pleroma/test/http/adapter_helper/gun_test.exs

265 lines
7.7 KiB
Elixir
Raw Normal View History

2020-02-10 23:12:57 -08:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2020-02-10 23:12:57 -08:00
# SPDX-License-Identifier: AGPL-3.0-only
2020-03-03 07:53:44 -08:00
defmodule Pleroma.HTTP.AdapterHelper.GunTest do
2020-02-10 23:12:57 -08:00
use ExUnit.Case, async: true
use Pleroma.Tests.Helpers
2020-03-06 09:23:58 -08:00
2020-02-10 23:12:57 -08:00
import ExUnit.CaptureLog
2020-03-06 09:23:58 -08:00
import Mox
2020-02-10 23:12:57 -08:00
alias Pleroma.Config
2020-02-24 08:56:27 -08:00
alias Pleroma.Gun.Conn
2020-03-03 07:53:44 -08:00
alias Pleroma.HTTP.AdapterHelper.Gun
2020-02-10 23:12:57 -08:00
alias Pleroma.Pool.Connections
2020-03-06 09:23:58 -08:00
setup :verify_on_exit!
defp gun_mock(_) do
gun_mock()
2020-02-10 23:12:57 -08:00
:ok
end
2020-03-06 09:23:58 -08:00
defp gun_mock do
Pleroma.GunMock
2020-03-06 23:12:34 -08:00
|> stub(:open, fn _, _, _ -> Task.start_link(fn -> Process.sleep(1000) end) end)
2020-03-07 00:01:37 -08:00
|> stub(:await_up, fn _, _ -> {:ok, :http} end)
|> stub(:set_owner, fn _, _ -> :ok end)
2020-03-06 09:23:58 -08:00
end
2020-02-10 23:12:57 -08:00
describe "options/1" do
clear_config([:http, :adapter]) do
Config.put([:http, :adapter], a: 1, b: 2)
end
test "https url with default port" do
uri = URI.parse("https://example.com")
2020-03-06 09:23:58 -08:00
opts = Gun.options([receive_conn: false], uri)
2020-02-10 23:12:57 -08:00
assert opts[:certificates_verification]
assert opts[:tls_opts][:log_level] == :warning
2020-02-10 23:12:57 -08:00
end
test "https ipv4 with default port" do
uri = URI.parse("https://127.0.0.1")
2020-03-06 09:23:58 -08:00
opts = Gun.options([receive_conn: false], uri)
assert opts[:certificates_verification]
assert opts[:tls_opts][:log_level] == :warning
2020-02-10 23:12:57 -08:00
end
test "https ipv6 with default port" do
uri = URI.parse("https://[2a03:2880:f10c:83:face:b00c:0:25de]")
2020-03-06 09:23:58 -08:00
opts = Gun.options([receive_conn: false], uri)
assert opts[:certificates_verification]
assert opts[:tls_opts][:log_level] == :warning
2020-02-10 23:12:57 -08:00
end
test "https url with non standart port" do
uri = URI.parse("https://example.com:115")
2020-03-06 09:23:58 -08:00
opts = Gun.options([receive_conn: false], uri)
2020-02-10 23:12:57 -08:00
assert opts[:certificates_verification]
assert opts[:transport] == :tls
end
test "get conn on next request" do
2020-03-06 09:23:58 -08:00
gun_mock()
2020-02-10 23:12:57 -08:00
level = Application.get_env(:logger, :level)
Logger.configure(level: :debug)
2020-02-10 23:12:57 -08:00
on_exit(fn -> Logger.configure(level: level) end)
uri = URI.parse("http://some-domain2.com")
assert capture_log(fn ->
opts = Gun.options(uri)
assert opts[:conn] == nil
assert opts[:close_conn] == nil
end) =~
2020-02-18 07:30:18 -08:00
"Gun connections pool checkin was not successful. Trying to open conn for next request."
2020-02-10 23:12:57 -08:00
opts = Gun.options(uri)
assert is_pid(opts[:conn])
assert opts[:close_conn] == false
end
test "merges with defaul http adapter config" do
2020-03-06 09:23:58 -08:00
defaults = Gun.options([receive_conn: false], URI.parse("https://example.com"))
2020-02-10 23:12:57 -08:00
assert Keyword.has_key?(defaults, :a)
assert Keyword.has_key?(defaults, :b)
end
test "default ssl adapter opts with connection" do
2020-03-06 09:23:58 -08:00
gun_mock()
2020-02-10 23:12:57 -08:00
uri = URI.parse("https://some-domain.com")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options(uri)
assert opts[:certificates_verification]
2020-03-06 09:23:58 -08:00
refute opts[:tls_opts] == []
2020-02-10 23:12:57 -08:00
assert opts[:close_conn] == false
assert is_pid(opts[:conn])
end
test "parses string proxy host & port" do
proxy = Config.get([:http, :proxy_url])
Config.put([:http, :proxy_url], "localhost:8123")
on_exit(fn -> Config.put([:http, :proxy_url], proxy) end)
uri = URI.parse("https://some-domain.com")
opts = Gun.options([receive_conn: false], uri)
assert opts[:proxy] == {'localhost', 8123}
end
test "parses tuple proxy scheme host and port" do
proxy = Config.get([:http, :proxy_url])
Config.put([:http, :proxy_url], {:socks, 'localhost', 1234})
on_exit(fn -> Config.put([:http, :proxy_url], proxy) end)
uri = URI.parse("https://some-domain.com")
opts = Gun.options([receive_conn: false], uri)
assert opts[:proxy] == {:socks, 'localhost', 1234}
end
test "passed opts have more weight than defaults" do
proxy = Config.get([:http, :proxy_url])
Config.put([:http, :proxy_url], {:socks5, 'localhost', 1234})
on_exit(fn -> Config.put([:http, :proxy_url], proxy) end)
uri = URI.parse("https://some-domain.com")
opts = Gun.options([receive_conn: false, proxy: {'example.com', 4321}], uri)
assert opts[:proxy] == {'example.com', 4321}
end
end
2020-03-06 09:23:58 -08:00
describe "options/1 with receive_conn parameter" do
setup :gun_mock
test "receive conn by default" do
uri = URI.parse("http://another-domain.com")
:ok = Conn.open(uri, :gun_connections)
received_opts = Gun.options(uri)
assert received_opts[:close_conn] == false
assert is_pid(received_opts[:conn])
end
test "don't receive conn if receive_conn is false" do
uri = URI.parse("http://another-domain.com")
:ok = Conn.open(uri, :gun_connections)
opts = [receive_conn: false]
received_opts = Gun.options(opts, uri)
assert received_opts[:close_conn] == nil
assert received_opts[:conn] == nil
end
end
2020-02-10 23:12:57 -08:00
describe "after_request/1" do
2020-03-06 09:23:58 -08:00
setup :gun_mock
2020-02-10 23:12:57 -08:00
test "body_as not chunks" do
uri = URI.parse("http://some-domain.com")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options(uri)
:ok = Gun.after_request(opts)
conn = opts[:conn]
assert %Connections{
conns: %{
"http:some-domain.com:80" => %Pleroma.Gun.Conn{
conn: ^conn,
conn_state: :idle,
used_by: []
}
}
} = Connections.get_state(:gun_connections)
end
test "body_as chunks" do
uri = URI.parse("http://some-domain.com")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options([body_as: :chunks], uri)
:ok = Gun.after_request(opts)
conn = opts[:conn]
self = self()
assert %Connections{
conns: %{
"http:some-domain.com:80" => %Pleroma.Gun.Conn{
conn: ^conn,
conn_state: :active,
used_by: [{^self, _}]
}
}
} = Connections.get_state(:gun_connections)
end
test "with no connection" do
uri = URI.parse("http://uniq-domain.com")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options([body_as: :chunks], uri)
conn = opts[:conn]
opts = Keyword.delete(opts, :conn)
self = self()
:ok = Gun.after_request(opts)
assert %Connections{
conns: %{
"http:uniq-domain.com:80" => %Pleroma.Gun.Conn{
conn: ^conn,
conn_state: :active,
used_by: [{^self, _}]
}
}
} = Connections.get_state(:gun_connections)
end
test "with ipv4" do
uri = URI.parse("http://127.0.0.1")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options(uri)
:ok = Gun.after_request(opts)
conn = opts[:conn]
assert %Connections{
conns: %{
"http:127.0.0.1:80" => %Pleroma.Gun.Conn{
conn: ^conn,
conn_state: :idle,
used_by: []
}
}
} = Connections.get_state(:gun_connections)
end
test "with ipv6" do
uri = URI.parse("http://[2a03:2880:f10c:83:face:b00c:0:25de]")
2020-02-24 08:56:27 -08:00
:ok = Conn.open(uri, :gun_connections)
2020-02-10 23:12:57 -08:00
opts = Gun.options(uri)
:ok = Gun.after_request(opts)
conn = opts[:conn]
assert %Connections{
conns: %{
"http:2a03:2880:f10c:83:face:b00c:0:25de:80" => %Pleroma.Gun.Conn{
conn: ^conn,
conn_state: :idle,
used_by: []
}
}
} = Connections.get_state(:gun_connections)
end
end
end