar!*@*",
|
|
||||||
StrRe("chanop(!.*@.*)?"),
|
|
||||||
StrRe("[0-9]+"),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=RPL_ENDOFBANLIST,
|
|
||||||
params=[
|
|
||||||
"chanop",
|
|
||||||
"#chan",
|
|
||||||
ANYSTR,
|
|
||||||
],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testBanException(self):
|
|
||||||
"""`Exception mode <https://modern.ircdocs.horse/#exception-channel-mode`_,
|
|
||||||
detected using `ISUPPORT EXCEPTS
|
|
||||||
<https://modern.ircdocs.horse/#excepts-parameter>`_ and checked against
|
|
||||||
`ISUPPORT CHANMODES <https://modern.ircdocs.horse/#chanmodes-parameter>`_"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
|
|
||||||
if "EXCEPTS" in self.server_support:
|
|
||||||
mode = self.server_support["EXCEPTS"] or "e"
|
|
||||||
if "CHANMODES" in self.server_support:
|
|
||||||
self.assertIn(
|
|
||||||
mode,
|
|
||||||
self.server_support["CHANMODES"],
|
|
||||||
fail_msg="ISUPPORT EXCEPTS is present, but '{item}' is missing "
|
|
||||||
"from 'CHANMODES={list}'",
|
|
||||||
)
|
|
||||||
self.assertIn(
|
|
||||||
mode,
|
|
||||||
self.server_support["CHANMODES"].split(",")[0],
|
|
||||||
fail_msg="ISUPPORT EXCEPTS is present, but '{item}' is not "
|
|
||||||
"in group A",
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
mode = "e"
|
|
||||||
if "CHANMODES" in self.server_support:
|
|
||||||
if "e" not in self.server_support["CHANMODES"]:
|
|
||||||
raise runner.OptionalExtensionNotSupported(
|
|
||||||
"Ban exception (or mode letter is not +e)"
|
|
||||||
)
|
|
||||||
self.assertIn(
|
|
||||||
mode,
|
|
||||||
self.server_support["CHANMODES"].split(",")[0],
|
|
||||||
fail_msg="Mode +e (assumed to be ban exception) is present, "
|
|
||||||
"but 'e' is not in group A",
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
raise runner.OptionalExtensionNotSupported("ISUPPORT CHANMODES")
|
|
||||||
|
|
||||||
self.sendLine("chanop", "JOIN #chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +b ba*!*@*")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
|
|
||||||
# banned client cannot join
|
|
||||||
self.connectClient("Bar", name="bar")
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command=ERR_BANNEDFROMCHAN)
|
|
||||||
|
|
||||||
# chanop sets exception
|
|
||||||
self.sendLine("chanop", "MODE #chan +e *ar!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage("chanop"), command="MODE")
|
|
||||||
|
|
||||||
# client can now join
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command="JOIN")
|
|
||||||
|
|
||||||
# TODO: Add testBanExceptionList, once the numerics are specified in Modern
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testCaseInsensitive(self):
|
|
||||||
"""Some clients allow unsetting modes if their argument matches
|
|
||||||
up to normalization"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +b BAR!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage("chanop"), command="MODE")
|
|
||||||
|
|
||||||
self.connectClient("Bar", name="bar")
|
|
||||||
self.getMessages("bar")
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command=ERR_BANNEDFROMCHAN)
|
|
||||||
|
|
||||||
self.sendLine("chanop", "MODE #chan -b bar!*@*")
|
|
||||||
self.assertMessageMatch(self.getMessage("chanop"), command="MODE")
|
|
||||||
|
|
||||||
self.sendLine("bar", "JOIN #chan")
|
|
||||||
self.assertMessageMatch(self.getMessage("bar"), command="JOIN")
|
|
@ -1,128 +0,0 @@
|
|||||||
"""
|
|
||||||
Various Ergo-specific channel modes
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_CANNOTSENDTOCHAN, ERR_CHANOPRIVSNEEDED
|
|
||||||
|
|
||||||
MODERN_CAPS = [
|
|
||||||
"server-time",
|
|
||||||
"message-tags",
|
|
||||||
"batch",
|
|
||||||
"labeled-response",
|
|
||||||
"echo-message",
|
|
||||||
"account-tag",
|
|
||||||
]
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
class RegisteredOnlySpeakModeTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testRegisteredOnlySpeakMode(self):
|
|
||||||
self.controller.registerUser(self, "evan", "sesame")
|
|
||||||
|
|
||||||
# test the +M (only registered users and ops can speak) channel mode
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +M")
|
|
||||||
replies = self.getMessages("chanop")
|
|
||||||
modeLines = [line for line in replies if line.command == "MODE"]
|
|
||||||
self.assertMessageMatch(modeLines[0], command="MODE", params=["#chan", "+M"])
|
|
||||||
|
|
||||||
self.connectClient("baz", name="baz")
|
|
||||||
self.joinChannel("baz", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
# this message should be suppressed completely by +M
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi from baz")
|
|
||||||
replies = self.getMessages("baz")
|
|
||||||
reply_cmds = {reply.command for reply in replies}
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, reply_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
# +v exempts users from the registration requirement:
|
|
||||||
self.sendLine("chanop", "MODE #chan +v baz")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.getMessages("baz")
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi again from baz")
|
|
||||||
replies = self.getMessages("baz")
|
|
||||||
# baz should not receive an error (or an echo)
|
|
||||||
self.assertEqual(replies, [])
|
|
||||||
replies = self.getMessages("chanop")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
replies[0], command="PRIVMSG", params=["#chan", "hi again from baz"]
|
|
||||||
)
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"evan",
|
|
||||||
name="evan",
|
|
||||||
account="evan",
|
|
||||||
password="sesame",
|
|
||||||
capabilities=["sasl"],
|
|
||||||
)
|
|
||||||
self.joinChannel("evan", "#chan")
|
|
||||||
self.getMessages("baz")
|
|
||||||
self.sendLine("evan", "PRIVMSG #chan :hi from evan")
|
|
||||||
replies = self.getMessages("evan")
|
|
||||||
# evan should not receive an error (or an echo)
|
|
||||||
self.assertEqual(replies, [])
|
|
||||||
replies = self.getMessages("baz")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
replies[0], command="PRIVMSG", params=["#chan", "hi from evan"]
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
class OpModeratedTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testOpModerated(self):
|
|
||||||
# test the +U channel mode
|
|
||||||
self.connectClient("chanop", name="chanop", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +U")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.connectClient("baz", name="baz", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("baz", "#chan")
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi from baz")
|
|
||||||
echo = self.getMessages("baz")[0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
echo, command="PRIVMSG", params=["#chan", "hi from baz"]
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
[msg for msg in self.getMessages("chanop") if msg.command == "PRIVMSG"],
|
|
||||||
[echo],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.connectClient("qux", name="qux", capabilities=MODERN_CAPS)
|
|
||||||
self.joinChannel("qux", "#chan")
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :hi from qux")
|
|
||||||
echo = self.getMessages("qux")[0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
echo, command="PRIVMSG", params=["#chan", "hi from qux"]
|
|
||||||
)
|
|
||||||
# message is relayed to chanop but not to unprivileged
|
|
||||||
self.assertEqual(
|
|
||||||
[msg for msg in self.getMessages("chanop") if msg.command == "PRIVMSG"],
|
|
||||||
[echo],
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
[msg for msg in self.getMessages("baz") if msg.command == "PRIVMSG"], []
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine("chanop", "MODE #chan +v qux")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :hi again from qux")
|
|
||||||
echo = [msg for msg in self.getMessages("qux") if msg.command == "PRIVMSG"][0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
echo, command="PRIVMSG", params=["#chan", "hi again from qux"]
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
[msg for msg in self.getMessages("chanop") if msg.command == "PRIVMSG"],
|
|
||||||
[echo],
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
[msg for msg in self.getMessages("baz") if msg.command == "PRIVMSG"], [echo]
|
|
||||||
)
|
|
@ -1,162 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel key (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.3.1>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.3>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#key-channel-mode>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import (
|
|
||||||
ERR_BADCHANNELKEY,
|
|
||||||
ERR_INVALIDKEY,
|
|
||||||
ERR_INVALIDMODEPARAM,
|
|
||||||
ERR_UNKNOWNERROR,
|
|
||||||
)
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
|
|
||||||
class KeyTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812")
|
|
||||||
def testKeyNormal(self):
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.sendLine(1, "MODE #chan +k beer")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.connectClient("qux")
|
|
||||||
self.getMessages(2)
|
|
||||||
# JOIN with a missing key MUST receive ERR_BADCHANNELKEY:
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
reply_cmds = {msg.command for msg in self.getMessages(2)}
|
|
||||||
self.assertNotIn("JOIN", reply_cmds)
|
|
||||||
self.assertIn(ERR_BADCHANNELKEY, reply_cmds)
|
|
||||||
# similarly for JOIN with an incorrect key:
|
|
||||||
self.sendLine(2, "JOIN #chan bees")
|
|
||||||
reply_cmds = {msg.command for msg in self.getMessages(2)}
|
|
||||||
self.assertNotIn("JOIN", reply_cmds)
|
|
||||||
self.assertIn(ERR_BADCHANNELKEY, reply_cmds)
|
|
||||||
|
|
||||||
self.sendLine(2, "JOIN #chan beer")
|
|
||||||
reply = self.getMessages(2)
|
|
||||||
self.assertMessageMatch(reply[0], command="JOIN", params=["#chan"])
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"key",
|
|
||||||
["passphrase with spaces", "long" * 100, ""],
|
|
||||||
ids=["spaces", "long", "empty"],
|
|
||||||
)
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern")
|
|
||||||
def testKeyValidation(self, key):
|
|
||||||
"""
|
|
||||||
key = 1*23( %x01-05 / %x07-08 / %x0C / %x0E-1F / %x21-7F )
|
|
||||||
; any 7-bit US_ASCII character,
|
|
||||||
; except NUL, CR, LF, FF, h/v TABs, and " "
|
|
||||||
-- https://tools.ietf.org/html/rfc2812#page-8
|
|
||||||
|
|
||||||
"Servers may validate the value (eg. to forbid spaces, as they make it harder
|
|
||||||
to use the key in `JOIN` messages). If the value is invalid, they SHOULD
|
|
||||||
return [`ERR_INVALIDMODEPARAM`](#errinvalidmodeparam-696).
|
|
||||||
However, clients MUST be able to handle any of the following:
|
|
||||||
|
|
||||||
* [`ERR_INVALIDMODEPARAM`](#errinvalidmodeparam-696)
|
|
||||||
* [`ERR_INVALIDKEY`](#errinvalidkey-525)
|
|
||||||
* `MODE` echoed with a different key (eg. truncated or stripped of invalid
|
|
||||||
characters)
|
|
||||||
* the key changed ignored, and no `MODE` echoed if no other mode change
|
|
||||||
was valid.
|
|
||||||
"
|
|
||||||
-- https://modern.ircdocs.horse/#key-channel-mode
|
|
||||||
-- https://github.com/ircdocs/modern-irc/pull/111
|
|
||||||
"""
|
|
||||||
if key == "" and self.controller.software_name in (
|
|
||||||
"ircu2",
|
|
||||||
"Nefarious",
|
|
||||||
"snircd",
|
|
||||||
):
|
|
||||||
pytest.xfail(
|
|
||||||
"ircu2 returns ERR_NEEDMOREPARAMS on empty keys: "
|
|
||||||
"https://github.com/UndernetIRC/ircu2/issues/13"
|
|
||||||
)
|
|
||||||
if (key == "" or " " in key) and self.controller.software_name == "ngIRCd":
|
|
||||||
pytest.xfail(
|
|
||||||
"ngIRCd does not validate channel keys: "
|
|
||||||
"https://github.com/ngircd/ngircd/issues/290"
|
|
||||||
)
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.sendLine(1, f"MODE #chan +k :{key}")
|
|
||||||
|
|
||||||
# The spec requires no space; but doesn't say what to do
|
|
||||||
# if there is one.
|
|
||||||
# Let's check the various alternatives
|
|
||||||
|
|
||||||
replies = self.getMessages(1)
|
|
||||||
self.assertNotIn(
|
|
||||||
ERR_UNKNOWNERROR,
|
|
||||||
{msg.command for msg in replies},
|
|
||||||
fail_msg="Sending an invalid key caused an "
|
|
||||||
"ERR_UNKNOWNERROR instead of being handled explicitly "
|
|
||||||
"(eg. ERR_INVALIDMODEPARAM or truncation): {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
commands = {msg.command for msg in replies}
|
|
||||||
if {ERR_INVALIDMODEPARAM, ERR_INVALIDKEY} & commands:
|
|
||||||
# First option: ERR_INVALIDMODEPARAM (eg. Ergo) or ERR_INVALIDKEY
|
|
||||||
# (eg. ircu2)
|
|
||||||
if ERR_INVALIDMODEPARAM in commands:
|
|
||||||
command = [
|
|
||||||
msg for msg in replies if msg.command == ERR_INVALIDMODEPARAM
|
|
||||||
]
|
|
||||||
self.assertEqual(len(command), 1, command)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
command[0],
|
|
||||||
command=ERR_INVALIDMODEPARAM,
|
|
||||||
params=["bar", "#chan", "k", "*", ANYSTR],
|
|
||||||
)
|
|
||||||
return
|
|
||||||
|
|
||||||
if not replies:
|
|
||||||
# MODE was ignored entirely
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(2), command="JOIN", params=["#chan"]
|
|
||||||
)
|
|
||||||
return
|
|
||||||
|
|
||||||
# Second and third options: truncating the key (eg. UnrealIRCd)
|
|
||||||
# or replacing spaces (eg. Charybdis)
|
|
||||||
mode_commands = [msg for msg in replies if msg.command == "MODE"]
|
|
||||||
self.assertGreaterEqual(
|
|
||||||
len(mode_commands),
|
|
||||||
1,
|
|
||||||
fail_msg="Sending an invalid key (with a space) triggered "
|
|
||||||
"neither ERR_UNKNOWNERROR, ERR_INVALIDMODEPARAM, ERR_INVALIDKEY, "
|
|
||||||
" or a MODE. Only these: {}",
|
|
||||||
extra_format=(replies,),
|
|
||||||
)
|
|
||||||
self.assertLessEqual(
|
|
||||||
len(mode_commands),
|
|
||||||
1,
|
|
||||||
fail_msg="Sending an invalid key (with a space) triggered "
|
|
||||||
"multiple MODE responses: {}",
|
|
||||||
extra_format=(replies,),
|
|
||||||
)
|
|
||||||
|
|
||||||
mode_command = mode_commands[0]
|
|
||||||
if mode_command.params == ["#chan", "+k", "passphrase"]:
|
|
||||||
key = "passphrase"
|
|
||||||
elif mode_command.params == ["#chan", "+k", "passphrasewithspaces"]:
|
|
||||||
key = "passphrasewithspaces"
|
|
||||||
elif mode_command.params[2].startswith("longlonglong"):
|
|
||||||
key = mode_command.params[2]
|
|
||||||
assert mode_command.params == ["#chan", "+k", key]
|
|
||||||
elif mode_command.params == ["#chan", "+k", "passphrase with spaces"]:
|
|
||||||
raise self.failureException("Invalid key (with a space) was not rejected.")
|
|
||||||
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(2, f"JOIN #chan {key}")
|
|
||||||
self.assertMessageMatch(self.getMessage(2), command="JOIN", params=["#chan"])
|
|
@ -1,43 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel moderation mode (`RFC 2812
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.3>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#ban-channel-mode>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_CANNOTSENDTOCHAN
|
|
||||||
|
|
||||||
|
|
||||||
class ModeratedModeTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
def testModeratedMode(self):
|
|
||||||
# test the +m channel mode
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", "MODE #chan +m")
|
|
||||||
replies = self.getMessages("chanop")
|
|
||||||
modeLines = [line for line in replies if line.command == "MODE"]
|
|
||||||
self.assertMessageMatch(modeLines[0], command="MODE", params=["#chan", "+m"])
|
|
||||||
|
|
||||||
self.connectClient("baz", name="baz")
|
|
||||||
self.joinChannel("baz", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
# this message should be suppressed completely by +m
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi from baz")
|
|
||||||
replies = self.getMessages("baz")
|
|
||||||
reply_cmds = {reply.command for reply in replies}
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, reply_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
# grant +v, user should be able to send messages
|
|
||||||
self.sendLine("chanop", "MODE #chan +v baz")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.getMessages("baz")
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi again from baz")
|
|
||||||
self.getMessages("baz")
|
|
||||||
relays = self.getMessages("chanop")
|
|
||||||
relay = relays[0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
relay, command="PRIVMSG", params=["#chan", "hi again from baz"]
|
|
||||||
)
|
|
@ -1,271 +0,0 @@
|
|||||||
"""
|
|
||||||
Mute extban, currently no specifications or ways to discover it.
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.numerics import ERR_CANNOTSENDTOCHAN, ERR_CHANOPRIVSNEEDED
|
|
||||||
from irctest.patma import ANYLIST, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class MuteExtbanTestCase(cases.BaseServerTestCase):
|
|
||||||
"""https://defs.ircdocs.horse/defs/isupport.html#extban
|
|
||||||
|
|
||||||
It magically guesses what char the IRCd uses for mutes."""
|
|
||||||
|
|
||||||
def char(self):
|
|
||||||
if self.controller.extban_mute_char is None:
|
|
||||||
raise runner.ExtbanNotSupported("", "mute")
|
|
||||||
else:
|
|
||||||
return self.controller.extban_mute_char
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testISupport(self):
|
|
||||||
self.connectClient("chk") # Fetches ISUPPORT
|
|
||||||
isupport = self.server_support
|
|
||||||
token = isupport["EXTBAN"]
|
|
||||||
prefix, comma, types = token.partition(",")
|
|
||||||
self.assertIn(self.char(), types, f"Missing '{self.char()}' in ISUPPORT EXTBAN")
|
|
||||||
self.assertEqual(prefix, "")
|
|
||||||
self.assertEqual(comma, ",")
|
|
||||||
|
|
||||||
@cases.mark_specifications("ircdocs")
|
|
||||||
def testMuteExtban(self):
|
|
||||||
"""Basic usage of mute"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
|
|
||||||
isupport = self.server_support
|
|
||||||
token = isupport.get("EXTBAN", "")
|
|
||||||
prefix, comma, types = token.partition(",")
|
|
||||||
if self.char() not in types:
|
|
||||||
raise runner.ExtbanNotSupported(self.char(), "mute")
|
|
||||||
|
|
||||||
clients = ("chanop", "bar")
|
|
||||||
|
|
||||||
# Mute "bar"
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", f"MODE #chan +b {prefix}{self.char()}:bar!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.connectClient("bar", name="bar", capabilities=["echo-message"])
|
|
||||||
self.joinChannel("bar", "#chan")
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
# "bar" sees the MODE too
|
|
||||||
self.sendLine("bar", "MODE #chan +b")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage("bar"),
|
|
||||||
command="367",
|
|
||||||
params=[
|
|
||||||
"bar",
|
|
||||||
"#chan",
|
|
||||||
f"{prefix}{self.char()}:bar!*@*",
|
|
||||||
StrRe("chanop(!.*)?"),
|
|
||||||
*ANYLIST,
|
|
||||||
],
|
|
||||||
)
|
|
||||||
self.getMessages("bar")
|
|
||||||
|
|
||||||
# "bar" talks: rejected
|
|
||||||
self.sendLine("bar", "PRIVMSG #chan :hi from bar")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertNotIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
# remove mute on "bar" with -b
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", f"MODE #chan -b {prefix}{self.char()}:bar!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
# "bar" can now talk
|
|
||||||
self.sendLine("bar", "PRIVMSG #chan :hi again from bar")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertNotIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(
|
|
||||||
self.getMessages("chanop"),
|
|
||||||
[msg for msg in replies if msg.command == "PRIVMSG"],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("ircdocs")
|
|
||||||
def testMuteExtbanVoiced(self):
|
|
||||||
"""Checks +v overrides the mute"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
|
|
||||||
isupport = self.server_support
|
|
||||||
token = isupport.get("EXTBAN", "")
|
|
||||||
prefix, comma, types = token.partition(",")
|
|
||||||
if self.char() not in types:
|
|
||||||
raise runner.ExtbanNotSupported(self.char(), "mute")
|
|
||||||
|
|
||||||
clients = ("chanop", "qux")
|
|
||||||
|
|
||||||
# Mute "qux"
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", f"MODE #chan +b {prefix}{self.char()}:qux!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"qux", name="qux", ident="evan", capabilities=["echo-message"]
|
|
||||||
)
|
|
||||||
self.joinChannel("qux", "#chan")
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
# "qux" talks: rejected
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :hi from qux")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertNotIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
# +v grants an exemption to +b
|
|
||||||
self.sendLine("chanop", "MODE #chan +v qux")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
# so "qux" can now talk
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :hi again from qux")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertNotIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(
|
|
||||||
self.getMessages("chanop"),
|
|
||||||
[msg for msg in replies if msg.command == "PRIVMSG"],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("ircdocs")
|
|
||||||
def testMuteExtbanExempt(self):
|
|
||||||
"""Checks +e overrides the mute
|
|
||||||
|
|
||||||
<https://defs.ircdocs.horse/defs/chanmodes.html#e-ban-exception>"""
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
|
|
||||||
isupport = self.server_support
|
|
||||||
token = isupport.get("EXTBAN", "")
|
|
||||||
prefix, comma, types = token.partition(",")
|
|
||||||
if self.char() not in types:
|
|
||||||
raise runner.ExtbanNotSupported(self.char(), "mute")
|
|
||||||
if "e" not in self.server_support["CHANMODES"]:
|
|
||||||
raise runner.ChannelModeNotSupported(self.char(), "mute")
|
|
||||||
|
|
||||||
clients = ("chanop", "qux")
|
|
||||||
|
|
||||||
# Mute "qux"
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", f"MODE #chan +b {prefix}{self.char()}:qux!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"qux", name="qux", ident="evan", capabilities=["echo-message"]
|
|
||||||
)
|
|
||||||
self.joinChannel("qux", "#chan")
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
# "qux" talks: rejected
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :hi from qux")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertNotIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
# +e grants an exemption to +b
|
|
||||||
self.sendLine("chanop", f"MODE #chan +e {prefix}{self.char()}:*!*evan@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.getMessages("qux")
|
|
||||||
|
|
||||||
# so "qux" can now talk
|
|
||||||
self.sendLine("qux", "PRIVMSG #chan :thanks for mute-excepting me")
|
|
||||||
replies = self.getMessages("qux")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertNotIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(
|
|
||||||
self.getMessages("chanop"),
|
|
||||||
[msg for msg in replies if msg.command == "PRIVMSG"],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testCapitalization(self):
|
|
||||||
"""
|
|
||||||
Regression test for oragono #1370: mutes not correctly enforced against
|
|
||||||
users with capital letters in their NUH
|
|
||||||
|
|
||||||
For consistency with regular -b, which allows unsetting up to
|
|
||||||
normalization
|
|
||||||
"""
|
|
||||||
clients = ("chanop", "bar")
|
|
||||||
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
|
|
||||||
isupport = self.server_support
|
|
||||||
token = isupport.get("EXTBAN", "")
|
|
||||||
prefix, comma, types = token.partition(",")
|
|
||||||
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
self.sendLine("chanop", f"MODE #chan +b {prefix}{self.char()}:BAR!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.connectClient("Bar", name="bar", capabilities=["echo-message"])
|
|
||||||
self.joinChannel("bar", "#chan")
|
|
||||||
|
|
||||||
for client in clients:
|
|
||||||
self.getMessages(client)
|
|
||||||
|
|
||||||
self.sendLine("bar", "PRIVMSG #chan :hi from bar")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertNotIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
# remove mute with -b
|
|
||||||
self.sendLine("chanop", f"MODE #chan -b {prefix}{self.char()}:bar!*@*")
|
|
||||||
replies = {msg.command for msg in self.getMessages("chanop")}
|
|
||||||
self.assertIn("MODE", replies)
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
# "bar" can talk again
|
|
||||||
self.sendLine("bar", "PRIVMSG #chan :hi again from bar")
|
|
||||||
replies = self.getMessages("bar")
|
|
||||||
replies_cmds = {msg.command for msg in replies}
|
|
||||||
self.assertIn("PRIVMSG", replies_cmds)
|
|
||||||
self.assertNotIn(ERR_CANNOTSENDTOCHAN, replies_cmds)
|
|
||||||
self.assertEqual(
|
|
||||||
self.getMessages("chanop"),
|
|
||||||
[msg for msg in replies if msg.command == "PRIVMSG"],
|
|
||||||
)
|
|
@ -1,38 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel "no external messages" mode (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.3.1>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#no-external-messages-mode>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_CANNOTSENDTOCHAN
|
|
||||||
|
|
||||||
|
|
||||||
class NoExternalMessagesTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "Modern")
|
|
||||||
def testNoExternalMessagesMode(self):
|
|
||||||
# test the +n channel mode
|
|
||||||
self.connectClient("chanop", name="chanop")
|
|
||||||
self.joinChannel("chanop", "#chan")
|
|
||||||
self.sendLine("chanop", "MODE #chan +n")
|
|
||||||
self.getMessages("chanop")
|
|
||||||
|
|
||||||
self.connectClient("baz", name="baz")
|
|
||||||
# this message should be suppressed completely by +n
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi from baz")
|
|
||||||
replies = self.getMessages("baz")
|
|
||||||
reply_cmds = {reply.command for reply in replies}
|
|
||||||
self.assertIn(ERR_CANNOTSENDTOCHAN, reply_cmds)
|
|
||||||
self.assertEqual(self.getMessages("chanop"), [])
|
|
||||||
|
|
||||||
# set the channel to -n: baz should be able to send now
|
|
||||||
self.sendLine("chanop", "MODE #chan -n")
|
|
||||||
replies = self.getMessages("chanop")
|
|
||||||
modeLines = [line for line in replies if line.command == "MODE"]
|
|
||||||
self.assertMessageMatch(modeLines[0], command="MODE", params=["#chan", "-n"])
|
|
||||||
self.sendLine("baz", "PRIVMSG #chan :hi again from baz")
|
|
||||||
self.getMessages("baz")
|
|
||||||
relays = self.getMessages("chanop")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
relays[0], command="PRIVMSG", params=["#chan", "hi again from baz"]
|
|
||||||
)
|
|
@ -1,62 +0,0 @@
|
|||||||
"""
|
|
||||||
Channel secrecy mode (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.3.1>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.3>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#secret-channel-mode>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import RPL_LIST
|
|
||||||
|
|
||||||
|
|
||||||
class SecretChannelTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "Modern")
|
|
||||||
def testSecretChannelListCommand(self):
|
|
||||||
"""
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.6>
|
|
||||||
|
|
||||||
"Likewise, secret channels are not listed
|
|
||||||
at all unless the client is a member of the channel in question."
|
|
||||||
|
|
||||||
<https://modern.ircdocs.horse/#secret-channel-mode>
|
|
||||||
"A channel that is set to secret will not show up in responses to
|
|
||||||
the LIST or NAMES command unless the client sending the command is
|
|
||||||
joined to the channel."
|
|
||||||
"""
|
|
||||||
|
|
||||||
def get_listed_channels(replies):
|
|
||||||
channels = set()
|
|
||||||
for reply in replies:
|
|
||||||
# skip pseudo-channels (&SERVER, &NOTICES) listed by ngircd
|
|
||||||
# and ircu:
|
|
||||||
if reply.command == RPL_LIST and reply.params[1].startswith("#"):
|
|
||||||
channels.add(reply.params[1])
|
|
||||||
return channels
|
|
||||||
|
|
||||||
# test that a silent channel is shown in list if the user is in the channel.
|
|
||||||
self.connectClient("first", name="first")
|
|
||||||
self.joinChannel("first", "#gen")
|
|
||||||
self.getMessages("first")
|
|
||||||
self.sendLine("first", "MODE #gen +s")
|
|
||||||
# run command LIST
|
|
||||||
self.sendLine("first", "LIST")
|
|
||||||
replies = self.getMessages("first")
|
|
||||||
self.assertEqual(get_listed_channels(replies), {"#gen"})
|
|
||||||
|
|
||||||
# test that another client would not see the secret
|
|
||||||
# channel.
|
|
||||||
self.connectClient("second", name="second")
|
|
||||||
self.getMessages("second")
|
|
||||||
self.sendLine("second", "LIST")
|
|
||||||
replies = self.getMessages("second")
|
|
||||||
# RPL_LIST 322 should NOT be present this time.
|
|
||||||
self.assertEqual(get_listed_channels(replies), set())
|
|
||||||
|
|
||||||
# Second client will join the secret channel
|
|
||||||
# and call command LIST. The channel SHOULD
|
|
||||||
# appear this time.
|
|
||||||
self.joinChannel("second", "#gen")
|
|
||||||
self.sendLine("second", "LIST")
|
|
||||||
replies = self.getMessages("second")
|
|
||||||
# Should be only one line with command RPL_LIST
|
|
||||||
self.assertEqual(get_listed_channels(replies), {"#gen"})
|
|
@ -1,40 +0,0 @@
|
|||||||
"""
|
|
||||||
`Ergo <https://ergo.chat/>`_-specific tests for nick collisions based on Unicode
|
|
||||||
confusable characters
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_NICKNAMEINUSE, RPL_WELCOME
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
class ConfusablesTestCase(cases.BaseServerTestCase):
|
|
||||||
@staticmethod
|
|
||||||
def config() -> cases.TestCaseControllerConfig:
|
|
||||||
return cases.TestCaseControllerConfig(
|
|
||||||
ergo_config=lambda config: config["accounts"].update(
|
|
||||||
{"nick-reservation": {"enabled": True, "method": "strict"}}
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testConfusableNicks(self):
|
|
||||||
self.controller.registerUser(self, "evan", "sesame")
|
|
||||||
|
|
||||||
self.addClient(1)
|
|
||||||
# U+0435 in place of e:
|
|
||||||
self.sendLine(1, "NICK еvan")
|
|
||||||
self.sendLine(1, "USER a 0 * a")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
commands = set(msg.command for msg in messages)
|
|
||||||
self.assertNotIn(RPL_WELCOME, commands)
|
|
||||||
self.assertIn(ERR_NICKNAMEINUSE, commands)
|
|
||||||
|
|
||||||
self.connectClient(
|
|
||||||
"evan", name="evan", password="sesame", capabilities=["sasl"]
|
|
||||||
)
|
|
||||||
# should be able to switch to the confusable nick
|
|
||||||
self.sendLine("evan", "NICK еvan")
|
|
||||||
messages = self.getMessages("evan")
|
|
||||||
commands = set(msg.command for msg in messages)
|
|
||||||
self.assertIn("NICK", commands)
|
|
@ -1,208 +0,0 @@
|
|||||||
"""
|
|
||||||
Tests section 4.1 of RFC 1459.
|
|
||||||
<https://tools.ietf.org/html/rfc1459#section-4.1>
|
|
||||||
|
|
||||||
TODO: cross-reference Modern and RFC 2812 too
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.client_mock import ConnectionClosed
|
|
||||||
from irctest.numerics import ERR_NEEDMOREPARAMS, ERR_PASSWDMISMATCH
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class PasswordedConnectionRegistrationTestCase(cases.BaseServerTestCase):
|
|
||||||
password = "testpassword"
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812")
|
|
||||||
def testPassBeforeNickuser(self):
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "PASS {}".format(self.password))
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :Realname")
|
|
||||||
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="001",
|
|
||||||
fail_msg="Did not get 001 after correct PASS+NICK+USER: {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812")
|
|
||||||
def testNoPassword(self):
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :Realname")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertNotEqual(
|
|
||||||
m.command, "001", msg="Got 001 after NICK+USER but missing PASS"
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testWrongPassword(self):
|
|
||||||
"""
|
|
||||||
"If the password supplied does not match the password expected by the server,
|
|
||||||
then the server SHOULD send ERR_PASSWDMISMATCH and MUST close the connection
|
|
||||||
with ERROR."
|
|
||||||
-- https://github.com/ircdocs/modern-irc/pull/172
|
|
||||||
"""
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "PASS {}".format(self.password + "garbage"))
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :Realname")
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertNotEqual(
|
|
||||||
m.command, "001", msg="Got 001 after NICK+USER but incorrect PASS"
|
|
||||||
)
|
|
||||||
self.assertIn(m.command, {ERR_PASSWDMISMATCH, "ERROR"})
|
|
||||||
|
|
||||||
if m.command == "ERR_PASSWDMISMATCH":
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertEqual(
|
|
||||||
m.command, "ERROR", msg="ERR_PASSWDMISMATCH not followed by ERROR."
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", strict=True)
|
|
||||||
def testPassAfterNickuser(self):
|
|
||||||
"""“The password can and must be set before any attempt to register
|
|
||||||
the connection is made.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.1.1>
|
|
||||||
|
|
||||||
“The optional password can and MUST be set before any attempt to
|
|
||||||
register the connection is made.
|
|
||||||
Currently this requires that user send a PASS command before
|
|
||||||
sending the NICK/USER combination.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-3.1.1>
|
|
||||||
"""
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :Realname")
|
|
||||||
self.sendLine(1, "PASS {}".format(self.password))
|
|
||||||
m = self.getRegistrationMessage(1)
|
|
||||||
self.assertNotEqual(m.command, "001", "Got 001 after PASS sent after NICK+USER")
|
|
||||||
|
|
||||||
|
|
||||||
class ConnectionRegistrationTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459")
|
|
||||||
def testQuitDisconnects(self):
|
|
||||||
"""“The server must close the connection to a client which sends a
|
|
||||||
QUIT message.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.1.3>
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "QUIT")
|
|
||||||
with self.assertRaises(ConnectionClosed):
|
|
||||||
self.getMessages(1) # Fetch remaining messages
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
@cases.xfailIfSoftware(["Charybdis", "Solanum"], "very flaky")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["ircu2", "Nefarious", "snircd"], "ircu2 does not send ERROR"
|
|
||||||
)
|
|
||||||
def testQuitErrors(self):
|
|
||||||
"""“A client session is terminated with a quit message. The server
|
|
||||||
acknowledges this by sending an ERROR message to the client.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-3.1.7>
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "QUIT")
|
|
||||||
while True:
|
|
||||||
try:
|
|
||||||
new_messages = self.getMessages(1)
|
|
||||||
if not new_messages:
|
|
||||||
break
|
|
||||||
commands = {m.command for m in new_messages}
|
|
||||||
except ConnectionClosed:
|
|
||||||
break
|
|
||||||
self.assertIn(
|
|
||||||
"ERROR", commands, fail_msg="Did not receive ERROR as a reply to QUIT."
|
|
||||||
)
|
|
||||||
|
|
||||||
def testNickCollision(self):
|
|
||||||
"""A user connects and requests the same nickname as an already
|
|
||||||
registered user.
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(2, "NICK foo")
|
|
||||||
self.sendLine(2, "USER username * * :Realname")
|
|
||||||
m = self.getRegistrationMessage(2)
|
|
||||||
self.assertNotEqual(
|
|
||||||
m.command,
|
|
||||||
"001",
|
|
||||||
"Received 001 after registering with the nick of a " "registered user.",
|
|
||||||
)
|
|
||||||
|
|
||||||
def testEarlyNickCollision(self):
|
|
||||||
"""Two users register simultaneously with the same nick."""
|
|
||||||
self.addClient()
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(2, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :Realname")
|
|
||||||
|
|
||||||
try:
|
|
||||||
self.sendLine(2, "USER username * * :Realname")
|
|
||||||
except (ConnectionClosed, ConnectionResetError):
|
|
||||||
# Bahamut closes the connection here
|
|
||||||
pass
|
|
||||||
|
|
||||||
try:
|
|
||||||
m1 = self.getRegistrationMessage(1)
|
|
||||||
except (ConnectionClosed, ConnectionResetError):
|
|
||||||
# Unreal closes the connection, see
|
|
||||||
# https://bugs.unrealircd.org/view.php?id=5950
|
|
||||||
command1 = None
|
|
||||||
else:
|
|
||||||
command1 = m1.command
|
|
||||||
|
|
||||||
try:
|
|
||||||
m2 = self.getRegistrationMessage(2)
|
|
||||||
except (ConnectionClosed, ConnectionResetError):
|
|
||||||
# ditto
|
|
||||||
command2 = None
|
|
||||||
else:
|
|
||||||
command2 = m2.command
|
|
||||||
|
|
||||||
self.assertNotEqual(
|
|
||||||
(command1, command2),
|
|
||||||
("001", "001"),
|
|
||||||
"Two concurrently registering requesting the same nickname "
|
|
||||||
"both got 001.",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertIn(
|
|
||||||
"001",
|
|
||||||
(command1, command2),
|
|
||||||
"Two concurrently registering requesting the same nickname "
|
|
||||||
"neither got 001.",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["ircu2", "Nefarious", "ngIRCd"],
|
|
||||||
"uses a default value instead of ERR_NEEDMOREPARAMS",
|
|
||||||
)
|
|
||||||
def testEmptyRealname(self):
|
|
||||||
"""
|
|
||||||
Syntax:
|
|
||||||
"<client> <command> :Not enough parameters"
|
|
||||||
-- https://defs.ircdocs.horse/defs/numerics.html#err-needmoreparams-461
|
|
||||||
-- https://modern.ircdocs.horse/#errneedmoreparams-461
|
|
||||||
|
|
||||||
Use of this numeric:
|
|
||||||
"The minimum length of `<username>` is 1, ie. it MUST not be empty.
|
|
||||||
If it is empty, the server SHOULD reject the command with ERR_NEEDMOREPARAMS
|
|
||||||
(even an empty parameter is provided)"
|
|
||||||
https://github.com/ircdocs/modern-irc/issues/85
|
|
||||||
"""
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(1, "NICK foo")
|
|
||||||
self.sendLine(1, "USER username * * :")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getRegistrationMessage(1),
|
|
||||||
command=ERR_NEEDMOREPARAMS,
|
|
||||||
params=[StrRe(r"(\*|foo)"), "USER", ANYSTR],
|
|
||||||
)
|
|
@ -1,135 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 echo-message <https://ircv3.net/specs/extensions/echo-message>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.irc_utils.junkdrawer import random_name
|
|
||||||
from irctest.patma import ANYDICT
|
|
||||||
|
|
||||||
|
|
||||||
class EchoMessageTestCase(cases.BaseServerTestCase):
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"command,solo,server_time",
|
|
||||||
[
|
|
||||||
("PRIVMSG", False, False),
|
|
||||||
("PRIVMSG", True, True),
|
|
||||||
("PRIVMSG", False, True),
|
|
||||||
("NOTICE", False, True),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
@cases.mark_capabilities("echo-message")
|
|
||||||
def testEchoMessage(self, command, solo, server_time):
|
|
||||||
"""<http://ircv3.net/specs/extensions/echo-message-3.2.html>"""
|
|
||||||
if server_time:
|
|
||||||
self.connectClient(
|
|
||||||
"baz",
|
|
||||||
capabilities=["echo-message", "server-time"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
self.connectClient(
|
|
||||||
"baz",
|
|
||||||
capabilities=["echo-message", "server-time"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
|
|
||||||
if not solo:
|
|
||||||
capabilities = ["server-time"] if server_time else None
|
|
||||||
self.connectClient("qux", capabilities=capabilities)
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
|
|
||||||
# Synchronize and clean
|
|
||||||
self.getMessages(1)
|
|
||||||
if not solo:
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "{} #chan :hello everyone".format(command))
|
|
||||||
m1 = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m1,
|
|
||||||
command=command,
|
|
||||||
params=["#chan", "hello everyone"],
|
|
||||||
fail_msg="Did not echo “{} #chan :hello everyone”: {msg}",
|
|
||||||
extra_format=(command,),
|
|
||||||
)
|
|
||||||
|
|
||||||
if not solo:
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m2,
|
|
||||||
command=command,
|
|
||||||
params=["#chan", "hello everyone"],
|
|
||||||
fail_msg="Did not propagate “{} #chan :hello everyone”: "
|
|
||||||
"after echoing it to the author: {msg}",
|
|
||||||
extra_format=(command,),
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
m1.params,
|
|
||||||
m2.params,
|
|
||||||
fail_msg="Parameters of forwarded and echoed " "messages differ: {} {}",
|
|
||||||
extra_format=(m1, m2),
|
|
||||||
)
|
|
||||||
if server_time:
|
|
||||||
self.assertIn(
|
|
||||||
"time",
|
|
||||||
m1.tags,
|
|
||||||
fail_msg="Echoed message is missing server time: {}",
|
|
||||||
extra_format=(m1,),
|
|
||||||
)
|
|
||||||
self.assertIn(
|
|
||||||
"time",
|
|
||||||
m2.tags,
|
|
||||||
fail_msg="Forwarded message is missing server time: {}",
|
|
||||||
extra_format=(m2,),
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.arbitrary_client_tags
|
|
||||||
@cases.mark_capabilities(
|
|
||||||
"batch", "labeled-response", "echo-message", "message-tags"
|
|
||||||
)
|
|
||||||
def testDirectMessageEcho(self):
|
|
||||||
bar = random_name("bar")
|
|
||||||
self.connectClient(
|
|
||||||
bar,
|
|
||||||
name=bar,
|
|
||||||
capabilities=["batch", "labeled-response", "echo-message", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(bar)
|
|
||||||
|
|
||||||
qux = random_name("qux")
|
|
||||||
self.connectClient(
|
|
||||||
qux,
|
|
||||||
name=qux,
|
|
||||||
capabilities=["batch", "labeled-response", "echo-message", "message-tags"],
|
|
||||||
)
|
|
||||||
self.getMessages(qux)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
bar,
|
|
||||||
"@label=xyz;+example-client-tag=example-value PRIVMSG %s :hi there"
|
|
||||||
% (qux,),
|
|
||||||
)
|
|
||||||
echo = self.getMessages(bar)[0]
|
|
||||||
delivery = self.getMessages(qux)[0]
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
echo,
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=[qux, "hi there"],
|
|
||||||
tags={"label": "xyz", "+example-client-tag": "example-value", **ANYDICT},
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
delivery,
|
|
||||||
command="PRIVMSG",
|
|
||||||
params=[qux, "hi there"],
|
|
||||||
tags={"+example-client-tag": "example-value", **ANYDICT},
|
|
||||||
)
|
|
||||||
|
|
||||||
# Either both messages have a msgid, or neither does
|
|
||||||
self.assertEqual(delivery.tags.get("msgid"), echo.tags.get("msgid"))
|
|
@ -1,29 +0,0 @@
|
|||||||
"""
|
|
||||||
`Ergo <https://ergo.chat/>`-specific tests of NickServ.
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import RPL_YOUREOPER
|
|
||||||
|
|
||||||
|
|
||||||
class NickservTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def test_saregister(self):
|
|
||||||
self.connectClient("root", name="root")
|
|
||||||
self.sendLine("root", "OPER operuser operpassword")
|
|
||||||
self.assertIn(RPL_YOUREOPER, {msg.command for msg in self.getMessages("root")})
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
"root",
|
|
||||||
"PRIVMSG NickServ :SAREGISTER saregister_test saregistertestpassphrase",
|
|
||||||
)
|
|
||||||
self.getMessages("root")
|
|
||||||
|
|
||||||
# test that the account was registered
|
|
||||||
self.connectClient(
|
|
||||||
name="saregister_test",
|
|
||||||
nick="saregister_test",
|
|
||||||
capabilities=["sasl"],
|
|
||||||
account="saregister_test",
|
|
||||||
password="saregistertestpassphrase",
|
|
||||||
)
|
|
@ -1,69 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 extended-join <https://ircv3.net/specs/extensions/extended-join>`_
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
|
|
||||||
|
|
||||||
@cases.mark_services
|
|
||||||
class MetadataTestCase(cases.BaseServerTestCase):
|
|
||||||
def connectRegisteredClient(self, nick):
|
|
||||||
self.addClient()
|
|
||||||
self.sendLine(2, "CAP LS 302")
|
|
||||||
capabilities = self.getCapLs(2)
|
|
||||||
assert "sasl" in capabilities
|
|
||||||
self.requestCapabilities(2, ["sasl"], skip_if_cap_nak=False)
|
|
||||||
self.sendLine(2, "AUTHENTICATE PLAIN")
|
|
||||||
m = self.getRegistrationMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="AUTHENTICATE",
|
|
||||||
params=["+"],
|
|
||||||
fail_msg="Sent “AUTHENTICATE PLAIN”, server should have "
|
|
||||||
"replied with “AUTHENTICATE +”, but instead sent: {msg}",
|
|
||||||
)
|
|
||||||
self.sendLine(2, "AUTHENTICATE amlsbGVzAGppbGxlcwBzZXNhbWU=")
|
|
||||||
m = self.getRegistrationMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="900",
|
|
||||||
fail_msg="Did not send 900 after correct SASL authentication.",
|
|
||||||
)
|
|
||||||
self.sendLine(2, "USER f * * :Realname")
|
|
||||||
self.sendLine(2, "NICK {}".format(nick))
|
|
||||||
self.sendLine(2, "CAP END")
|
|
||||||
self.skipToWelcome(2)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("extended-join")
|
|
||||||
def testNotLoggedIn(self):
|
|
||||||
self.connectClient("foo", capabilities=["extended-join"], skip_if_cap_nak=True)
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="JOIN",
|
|
||||||
params=["#chan", "*", "Realname"],
|
|
||||||
fail_msg="Expected “JOIN #chan * :Realname” after "
|
|
||||||
"unregistered user joined, got: {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("extended-join")
|
|
||||||
@cases.skipUnlessHasMechanism("PLAIN")
|
|
||||||
def testLoggedIn(self):
|
|
||||||
self.connectClient("foo", capabilities=["extended-join"], skip_if_cap_nak=True)
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.controller.registerUser(self, "jilles", "sesame")
|
|
||||||
self.connectRegisteredClient("bar")
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="JOIN",
|
|
||||||
params=["#chan", "jilles", "Realname"],
|
|
||||||
fail_msg="Expected “JOIN #chan * :Realname” after "
|
|
||||||
"nick “bar” logged in as “jilles” joined, got: {msg}",
|
|
||||||
)
|
|
@ -1,126 +0,0 @@
|
|||||||
"""
|
|
||||||
The HELP and HELPOP command (`Modern <https://modern.ircdocs.horse/#help-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
import functools
|
|
||||||
import re
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.numerics import (
|
|
||||||
ERR_HELPNOTFOUND,
|
|
||||||
ERR_UNKNOWNCOMMAND,
|
|
||||||
RPL_ENDOFHELP,
|
|
||||||
RPL_HELPSTART,
|
|
||||||
RPL_HELPTXT,
|
|
||||||
)
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
def with_xfails(f):
|
|
||||||
@functools.wraps(f)
|
|
||||||
def newf(self, command, *args, **kwargs):
|
|
||||||
if command == "HELP" and self.controller.software_name == "Bahamut":
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"fail because Bahamut forwards /HELP to HelpServ (but not /HELPOP)"
|
|
||||||
)
|
|
||||||
|
|
||||||
if self.controller.software_name in ("irc2", "ircu2", "ngIRCd"):
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"numerics in reply to /HELP and /HELPOP (uses NOTICE instead)"
|
|
||||||
)
|
|
||||||
|
|
||||||
if self.controller.software_name == "UnrealIRCd":
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"fails because Unreal uses custom numerics "
|
|
||||||
"https://github.com/unrealircd/unrealircd/pull/184"
|
|
||||||
)
|
|
||||||
|
|
||||||
return f(self, command, *args, **kwargs)
|
|
||||||
|
|
||||||
return newf
|
|
||||||
|
|
||||||
|
|
||||||
class HelpTestCase(cases.BaseServerTestCase):
|
|
||||||
def _assertValidHelp(self, messages, subject):
|
|
||||||
if subject != ANYSTR:
|
|
||||||
subject = StrRe("(?i)" + re.escape(subject))
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[0],
|
|
||||||
command=RPL_HELPSTART,
|
|
||||||
params=["nick", subject, ANYSTR],
|
|
||||||
fail_msg=f"Expected {RPL_HELPSTART} (RPL_HELPSTART), got: {{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[-1],
|
|
||||||
command=RPL_ENDOFHELP,
|
|
||||||
params=["nick", subject, ANYSTR],
|
|
||||||
fail_msg=f"Expected {RPL_ENDOFHELP} (RPL_ENDOFHELP), got: {{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
for i in range(1, len(messages) - 1):
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[i],
|
|
||||||
command=RPL_HELPTXT,
|
|
||||||
params=["nick", subject, ANYSTR],
|
|
||||||
fail_msg=f"Expected {RPL_HELPTXT} (RPL_HELPTXT), got: {{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("command", ["HELP", "HELPOP"])
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
@with_xfails
|
|
||||||
def testHelpNoArg(self, command):
|
|
||||||
self.connectClient("nick")
|
|
||||||
self.sendLine(1, f"{command}")
|
|
||||||
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
|
|
||||||
if messages[0].command == ERR_UNKNOWNCOMMAND:
|
|
||||||
raise runner.OptionalCommandNotSupported(command)
|
|
||||||
|
|
||||||
self._assertValidHelp(messages, ANYSTR)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("command", ["HELP", "HELPOP"])
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
@with_xfails
|
|
||||||
def testHelpPrivmsg(self, command):
|
|
||||||
self.connectClient("nick")
|
|
||||||
self.sendLine(1, f"{command} PRIVMSG")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
|
|
||||||
if messages[0].command == ERR_UNKNOWNCOMMAND:
|
|
||||||
raise runner.OptionalCommandNotSupported(command)
|
|
||||||
|
|
||||||
self._assertValidHelp(messages, "PRIVMSG")
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("command", ["HELP", "HELPOP"])
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
@with_xfails
|
|
||||||
def testHelpUnknownSubject(self, command):
|
|
||||||
self.connectClient("nick")
|
|
||||||
self.sendLine(1, f"{command} THISISNOTACOMMAND")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
|
|
||||||
if messages[0].command == ERR_UNKNOWNCOMMAND:
|
|
||||||
raise runner.OptionalCommandNotSupported(command)
|
|
||||||
|
|
||||||
if messages[0].command == ERR_HELPNOTFOUND:
|
|
||||||
# Inspircd, Hybrid et al
|
|
||||||
self.assertEqual(len(messages), 1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[0],
|
|
||||||
command=ERR_HELPNOTFOUND,
|
|
||||||
params=[
|
|
||||||
"nick",
|
|
||||||
StrRe(
|
|
||||||
"(?i)THISISNOTACOMMAND"
|
|
||||||
), # case-insensitive, for Hybrid and Plexus4 (but not Chary et al)
|
|
||||||
ANYSTR,
|
|
||||||
],
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
# Unrealircd
|
|
||||||
self._assertValidHelp(messages, ANYSTR)
|
|
@ -1,118 +0,0 @@
|
|||||||
"""
|
|
||||||
The INFO command (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.3.8>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.4.10>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#info-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_NOSUCHSERVER, RPL_ENDOFINFO, RPL_INFO, RPL_YOUREOPER
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
|
|
||||||
class InfoTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern")
|
|
||||||
def testInfo(self):
|
|
||||||
"""
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.3.8>
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc2812#section-3.4.10>
|
|
||||||
|
|
||||||
"Upon receiving an INFO command, the given server will respond with zero or
|
|
||||||
more RPL_INFO replies, followed by one RPL_ENDOFINFO numeric"
|
|
||||||
-- <https://modern.ircdocs.horse/#info-message>
|
|
||||||
"""
|
|
||||||
self.connectClient("nick")
|
|
||||||
|
|
||||||
# Remote /INFO is oper-only on Unreal and ircu2
|
|
||||||
self.sendLine(1, "OPER operuser operpassword")
|
|
||||||
self.assertIn(
|
|
||||||
RPL_YOUREOPER,
|
|
||||||
[m.command for m in self.getMessages(1)],
|
|
||||||
fail_msg="OPER failed",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "INFO")
|
|
||||||
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
last_message = messages.pop()
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
last_message, command=RPL_ENDOFINFO, params=["nick", ANYSTR]
|
|
||||||
)
|
|
||||||
|
|
||||||
for message in messages:
|
|
||||||
self.assertMessageMatch(message, command=RPL_INFO, params=["nick", ANYSTR])
|
|
||||||
|
|
||||||
@pytest.mark.parametrize(
|
|
||||||
"target",
|
|
||||||
["My.Little.Server", "*Little*", "nick"],
|
|
||||||
ids=["target-server", "target-wildcard", "target-nick"],
|
|
||||||
)
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", deprecated=True)
|
|
||||||
def testInfoTarget(self, target):
|
|
||||||
"""
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.3.8>
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc2812#section-3.4.10>
|
|
||||||
|
|
||||||
"Upon receiving an INFO command, the given server will respond with zero or
|
|
||||||
more RPL_INFO replies, followed by one RPL_ENDOFINFO numeric"
|
|
||||||
-- <https://modern.ircdocs.horse/#info-message>
|
|
||||||
"""
|
|
||||||
self.connectClient("nick")
|
|
||||||
|
|
||||||
# Remote /INFO is oper-only on Unreal and ircu2
|
|
||||||
self.sendLine(1, "OPER operuser operpassword")
|
|
||||||
self.assertIn(
|
|
||||||
RPL_YOUREOPER,
|
|
||||||
[m.command for m in self.getMessages(1)],
|
|
||||||
fail_msg="OPER failed",
|
|
||||||
)
|
|
||||||
|
|
||||||
if target:
|
|
||||||
self.sendLine(1, "INFO My.Little.Server")
|
|
||||||
else:
|
|
||||||
self.sendLine(1, "INFO")
|
|
||||||
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
last_message = messages.pop()
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
last_message, command=RPL_ENDOFINFO, params=["nick", ANYSTR]
|
|
||||||
)
|
|
||||||
|
|
||||||
for message in messages:
|
|
||||||
self.assertMessageMatch(message, command=RPL_INFO, params=["nick", ANYSTR])
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("target", ["invalid.server.example", "invalidserver"])
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", deprecated=True)
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Ergo"], "does not apply to Ergo, which ignores the optional <target> argument"
|
|
||||||
)
|
|
||||||
def testInfoNosuchserver(self, target):
|
|
||||||
"""
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.3.8>
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc2812#section-3.4.10>
|
|
||||||
|
|
||||||
"Upon receiving an INFO command, the given server will respond with zero or
|
|
||||||
more RPL_INFO replies, followed by one RPL_ENDOFINFO numeric"
|
|
||||||
-- <https://modern.ircdocs.horse/#info-message>
|
|
||||||
"""
|
|
||||||
self.connectClient("nick")
|
|
||||||
|
|
||||||
# Remote /INFO is oper-only on Unreal and ircu2
|
|
||||||
self.sendLine(1, "OPER operuser operpassword")
|
|
||||||
self.assertIn(
|
|
||||||
RPL_YOUREOPER,
|
|
||||||
[m.command for m in self.getMessages(1)],
|
|
||||||
fail_msg="OPER failed",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, f"INFO {target}")
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=ERR_NOSUCHSERVER,
|
|
||||||
params=["nick", target, ANYSTR],
|
|
||||||
)
|
|
@ -1,495 +0,0 @@
|
|||||||
"""
|
|
||||||
The INVITE command (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.7>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.7>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#invite-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.numerics import (
|
|
||||||
ERR_BANNEDFROMCHAN,
|
|
||||||
ERR_CHANOPRIVSNEEDED,
|
|
||||||
ERR_INVITEONLYCHAN,
|
|
||||||
ERR_NEEDMOREPARAMS,
|
|
||||||
ERR_NOSUCHNICK,
|
|
||||||
ERR_NOTONCHANNEL,
|
|
||||||
ERR_USERONCHANNEL,
|
|
||||||
RPL_INVITING,
|
|
||||||
)
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class InviteTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testInvites(self):
|
|
||||||
"""Test some basic functionality related to INVITE and the +i mode.
|
|
||||||
|
|
||||||
https://modern.ircdocs.horse/#invite-only-channel-mode
|
|
||||||
https://modern.ircdocs.horse/#rplinviting-341
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
self.sendLine(1, "MODE #chan +i")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertEqual(m.command, ERR_NOSUCHNICK)
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
m = self.getMessage(2)
|
|
||||||
self.assertEqual(m.command, ERR_INVITEONLYCHAN)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
# modern/ircv3 param order: inviter, invitee, channel
|
|
||||||
self.assertMessageMatch(m, command=RPL_INVITING, params=["foo", "bar", "#chan"])
|
|
||||||
m = self.getMessage(2)
|
|
||||||
self.assertMessageMatch(m, command="INVITE", params=["bar", "#chan"])
|
|
||||||
self.assertTrue(m.prefix.startswith("foo")) # nickmask of inviter
|
|
||||||
|
|
||||||
# we were invited, so join should succeed now
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", deprecated=True)
|
|
||||||
def testInviteNonExistingChannelTransmitted(self):
|
|
||||||
"""“There is no requirement that the channel the target user is being
|
|
||||||
invited to must exist or be a valid channel.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.2.7>
|
|
||||||
and <https://tools.ietf.org/html/rfc2812#section-3.2.7>
|
|
||||||
|
|
||||||
“Only the user inviting and the user being invited will receive
|
|
||||||
notification of the invitation.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-3.2.7>
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.sendLine(1, "INVITE #chan bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
messages = self.getMessages(2)
|
|
||||||
self.assertNotEqual(
|
|
||||||
messages,
|
|
||||||
[],
|
|
||||||
fail_msg="After using “INVITE #chan bar” while #chan does "
|
|
||||||
"not exist, “bar” received nothing.",
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[0],
|
|
||||||
command="INVITE",
|
|
||||||
params=["#chan", "bar"],
|
|
||||||
fail_msg="After “foo” invited “bar” do non-existing channel "
|
|
||||||
"#chan, “bar” should have received “INVITE #chan bar” but "
|
|
||||||
"got this instead: {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", deprecated=True)
|
|
||||||
def testInviteNonExistingChannelEchoed(self):
|
|
||||||
"""“There is no requirement that the channel the target user is being
|
|
||||||
invited to must exist or be a valid channel.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.2.7>
|
|
||||||
and <https://tools.ietf.org/html/rfc2812#section-3.2.7>
|
|
||||||
|
|
||||||
“Only the user inviting and the user being invited will receive
|
|
||||||
notification of the invitation.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-3.2.7>
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.sendLine(1, "INVITE #chan bar")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
self.assertNotEqual(
|
|
||||||
messages,
|
|
||||||
[],
|
|
||||||
fail_msg="After using “INVITE #chan bar” while #chan does "
|
|
||||||
"not exist, the author received nothing.",
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[0],
|
|
||||||
command="INVITE",
|
|
||||||
params=["#chan", "bar"],
|
|
||||||
fail_msg="After “foo” invited “bar” do non-existing channel "
|
|
||||||
"#chan, “foo” should have received “INVITE #chan bar” but "
|
|
||||||
"got this instead: {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
def _testInvite(self, opped, invite_only):
|
|
||||||
"""
|
|
||||||
"Only the user inviting and the user being invited will receive
|
|
||||||
notification of the invitation."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.7
|
|
||||||
|
|
||||||
" 341 RPL_INVITING
|
|
||||||
"<channel> <nick>"
|
|
||||||
|
|
||||||
- Returned by the server to indicate that the
|
|
||||||
attempted INVITE message was successful and is
|
|
||||||
being passed onto the end client."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc1459
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812
|
|
||||||
|
|
||||||
"When the invite is successful, the server MUST send a `RPL_INVITING`
|
|
||||||
numeric to the command issuer, and an `INVITE` message,
|
|
||||||
with the issuer as prefix, to the target user."
|
|
||||||
-- https://modern.ircdocs.horse/#invite-message
|
|
||||||
|
|
||||||
"### `RPL_INVITING (341)`
|
|
||||||
|
|
||||||
<client> <nick> <channel>
|
|
||||||
|
|
||||||
Sent as a reply to the [`INVITE`](#invite-message) command to indicate
|
|
||||||
that the attempt was successful and the client with the nickname `<nick>`
|
|
||||||
has been invited to `<channel>`.
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
if invite_only:
|
|
||||||
self.sendLine(1, "MODE #chan +i")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command="MODE",
|
|
||||||
params=["#chan", "+i"],
|
|
||||||
)
|
|
||||||
|
|
||||||
if not opped:
|
|
||||||
self.sendLine(1, "MODE #chan -o foo")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command="MODE",
|
|
||||||
params=["#chan", "-o", "foo"],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=RPL_INVITING,
|
|
||||||
params=["foo", "bar", "#chan"],
|
|
||||||
fail_msg=f"After “foo” invited “bar” to a channel, “foo” should have "
|
|
||||||
f"received “{RPL_INVITING} foo #chan bar” but got this instead: "
|
|
||||||
f"{{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
messages = self.getMessages(2)
|
|
||||||
self.assertNotEqual(
|
|
||||||
messages,
|
|
||||||
[],
|
|
||||||
fail_msg="After using “INVITE #chan bar”, “bar” received nothing.",
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
messages[0],
|
|
||||||
prefix=StrRe("foo!.*"),
|
|
||||||
command="INVITE",
|
|
||||||
params=["bar", "#chan"],
|
|
||||||
fail_msg="After “foo” invited “bar”, “bar” should have received "
|
|
||||||
"“INVITE bar #chan” but got this instead: {msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("invite_only", [True, False])
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern")
|
|
||||||
def testInvite(self, invite_only):
|
|
||||||
self._testInvite(opped=True, invite_only=invite_only)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern", strict=True)
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Hybrid", "Plexus4"], "the only strict test that Hybrid fails"
|
|
||||||
)
|
|
||||||
def testInviteUnopped(self):
|
|
||||||
"""Tests invites from unopped users on not-invite-only chans."""
|
|
||||||
self._testInvite(opped=False, invite_only=False)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern")
|
|
||||||
def testInviteNoNotificationForOtherMembers(self):
|
|
||||||
"""
|
|
||||||
"Other channel members are not notified."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.7
|
|
||||||
|
|
||||||
"Other channel members SHOULD NOT be notified."
|
|
||||||
-- https://modern.ircdocs.horse/#invite-message
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.connectClient("baz")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(3)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(3, "JOIN #chan")
|
|
||||||
self.getMessages(3)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
self.getMessages(3),
|
|
||||||
[],
|
|
||||||
fail_msg="After foo used “INVITE #chan bar”, other channel members "
|
|
||||||
"were notified: {got}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Plexus4"],
|
|
||||||
"Plexus4 allows non-op to invite if (and only if) the channel is not "
|
|
||||||
"invite-only",
|
|
||||||
)
|
|
||||||
def testInviteInviteOnly(self):
|
|
||||||
"""
|
|
||||||
"To invite a user to a channel which is invite only (MODE
|
|
||||||
+i), the client sending the invite must be recognised as being a
|
|
||||||
channel operator on the given channel."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.7
|
|
||||||
|
|
||||||
"When the channel has invite-only
|
|
||||||
flag set, only channel operators may issue INVITE command."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.7
|
|
||||||
|
|
||||||
"When the channel has [invite-only](#invite-only-channel-mode) mode set,
|
|
||||||
only channel operators may issue INVITE command.
|
|
||||||
Otherwise, the server MUST reject the command with the `ERR_CHANOPRIVSNEEDED`
|
|
||||||
numeric."
|
|
||||||
-- https://modern.ircdocs.horse/#invite-message
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "MODE #chan +i")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command="MODE",
|
|
||||||
params=["#chan", "+i"],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "MODE #chan -o foo")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command="MODE",
|
|
||||||
params=["#chan", "-o", "foo"],
|
|
||||||
)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=ERR_CHANOPRIVSNEEDED,
|
|
||||||
params=["foo", "#chan", ANYSTR],
|
|
||||||
fail_msg=f"After “foo” invited “bar” to a channel to an invite-only "
|
|
||||||
f"channel without being opped, “foo” should have received "
|
|
||||||
f"“{ERR_CHANOPRIVSNEEDED} foo #chan :*” but got this instead: {{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern")
|
|
||||||
def testInviteOnlyFromUsersInChannel(self):
|
|
||||||
"""
|
|
||||||
"if the channel exists, only members of the channel are allowed
|
|
||||||
to invite other users"
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.7
|
|
||||||
|
|
||||||
" 442 ERR_NOTONCHANNEL
|
|
||||||
"<channel> :You're not on that channel"
|
|
||||||
|
|
||||||
- Returned by the server whenever a client tries to
|
|
||||||
perform a channel affecting command for which the
|
|
||||||
client isn't a member.
|
|
||||||
"
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812
|
|
||||||
|
|
||||||
|
|
||||||
" Only members of the channel are allowed to invite other users.
|
|
||||||
Otherwise, the server MUST reject the command with the `ERR_NOTONCHANNEL`
|
|
||||||
numeric."
|
|
||||||
-- https://modern.ircdocs.horse/#invite-message
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.connectClient("baz")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(3)
|
|
||||||
|
|
||||||
# Create the channel
|
|
||||||
self.sendLine(3, "JOIN #chan")
|
|
||||||
self.getMessages(3)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=ERR_NOTONCHANNEL,
|
|
||||||
params=["foo", "#chan", ANYSTR],
|
|
||||||
fail_msg=f"After “foo” invited “bar” to a channel it is not on "
|
|
||||||
f"#chan, “foo” should have received "
|
|
||||||
f"“ERR_NOTONCHANNEL ({ERR_NOTONCHANNEL}) foo #chan :*” but "
|
|
||||||
f"got this instead: {{msg}}",
|
|
||||||
)
|
|
||||||
|
|
||||||
messages = self.getMessages(2)
|
|
||||||
self.assertEqual(
|
|
||||||
messages,
|
|
||||||
[],
|
|
||||||
fail_msg="After using “INVITE #chan bar” while the emitter is "
|
|
||||||
"not in #chan, “bar” received something.",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testInviteAlreadyInChannel(self):
|
|
||||||
"""
|
|
||||||
"If the user is already on the target channel,
|
|
||||||
the server MUST reject the command with the `ERR_USERONCHANNEL` numeric."
|
|
||||||
-- https://modern.ircdocs.horse/#invite-message
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command=ERR_USERONCHANNEL,
|
|
||||||
params=["foo", "bar", "#chan", ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["ircu2"],
|
|
||||||
"Uses 346/347 instead of 336/337 to reply to INVITE "
|
|
||||||
"https://github.com/UndernetIRC/ircu2/pull/20",
|
|
||||||
)
|
|
||||||
def testInviteList(self):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "INVITE bar #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(2, "INVITE")
|
|
||||||
m = self.getMessage(2)
|
|
||||||
if m.command == ERR_NEEDMOREPARAMS:
|
|
||||||
raise runner.OptionalExtensionNotSupported("INVITE with no parameter")
|
|
||||||
if m.command != "337":
|
|
||||||
# Hybrid always sends an empty list; so skip this.
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="336",
|
|
||||||
params=["bar", "#chan"],
|
|
||||||
)
|
|
||||||
m = self.getMessage(2)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="337",
|
|
||||||
params=["bar", ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_isupport("INVEX")
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testInvexList(self):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
if "INVEX" in self.server_support:
|
|
||||||
invex = self.server_support.get("INVEX") or "I"
|
|
||||||
else:
|
|
||||||
raise runner.IsupportTokenNotSupported("INVEX")
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, f"MODE #chan +{invex} bar!*@*")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, f"MODE #chan +{invex}")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
if len(m.params) == 3:
|
|
||||||
# Old format
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="346",
|
|
||||||
params=["foo", "#chan", "bar!*@*"],
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="346",
|
|
||||||
params=[
|
|
||||||
"foo",
|
|
||||||
"#chan",
|
|
||||||
"bar!*@*",
|
|
||||||
StrRe("foo(!.*@.*)?"),
|
|
||||||
StrRe("[0-9]+"),
|
|
||||||
],
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
self.getMessage(1),
|
|
||||||
command="347",
|
|
||||||
params=["foo", "#chan", ANYSTR],
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Ergo")
|
|
||||||
def testInviteExemptsFromBan(self):
|
|
||||||
# regression test for ergochat/ergo#1876;
|
|
||||||
# INVITE should override a +b ban
|
|
||||||
self.connectClient("alice", name="alice")
|
|
||||||
self.joinChannel("alice", "#alice")
|
|
||||||
self.sendLine("alice", "MODE #alice +b bob!*@*")
|
|
||||||
result = {msg.command for msg in self.getMessages("alice")}
|
|
||||||
self.assertIn("MODE", result)
|
|
||||||
|
|
||||||
self.connectClient("bob", name="bob")
|
|
||||||
self.sendLine("bob", "JOIN #alice")
|
|
||||||
result = {msg.command for msg in self.getMessages("bob")}
|
|
||||||
self.assertIn(ERR_BANNEDFROMCHAN, result)
|
|
||||||
self.assertNotIn("JOIN", result)
|
|
||||||
|
|
||||||
self.sendLine("alice", "INVITE bob #alice")
|
|
||||||
result = {msg.command for msg in self.getMessages("alice")}
|
|
||||||
self.assertIn(RPL_INVITING, result)
|
|
||||||
self.assertNotIn(ERR_USERONCHANNEL, result)
|
|
||||||
|
|
||||||
result = {msg.command for msg in self.getMessages("bob")}
|
|
||||||
self.assertIn("INVITE", result)
|
|
||||||
|
|
||||||
self.sendLine("bob", "JOIN #alice")
|
|
||||||
result = {msg.command for msg in self.getMessages("bob")}
|
|
||||||
self.assertNotIn(ERR_BANNEDFROMCHAN, result)
|
|
||||||
self.assertIn("JOIN", result)
|
|
||||||
|
|
||||||
self.sendLine("alice", "KICK #alice bob")
|
|
||||||
self.getMessages("alice")
|
|
||||||
result = {msg.command for msg in self.getMessages("bob")}
|
|
||||||
self.assertIn("KICK", result)
|
|
||||||
|
|
||||||
# INVITE gets "used up" after one JOIN
|
|
||||||
self.sendLine("bob", "JOIN #alice")
|
|
||||||
result = {msg.command for msg in self.getMessages("bob")}
|
|
||||||
self.assertIn(ERR_BANNEDFROMCHAN, result)
|
|
||||||
self.assertNotIn("JOIN", result)
|
|
@ -1,89 +0,0 @@
|
|||||||
"""
|
|
||||||
RPL_ISUPPORT: `format <https://modern.ircdocs.horse/#rplisupport-005>`__
|
|
||||||
and various `tokens <https://modern.ircdocs.horse/#rplisupport-parameters>`__
|
|
||||||
"""
|
|
||||||
|
|
||||||
import re
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
|
|
||||||
|
|
||||||
class IsupportTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
@cases.mark_isupport("PREFIX")
|
|
||||||
def testPrefix(self):
|
|
||||||
"""https://modern.ircdocs.horse/#prefix-parameter"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
|
|
||||||
if "PREFIX" not in self.server_support:
|
|
||||||
raise runner.IsupportTokenNotSupported("PREFIX")
|
|
||||||
|
|
||||||
if self.server_support["PREFIX"] == "":
|
|
||||||
# "The value is OPTIONAL and when it is not specified indicates that no
|
|
||||||
# prefixes are supported."
|
|
||||||
return
|
|
||||||
|
|
||||||
m = re.match(
|
|
||||||
r"\((?P<modes>[a-zA-Z]+)\)(?P<prefixes>\S+)", self.server_support["PREFIX"]
|
|
||||||
)
|
|
||||||
self.assertTrue(
|
|
||||||
m,
|
|
||||||
f"PREFIX={self.server_support['PREFIX']} does not have the expected "
|
|
||||||
f"format.",
|
|
||||||
)
|
|
||||||
|
|
||||||
modes = m.group("modes")
|
|
||||||
prefixes = m.group("prefixes")
|
|
||||||
|
|
||||||
# "There is a one-to-one mapping between prefixes and channel modes."
|
|
||||||
self.assertEqual(
|
|
||||||
len(modes), len(prefixes), "Mismatched length of prefix and channel modes."
|
|
||||||
)
|
|
||||||
|
|
||||||
# "The prefixes in this parameter are in descending order, from the prefix
|
|
||||||
# that gives the most privileges to the prefix that gives the least."
|
|
||||||
self.assertLess(modes.index("o"), modes.index("v"), "'o' is not before 'v'")
|
|
||||||
if "h" in modes:
|
|
||||||
self.assertLess(modes.index("o"), modes.index("h"), "'o' is not before 'h'")
|
|
||||||
self.assertLess(modes.index("h"), modes.index("v"), "'h' is not before 'v'")
|
|
||||||
if "q" in modes:
|
|
||||||
self.assertLess(modes.index("q"), modes.index("o"), "'q' is not before 'o'")
|
|
||||||
|
|
||||||
# Not technically in the spec, but it would be very confusing not to follow
|
|
||||||
# these conventions.
|
|
||||||
mode_to_prefix = dict(zip(modes, prefixes))
|
|
||||||
self.assertEqual(mode_to_prefix["o"], "@", "Prefix char for mode +o is not @")
|
|
||||||
self.assertEqual(mode_to_prefix["v"], "+", "Prefix char for mode +v is not +")
|
|
||||||
if "h" in modes:
|
|
||||||
self.assertEqual(
|
|
||||||
mode_to_prefix["h"], "%", "Prefix char for mode +h is not %"
|
|
||||||
)
|
|
||||||
if "q" in modes:
|
|
||||||
self.assertEqual(
|
|
||||||
mode_to_prefix["q"], "~", "Prefix char for mode +q is not ~"
|
|
||||||
)
|
|
||||||
if "a" in modes:
|
|
||||||
self.assertEqual(
|
|
||||||
mode_to_prefix["a"], "&", "Prefix char for mode +a is not &"
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern", "ircdocs")
|
|
||||||
@cases.mark_isupport("TARGMAX")
|
|
||||||
def testTargmax(self):
|
|
||||||
"""
|
|
||||||
"Format: TARGMAX=[<command>:[limit]{,<command>:[limit]}]"
|
|
||||||
-- https://modern.ircdocs.horse/#targmax-parameter
|
|
||||||
|
|
||||||
"TARGMAX=[cmd:[number][,cmd:[number][,...]]]"
|
|
||||||
-- https://defs.ircdocs.horse/defs/isupport.html#targmax
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
|
|
||||||
if "TARGMAX" not in self.server_support:
|
|
||||||
raise runner.IsupportTokenNotSupported("TARGMAX")
|
|
||||||
|
|
||||||
parts = self.server_support["TARGMAX"].split(",")
|
|
||||||
for part in parts:
|
|
||||||
self.assertTrue(
|
|
||||||
re.match("[A-Z]+:[0-9]*", part), "Invalid TARGMAX key:value: %r", part
|
|
||||||
)
|
|
@ -1,238 +0,0 @@
|
|||||||
"""
|
|
||||||
The JOIN command (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.1>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.1>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#join-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
from irctest import cases, runner
|
|
||||||
from irctest.irc_utils import ambiguities
|
|
||||||
from irctest.numerics import (
|
|
||||||
ERR_BADCHANMASK,
|
|
||||||
ERR_FORBIDDENCHANNEL,
|
|
||||||
ERR_NOSUCHCHANNEL,
|
|
||||||
RPL_ENDOFNAMES,
|
|
||||||
RPL_NAMREPLY,
|
|
||||||
)
|
|
||||||
from irctest.patma import ANYSTR, StrRe
|
|
||||||
|
|
||||||
ERR_BADCHANNAME = "479" # Hybrid only, and conflicts with others
|
|
||||||
|
|
||||||
|
|
||||||
JOIN_ERROR_NUMERICS = {
|
|
||||||
ERR_BADCHANMASK,
|
|
||||||
ERR_NOSUCHCHANNEL,
|
|
||||||
ERR_FORBIDDENCHANNEL,
|
|
||||||
ERR_BADCHANNAME,
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
class JoinTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", strict=True)
|
|
||||||
def testJoinAllMessages(self):
|
|
||||||
"""“If a JOIN is successful, the user receives a JOIN message as
|
|
||||||
confirmation and is then sent the channel's topic (using RPL_TOPIC) and
|
|
||||||
the list of users who are on the channel (using RPL_NAMREPLY), which
|
|
||||||
MUST include the user joining.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-3.2.1>
|
|
||||||
|
|
||||||
“If a JOIN is successful, the user is then sent the channel's topic
|
|
||||||
(using RPL_TOPIC) and the list of users who are on the channel (using
|
|
||||||
RPL_NAMREPLY), which must include the user joining.”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.2.1>
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
received_commands = {m.command for m in self.getMessages(1)}
|
|
||||||
expected_commands = {RPL_NAMREPLY, RPL_ENDOFNAMES, "JOIN"}
|
|
||||||
acceptable_commands = expected_commands | {"MODE"}
|
|
||||||
self.assertLessEqual( # set inclusion
|
|
||||||
expected_commands,
|
|
||||||
received_commands,
|
|
||||||
"Server sent {} commands, but at least {} were expected.".format(
|
|
||||||
received_commands, expected_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
self.assertLessEqual( # ditto
|
|
||||||
received_commands,
|
|
||||||
acceptable_commands,
|
|
||||||
"Server sent {} commands, but only {} were expected.".format(
|
|
||||||
received_commands, acceptable_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
def testJoinNamreply(self):
|
|
||||||
"""“353 RPL_NAMREPLY
|
|
||||||
"( "=" / "*" / "@" ) <channel>
|
|
||||||
:[ "@" / "+" ] <nick> *( " " [ "@" / "+" ] <nick> )”
|
|
||||||
-- <https://tools.ietf.org/html/rfc2812#section-5.2>
|
|
||||||
|
|
||||||
This test makes a user join and check what is sent to them.
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
|
|
||||||
for m in self.getMessages(1):
|
|
||||||
if m.command == "353":
|
|
||||||
self.assertIn(
|
|
||||||
len(m.params),
|
|
||||||
(3, 4),
|
|
||||||
m,
|
|
||||||
fail_msg="RPL_NAM_REPLY with number of arguments "
|
|
||||||
"<3 or >4: {msg}",
|
|
||||||
)
|
|
||||||
params = ambiguities.normalize_namreply_params(m.params)
|
|
||||||
self.assertIn(
|
|
||||||
params[1],
|
|
||||||
"=*@",
|
|
||||||
m,
|
|
||||||
fail_msg="Bad channel prefix: {item} not in {list}: {msg}",
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
params[2],
|
|
||||||
"#chan",
|
|
||||||
m,
|
|
||||||
fail_msg="Bad channel name: {got} instead of " "{expects}: {msg}",
|
|
||||||
)
|
|
||||||
self.assertIn(
|
|
||||||
params[3],
|
|
||||||
{"foo", "@foo", "+foo"},
|
|
||||||
m,
|
|
||||||
fail_msg="Bad user list: should contain only user "
|
|
||||||
'"foo" with an optional "+" or "@" prefix, but got: '
|
|
||||||
"{msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
def testJoinTwice(self):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(m, command="JOIN", params=["#chan"])
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
# Note that there may be no message. Both RFCs require replies only
|
|
||||||
# if the join is successful, or has an error among the given set.
|
|
||||||
for m in self.getMessages(1):
|
|
||||||
if m.command == "353":
|
|
||||||
self.assertIn(
|
|
||||||
len(m.params),
|
|
||||||
(3, 4),
|
|
||||||
m,
|
|
||||||
fail_msg="RPL_NAM_REPLY with number of arguments "
|
|
||||||
"<3 or >4: {msg}",
|
|
||||||
)
|
|
||||||
params = ambiguities.normalize_namreply_params(m.params)
|
|
||||||
self.assertIn(
|
|
||||||
params[1],
|
|
||||||
"=*@",
|
|
||||||
m,
|
|
||||||
fail_msg="Bad channel prefix: {item} not in {list}: {msg}",
|
|
||||||
)
|
|
||||||
self.assertEqual(
|
|
||||||
params[2],
|
|
||||||
"#chan",
|
|
||||||
m,
|
|
||||||
fail_msg="Bad channel name: {got} instead of " "{expects}: {msg}",
|
|
||||||
)
|
|
||||||
self.assertIn(
|
|
||||||
params[3],
|
|
||||||
{"foo", "@foo", "+foo"},
|
|
||||||
m,
|
|
||||||
fail_msg='Bad user list after user "foo" joined twice '
|
|
||||||
"the same channel: should contain only user "
|
|
||||||
'"foo" with an optional "+" or "@" prefix, but got: '
|
|
||||||
"{msg}",
|
|
||||||
)
|
|
||||||
|
|
||||||
def testJoinPartiallyInvalid(self):
|
|
||||||
"""TODO: specify this in Modern"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
if int(self.targmax.get("JOIN") or "4") < 2:
|
|
||||||
raise runner.OptionalExtensionNotSupported("multi-channel JOIN")
|
|
||||||
|
|
||||||
self.sendLine(1, "JOIN #valid,inv@lid")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
received_commands = {m.command for m in messages}
|
|
||||||
expected_commands = {RPL_NAMREPLY, RPL_ENDOFNAMES, "JOIN"}
|
|
||||||
acceptable_commands = expected_commands | JOIN_ERROR_NUMERICS | {"MODE"}
|
|
||||||
self.assertLessEqual(
|
|
||||||
expected_commands,
|
|
||||||
received_commands,
|
|
||||||
"Server sent {} commands, but at least {} were expected.".format(
|
|
||||||
received_commands, expected_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
self.assertLessEqual(
|
|
||||||
received_commands,
|
|
||||||
acceptable_commands,
|
|
||||||
"Server sent {} commands, but only {} were expected.".format(
|
|
||||||
received_commands, acceptable_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
nb_errors = 0
|
|
||||||
for m in messages:
|
|
||||||
if m.command in JOIN_ERROR_NUMERICS:
|
|
||||||
nb_errors += 1
|
|
||||||
self.assertMessageMatch(m, params=["foo", "inv@lid", ANYSTR])
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
nb_errors,
|
|
||||||
1,
|
|
||||||
fail_msg="Expected 1 error when joining channels '#valid' and 'inv@lid', "
|
|
||||||
"got {got}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("batch", "labeled-response")
|
|
||||||
def testJoinPartiallyInvalidLabeledResponse(self):
|
|
||||||
"""TODO: specify this in Modern"""
|
|
||||||
self.connectClient(
|
|
||||||
"foo", capabilities=["batch", "labeled-response"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
if int(self.targmax.get("JOIN") or "4") < 2:
|
|
||||||
raise runner.OptionalExtensionNotSupported("multi-channel JOIN")
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=label1 JOIN #valid,inv@lid")
|
|
||||||
messages = self.getMessages(1)
|
|
||||||
|
|
||||||
first_msg = messages.pop(0)
|
|
||||||
last_msg = messages.pop(-1)
|
|
||||||
self.assertMessageMatch(
|
|
||||||
first_msg, command="BATCH", params=[StrRe(r"\+.*"), "labeled-response"]
|
|
||||||
)
|
|
||||||
batch_id = first_msg.params[0][1:]
|
|
||||||
self.assertMessageMatch(last_msg, command="BATCH", params=["-" + batch_id])
|
|
||||||
|
|
||||||
received_commands = {m.command for m in messages}
|
|
||||||
expected_commands = {RPL_NAMREPLY, RPL_ENDOFNAMES, "JOIN"}
|
|
||||||
acceptable_commands = expected_commands | JOIN_ERROR_NUMERICS | {"MODE"}
|
|
||||||
self.assertLessEqual(
|
|
||||||
expected_commands,
|
|
||||||
received_commands,
|
|
||||||
"Server sent {} commands, but at least {} were expected.".format(
|
|
||||||
received_commands, expected_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
self.assertLessEqual(
|
|
||||||
received_commands,
|
|
||||||
acceptable_commands,
|
|
||||||
"Server sent {} commands, but only {} were expected.".format(
|
|
||||||
received_commands, acceptable_commands
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
nb_errors = 0
|
|
||||||
for m in messages:
|
|
||||||
self.assertIn("batch", m.tags)
|
|
||||||
self.assertEqual(m.tags["batch"], batch_id)
|
|
||||||
if m.command in JOIN_ERROR_NUMERICS:
|
|
||||||
nb_errors += 1
|
|
||||||
self.assertMessageMatch(m, params=["foo", "inv@lid", ANYSTR])
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
nb_errors,
|
|
||||||
1,
|
|
||||||
fail_msg="Expected 1 error when joining channels '#valid' and 'inv@lid', "
|
|
||||||
"got {got}",
|
|
||||||
)
|
|
@ -1,274 +0,0 @@
|
|||||||
"""
|
|
||||||
The KICK command (`RFC 1459
|
|
||||||
<https://datatracker.ietf.org/doc/html/rfc1459#section-4.2.1>`__,
|
|
||||||
`RFC 2812 <https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.>`__,
|
|
||||||
`Modern <https://modern.ircdocs.horse/#kick-message>`__)
|
|
||||||
"""
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases, client_mock, runner
|
|
||||||
from irctest.numerics import (
|
|
||||||
ERR_CHANOPRIVSNEEDED,
|
|
||||||
ERR_NOSUCHCHANNEL,
|
|
||||||
ERR_NOTONCHANNEL,
|
|
||||||
RPL_NAMREPLY,
|
|
||||||
)
|
|
||||||
from irctest.patma import ANYSTR
|
|
||||||
|
|
||||||
|
|
||||||
class KickTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_specifications("RFC1459", "RFC2812", "Modern")
|
|
||||||
def testKickSendsMessages(self):
|
|
||||||
"""“Once a user has joined a channel, he receives information about
|
|
||||||
all commands his server receives affecting the channel. This
|
|
||||||
includes […] KICK”
|
|
||||||
-- <https://tools.ietf.org/html/rfc1459#section-4.2.1>
|
|
||||||
and <https://tools.ietf.org/html/rfc2812#section-3.2.1>
|
|
||||||
|
|
||||||
"If a comment is given, this will be sent instead of the default message,
|
|
||||||
the nickname of the user targeted by the KICK."
|
|
||||||
-- https://modern.ircdocs.horse/#kick-message
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("baz")
|
|
||||||
self.joinChannel(3, "#chan")
|
|
||||||
|
|
||||||
# TODO: check foo is an operator
|
|
||||||
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(3)
|
|
||||||
self.sendLine(1, "KICK #chan bar :bye")
|
|
||||||
try:
|
|
||||||
m = self.getMessage(1)
|
|
||||||
if m.command == "482":
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"Channel creators are not opped by default."
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(m, command="KICK")
|
|
||||||
except client_mock.NoMessageException:
|
|
||||||
# The RFCs do not say KICK must be echoed
|
|
||||||
pass
|
|
||||||
m = self.getMessage(2)
|
|
||||||
self.assertMessageMatch(m, command="KICK", params=["#chan", "bar", "bye"])
|
|
||||||
m = self.getMessage(3)
|
|
||||||
self.assertMessageMatch(m, command="KICK", params=["#chan", "bar", "bye"])
|
|
||||||
|
|
||||||
def _testKickNoComment(self, check_default):
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("baz")
|
|
||||||
self.joinChannel(3, "#chan")
|
|
||||||
|
|
||||||
# TODO: check foo is an operator
|
|
||||||
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(3)
|
|
||||||
self.sendLine(1, "KICK #chan bar")
|
|
||||||
try:
|
|
||||||
m = self.getMessage(1)
|
|
||||||
if m.command == "482":
|
|
||||||
raise runner.ImplementationChoice(
|
|
||||||
"Channel creators are not opped by default."
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(m, command="KICK")
|
|
||||||
except client_mock.NoMessageException:
|
|
||||||
# The RFCs do not say KICK must be echoed
|
|
||||||
pass
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
m3 = self.getMessage(3)
|
|
||||||
if check_default:
|
|
||||||
self.assertMessageMatch(m2, command="KICK", params=["#chan", "bar", "foo"])
|
|
||||||
self.assertMessageMatch(m3, command="KICK", params=["#chan", "bar", "foo"])
|
|
||||||
else:
|
|
||||||
self.assertMessageMatch(m2, command="KICK", params=["#chan", "bar", ANYSTR])
|
|
||||||
self.assertMessageMatch(m3, command="KICK", params=["#chan", "bar", ANYSTR])
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
@cases.xfailIfSoftware(
|
|
||||||
["Charybdis", "ircu2", "irc2", "Solanum"],
|
|
||||||
"uses the nick of the kickee rather than the kicker.",
|
|
||||||
)
|
|
||||||
def testKickDefaultComment(self):
|
|
||||||
"""
|
|
||||||
"If a "comment" is
|
|
||||||
given, this will be sent instead of the default message, the nickname
|
|
||||||
of the user issuing the KICK."
|
|
||||||
-- https://datatracker.ietf.org/doc/html/rfc2812#section-3.2.8
|
|
||||||
"""
|
|
||||||
self._testKickNoComment(check_default=True)
|
|
||||||
|
|
||||||
@cases.mark_specifications("Modern")
|
|
||||||
def testKickNoComment(self):
|
|
||||||
"""
|
|
||||||
"If no comment is given, the server SHOULD use a default message instead."
|
|
||||||
-- https://modern.ircdocs.horse/#kick-message
|
|
||||||
"""
|
|
||||||
self._testKickNoComment(check_default=False)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
def testKickPrivileges(self):
|
|
||||||
"""Test who has the ability to kick / what error codes are sent
|
|
||||||
for invalid kicks."""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(1, "JOIN #chan")
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.sendLine(2, "JOIN #chan")
|
|
||||||
|
|
||||||
messages = self.getMessages(2)
|
|
||||||
names = set()
|
|
||||||
for message in messages:
|
|
||||||
if message.command == RPL_NAMREPLY:
|
|
||||||
names.update(set(message.params[-1].split()))
|
|
||||||
# assert foo is opped
|
|
||||||
self.assertIn("@foo", names, f"unexpected names: {names}")
|
|
||||||
|
|
||||||
self.connectClient("baz")
|
|
||||||
|
|
||||||
self.sendLine(3, "KICK #chan bar")
|
|
||||||
replies = set(m.command for m in self.getMessages(3))
|
|
||||||
self.assertTrue(
|
|
||||||
ERR_NOTONCHANNEL in replies
|
|
||||||
or ERR_CHANOPRIVSNEEDED in replies
|
|
||||||
or ERR_NOSUCHCHANNEL in replies,
|
|
||||||
f"did not receive acceptable error code for kick from outside channel: "
|
|
||||||
f"{replies}",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.joinChannel(3, "#chan")
|
|
||||||
self.getMessages(3)
|
|
||||||
self.sendLine(3, "KICK #chan bar")
|
|
||||||
replies = set(m.command for m in self.getMessages(3))
|
|
||||||
# now we're a channel member so we should receive ERR_CHANOPRIVSNEEDED
|
|
||||||
self.assertIn(ERR_CHANOPRIVSNEEDED, replies)
|
|
||||||
|
|
||||||
self.sendLine(1, "MODE #chan +o baz")
|
|
||||||
self.getMessages(1)
|
|
||||||
# should be able to kick an unprivileged user:
|
|
||||||
self.sendLine(3, "KICK #chan bar")
|
|
||||||
# should be able to kick an operator:
|
|
||||||
self.sendLine(3, "KICK #chan foo")
|
|
||||||
baz_replies = set(m.command for m in self.getMessages(3))
|
|
||||||
self.assertNotIn(ERR_CHANOPRIVSNEEDED, baz_replies)
|
|
||||||
kick_targets = [m.params[1] for m in self.getMessages(1) if m.command == "KICK"]
|
|
||||||
# foo should see bar and foo being kicked
|
|
||||||
self.assertTrue(
|
|
||||||
any(target.startswith("foo") for target in kick_targets),
|
|
||||||
f"unexpected kick targets: {kick_targets}",
|
|
||||||
)
|
|
||||||
self.assertTrue(
|
|
||||||
any(target.startswith("bar") for target in kick_targets),
|
|
||||||
f"unexpected kick targets: {kick_targets}",
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_specifications("RFC2812")
|
|
||||||
def testKickNonexistentChannel(self):
|
|
||||||
"""“Kick command [...] Numeric replies: [...] ERR_NOSUCHCHANNEL."""
|
|
||||||
self.connectClient("nick")
|
|
||||||
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.sendLine(1, "KICK #chan nick")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
# should return ERR_NOSUCHCHANNEL
|
|
||||||
self.assertMessageMatch(m, command="403")
|
|
||||||
|
|
||||||
@pytest.mark.parametrize("multiple_targets", [True, False])
|
|
||||||
@cases.mark_specifications("RFC2812", "Modern", "ircdocs")
|
|
||||||
def testDoubleKickMessages(self, multiple_targets):
|
|
||||||
"""“The server MUST NOT send KICK messages with multiple channels or
|
|
||||||
users to clients. This is necessarily to maintain backward
|
|
||||||
compatibility with old client software.”
|
|
||||||
-- https://tools.ietf.org/html/rfc2812#section-3.2.8
|
|
||||||
|
|
||||||
"The server MUST NOT send KICK messages with multiple channels or
|
|
||||||
users to clients.
|
|
||||||
This is necessary to maintain backward compatibility with existing
|
|
||||||
client software."
|
|
||||||
-- https://modern.ircdocs.horse/#kick-message
|
|
||||||
|
|
||||||
"Servers MAY limit the number of target users per `KICK` command
|
|
||||||
via the [`TARGMAX` parameter of `RPL_ISUPPORT`](#targmax-parameter),
|
|
||||||
and silently drop targets if the number of targets exceeds the limit."
|
|
||||||
-- https://modern.ircdocs.horse/#kick-message
|
|
||||||
|
|
||||||
"If the "TARGMAX" parameter is not advertised or a value is not sent
|
|
||||||
then a client SHOULD assume that no commands except the "JOIN" and "PART"
|
|
||||||
commands accept multiple parameters."
|
|
||||||
-- https://defs.ircdocs.horse/defs/isupport.html#targmax
|
|
||||||
|
|
||||||
"If this parameter is not advertised or a value is not sent then a client
|
|
||||||
SHOULD assume that no commands except the `JOIN` and `PART` commands
|
|
||||||
accept multiple parameters."
|
|
||||||
-- https://github.com/ircdocs/modern-irc/pull/113
|
|
||||||
|
|
||||||
"If <limit> is not specified, then there is no maximum number of targets
|
|
||||||
for that command."
|
|
||||||
-- https://modern.ircdocs.horse/#targmax-parameter
|
|
||||||
"""
|
|
||||||
self.connectClient("foo")
|
|
||||||
self.joinChannel(1, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("bar")
|
|
||||||
self.joinChannel(2, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("baz")
|
|
||||||
self.joinChannel(3, "#chan")
|
|
||||||
|
|
||||||
self.connectClient("qux")
|
|
||||||
self.joinChannel(4, "#chan")
|
|
||||||
|
|
||||||
if self.targmax.get("KICK", "1") == "1":
|
|
||||||
raise runner.OptionalExtensionNotSupported("Multi-target KICK")
|
|
||||||
|
|
||||||
# TODO: check foo is an operator
|
|
||||||
|
|
||||||
# Synchronize
|
|
||||||
self.getMessages(1)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(3)
|
|
||||||
self.getMessages(4)
|
|
||||||
|
|
||||||
if multiple_targets:
|
|
||||||
self.sendLine(1, "KICK #chan,#chan bar,baz :bye")
|
|
||||||
else:
|
|
||||||
self.sendLine(1, "KICK #chan bar,baz :bye")
|
|
||||||
try:
|
|
||||||
m = self.getMessage(1)
|
|
||||||
if m.command == "482":
|
|
||||||
raise runner.OptionalExtensionNotSupported(
|
|
||||||
"Channel creators are not opped by default."
|
|
||||||
)
|
|
||||||
except client_mock.NoMessageException:
|
|
||||||
# The RFCs do not say KICK must be echoed
|
|
||||||
pass
|
|
||||||
|
|
||||||
mgroup = self.getMessages(4)
|
|
||||||
self.assertGreaterEqual(len(mgroup), 2, mgroup)
|
|
||||||
m1, m2 = mgroup[:2]
|
|
||||||
|
|
||||||
self.assertMessageMatch(m1, command="KICK", params=["#chan", ANYSTR, "bye"])
|
|
||||||
self.assertMessageMatch(m2, command="KICK", params=["#chan", ANYSTR, "bye"])
|
|
||||||
|
|
||||||
if (m1.params[1] == "bar" and m2.params[1] == "baz") or (
|
|
||||||
m1.params[1] == "baz" and m2.params[1] == "bar"
|
|
||||||
):
|
|
||||||
... # success
|
|
||||||
else:
|
|
||||||
raise AssertionError(
|
|
||||||
"Middle params [{}, {}] are not correct.".format(
|
|
||||||
m1.params[1], m2.params[1]
|
|
||||||
)
|
|
||||||
)
|
|
@ -1,521 +0,0 @@
|
|||||||
"""
|
|
||||||
`IRCv3 labeled-response <https://ircv3.net/specs/extensions/labeled-response>`_
|
|
||||||
|
|
||||||
This specification is a little hard to test because all labels are optional;
|
|
||||||
so there may be many false positives.
|
|
||||||
"""
|
|
||||||
|
|
||||||
import re
|
|
||||||
|
|
||||||
import pytest
|
|
||||||
|
|
||||||
from irctest import cases
|
|
||||||
from irctest.numerics import ERR_UNKNOWNCOMMAND
|
|
||||||
from irctest.patma import ANYDICT, ANYOPTSTR, NotStrRe, RemainingKeys, StrRe
|
|
||||||
|
|
||||||
|
|
||||||
class LabeledResponsesTestCase(cases.BaseServerTestCase):
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledPrivmsgResponsesToMultipleClients(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
self.connectClient(
|
|
||||||
"carl",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(3)
|
|
||||||
self.connectClient(
|
|
||||||
"alice",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(4)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 PRIVMSG bar,carl,alice :hi")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
m3 = self.getMessage(3)
|
|
||||||
m4 = self.getMessage(4)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipients
|
|
||||||
self.assertMessageMatch(m2, command="PRIVMSG", tags={})
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m3,
|
|
||||||
command="PRIVMSG",
|
|
||||||
tags={},
|
|
||||||
)
|
|
||||||
self.assertMessageMatch(m4, command="PRIVMSG", tags={})
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="BATCH", fail_msg="No BATCH echo received after sending one out"
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledPrivmsgResponsesToClient(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 PRIVMSG bar :hi")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(m2, command="PRIVMSG", tags={})
|
|
||||||
|
|
||||||
self.assertMessageMatch(m, command="PRIVMSG", tags={"label": "12345"})
|
|
||||||
|
|
||||||
@pytest.mark.react_tag
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledPrivmsgResponsesToChannel(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
# join channels
|
|
||||||
self.sendLine(1, "JOIN #test")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(2, "JOIN #test")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, "@label=12345;+draft/reply=123;+draft/react=l😃l PRIVMSG #test :hi"
|
|
||||||
)
|
|
||||||
ms = self.getMessage(1)
|
|
||||||
mt = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(mt, command="PRIVMSG", tags={})
|
|
||||||
|
|
||||||
# ensure sender correctly receives msg
|
|
||||||
self.assertMessageMatch(ms, command="PRIVMSG", tags={"label": "12345"})
|
|
||||||
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledPrivmsgResponsesToSelf(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 PRIVMSG foo :hi")
|
|
||||||
m1 = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(1)
|
|
||||||
|
|
||||||
number_of_labels = 0
|
|
||||||
for m in [m1, m2]:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="PRIVMSG",
|
|
||||||
fail_msg="Got a message back that wasn't a PRIVMSG",
|
|
||||||
)
|
|
||||||
if "label" in m.tags:
|
|
||||||
number_of_labels += 1
|
|
||||||
self.assertEqual(
|
|
||||||
m.tags["label"],
|
|
||||||
"12345",
|
|
||||||
m,
|
|
||||||
fail_msg=(
|
|
||||||
"Echo'd label doesn't match the label we sent "
|
|
||||||
"(should be '12345'): {msg}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
number_of_labels,
|
|
||||||
1,
|
|
||||||
m1,
|
|
||||||
fail_msg=(
|
|
||||||
"When sending a PRIVMSG to self with echo-message, "
|
|
||||||
"we only expect one message to contain the label. "
|
|
||||||
"Instead, {} messages had the label"
|
|
||||||
).format(number_of_labels),
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledNoticeResponsesToClient(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 NOTICE bar :hi")
|
|
||||||
m = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(m2, command="NOTICE", tags={})
|
|
||||||
|
|
||||||
self.assertMessageMatch(m, command="NOTICE", tags={"label": "12345"})
|
|
||||||
|
|
||||||
@pytest.mark.react_tag
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledNoticeResponsesToChannel(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
# join channels
|
|
||||||
self.sendLine(1, "JOIN #test")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(2, "JOIN #test")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, "@label=12345;+draft/reply=123;+draft/react=l😃l NOTICE #test :hi"
|
|
||||||
)
|
|
||||||
ms = self.getMessage(1)
|
|
||||||
mt = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(mt, command="NOTICE", tags={})
|
|
||||||
|
|
||||||
# ensure sender correctly receives msg
|
|
||||||
self.assertMessageMatch(ms, command="NOTICE", tags={"label": "12345"})
|
|
||||||
|
|
||||||
@cases.mark_capabilities("echo-message", "batch", "labeled-response")
|
|
||||||
def testLabeledNoticeResponsesToSelf(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 NOTICE foo :hi")
|
|
||||||
m1 = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(1)
|
|
||||||
|
|
||||||
number_of_labels = 0
|
|
||||||
for m in [m1, m2]:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="NOTICE", fail_msg="Got a message back that wasn't a NOTICE"
|
|
||||||
)
|
|
||||||
if "label" in m.tags:
|
|
||||||
number_of_labels += 1
|
|
||||||
self.assertEqual(
|
|
||||||
m.tags["label"],
|
|
||||||
"12345",
|
|
||||||
m,
|
|
||||||
fail_msg=(
|
|
||||||
"Echo'd label doesn't match the label we sent "
|
|
||||||
"(should be '12345'): {msg}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
number_of_labels,
|
|
||||||
1,
|
|
||||||
m1,
|
|
||||||
fail_msg=(
|
|
||||||
"When sending a NOTICE to self with echo-message, "
|
|
||||||
"we only expect one message to contain the label. "
|
|
||||||
"Instead, {} messages had the label"
|
|
||||||
).format(number_of_labels),
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.react_tag
|
|
||||||
@cases.mark_capabilities(
|
|
||||||
"echo-message", "batch", "labeled-response", "message-tags"
|
|
||||||
)
|
|
||||||
def testLabeledTagMsgResponsesToClient(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
# Need to get a valid msgid because Unreal validates them
|
|
||||||
self.sendLine(1, "PRIVMSG bar :hi")
|
|
||||||
msgid = self.getMessage(1).tags["msgid"]
|
|
||||||
assert msgid == self.getMessage(2).tags["msgid"]
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, f"@label=12345;+draft/reply={msgid};+draft/react=l😃l TAGMSG bar"
|
|
||||||
)
|
|
||||||
m = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m2,
|
|
||||||
command="TAGMSG",
|
|
||||||
tags={
|
|
||||||
"+draft/reply": msgid,
|
|
||||||
"+draft/react": "l😃l",
|
|
||||||
RemainingKeys(NotStrRe("label")): ANYOPTSTR,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
self.assertNotIn(
|
|
||||||
"label",
|
|
||||||
m2.tags,
|
|
||||||
m2,
|
|
||||||
fail_msg=(
|
|
||||||
"When sending a TAGMSG with a label, "
|
|
||||||
"the target user shouldn't receive the label "
|
|
||||||
"(only the sending user should): {msg}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m,
|
|
||||||
command="TAGMSG",
|
|
||||||
tags={
|
|
||||||
"label": "12345",
|
|
||||||
"+draft/reply": msgid,
|
|
||||||
"+draft/react": "l😃l",
|
|
||||||
**ANYDICT,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.react_tag
|
|
||||||
@cases.mark_capabilities(
|
|
||||||
"echo-message", "batch", "labeled-response", "message-tags"
|
|
||||||
)
|
|
||||||
def testLabeledTagMsgResponsesToChannel(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(2)
|
|
||||||
|
|
||||||
# join channels
|
|
||||||
self.sendLine(1, "JOIN #test")
|
|
||||||
self.getMessages(1)
|
|
||||||
self.sendLine(2, "JOIN #test")
|
|
||||||
self.getMessages(2)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
# Need to get a valid msgid because Unreal validates them
|
|
||||||
self.sendLine(1, "PRIVMSG #test :hi")
|
|
||||||
msgid = self.getMessage(1).tags["msgid"]
|
|
||||||
assert msgid == self.getMessage(2).tags["msgid"]
|
|
||||||
|
|
||||||
self.sendLine(
|
|
||||||
1, f"@label=12345;+draft/reply={msgid};+draft/react=l😃l TAGMSG #test"
|
|
||||||
)
|
|
||||||
ms = self.getMessage(1)
|
|
||||||
mt = self.getMessage(2)
|
|
||||||
|
|
||||||
# ensure the label isn't sent to recipient
|
|
||||||
self.assertMessageMatch(
|
|
||||||
mt,
|
|
||||||
command="TAGMSG",
|
|
||||||
tags={
|
|
||||||
"+draft/reply": msgid,
|
|
||||||
"+draft/react": "l😃l",
|
|
||||||
RemainingKeys(NotStrRe("label")): ANYOPTSTR,
|
|
||||||
},
|
|
||||||
fail_msg="No TAGMSG received by the target after sending one out",
|
|
||||||
)
|
|
||||||
self.assertNotIn(
|
|
||||||
"label",
|
|
||||||
mt.tags,
|
|
||||||
mt,
|
|
||||||
fail_msg=(
|
|
||||||
"When sending a TAGMSG with a label, "
|
|
||||||
"the target user shouldn't receive the label "
|
|
||||||
"(only the sending user should): {msg}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
# ensure sender correctly receives msg
|
|
||||||
self.assertMessageMatch(
|
|
||||||
ms,
|
|
||||||
command="TAGMSG",
|
|
||||||
tags={"label": "12345", "+draft/reply": msgid, **ANYDICT},
|
|
||||||
)
|
|
||||||
|
|
||||||
@pytest.mark.react_tag
|
|
||||||
@cases.mark_capabilities(
|
|
||||||
"echo-message", "batch", "labeled-response", "message-tags"
|
|
||||||
)
|
|
||||||
def testLabeledTagMsgResponsesToSelf(self):
|
|
||||||
self.connectClient(
|
|
||||||
"foo",
|
|
||||||
capabilities=["echo-message", "batch", "labeled-response", "message-tags"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345;+draft/reply=123;+draft/react=l😃l TAGMSG foo")
|
|
||||||
m1 = self.getMessage(1)
|
|
||||||
m2 = self.getMessage(1)
|
|
||||||
|
|
||||||
number_of_labels = 0
|
|
||||||
for m in [m1, m2]:
|
|
||||||
self.assertMessageMatch(
|
|
||||||
m, command="TAGMSG", fail_msg="Got a message back that wasn't a TAGMSG"
|
|
||||||
)
|
|
||||||
if "label" in m.tags:
|
|
||||||
number_of_labels += 1
|
|
||||||
self.assertEqual(
|
|
||||||
m.tags["label"],
|
|
||||||
"12345",
|
|
||||||
m,
|
|
||||||
fail_msg=(
|
|
||||||
"Echo'd label doesn't match the label we sent "
|
|
||||||
"(should be '12345'): {msg}"
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertEqual(
|
|
||||||
number_of_labels,
|
|
||||||
1,
|
|
||||||
m1,
|
|
||||||
fail_msg=(
|
|
||||||
"When sending a TAGMSG to self with echo-message, "
|
|
||||||
"we only expect one message to contain the label. "
|
|
||||||
"Instead, {} messages had the label"
|
|
||||||
).format(number_of_labels),
|
|
||||||
)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("batch", "labeled-response", "message-tags", "server-time")
|
|
||||||
def testBatchedJoinMessages(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar",
|
|
||||||
capabilities=["batch", "labeled-response", "message-tags", "server-time"],
|
|
||||||
skip_if_cap_nak=True,
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=12345 JOIN #xyz")
|
|
||||||
m = self.getMessages(1)
|
|
||||||
|
|
||||||
# we expect at least join and names lines, which must be batched
|
|
||||||
self.assertGreaterEqual(len(m), 3)
|
|
||||||
|
|
||||||
# valid BATCH start line:
|
|
||||||
batch_start = m[0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
batch_start,
|
|
||||||
command="BATCH",
|
|
||||||
params=[StrRe(r"\+.*"), "labeled-response"],
|
|
||||||
)
|
|
||||||
batch_id = batch_start.params[0][1:]
|
|
||||||
# batch id MUST be alphanumerics and hyphens
|
|
||||||
self.assertTrue(
|
|
||||||
re.match(r"^[A-Za-z0-9\-]+$", batch_id) is not None,
|
|
||||||
"batch id must be alphanumerics and hyphens, got %r" % (batch_id,),
|
|
||||||
)
|
|
||||||
self.assertEqual(batch_start.tags.get("label"), "12345")
|
|
||||||
|
|
||||||
# valid BATCH end line
|
|
||||||
batch_end = m[-1]
|
|
||||||
self.assertMessageMatch(batch_end, command="BATCH", params=["-" + batch_id])
|
|
||||||
|
|
||||||
# messages must have the BATCH tag
|
|
||||||
for message in m[1:-1]:
|
|
||||||
self.assertEqual(message.tags.get("batch"), batch_id)
|
|
||||||
|
|
||||||
@cases.mark_capabilities("labeled-response")
|
|
||||||
def testNoBatchForSingleMessage(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar", capabilities=["batch", "labeled-response"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
self.sendLine(1, "@label=98765 PING adhoctestline")
|
|
||||||
# no BATCH should be initiated for a one-line response,
|
|
||||||
# it should just be labeled
|
|
||||||
m = self.getMessage(1)
|
|
||||||
self.assertMessageMatch(m, command="PONG", tags={"label": "98765"})
|
|
||||||
self.assertEqual(m.params[-1], "adhoctestline")
|
|
||||||
|
|
||||||
@cases.mark_capabilities("labeled-response")
|
|
||||||
def testEmptyBatchForNoResponse(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar", capabilities=["batch", "labeled-response"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
self.getMessages(1)
|
|
||||||
|
|
||||||
# PONG never receives a response
|
|
||||||
self.sendLine(1, "@label=98765 PONG adhoctestline")
|
|
||||||
|
|
||||||
# labeled-response: "Servers MUST respond with a labeled
|
|
||||||
# `ACK` message when a client sends a labeled command that normally
|
|
||||||
# produces no response."
|
|
||||||
ms = self.getMessages(1)
|
|
||||||
self.assertEqual(len(ms), 1)
|
|
||||||
ack = ms[0]
|
|
||||||
|
|
||||||
self.assertMessageMatch(ack, command="ACK", tags={"label": "98765"})
|
|
||||||
|
|
||||||
@cases.mark_capabilities("labeled-response")
|
|
||||||
def testUnknownCommand(self):
|
|
||||||
self.connectClient(
|
|
||||||
"bar", capabilities=["batch", "labeled-response"], skip_if_cap_nak=True
|
|
||||||
)
|
|
||||||
|
|
||||||
# this command doesn't exist, but the error response should still
|
|
||||||
# be labeled:
|
|
||||||
self.sendLine(1, "@label=deadbeef NONEXISTENT_COMMAND")
|
|
||||||
ms = self.getMessages(1)
|
|
||||||
self.assertEqual(len(ms), 1)
|
|
||||||
unknowncommand = ms[0]
|
|
||||||
self.assertMessageMatch(
|
|
||||||
unknowncommand, command=ERR_UNKNOWNCOMMAND, tags={"label": "deadbeef"}
|
|
||||||
)
|
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user