mirror of
https://github.com/caronc/apprise.git
synced 2025-03-10 12:58:22 +01:00
While the namespace is physically made of modules, it has been amended to be the namespace home for the corresponding notifier classes as well. This turned out to confuse both humans and machines on various ends. While it has apparently worked for a while, it croaks on Python 3.11 now, and is not considered to have been a good idea in general.
867 lines
28 KiB
Python
867 lines
28 KiB
Python
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2021 Chris Caron <lead2gold@gmail.com>
|
|
# All rights reserved.
|
|
#
|
|
# This code is licensed under the MIT License.
|
|
#
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
# of this software and associated documentation files(the "Software"), to deal
|
|
# in the Software without restriction, including without limitation the rights
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and / or sell
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
# furnished to do so, subject to the following conditions :
|
|
#
|
|
# The above copyright notice and this permission notice shall be included in
|
|
# all copies or substantial portions of the Software.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.IN NO EVENT SHALL THE
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
|
# THE SOFTWARE.
|
|
#
|
|
# Great Resources:
|
|
# - Dev/Legacy API:
|
|
# https://firebase.google.com/docs/cloud-messaging/http-server-ref
|
|
# - Legacy API (v1) -> OAuth
|
|
# - https://firebase.google.com/docs/cloud-messaging/migrate-v1
|
|
|
|
import os
|
|
import sys
|
|
from unittest import mock
|
|
|
|
import pytest
|
|
import requests
|
|
import json
|
|
from apprise import Apprise
|
|
from apprise.plugins.NotifyFCM import NotifyFCM
|
|
from helpers import AppriseURLTester
|
|
|
|
try:
|
|
from apprise.plugins.NotifyFCM.oauth import GoogleOAuth
|
|
from apprise.plugins.NotifyFCM.common import FCM_MODES
|
|
from apprise.plugins.NotifyFCM.priority import (
|
|
FCMPriorityManager, FCM_PRIORITIES)
|
|
from apprise.plugins.NotifyFCM.color import FCMColorManager
|
|
from cryptography.exceptions import UnsupportedAlgorithm
|
|
|
|
except ImportError:
|
|
# No problem; there is no cryptography support
|
|
pass
|
|
|
|
|
|
# Disable logging for a cleaner testing output
|
|
import logging
|
|
logging.disable(logging.CRITICAL)
|
|
|
|
# Test files for KeyFile Directory
|
|
PRIVATE_KEYFILE_DIR = os.path.join(os.path.dirname(__file__), 'var', 'fcm')
|
|
|
|
# Our Testing URLs
|
|
apprise_url_tests = (
|
|
('fcm://', {
|
|
# We failed to identify any valid authentication
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://:@/', {
|
|
# We failed to identify any valid authentication
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://project@%20%20/', {
|
|
# invalid apikey
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://apikey/', {
|
|
# no project id specified so we operate in legacy mode
|
|
'instance': NotifyFCM,
|
|
# but there are no targets specified so we return False
|
|
'notify_response': False,
|
|
}),
|
|
('fcm://apikey/device', {
|
|
# Valid device
|
|
'instance': NotifyFCM,
|
|
'privacy_url': 'fcm://a...y/device',
|
|
}),
|
|
('fcm://apikey/#topic', {
|
|
# Valid topic
|
|
'instance': NotifyFCM,
|
|
'privacy_url': 'fcm://a...y/%23topic',
|
|
}),
|
|
('fcm://apikey/device?mode=invalid', {
|
|
# Valid device, invalid mode
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://apikey/#topic1/device/%20/', {
|
|
# Valid topic, valid device, and invalid entry
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://apikey?to=#topic1,device', {
|
|
# Test to=
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://?apikey=abc123&to=device', {
|
|
# Test apikey= to=
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://?apikey=abc123&to=device&image=yes', {
|
|
# Test image boolean
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://?apikey=abc123&to=device&color=no', {
|
|
# Disable colors
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://?apikey=abc123&to=device&color=aabbcc', {
|
|
# custom colors
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://?apikey=abc123&to=device'
|
|
'&image_url=http://example.com/interesting.jpg', {
|
|
# Test image_url
|
|
'instance': NotifyFCM}),
|
|
('fcm://?apikey=abc123&to=device'
|
|
'&image_url=http://example.com/interesting.jpg&image=no', {
|
|
# Test image_url but set to no
|
|
'instance': NotifyFCM}),
|
|
('fcm://?apikey=abc123&to=device&+key=value&+key2=value2', {
|
|
# Test apikey= to= and data arguments
|
|
'instance': NotifyFCM,
|
|
}),
|
|
('fcm://%20?to=device&keyfile=/invalid/path', {
|
|
# invalid Project ID
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://project_id?to=device&keyfile=/invalid/path', {
|
|
# Test to= and auto detection of oauth mode
|
|
'instance': NotifyFCM,
|
|
# we'll fail to send our notification as a result
|
|
'response': False,
|
|
}),
|
|
('fcm://?to=device&project=project_id&keyfile=/invalid/path', {
|
|
# Test project= & to= and auto detection of oauth mode
|
|
'instance': NotifyFCM,
|
|
# we'll fail to send our notification as a result
|
|
'response': False,
|
|
}),
|
|
('fcm://project_id?to=device&mode=oauth2', {
|
|
# no keyfile was specified
|
|
'instance': TypeError,
|
|
}),
|
|
('fcm://project_id?to=device&mode=oauth2&keyfile=/invalid/path', {
|
|
# Same test as above except we explicitly set our oauth2 mode
|
|
# Test to= and auto detection of oauth mode
|
|
'instance': NotifyFCM,
|
|
# we'll fail to send our notification as a result
|
|
'response': False,
|
|
}),
|
|
('fcm://apikey/#topic1/device/?mode=legacy', {
|
|
'instance': NotifyFCM,
|
|
# throw a bizzare code forcing us to fail to look it up
|
|
'response': False,
|
|
'requests_response_code': 999,
|
|
}),
|
|
('fcm://apikey/#topic1/device/?mode=legacy', {
|
|
'instance': NotifyFCM,
|
|
# Throws a series of connection and transfer exceptions when this flag
|
|
# is set and tests that we gracfully handle them
|
|
'test_requests_exceptions': True,
|
|
}),
|
|
('fcm://project/#topic1/device/?mode=oauth2&keyfile=file://{}'.format(
|
|
os.path.join(
|
|
os.path.dirname(__file__), 'var', 'fcm',
|
|
'service_account.json')), {
|
|
'instance': NotifyFCM,
|
|
# throw a bizzare code forcing us to fail to look it up
|
|
'response': False,
|
|
'requests_response_code': 999,
|
|
}),
|
|
('fcm://projectid/#topic1/device/?mode=oauth2&keyfile=file://{}'.format(
|
|
os.path.join(
|
|
os.path.dirname(__file__), 'var', 'fcm',
|
|
'service_account.json')), {
|
|
'instance': NotifyFCM,
|
|
# Throws a series of connection and transfer exceptions when
|
|
# this flag is set and tests that we gracfully handle them
|
|
'test_requests_exceptions': True,
|
|
}),
|
|
)
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
def test_plugin_fcm_urls():
|
|
"""
|
|
NotifyFCM() Apprise URLs
|
|
|
|
"""
|
|
|
|
# Run our general tests
|
|
AppriseURLTester(tests=apprise_url_tests).run_all()
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
@pytest.mark.skipif(
|
|
hasattr(sys, "pypy_version_info"), reason="Does not work reliably on PyPy")
|
|
@mock.patch('requests.post')
|
|
def test_plugin_fcm_general_legacy(mock_post, no_throttling):
|
|
"""
|
|
NotifyFCM() General Legacy/APIKey Checks
|
|
|
|
"""
|
|
|
|
# Prepare a good response
|
|
response = mock.Mock()
|
|
response.status_code = requests.codes.ok
|
|
mock_post.return_value = response
|
|
|
|
# A valid Legacy URL
|
|
obj = Apprise.instantiate(
|
|
'fcm://abc123/device/'
|
|
'?+key=value&+key2=value2'
|
|
'&image_url=https://example.com/interesting.png')
|
|
|
|
# Send our notification
|
|
assert obj.notify("test") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://fcm.googleapis.com/fcm/send'
|
|
|
|
payload = mock_post.mock_calls[0][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'data' in data
|
|
assert isinstance(data, dict)
|
|
assert 'key' in data['data']
|
|
assert data['data']['key'] == 'value'
|
|
assert 'key2' in data['data']
|
|
assert data['data']['key2'] == 'value2'
|
|
|
|
assert 'notification' in data
|
|
assert isinstance(data['notification'], dict)
|
|
assert 'notification' in data['notification']
|
|
assert isinstance(data['notification']['notification'], dict)
|
|
assert 'image' in data['notification']['notification']
|
|
assert data['notification']['notification']['image'] == \
|
|
'https://example.com/interesting.png'
|
|
|
|
#
|
|
# Test priorities
|
|
#
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://abc123/device/?priority=low')
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://fcm.googleapis.com/fcm/send'
|
|
|
|
payload = mock_post.mock_calls[0][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'data' not in data
|
|
assert 'notification' in data
|
|
assert isinstance(data['notification'], dict)
|
|
assert 'notification' in data['notification']
|
|
assert isinstance(data['notification']['notification'], dict)
|
|
assert 'image' not in data['notification']['notification']
|
|
assert 'priority' in data
|
|
|
|
# legacy can only switch between high/low
|
|
assert data['priority'] == "normal"
|
|
|
|
#
|
|
# Test colors
|
|
#
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://abc123/device/?color=no')
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://fcm.googleapis.com/fcm/send'
|
|
|
|
payload = mock_post.mock_calls[0][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'data' not in data
|
|
assert 'notification' in data
|
|
assert isinstance(data['notification'], dict)
|
|
assert 'notification' in data['notification']
|
|
assert isinstance(data['notification']['notification'], dict)
|
|
assert 'image' not in data['notification']['notification']
|
|
assert 'color' not in data['notification']['notification']
|
|
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://abc123/device/?color=AA001b')
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://fcm.googleapis.com/fcm/send'
|
|
|
|
payload = mock_post.mock_calls[0][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'data' not in data
|
|
assert 'notification' in data
|
|
assert isinstance(data['notification'], dict)
|
|
assert 'notification' in data['notification']
|
|
assert isinstance(data['notification']['notification'], dict)
|
|
assert 'image' not in data['notification']['notification']
|
|
assert 'color' in data['notification']['notification']
|
|
assert data['notification']['notification']['color'] == '#aa001b'
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
@mock.patch('requests.post')
|
|
def test_plugin_fcm_general_oauth(mock_post, no_throttling):
|
|
"""
|
|
NotifyFCM() General OAuth Checks
|
|
|
|
"""
|
|
|
|
# Valid Keyfile
|
|
path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json')
|
|
|
|
# Prepare a good response
|
|
response = mock.Mock()
|
|
response.content = json.dumps({
|
|
"access_token": "ya29.c.abcd",
|
|
"expires_in": 3599,
|
|
"token_type": "Bearer",
|
|
})
|
|
response.status_code = requests.codes.ok
|
|
mock_post.return_value = response
|
|
|
|
# Test having a valid keyfile, but not a valid project id match
|
|
obj = Apprise.instantiate(
|
|
'fcm://invalid_project_id/device/?keyfile={}'.format(str(path)))
|
|
# we'll fail as a result
|
|
assert obj.notify("test") is False
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 0
|
|
|
|
# Now we test using a valid Project ID but we can't open our file
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/?keyfile={}'.format(str(path)))
|
|
|
|
with mock.patch('builtins.open', side_effect=OSError):
|
|
# we'll fail as a result
|
|
assert obj.notify("test") is False
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 0
|
|
|
|
# Now we test using a valid Project ID
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/#topic/?keyfile={}'.format(str(path)))
|
|
|
|
# send our notification
|
|
assert obj.notify("test") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 3
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
assert mock_post.call_args_list[1][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
assert mock_post.call_args_list[2][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
|
|
mock_post.reset_mock()
|
|
# Now we test using a valid Project ID and data parameters
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/#topic/?keyfile={}'
|
|
'&+key=value&+key2=value2'
|
|
'&image_url=https://example.com/interesting.png'.format(str(path)))
|
|
assert mock_post.call_count == 0
|
|
|
|
# send our notification
|
|
assert obj.notify("test") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 3
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
assert mock_post.call_args_list[1][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
payload = mock_post.mock_calls[1][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'message' in data
|
|
assert isinstance(data['message'], dict)
|
|
assert 'data' in data['message']
|
|
assert isinstance(data['message']['data'], dict)
|
|
assert 'key' in data['message']['data']
|
|
assert data['message']['data']['key'] == 'value'
|
|
assert 'key2' in data['message']['data']
|
|
assert data['message']['data']['key2'] == 'value2'
|
|
|
|
assert 'notification' in data['message']
|
|
assert isinstance(data['message']['notification'], dict)
|
|
assert 'image' in data['message']['notification']
|
|
assert data['message']['notification']['image'] == \
|
|
'https://example.com/interesting.png'
|
|
|
|
assert mock_post.call_args_list[2][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
|
|
payload = mock_post.mock_calls[2][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'message' in data
|
|
assert isinstance(data['message'], dict)
|
|
assert 'data' in data['message']
|
|
assert isinstance(data['message']['data'], dict)
|
|
assert 'key' in data['message']['data']
|
|
assert data['message']['data']['key'] == 'value'
|
|
assert 'key2' in data['message']['data']
|
|
assert data['message']['data']['key2'] == 'value2'
|
|
|
|
assert 'notification' in data['message']
|
|
assert isinstance(data['message']['notification'], dict)
|
|
assert 'image' in data['message']['notification']
|
|
assert data['message']['notification']['image'] == \
|
|
'https://example.com/interesting.png'
|
|
|
|
#
|
|
# Test priorities
|
|
#
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/?keyfile={}'
|
|
'&priority=high'.format(str(path)))
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 2
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
assert mock_post.call_args_list[1][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
payload = mock_post.mock_calls[1][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'message' in data
|
|
assert isinstance(data['message'], dict)
|
|
assert 'data' not in data['message']
|
|
assert 'notification' in data['message']
|
|
assert isinstance(data['message']['notification'], dict)
|
|
assert 'image' not in data['message']['notification']
|
|
assert data['message']['apns']['headers']['apns-priority'] == "10"
|
|
assert data['message']['webpush']['headers']['Urgency'] == "high"
|
|
assert data['message']['android']['priority'] == "HIGH"
|
|
|
|
#
|
|
# Test colors
|
|
#
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/?keyfile={}'
|
|
'&color=no'.format(str(path)))
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 2
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
assert mock_post.call_args_list[1][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
payload = mock_post.mock_calls[1][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'message' in data
|
|
assert isinstance(data['message'], dict)
|
|
assert 'data' not in data['message']
|
|
assert 'notification' in data['message']
|
|
assert isinstance(data['message']['notification'], dict)
|
|
assert 'color' not in data['message']['notification']
|
|
|
|
mock_post.reset_mock()
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/?keyfile={}'
|
|
'&color=#12AAbb'.format(str(path)))
|
|
assert mock_post.call_count == 0
|
|
|
|
# Send our notification
|
|
assert obj.notify(title="title", body="body") is True
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 2
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
assert mock_post.call_args_list[1][0][0] == \
|
|
'https://fcm.googleapis.com/v1/projects/mock-project-id/messages:send'
|
|
payload = mock_post.mock_calls[1][2]
|
|
data = json.loads(payload['data'])
|
|
assert 'message' in data
|
|
assert isinstance(data['message'], dict)
|
|
assert 'data' not in data['message']
|
|
assert 'notification' in data['message']
|
|
assert isinstance(data['message']['notification'], dict)
|
|
assert 'color' in data['message']['android']['notification']
|
|
assert data['message']['android']['notification']['color'] == '#12aabb'
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
@mock.patch('requests.post')
|
|
def test_plugin_fcm_keyfile_parse(mock_post):
|
|
"""
|
|
NotifyFCM() KeyFile Tests
|
|
"""
|
|
|
|
# Prepare a good response
|
|
response = mock.Mock()
|
|
response.content = json.dumps({
|
|
"access_token": "ya29.c.abcd",
|
|
"expires_in": 3599,
|
|
"token_type": "Bearer",
|
|
})
|
|
response.status_code = requests.codes.ok
|
|
mock_post.return_value = response
|
|
|
|
path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json')
|
|
oauth = GoogleOAuth()
|
|
# We can not get an Access Token without content loaded
|
|
assert oauth.access_token is None
|
|
|
|
# Load our content
|
|
assert oauth.load(path) is True
|
|
assert oauth.access_token is not None
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
mock_post.reset_mock()
|
|
# a second call uses cache since our token hasn't expired yet
|
|
assert oauth.access_token is not None
|
|
assert mock_post.call_count == 0
|
|
|
|
# Same test case without expires_in entry
|
|
mock_post.reset_mock()
|
|
response.content = json.dumps({
|
|
"access_token": "ya29.c.abcd",
|
|
"token_type": "Bearer",
|
|
})
|
|
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(path) is True
|
|
assert oauth.access_token is not None
|
|
|
|
# Test our call count
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
# Test user-agent override
|
|
mock_post.reset_mock()
|
|
oauth = GoogleOAuth(user_agent="test-agent-override")
|
|
assert oauth.load(path) is True
|
|
assert oauth.access_token is not None
|
|
assert mock_post.call_count == 1
|
|
assert mock_post.call_args_list[0][0][0] == \
|
|
'https://accounts.google.com/o/oauth2/token'
|
|
|
|
#
|
|
# Test some errors that can get thrown when trying to handle
|
|
# the service_account.json file
|
|
#
|
|
|
|
# Reset our object
|
|
mock_post.reset_mock()
|
|
|
|
# Now we test a case where we can't access the file we've been pointed to:
|
|
oauth = GoogleOAuth()
|
|
with mock.patch('builtins.open', side_effect=OSError):
|
|
# We will fail to retrieve our Access Token
|
|
assert oauth.load(path) is False
|
|
assert oauth.access_token is None
|
|
|
|
oauth = GoogleOAuth()
|
|
with mock.patch('json.loads', side_effect=([], )):
|
|
# We will fail to retrieve our Access Token since we did not parse
|
|
# a dictionary
|
|
assert oauth.load(path) is False
|
|
assert oauth.access_token is None
|
|
|
|
# Case where we can't load the PEM key:
|
|
oauth = GoogleOAuth()
|
|
with mock.patch(
|
|
'cryptography.hazmat.primitives.serialization'
|
|
'.load_pem_private_key',
|
|
side_effect=ValueError("")):
|
|
assert oauth.load(path) is False
|
|
assert oauth.access_token is None
|
|
|
|
# Case where we can't load the PEM key:
|
|
oauth = GoogleOAuth()
|
|
with mock.patch(
|
|
'cryptography.hazmat.primitives.serialization'
|
|
'.load_pem_private_key',
|
|
side_effect=TypeError("")):
|
|
assert oauth.load(path) is False
|
|
assert oauth.access_token is None
|
|
|
|
# Case where we can't load the PEM key:
|
|
oauth = GoogleOAuth()
|
|
with mock.patch(
|
|
'cryptography.hazmat.primitives.serialization'
|
|
'.load_pem_private_key',
|
|
side_effect=UnsupportedAlgorithm("")):
|
|
# Note: This test should be te
|
|
assert oauth.load(path) is False
|
|
assert oauth.access_token is None
|
|
|
|
# Not one call was made to the web
|
|
assert mock_post.call_count == 0
|
|
|
|
#
|
|
# Test some web errors that can occur when speaking upstream
|
|
# with Google to get our token generated
|
|
#
|
|
response.status_code = requests.codes.internal_server_error
|
|
|
|
mock_post.reset_mock()
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(path) is True
|
|
|
|
# We'll fail due to an bad web response
|
|
assert oauth.access_token is None
|
|
|
|
# Return our status code to how it was
|
|
response.status_code = requests.codes.ok
|
|
|
|
# No access token
|
|
bad_response_1 = mock.Mock()
|
|
bad_response_1.content = json.dumps({
|
|
"expires_in": 3599,
|
|
"token_type": "Bearer",
|
|
})
|
|
|
|
# Invalid JSON
|
|
bad_response_2 = mock.Mock()
|
|
bad_response_2.content = '{'
|
|
|
|
mock_post.return_value = None
|
|
# Throw an exception on the first call to requests.post()
|
|
for side_effect in (
|
|
requests.RequestException(), bad_response_1, bad_response_2):
|
|
mock_post.side_effect = side_effect
|
|
|
|
# Test all of our bad side effects
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(path) is True
|
|
|
|
# We'll fail due to an bad web response
|
|
assert oauth.access_token is None
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
def test_plugin_fcm_bad_keyfile_parse():
|
|
"""
|
|
NotifyFCM() KeyFile Bad Service Account Type Tests
|
|
"""
|
|
|
|
path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account-bad-type.json')
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(path) is False
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
def test_plugin_fcm_keyfile_missing_entries_parse(tmpdir):
|
|
"""
|
|
NotifyFCM() KeyFile Missing Entries Test
|
|
"""
|
|
|
|
# Prepare a base keyfile reference to use
|
|
path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json')
|
|
with open(path, mode="r", encoding='utf-8') as fp:
|
|
content = json.loads(fp.read())
|
|
|
|
path = tmpdir.join('fcm_keyfile.json')
|
|
|
|
# Test that we fail to load if the following keys are missing:
|
|
for entry in (
|
|
'client_email', 'private_key_id', 'private_key', 'type',
|
|
'project_id'):
|
|
|
|
# Ensure the key actually exists in our file
|
|
assert entry in content
|
|
|
|
# Create a copy of our content
|
|
content_copy = content.copy()
|
|
|
|
# Remove our entry we expect to validate against
|
|
del content_copy[entry]
|
|
assert entry not in content_copy
|
|
|
|
path.write(json.dumps(content_copy))
|
|
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(str(path)) is False
|
|
|
|
# Now write ourselves a bad JSON file
|
|
path.write('{')
|
|
oauth = GoogleOAuth()
|
|
assert oauth.load(str(path)) is False
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
def test_plugin_fcm_priorities():
|
|
"""
|
|
NotifyFCM() FCMPriorityManager() Testing
|
|
"""
|
|
|
|
for mode in FCM_MODES:
|
|
for priority in FCM_PRIORITIES:
|
|
instance = FCMPriorityManager(mode, priority)
|
|
assert isinstance(instance.payload(), dict)
|
|
# Verify it's not empty
|
|
assert bool(instance)
|
|
assert instance.payload()
|
|
assert str(instance) == priority
|
|
|
|
# We do not have to set a priority
|
|
instance = FCMPriorityManager(mode)
|
|
assert isinstance(instance.payload(), dict)
|
|
|
|
# Dictionary is empty though
|
|
assert not bool(instance)
|
|
assert not instance.payload()
|
|
assert str(instance) == ''
|
|
|
|
with pytest.raises(TypeError):
|
|
instance = FCMPriorityManager(mode, 'invalid')
|
|
|
|
with pytest.raises(TypeError):
|
|
instance = FCMPriorityManager('invald', 'high')
|
|
|
|
# mode validation is done at the higher NotifyFCM() level so
|
|
# it is not tested here (not required)
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
def test_plugin_fcm_colors():
|
|
"""
|
|
NotifyFCM() FCMColorManager() Testing
|
|
"""
|
|
|
|
# No colors
|
|
instance = FCMColorManager('no')
|
|
assert bool(instance) is False
|
|
assert instance.get() is None
|
|
# We'll return that we are not defined
|
|
assert str(instance) == 'no'
|
|
|
|
# Asset colors
|
|
instance = FCMColorManager('yes')
|
|
assert isinstance(instance.get(), str)
|
|
# Output: #rrggbb
|
|
assert len(instance.get()) == 7
|
|
# Starts with has symbol
|
|
assert instance.get()[0] == '#'
|
|
# We'll return that we are defined but using default configuration
|
|
assert str(instance) == 'yes'
|
|
|
|
# We will be `true` because we can acquire a color based on what was
|
|
# passed in
|
|
assert bool(instance) is True
|
|
|
|
# Custom color
|
|
instance = FCMColorManager('#A2B3A4')
|
|
assert isinstance(instance.get(), str)
|
|
assert instance.get() == '#a2b3a4'
|
|
assert bool(instance) is True
|
|
# str() response does not include hashtag
|
|
assert str(instance) == 'a2b3a4'
|
|
|
|
# Custom color (no hashtag)
|
|
instance = FCMColorManager('A2B3A4')
|
|
assert isinstance(instance.get(), str)
|
|
# Hashtag is always part of output
|
|
assert instance.get() == '#a2b3a4'
|
|
assert bool(instance) is True
|
|
# str() response does not include hashtag
|
|
assert str(instance) == 'a2b3a4'
|
|
|
|
# Custom color (no hashtag) but only using 3 letter rgb values
|
|
instance = FCMColorManager('AC4')
|
|
assert isinstance(instance.get(), str)
|
|
# Hashtag is always part of output
|
|
assert instance.get() == '#aacc44'
|
|
assert bool(instance) is True
|
|
# str() response does not include hashtag
|
|
assert str(instance) == 'aacc44'
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' in sys.modules,
|
|
reason="Requires that cryptography NOT be installed")
|
|
def test_plugin_fcm_cryptography_import_error():
|
|
"""
|
|
NotifyFCM Cryptography loading failure
|
|
"""
|
|
|
|
# Prepare a base keyfile reference to use
|
|
path = os.path.join(PRIVATE_KEYFILE_DIR, 'service_account.json')
|
|
|
|
# Attempt to instantiate our object
|
|
obj = Apprise.instantiate(
|
|
'fcm://mock-project-id/device/#topic/?keyfile={}'.format(str(path)))
|
|
|
|
# It's not possible because our cryptography depedancy is missing
|
|
assert obj is None
|
|
|
|
|
|
@pytest.mark.skipif(
|
|
'cryptography' not in sys.modules, reason="Requires cryptography")
|
|
@mock.patch('requests.post')
|
|
def test_plugin_fcm_edge_cases(mock_post, no_throttling):
|
|
"""
|
|
NotifyFCM() Edge Cases
|
|
|
|
"""
|
|
|
|
# Prepare a good response
|
|
response = mock.Mock()
|
|
response.status_code = requests.codes.ok
|
|
mock_post.return_value = response
|
|
|
|
# this tests an edge case where verify if the data_kwargs is a dictionary
|
|
# or not. Below, we don't even define it, so it will be None (causing
|
|
# the check to go). We'll still correctly instantiate a plugin:
|
|
obj = NotifyFCM("project", "api:123", targets='device')
|
|
assert obj is not None
|