2016-10-27 23:55:31 +02:00
|
|
|
from __future__ import absolute_import
|
|
|
|
from __future__ import print_function
|
|
|
|
|
2016-08-03 11:11:25 +02:00
|
|
|
import mock
|
2016-08-08 14:20:41 +02:00
|
|
|
from mock import call
|
2016-08-04 13:15:49 +02:00
|
|
|
import time
|
2017-03-03 19:01:52 +01:00
|
|
|
from typing import Any, Dict, Union, SupportsInt, Text
|
2016-08-03 11:11:25 +02:00
|
|
|
|
2016-12-13 08:41:48 +01:00
|
|
|
import gcm
|
2016-10-27 23:55:31 +02:00
|
|
|
import ujson
|
2016-08-08 14:20:41 +02:00
|
|
|
|
2016-10-27 23:55:31 +02:00
|
|
|
from django.test import TestCase, override_settings
|
2016-08-03 11:11:25 +02:00
|
|
|
from django.conf import settings
|
2016-10-27 23:55:31 +02:00
|
|
|
from django.http import HttpResponse
|
2016-08-03 11:11:25 +02:00
|
|
|
|
2016-08-08 10:36:02 +02:00
|
|
|
from zerver.models import PushDeviceToken, UserProfile, Message
|
2016-12-14 13:29:42 +01:00
|
|
|
from zerver.models import get_user_profile_by_email, receives_online_notifications, \
|
|
|
|
receives_offline_notifications
|
2016-08-03 11:11:25 +02:00
|
|
|
from zerver.lib import push_notifications as apn
|
2016-10-27 23:55:31 +02:00
|
|
|
from zerver.lib.response import json_success
|
2016-11-10 19:30:09 +01:00
|
|
|
from zerver.lib.test_classes import (
|
|
|
|
ZulipTestCase,
|
|
|
|
)
|
2016-08-03 11:11:25 +02:00
|
|
|
|
2016-10-27 23:55:31 +02:00
|
|
|
from zilencer.models import RemoteZulipServer, RemotePushDeviceToken
|
|
|
|
from django.utils.timezone import now
|
|
|
|
|
2016-08-05 12:02:35 +02:00
|
|
|
class MockRedis(object):
|
|
|
|
data = {} # type: Dict[str, Any]
|
|
|
|
|
|
|
|
def hgetall(self, key):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (str) -> Any
|
2016-08-05 12:02:35 +02:00
|
|
|
return self.data.get(key)
|
|
|
|
|
|
|
|
def exists(self, key):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (str) -> bool
|
2016-08-05 12:02:35 +02:00
|
|
|
return key in self.data
|
|
|
|
|
|
|
|
def hmset(self, key, data):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (str, Dict[Any, Any]) -> None
|
2016-08-05 12:02:35 +02:00
|
|
|
self.data[key] = data
|
|
|
|
|
|
|
|
def delete(self, key):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (str) -> None
|
2016-08-05 12:02:35 +02:00
|
|
|
if self.exists(key):
|
|
|
|
del self.data[key]
|
|
|
|
|
|
|
|
def expire(self, *args, **kwargs):
|
2017-02-19 03:39:27 +01:00
|
|
|
# type: (*Any, **Any) -> None
|
2016-08-05 12:02:35 +02:00
|
|
|
pass
|
2016-08-03 11:11:25 +02:00
|
|
|
|
2016-10-27 23:55:31 +02:00
|
|
|
class PushBouncerNotificationTest(ZulipTestCase):
|
|
|
|
server_uuid = "1234-abcd"
|
|
|
|
|
|
|
|
def setUp(self):
|
|
|
|
# type: () -> None
|
|
|
|
server = RemoteZulipServer(uuid=self.server_uuid,
|
|
|
|
api_key="magic_secret_api_key",
|
|
|
|
hostname="demo.example.com",
|
|
|
|
last_updated=now())
|
|
|
|
server.save()
|
|
|
|
|
|
|
|
def tearDown(self):
|
|
|
|
# type: () -> None
|
|
|
|
RemoteZulipServer.objects.filter(uuid=self.server_uuid).delete()
|
|
|
|
|
|
|
|
def bounce_request(self, *args, **kwargs):
|
|
|
|
# type: (*Any, **Any) -> HttpResponse
|
|
|
|
"""This method is used to carry out the push notification bouncer
|
|
|
|
requests using the Django test browser, rather than python-requests.
|
|
|
|
"""
|
|
|
|
# args[0] is method, args[1] is URL.
|
|
|
|
local_url = args[1].replace(settings.PUSH_NOTIFICATION_BOUNCER_URL, "")
|
|
|
|
if args[0] == "POST":
|
|
|
|
result = self.client_post(local_url,
|
|
|
|
ujson.loads(kwargs['data']),
|
|
|
|
**self.get_auth())
|
|
|
|
else:
|
|
|
|
raise AssertionError("Unsupported method for bounce_request")
|
|
|
|
return result
|
|
|
|
|
|
|
|
def test_unregister_remote_push_user_params(self):
|
|
|
|
# type: () -> None
|
|
|
|
token = "111222"
|
|
|
|
token_kind = PushDeviceToken.GCM
|
|
|
|
|
|
|
|
endpoint = '/api/v1/remotes/push/unregister'
|
|
|
|
result = self.client_post(endpoint, {'token_kind': token_kind},
|
|
|
|
**self.get_auth())
|
|
|
|
self.assert_json_error(result, "Missing 'token' argument")
|
|
|
|
result = self.client_post(endpoint, {'token': token},
|
|
|
|
**self.get_auth())
|
|
|
|
self.assert_json_error(result, "Missing 'token_kind' argument")
|
|
|
|
result = self.client_post(endpoint, {'token': token, 'token_kind': token_kind},
|
|
|
|
**self.api_auth("hamlet@zulip.com"))
|
|
|
|
self.assert_json_error(result, "Must validate with valid Zulip server API key")
|
|
|
|
|
|
|
|
def test_register_remote_push_user_paramas(self):
|
|
|
|
# type: () -> None
|
|
|
|
token = "111222"
|
|
|
|
user_id = 11
|
|
|
|
token_kind = PushDeviceToken.GCM
|
|
|
|
|
|
|
|
endpoint = '/api/v1/remotes/push/register'
|
|
|
|
|
|
|
|
result = self.client_post(endpoint, {'user_id': user_id, 'token_kind': token_kind},
|
|
|
|
**self.get_auth())
|
|
|
|
self.assert_json_error(result, "Missing 'token' argument")
|
|
|
|
result = self.client_post(endpoint, {'user_id': user_id, 'token': token},
|
|
|
|
**self.get_auth())
|
|
|
|
self.assert_json_error(result, "Missing 'token_kind' argument")
|
|
|
|
result = self.client_post(endpoint, {'token': token, 'token_kind': token_kind},
|
|
|
|
**self.get_auth())
|
|
|
|
self.assert_json_error(result, "Missing 'user_id' argument")
|
|
|
|
result = self.client_post(endpoint, {'user_id': user_id, 'token_kind': token_kind,
|
|
|
|
'token': token},
|
|
|
|
**self.api_auth("hamlet@zulip.com"))
|
|
|
|
self.assert_json_error(result, "Must validate with valid Zulip server API key")
|
|
|
|
|
|
|
|
def test_remote_push_user_endpoints(self):
|
|
|
|
# type: () -> None
|
|
|
|
endpoints = [
|
|
|
|
('/api/v1/remotes/push/register', 'register'),
|
|
|
|
('/api/v1/remotes/push/unregister', 'unregister'),
|
|
|
|
]
|
|
|
|
|
|
|
|
for endpoint, method in endpoints:
|
|
|
|
payload = self.get_generic_payload(method)
|
|
|
|
|
|
|
|
# Verify correct results are success
|
|
|
|
result = self.client_post(endpoint, payload, **self.get_auth())
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
remote_tokens = RemotePushDeviceToken.objects.filter(token=payload['token'])
|
|
|
|
token_count = 1 if method == 'register' else 0
|
|
|
|
self.assertEqual(len(remote_tokens), token_count)
|
|
|
|
|
|
|
|
# Try adding/removing tokens that are too big...
|
|
|
|
broken_token = "x" * 5000 # too big
|
|
|
|
payload['token'] = broken_token
|
|
|
|
result = self.client_post(endpoint, payload, **self.get_auth())
|
|
|
|
self.assert_json_error(result, 'Empty or invalid length token')
|
|
|
|
|
|
|
|
@override_settings(PUSH_NOTIFICATION_BOUNCER_URL='https://push.zulip.org.example.com')
|
|
|
|
@mock.patch('zerver.lib.push_notifications.requests.request')
|
|
|
|
def test_push_bouncer_api(self, mock):
|
|
|
|
# type: (Any) -> None
|
|
|
|
"""This is a variant of the below test_push_api, but using the full
|
|
|
|
push notification bouncer flow
|
|
|
|
"""
|
|
|
|
mock.side_effect = self.bounce_request
|
|
|
|
email = "cordelia@zulip.com"
|
|
|
|
user = get_user_profile_by_email(email)
|
|
|
|
self.login(email)
|
|
|
|
server = RemoteZulipServer.objects.get(uuid=self.server_uuid)
|
|
|
|
|
|
|
|
endpoints = [
|
|
|
|
('/json/users/me/apns_device_token', 'apple-token'),
|
|
|
|
('/json/users/me/android_gcm_reg_id', 'android-token'),
|
|
|
|
]
|
|
|
|
|
|
|
|
# Test error handling
|
|
|
|
for endpoint, _ in endpoints:
|
|
|
|
# Try adding/removing tokens that are too big...
|
|
|
|
broken_token = "x" * 5000 # too big
|
|
|
|
result = self.client_post(endpoint, {'token': broken_token})
|
|
|
|
self.assert_json_error(result, 'Empty or invalid length token')
|
|
|
|
|
|
|
|
result = self.client_delete(endpoint, {'token': broken_token})
|
|
|
|
self.assert_json_error(result, 'Empty or invalid length token')
|
|
|
|
|
|
|
|
# Try to remove a non-existent token...
|
|
|
|
result = self.client_delete(endpoint, {'token': 'non-existent token'})
|
|
|
|
self.assert_json_error(result, 'Token does not exist')
|
|
|
|
|
|
|
|
# Add tokens
|
|
|
|
for endpoint, token in endpoints:
|
|
|
|
# Test that we can push twice
|
|
|
|
result = self.client_post(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
result = self.client_post(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
tokens = list(RemotePushDeviceToken.objects.filter(user_id=user.id, token=token,
|
|
|
|
server=server))
|
|
|
|
self.assertEqual(len(tokens), 1)
|
|
|
|
self.assertEqual(tokens[0].token, token)
|
|
|
|
|
|
|
|
# User should have tokens for both devices now.
|
|
|
|
tokens = list(RemotePushDeviceToken.objects.filter(user_id=user.id,
|
|
|
|
server=server))
|
|
|
|
self.assertEqual(len(tokens), 2)
|
|
|
|
|
|
|
|
# Remove tokens
|
|
|
|
for endpoint, token in endpoints:
|
|
|
|
result = self.client_delete(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
tokens = list(RemotePushDeviceToken.objects.filter(user_id=user.id, token=token,
|
|
|
|
server=server))
|
|
|
|
self.assertEqual(len(tokens), 0)
|
|
|
|
|
|
|
|
def get_generic_payload(self, method='register'):
|
|
|
|
# type: (Text) -> Dict[str, Any]
|
|
|
|
user_id = 10
|
|
|
|
token = "111222"
|
|
|
|
token_kind = PushDeviceToken.GCM
|
|
|
|
|
|
|
|
return {'user_id': user_id,
|
|
|
|
'token': token,
|
|
|
|
'token_kind': token_kind}
|
|
|
|
|
|
|
|
def get_auth(self):
|
|
|
|
# type: () -> Dict[str, Text]
|
|
|
|
# Auth on this user
|
|
|
|
return self.api_auth(self.server_uuid)
|
|
|
|
|
2016-08-03 11:11:25 +02:00
|
|
|
class PushNotificationTest(TestCase):
|
|
|
|
def setUp(self):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: () -> None
|
2016-08-03 11:11:25 +02:00
|
|
|
email = 'hamlet@zulip.com'
|
|
|
|
apn.connection = apn.get_connection('fake-cert', 'fake-key')
|
2016-08-05 12:02:35 +02:00
|
|
|
self.redis_client = apn.redis_client = MockRedis() # type: ignore
|
2016-08-03 11:11:25 +02:00
|
|
|
apn.dbx_connection = apn.get_connection('fake-cert', 'fake-key')
|
|
|
|
self.user_profile = get_user_profile_by_email(email)
|
2016-08-08 12:02:22 +02:00
|
|
|
self.tokens = [u'aaaa', u'bbbb']
|
2016-08-03 11:11:25 +02:00
|
|
|
for token in self.tokens:
|
|
|
|
PushDeviceToken.objects.create(
|
|
|
|
kind=PushDeviceToken.APNS,
|
|
|
|
token=apn.hex_to_b64(token),
|
|
|
|
user=self.user_profile,
|
|
|
|
ios_app_id=settings.ZULIP_IOS_APP_ID)
|
|
|
|
|
|
|
|
def tearDown(self):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: () -> None
|
2016-08-03 11:11:25 +02:00
|
|
|
for i in [100, 200]:
|
|
|
|
self.redis_client.delete(apn.get_apns_key(i))
|
|
|
|
|
|
|
|
class APNsMessageTest(PushNotificationTest):
|
|
|
|
@mock.patch('random.getrandbits', side_effect=[100, 200])
|
|
|
|
def test_apns_message(self, mock_getrandbits):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
2017-03-06 03:22:17 +01:00
|
|
|
apn.APNsMessage(self.user_profile.id, self.tokens, alert="test")
|
2016-08-03 11:11:25 +02:00
|
|
|
data = self.redis_client.hgetall(apn.get_apns_key(100))
|
|
|
|
self.assertEqual(data['token'], 'aaaa')
|
|
|
|
self.assertEqual(int(data['user_id']), self.user_profile.id)
|
|
|
|
data = self.redis_client.hgetall(apn.get_apns_key(200))
|
|
|
|
self.assertEqual(data['token'], 'bbbb')
|
|
|
|
self.assertEqual(int(data['user_id']), self.user_profile.id)
|
2016-08-04 10:49:19 +02:00
|
|
|
|
|
|
|
class ResponseListenerTest(PushNotificationTest):
|
|
|
|
def get_error_response(self, **kwargs):
|
2017-02-19 03:39:27 +01:00
|
|
|
# type: (**Any) -> Dict[str, SupportsInt]
|
2016-08-08 10:36:02 +02:00
|
|
|
er = {'identifier': 0, 'status': 0} # type: Dict[str, SupportsInt]
|
2016-08-04 10:49:19 +02:00
|
|
|
er.update({k: v for k, v in kwargs.items() if k in er})
|
|
|
|
return er
|
|
|
|
|
|
|
|
def get_cache_value(self):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: () -> Dict[str, Union[str, int]]
|
2016-08-04 10:49:19 +02:00
|
|
|
return {'token': 'aaaa', 'user_id': self.user_profile.id}
|
|
|
|
|
|
|
|
@mock.patch('logging.warn')
|
|
|
|
def test_cache_does_not_exist(self, mock_warn):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
2016-08-04 10:49:19 +02:00
|
|
|
err_rsp = self.get_error_response(identifier=100, status=1)
|
|
|
|
apn.response_listener(err_rsp)
|
|
|
|
msg = "APNs key, apns:100, doesn't not exist."
|
|
|
|
mock_warn.assert_called_once_with(msg)
|
|
|
|
|
|
|
|
@mock.patch('logging.warn')
|
|
|
|
def test_cache_exists(self, mock_warn):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
2016-08-04 10:49:19 +02:00
|
|
|
self.redis_client.hmset(apn.get_apns_key(100), self.get_cache_value())
|
|
|
|
err_rsp = self.get_error_response(identifier=100, status=1)
|
|
|
|
apn.response_listener(err_rsp)
|
|
|
|
b64_token = apn.hex_to_b64('aaaa')
|
2016-08-08 10:36:02 +02:00
|
|
|
errmsg = apn.ERROR_CODES[int(err_rsp['status'])]
|
2016-08-04 10:49:19 +02:00
|
|
|
msg = ("APNS: Failed to deliver APNS notification to %s, "
|
|
|
|
"reason: %s" % (b64_token, errmsg))
|
|
|
|
mock_warn.assert_called_once_with(msg)
|
|
|
|
|
|
|
|
@mock.patch('logging.warn')
|
|
|
|
def test_error_code_eight(self, mock_warn):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
2016-08-04 10:49:19 +02:00
|
|
|
self.redis_client.hmset(apn.get_apns_key(100), self.get_cache_value())
|
|
|
|
err_rsp = self.get_error_response(identifier=100, status=8)
|
|
|
|
b64_token = apn.hex_to_b64('aaaa')
|
|
|
|
self.assertEqual(PushDeviceToken.objects.filter(
|
|
|
|
user=self.user_profile, token=b64_token).count(), 1)
|
|
|
|
apn.response_listener(err_rsp)
|
|
|
|
self.assertEqual(mock_warn.call_count, 2)
|
|
|
|
self.assertEqual(PushDeviceToken.objects.filter(
|
|
|
|
user=self.user_profile, token=b64_token).count(), 0)
|
2016-08-04 12:52:39 +02:00
|
|
|
|
2016-09-15 15:19:46 +02:00
|
|
|
class TestPushApi(ZulipTestCase):
|
|
|
|
def test_push_api(self):
|
|
|
|
# type: () -> None
|
|
|
|
email = "cordelia@zulip.com"
|
|
|
|
user = get_user_profile_by_email(email)
|
|
|
|
self.login(email)
|
|
|
|
|
|
|
|
endpoints = [
|
|
|
|
('/json/users/me/apns_device_token', 'apple-token'),
|
|
|
|
('/json/users/me/android_gcm_reg_id', 'android-token'),
|
|
|
|
]
|
|
|
|
|
|
|
|
# Test error handling
|
|
|
|
for endpoint, _ in endpoints:
|
|
|
|
# Try adding/removing tokens that are too big...
|
|
|
|
broken_token = "x" * 5000 # too big
|
|
|
|
result = self.client_post(endpoint, {'token': broken_token})
|
|
|
|
self.assert_json_error(result, 'Empty or invalid length token')
|
|
|
|
|
|
|
|
result = self.client_delete(endpoint, {'token': broken_token})
|
|
|
|
self.assert_json_error(result, 'Empty or invalid length token')
|
|
|
|
|
|
|
|
# Try to remove a non-existent token...
|
|
|
|
result = self.client_delete(endpoint, {'token': 'non-existent token'})
|
|
|
|
self.assert_json_error(result, 'Token does not exist')
|
|
|
|
|
|
|
|
# Add tokens
|
|
|
|
for endpoint, token in endpoints:
|
|
|
|
# Test that we can push twice
|
|
|
|
result = self.client_post(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
result = self.client_post(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
|
|
|
|
tokens = list(PushDeviceToken.objects.filter(user=user, token=token))
|
|
|
|
self.assertEqual(len(tokens), 1)
|
|
|
|
self.assertEqual(tokens[0].token, token)
|
|
|
|
|
|
|
|
# User should have tokens for both devices now.
|
|
|
|
tokens = list(PushDeviceToken.objects.filter(user=user))
|
|
|
|
self.assertEqual(len(tokens), 2)
|
|
|
|
|
|
|
|
# Remove tokens
|
|
|
|
for endpoint, token in endpoints:
|
|
|
|
result = self.client_delete(endpoint, {'token': token})
|
|
|
|
self.assert_json_success(result)
|
|
|
|
tokens = list(PushDeviceToken.objects.filter(user=user, token=token))
|
|
|
|
self.assertEqual(len(tokens), 0)
|
|
|
|
|
2016-08-04 12:52:39 +02:00
|
|
|
class SendNotificationTest(PushNotificationTest):
|
2016-08-09 19:12:00 +02:00
|
|
|
@mock.patch('logging.warn')
|
|
|
|
@mock.patch('logging.info')
|
2016-08-04 12:52:39 +02:00
|
|
|
@mock.patch('zerver.lib.push_notifications._do_push_to_apns_service')
|
2016-08-09 19:12:00 +02:00
|
|
|
def test_send_apple_push_notifiction(self, mock_send, mock_info, mock_warn):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock, mock.MagicMock) -> None
|
2017-03-06 03:24:50 +01:00
|
|
|
def test_send(user_id, message, alert):
|
|
|
|
# type: (int, Message, str) -> None
|
|
|
|
self.assertEqual(user_id, self.user_profile.id)
|
2016-08-04 12:52:39 +02:00
|
|
|
self.assertEqual(set(message.tokens), set(self.tokens))
|
|
|
|
|
|
|
|
mock_send.side_effect = test_send
|
2017-03-06 03:19:40 +01:00
|
|
|
apn.send_apple_push_notification_to_user(self.user_profile, "test alert")
|
2016-08-04 12:52:39 +02:00
|
|
|
self.assertEqual(mock_send.call_count, 1)
|
|
|
|
|
|
|
|
@mock.patch('apns.GatewayConnection.send_notification_multiple')
|
|
|
|
def test_do_push_to_apns_service(self, mock_push):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
2017-03-06 03:22:17 +01:00
|
|
|
msg = apn.APNsMessage(self.user_profile.id, self.tokens, alert="test")
|
2016-11-29 07:22:02 +01:00
|
|
|
|
2016-08-04 12:52:39 +02:00
|
|
|
def test_push(message):
|
2016-08-08 10:36:02 +02:00
|
|
|
# type: (Message) -> None
|
2016-08-04 12:52:39 +02:00
|
|
|
self.assertIs(message, msg.get_frame())
|
|
|
|
|
|
|
|
mock_push.side_effect = test_push
|
2017-03-06 03:24:50 +01:00
|
|
|
apn._do_push_to_apns_service(self.user_profile.id, msg, apn.connection)
|
2016-08-04 12:52:39 +02:00
|
|
|
|
2016-08-09 19:12:00 +02:00
|
|
|
@mock.patch('logging.warn')
|
|
|
|
@mock.patch('logging.info')
|
2016-08-04 12:52:39 +02:00
|
|
|
@mock.patch('apns.GatewayConnection.send_notification_multiple')
|
2016-08-09 19:12:00 +02:00
|
|
|
def test_connection_single_none(self, mock_push, mock_info, mock_warn):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock, mock.MagicMock) -> None
|
2016-08-04 12:52:39 +02:00
|
|
|
apn.connection = None
|
2017-03-06 03:19:40 +01:00
|
|
|
apn.send_apple_push_notification_to_user(self.user_profile, "test alert")
|
2016-08-04 12:52:39 +02:00
|
|
|
|
2016-08-09 19:12:00 +02:00
|
|
|
@mock.patch('logging.error')
|
2016-08-04 12:52:39 +02:00
|
|
|
@mock.patch('apns.GatewayConnection.send_notification_multiple')
|
2016-08-09 19:12:00 +02:00
|
|
|
def test_connection_both_none(self, mock_push, mock_error):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-08-04 12:52:39 +02:00
|
|
|
apn.connection = None
|
|
|
|
apn.dbx_connection = None
|
2017-03-06 03:19:40 +01:00
|
|
|
apn.send_apple_push_notification_to_user(self.user_profile, "test alert")
|
2016-08-04 13:15:49 +02:00
|
|
|
|
|
|
|
class APNsFeedbackTest(PushNotificationTest):
|
2016-08-09 19:12:00 +02:00
|
|
|
@mock.patch('logging.info')
|
2016-08-04 13:15:49 +02:00
|
|
|
@mock.patch('apns.FeedbackConnection.items')
|
2016-08-09 19:12:00 +02:00
|
|
|
def test_feedback(self, mock_items, mock_info):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-08-04 13:15:49 +02:00
|
|
|
update_time = apn.timestamp_to_datetime(int(time.time()) - 10000)
|
|
|
|
PushDeviceToken.objects.all().update(last_updated=update_time)
|
|
|
|
mock_items.return_value = [
|
|
|
|
('aaaa', int(time.time())),
|
|
|
|
]
|
|
|
|
self.assertEqual(PushDeviceToken.objects.all().count(), 2)
|
|
|
|
apn.check_apns_feedback()
|
|
|
|
self.assertEqual(PushDeviceToken.objects.all().count(), 1)
|
2016-08-08 14:20:41 +02:00
|
|
|
|
|
|
|
class GCMTest(PushNotificationTest):
|
|
|
|
def setUp(self):
|
|
|
|
# type: () -> None
|
|
|
|
super(GCMTest, self).setUp()
|
2016-12-13 08:41:48 +01:00
|
|
|
apn.gcm = gcm.GCM('fake key')
|
2016-08-08 14:20:41 +02:00
|
|
|
self.gcm_tokens = [u'1111', u'2222']
|
|
|
|
for token in self.gcm_tokens:
|
|
|
|
PushDeviceToken.objects.create(
|
|
|
|
kind=PushDeviceToken.GCM,
|
|
|
|
token=apn.hex_to_b64(token),
|
|
|
|
user=self.user_profile,
|
|
|
|
ios_app_id=None)
|
|
|
|
|
|
|
|
def get_gcm_data(self, **kwargs):
|
|
|
|
# type: (**Any) -> Dict[str, Any]
|
|
|
|
data = {
|
|
|
|
'key 1': 'Data 1',
|
|
|
|
'key 2': 'Data 2',
|
|
|
|
}
|
|
|
|
data.update(kwargs)
|
|
|
|
return data
|
|
|
|
|
|
|
|
class GCMNotSetTest(GCMTest):
|
2017-04-25 22:51:27 +02:00
|
|
|
@mock.patch('logging.warning')
|
|
|
|
def test_gcm_is_none(self, mock_warning):
|
2016-08-08 14:20:41 +02:00
|
|
|
# type: (mock.MagicMock) -> None
|
|
|
|
apn.gcm = None
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, {})
|
2017-04-25 22:51:27 +02:00
|
|
|
mock_warning.assert_called_with("Attempting to send a GCM push "
|
|
|
|
"notification, but no API key was "
|
|
|
|
"configured")
|
2016-08-08 14:20:41 +02:00
|
|
|
|
|
|
|
class GCMSuccessTest(GCMTest):
|
|
|
|
@mock.patch('logging.warning')
|
|
|
|
@mock.patch('logging.info')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_success(self, mock_send, mock_info, mock_warning):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
|
|
|
res['success'] = {token: ind for ind, token in enumerate(self.gcm_tokens)}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-08-08 14:20:41 +02:00
|
|
|
self.assertEqual(mock_info.call_count, 2)
|
|
|
|
c1 = call("GCM: Sent 1111 as 0")
|
|
|
|
c2 = call("GCM: Sent 2222 as 1")
|
2016-08-09 19:02:31 +02:00
|
|
|
mock_info.assert_has_calls([c1, c2], any_order=True)
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_warning.assert_not_called()
|
|
|
|
|
|
|
|
class GCMCanonicalTest(GCMTest):
|
|
|
|
@mock.patch('logging.warning')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_equal(self, mock_send, mock_warning):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
|
|
|
res['canonical'] = {1: 1}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_warning.assert_called_once_with("GCM: Got canonical ref but it "
|
|
|
|
"already matches our ID 1!")
|
|
|
|
|
|
|
|
@mock.patch('logging.warning')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_pushdevice_not_present(self, mock_send, mock_warning):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
2016-08-08 14:20:41 +02:00
|
|
|
t1 = apn.hex_to_b64(u'1111')
|
|
|
|
t2 = apn.hex_to_b64(u'3333')
|
2016-12-13 08:41:48 +01:00
|
|
|
res['canonical'] = {t1: t2}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
2016-09-12 08:09:43 +02:00
|
|
|
def get_count(hex_token):
|
2016-12-04 18:38:56 +01:00
|
|
|
# type: (Text) -> int
|
2016-09-12 08:09:43 +02:00
|
|
|
token = apn.hex_to_b64(hex_token)
|
2016-08-08 14:20:41 +02:00
|
|
|
return PushDeviceToken.objects.filter(
|
|
|
|
token=token, kind=PushDeviceToken.GCM).count()
|
|
|
|
|
|
|
|
self.assertEqual(get_count(u'1111'), 1)
|
|
|
|
self.assertEqual(get_count(u'3333'), 0)
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-08-08 14:20:41 +02:00
|
|
|
msg = ("GCM: Got canonical ref %s "
|
|
|
|
"replacing %s but new ID not "
|
|
|
|
"registered! Updating.")
|
|
|
|
mock_warning.assert_called_once_with(msg % (t2, t1))
|
|
|
|
|
|
|
|
self.assertEqual(get_count(u'1111'), 0)
|
|
|
|
self.assertEqual(get_count(u'3333'), 1)
|
|
|
|
|
|
|
|
@mock.patch('logging.info')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_pushdevice_different(self, mock_send, mock_info):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
2016-08-08 14:20:41 +02:00
|
|
|
old_token = apn.hex_to_b64(u'1111')
|
|
|
|
new_token = apn.hex_to_b64(u'2222')
|
2016-12-13 08:41:48 +01:00
|
|
|
res['canonical'] = {old_token: new_token}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
2016-09-12 08:09:43 +02:00
|
|
|
def get_count(hex_token):
|
2016-12-04 18:38:56 +01:00
|
|
|
# type: (Text) -> int
|
2016-09-12 08:09:43 +02:00
|
|
|
token = apn.hex_to_b64(hex_token)
|
2016-08-08 14:20:41 +02:00
|
|
|
return PushDeviceToken.objects.filter(
|
|
|
|
token=token, kind=PushDeviceToken.GCM).count()
|
|
|
|
|
|
|
|
self.assertEqual(get_count(u'1111'), 1)
|
|
|
|
self.assertEqual(get_count(u'2222'), 1)
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_info.assert_called_once_with(
|
|
|
|
"GCM: Got canonical ref %s, dropping %s" % (new_token, old_token))
|
|
|
|
|
|
|
|
self.assertEqual(get_count(u'1111'), 0)
|
|
|
|
self.assertEqual(get_count(u'2222'), 1)
|
|
|
|
|
|
|
|
class GCMNotRegisteredTest(GCMTest):
|
|
|
|
@mock.patch('logging.info')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_not_registered(self, mock_send, mock_info):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
2016-08-08 14:20:41 +02:00
|
|
|
token = apn.hex_to_b64(u'1111')
|
2016-12-13 08:41:48 +01:00
|
|
|
res['errors'] = {'NotRegistered': [token]}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
2016-09-12 08:09:43 +02:00
|
|
|
def get_count(hex_token):
|
2016-12-04 18:38:56 +01:00
|
|
|
# type: (Text) -> int
|
2016-09-12 08:09:43 +02:00
|
|
|
token = apn.hex_to_b64(hex_token)
|
2016-08-08 14:20:41 +02:00
|
|
|
return PushDeviceToken.objects.filter(
|
|
|
|
token=token, kind=PushDeviceToken.GCM).count()
|
|
|
|
|
|
|
|
self.assertEqual(get_count(u'1111'), 1)
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_info.assert_called_once_with("GCM: Removing %s" % (token,))
|
|
|
|
self.assertEqual(get_count(u'1111'), 0)
|
|
|
|
|
|
|
|
class GCMFailureTest(GCMTest):
|
|
|
|
@mock.patch('logging.warning')
|
2016-12-13 08:41:48 +01:00
|
|
|
@mock.patch('gcm.GCM.json_request')
|
2016-08-08 14:20:41 +02:00
|
|
|
def test_failure(self, mock_send, mock_warn):
|
|
|
|
# type: (mock.MagicMock, mock.MagicMock) -> None
|
2016-12-13 08:41:48 +01:00
|
|
|
res = {}
|
2016-08-08 14:20:41 +02:00
|
|
|
token = apn.hex_to_b64(u'1111')
|
2016-12-13 08:41:48 +01:00
|
|
|
res['errors'] = {'Failed': [token]}
|
2016-08-08 14:20:41 +02:00
|
|
|
mock_send.return_value = res
|
|
|
|
|
|
|
|
data = self.get_gcm_data()
|
2017-03-06 03:11:44 +01:00
|
|
|
apn.send_android_push_notification_to_user(self.user_profile, data)
|
2016-12-13 08:41:48 +01:00
|
|
|
c1 = call("GCM: Delivery to %s failed: Failed" % (token,))
|
|
|
|
mock_warn.assert_has_calls([c1], any_order=True)
|
2016-12-14 13:23:05 +01:00
|
|
|
|
2016-12-14 13:29:42 +01:00
|
|
|
class TestReceivesNotificationsFunctions(ZulipTestCase):
|
2016-12-14 13:23:05 +01:00
|
|
|
def setUp(self):
|
|
|
|
# type: () -> None
|
|
|
|
email = "cordelia@zulip.com"
|
|
|
|
self.user = get_user_profile_by_email(email)
|
|
|
|
|
|
|
|
def test_receivers_online_notifications_when_user_is_a_bot(self):
|
|
|
|
# type: () -> None
|
|
|
|
self.user.is_bot = True
|
|
|
|
|
|
|
|
self.user.enable_online_push_notifications = True
|
|
|
|
self.assertFalse(receives_online_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_online_push_notifications = False
|
|
|
|
self.assertFalse(receives_online_notifications(self.user))
|
|
|
|
|
|
|
|
def test_receivers_online_notifications_when_user_is_not_a_bot(self):
|
|
|
|
# type: () -> None
|
|
|
|
self.user.is_bot = False
|
|
|
|
|
|
|
|
self.user.enable_online_push_notifications = True
|
|
|
|
self.assertTrue(receives_online_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_online_push_notifications = False
|
|
|
|
self.assertFalse(receives_online_notifications(self.user))
|
2016-12-14 13:29:42 +01:00
|
|
|
|
|
|
|
def test_receivers_offline_notifications_when_user_is_a_bot(self):
|
|
|
|
# type: () -> None
|
|
|
|
self.user.is_bot = True
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = True
|
|
|
|
self.user.enable_offline_push_notifications = True
|
|
|
|
self.assertFalse(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = False
|
|
|
|
self.user.enable_offline_push_notifications = False
|
|
|
|
self.assertFalse(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = True
|
|
|
|
self.user.enable_offline_push_notifications = False
|
|
|
|
self.assertFalse(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = False
|
|
|
|
self.user.enable_offline_push_notifications = True
|
|
|
|
self.assertFalse(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
def test_receivers_offline_notifications_when_user_is_not_a_bot(self):
|
|
|
|
# type: () -> None
|
|
|
|
self.user.is_bot = False
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = True
|
|
|
|
self.user.enable_offline_push_notifications = True
|
|
|
|
self.assertTrue(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = False
|
|
|
|
self.user.enable_offline_push_notifications = False
|
|
|
|
self.assertFalse(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = True
|
|
|
|
self.user.enable_offline_push_notifications = False
|
|
|
|
self.assertTrue(receives_offline_notifications(self.user))
|
|
|
|
|
|
|
|
self.user.enable_offline_email_notifications = False
|
|
|
|
self.user.enable_offline_push_notifications = True
|
|
|
|
self.assertTrue(receives_offline_notifications(self.user))
|