2020-06-22 08:27:49 -06:00
|
|
|
# Pleroma: A lightweight social networking server
|
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2020-06-22 21:56:17 -06:00
|
|
|
defmodule Pleroma.ApplicationRequirementsTest do
|
2020-06-22 08:27:49 -06:00
|
|
|
use Pleroma.DataCase
|
2020-06-24 05:11:05 -06:00
|
|
|
|
2020-06-22 08:27:49 -06:00
|
|
|
import ExUnit.CaptureLog
|
|
|
|
import Mock
|
|
|
|
|
2020-06-24 05:11:05 -06:00
|
|
|
alias Pleroma.ApplicationRequirements
|
|
|
|
alias Pleroma.Config
|
2020-06-23 00:08:24 -06:00
|
|
|
alias Pleroma.Repo
|
|
|
|
|
2020-12-08 09:30:10 -07:00
|
|
|
describe "check_repo_pool_size!/1" do
|
|
|
|
test "raises if the pool size is unexpected" do
|
|
|
|
clear_config([Pleroma.Repo, :pool_size], 11)
|
|
|
|
|
|
|
|
assert_raise Pleroma.ApplicationRequirements.VerifyError,
|
|
|
|
"Repo.pool_size different than recommended value.",
|
|
|
|
fn ->
|
|
|
|
capture_log(&Pleroma.ApplicationRequirements.verify!/0)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't raise if the pool size is unexpected but the respective flag is set" do
|
|
|
|
clear_config([Pleroma.Repo, :pool_size], 11)
|
|
|
|
clear_config([:dangerzone, :override_repo_pool_size], true)
|
|
|
|
|
|
|
|
assert Pleroma.ApplicationRequirements.verify!() == :ok
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-07-22 21:51:19 -06:00
|
|
|
describe "check_welcome_message_config!/1" do
|
|
|
|
setup do: clear_config([:welcome])
|
|
|
|
setup do: clear_config([Pleroma.Emails.Mailer])
|
|
|
|
|
|
|
|
test "raises if welcome email enabled but mail disabled" do
|
|
|
|
Pleroma.Config.put([:welcome, :email, :enabled], true)
|
|
|
|
Pleroma.Config.put([Pleroma.Emails.Mailer, :enabled], false)
|
|
|
|
|
|
|
|
assert_raise Pleroma.ApplicationRequirements.VerifyError, "The mail disabled.", fn ->
|
|
|
|
capture_log(&Pleroma.ApplicationRequirements.verify!/0)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-07-10 22:20:35 -06:00
|
|
|
describe "check_confirmation_accounts!" do
|
|
|
|
setup_with_mocks([
|
|
|
|
{Pleroma.ApplicationRequirements, [:passthrough],
|
|
|
|
[
|
|
|
|
check_migrations_applied!: fn _ -> :ok end
|
|
|
|
]}
|
|
|
|
]) do
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
|
|
|
setup do: clear_config([:instance, :account_activation_required])
|
|
|
|
|
|
|
|
test "raises if account confirmation is required but mailer isn't enable" do
|
|
|
|
Pleroma.Config.put([:instance, :account_activation_required], true)
|
|
|
|
Pleroma.Config.put([Pleroma.Emails.Mailer, :enabled], false)
|
|
|
|
|
|
|
|
assert_raise Pleroma.ApplicationRequirements.VerifyError,
|
2020-07-14 12:15:37 -06:00
|
|
|
"Account activation enabled, but Mailer is disabled. Cannot send confirmation emails.",
|
2020-07-10 22:20:35 -06:00
|
|
|
fn ->
|
|
|
|
capture_log(&Pleroma.ApplicationRequirements.verify!/0)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't do anything if account confirmation is disabled" do
|
|
|
|
Pleroma.Config.put([:instance, :account_activation_required], false)
|
|
|
|
Pleroma.Config.put([Pleroma.Emails.Mailer, :enabled], false)
|
|
|
|
assert Pleroma.ApplicationRequirements.verify!() == :ok
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't do anything if account confirmation is required and mailer is enabled" do
|
|
|
|
Pleroma.Config.put([:instance, :account_activation_required], true)
|
|
|
|
Pleroma.Config.put([Pleroma.Emails.Mailer, :enabled], true)
|
|
|
|
assert Pleroma.ApplicationRequirements.verify!() == :ok
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-22 08:27:49 -06:00
|
|
|
describe "check_rum!" do
|
|
|
|
setup_with_mocks([
|
2020-06-22 21:56:17 -06:00
|
|
|
{Pleroma.ApplicationRequirements, [:passthrough],
|
|
|
|
[check_migrations_applied!: fn _ -> :ok end]}
|
2020-06-22 08:27:49 -06:00
|
|
|
]) do
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
|
|
|
setup do: clear_config([:database, :rum_enabled])
|
|
|
|
|
2020-06-22 21:56:17 -06:00
|
|
|
test "raises if rum is enabled and detects unapplied rum migrations" do
|
2020-06-24 05:11:05 -06:00
|
|
|
Config.put([:database, :rum_enabled], true)
|
2020-06-22 08:27:49 -06:00
|
|
|
|
2020-06-23 00:08:24 -06:00
|
|
|
with_mocks([{Repo, [:passthrough], [exists?: fn _, _ -> false end]}]) do
|
2020-06-24 05:11:05 -06:00
|
|
|
assert_raise ApplicationRequirements.VerifyError,
|
2020-06-23 00:08:24 -06:00
|
|
|
"Unapplied RUM Migrations detected",
|
|
|
|
fn ->
|
2020-06-24 05:11:05 -06:00
|
|
|
capture_log(&ApplicationRequirements.verify!/0)
|
2020-06-23 00:08:24 -06:00
|
|
|
end
|
|
|
|
end
|
2020-06-22 08:27:49 -06:00
|
|
|
end
|
2020-06-22 21:56:17 -06:00
|
|
|
|
|
|
|
test "raises if rum is disabled and detects rum migrations" do
|
2020-06-24 05:11:05 -06:00
|
|
|
Config.put([:database, :rum_enabled], false)
|
2020-06-22 21:56:17 -06:00
|
|
|
|
2020-06-23 00:08:24 -06:00
|
|
|
with_mocks([{Repo, [:passthrough], [exists?: fn _, _ -> true end]}]) do
|
2020-06-24 05:11:05 -06:00
|
|
|
assert_raise ApplicationRequirements.VerifyError,
|
2020-06-22 21:56:17 -06:00
|
|
|
"RUM Migrations detected",
|
|
|
|
fn ->
|
2020-06-24 05:11:05 -06:00
|
|
|
capture_log(&ApplicationRequirements.verify!/0)
|
2020-06-22 21:56:17 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't do anything if rum enabled and applied migrations" do
|
2020-06-24 05:11:05 -06:00
|
|
|
Config.put([:database, :rum_enabled], true)
|
2020-06-22 21:56:17 -06:00
|
|
|
|
2020-06-23 00:08:24 -06:00
|
|
|
with_mocks([{Repo, [:passthrough], [exists?: fn _, _ -> true end]}]) do
|
2020-06-24 05:11:05 -06:00
|
|
|
assert ApplicationRequirements.verify!() == :ok
|
2020-06-22 21:56:17 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't do anything if rum disabled" do
|
2020-06-24 05:11:05 -06:00
|
|
|
Config.put([:database, :rum_enabled], false)
|
2020-06-23 00:08:24 -06:00
|
|
|
|
|
|
|
with_mocks([{Repo, [:passthrough], [exists?: fn _, _ -> false end]}]) do
|
2020-06-24 05:11:05 -06:00
|
|
|
assert ApplicationRequirements.verify!() == :ok
|
2020-06-23 00:08:24 -06:00
|
|
|
end
|
2020-06-22 21:56:17 -06:00
|
|
|
end
|
2020-06-22 08:27:49 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "check_migrations_applied!" do
|
|
|
|
setup_with_mocks([
|
|
|
|
{Ecto.Migrator, [],
|
|
|
|
[
|
|
|
|
with_repo: fn repo, fun -> passthrough([repo, fun]) end,
|
2020-06-23 00:08:24 -06:00
|
|
|
migrations: fn Repo ->
|
2020-06-22 08:27:49 -06:00
|
|
|
[
|
|
|
|
{:up, 20_191_128_153_944, "fix_missing_following_count"},
|
|
|
|
{:up, 20_191_203_043_610, "create_report_notes"},
|
|
|
|
{:down, 20_191_220_174_645, "add_scopes_to_pleroma_feo_auth_records"}
|
|
|
|
]
|
|
|
|
end
|
|
|
|
]}
|
|
|
|
]) do
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
|
|
|
setup do: clear_config([:i_am_aware_this_may_cause_data_loss, :disable_migration_check])
|
|
|
|
|
|
|
|
test "raises if it detects unapplied migrations" do
|
2020-06-24 05:11:05 -06:00
|
|
|
assert_raise ApplicationRequirements.VerifyError,
|
2020-06-22 08:27:49 -06:00
|
|
|
"Unapplied Migrations detected",
|
|
|
|
fn ->
|
2020-06-24 05:11:05 -06:00
|
|
|
capture_log(&ApplicationRequirements.verify!/0)
|
2020-06-22 08:27:49 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
test "doesn't do anything if disabled" do
|
2020-06-24 05:11:05 -06:00
|
|
|
Config.put([:i_am_aware_this_may_cause_data_loss, :disable_migration_check], true)
|
2020-06-22 08:27:49 -06:00
|
|
|
|
2020-06-24 05:11:05 -06:00
|
|
|
assert :ok == ApplicationRequirements.verify!()
|
2020-06-22 08:27:49 -06:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|