2019-12-03 11:29:51 +01:00
|
|
|
# Portions of this file are derived from Pleroma:
|
|
|
|
# Pleroma: A lightweight social networking server
|
|
|
|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
|
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2020-01-26 21:36:50 +01:00
|
|
|
defmodule Mobilizon.Web.Plugs.MappedSignatureToIdentityTest do
|
|
|
|
use Mobilizon.Web.ConnCase
|
2019-12-03 11:29:51 +01:00
|
|
|
use ExVCR.Mock, adapter: ExVCR.Adapter.Hackney
|
2020-01-23 00:55:07 +01:00
|
|
|
|
2020-01-26 21:36:50 +01:00
|
|
|
alias Mobilizon.Web.Plugs.MappedSignatureToIdentity
|
2019-12-03 11:29:51 +01:00
|
|
|
|
|
|
|
defp set_signature(conn, key_id) do
|
|
|
|
conn
|
|
|
|
|> put_req_header("signature", "keyId=\"#{key_id}\"")
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it successfully maps a valid identity with a valid signature" do
|
|
|
|
use_cassette "activity_pub/signature/valid" do
|
|
|
|
conn =
|
|
|
|
build_conn(:get, "/doesntmattter")
|
|
|
|
|> set_signature("https://framapiaf.org/users/admin")
|
|
|
|
|> MappedSignatureToIdentity.call(%{})
|
|
|
|
|
|
|
|
refute is_nil(conn.assigns.actor)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it successfully maps a valid identity with a valid signature with payload" do
|
|
|
|
use_cassette "activity_pub/signature/valid_payload" do
|
|
|
|
conn =
|
|
|
|
build_conn(:post, "/doesntmattter", %{"actor" => "https://framapiaf.org/users/admin"})
|
|
|
|
|> set_signature("https://framapiaf.org/users/admin")
|
|
|
|
|> MappedSignatureToIdentity.call(%{})
|
|
|
|
|
|
|
|
refute is_nil(conn.assigns.actor)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it considers a mapped identity to be invalid when it mismatches a payload" do
|
|
|
|
use_cassette "activity_pub/signature/invalid_payload" do
|
|
|
|
conn =
|
|
|
|
build_conn(:post, "/doesntmattter", %{"actor" => "https://framapiaf.org/users/admin"})
|
|
|
|
|> set_signature("https://niu.moe/users/rye")
|
|
|
|
|> MappedSignatureToIdentity.call(%{})
|
|
|
|
|
|
|
|
assert %{valid_signature: false} == conn.assigns
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it considers a mapped identity to be invalid when the identity cannot be found" do
|
|
|
|
use_cassette "activity_pub/signature/invalid_not_found" do
|
|
|
|
conn =
|
|
|
|
build_conn(:post, "/doesntmattter", %{"actor" => "https://framapiaf.org/users/admin"})
|
2020-12-15 17:17:42 +01:00
|
|
|
|> set_signature("https://mastodon.social/users/gargron")
|
2019-12-03 11:29:51 +01:00
|
|
|
|> MappedSignatureToIdentity.call(%{})
|
|
|
|
|
|
|
|
assert %{valid_signature: false} == conn.assigns
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|