atproto/packages/ozone/tests/get-repo.test.ts
Daniel Holmgren 50c0ec176c
Service auth method binding (lxm) (#2663)
* add scopes to service auth impl

* add error to getServiceAuth

* send scoped tokens from pds

* clean up privileged access scopes & allow simple service auth tokens for app passwords

* integration into ozone

* fix up bsky tests

* cleanup xrpc-server tests

* fix up tests & types

* one more test

* fix read after write tests

* fix mod auth test

* convert scopes to be a single method name

* add scope check callback for auth verifier

* pds changes only

* fix feed generation tests

* use scope for ozone service profile

* dont verify scopes on pds yet

* tidy

* tidy imports

* changeset

* add tests

* tidy

* another changeset

* scope -> lxm

* tidy

* clean up scope references

* update nonce size

* pr feedback

* trim trailing slash

* nonce -> jti

* fix xrpc-server test

* allow service auth on uploadBlob

* fix build error

* changeset

* build, tidy

* xrpc-server: update lxm claim check error

* appview: temporarily permit labeler service calls to omit lxm claim

* xrpc-server: fix test

* changeset

* fix merged tests

---------

Co-authored-by: Devin Ivy <devinivy@gmail.com>
2024-08-18 15:46:07 -04:00

168 lines
4.9 KiB
TypeScript

import {
SeedClient,
TestNetwork,
TestOzone,
basicSeed,
ModeratorClient,
} from '@atproto/dev-env'
import { AtpAgent } from '@atproto/api'
import {
REASONOTHER,
REASONSPAM,
} from '../src/lexicon/types/com/atproto/moderation/defs'
import { forSnapshot } from './_util'
import { ids } from '../src/lexicon/lexicons'
describe('admin get repo view', () => {
let network: TestNetwork
let ozone: TestOzone
let agent: AtpAgent
let pdsAgent: AtpAgent
let sc: SeedClient
let modClient: ModeratorClient
beforeAll(async () => {
network = await TestNetwork.create({
dbPostgresSchema: 'ozone_admin_get_repo',
})
ozone = network.ozone
agent = ozone.getClient()
pdsAgent = network.pds.getClient()
sc = network.getSeedClient()
modClient = ozone.getModClient()
await basicSeed(sc)
await pdsAgent.com.atproto.server.deactivateAccount(
{},
{ encoding: 'application/json', headers: sc.getHeaders(sc.dids.dan) },
)
await network.processAll()
})
afterAll(async () => {
await network.close()
})
beforeAll(async () => {
await modClient.emitEvent({
event: { $type: 'tools.ozone.moderation.defs#modEventAcknowledge' },
subject: {
$type: 'com.atproto.admin.defs#repoRef',
did: sc.dids.alice,
},
})
await sc.createReport({
reportedBy: sc.dids.bob,
reasonType: REASONSPAM,
subject: {
$type: 'com.atproto.admin.defs#repoRef',
did: sc.dids.alice,
},
})
await sc.createReport({
reportedBy: sc.dids.carol,
reasonType: REASONOTHER,
reason: 'defamation',
subject: {
$type: 'com.atproto.admin.defs#repoRef',
did: sc.dids.alice,
},
})
await modClient.emitEvent({
event: { $type: 'tools.ozone.moderation.defs#modEventTakedown' },
subject: {
$type: 'com.atproto.admin.defs#repoRef',
did: sc.dids.alice,
},
})
})
it('gets a repo by did, even when taken down.', async () => {
const result = await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.alice },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
expect(forSnapshot(result.data)).toMatchSnapshot()
})
it('does not include account emails for triage mods.', async () => {
const { data: admin } = await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.bob },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
const { data: moderator } = await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.bob },
{
headers: await ozone.modHeaders(
ids.ToolsOzoneModerationGetRepo,
'moderator',
),
},
)
const { data: triage } = await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.bob },
{
headers: await ozone.modHeaders(
ids.ToolsOzoneModerationGetRepo,
'triage',
),
},
)
expect(admin.email).toEqual('bob@test.com')
expect(moderator.email).toEqual('bob@test.com')
expect(triage.email).toBeUndefined()
expect(triage).toEqual({ ...admin, email: undefined })
})
it('includes emailConfirmedAt timestamp', async () => {
const { data: beforeEmailVerification } =
await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.bob },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
expect(beforeEmailVerification.emailConfirmedAt).toBeUndefined()
const timestampBeforeVerification = Date.now()
const bobsAccount = sc.accounts[sc.dids.bob]
const verificationToken =
await network.pds.ctx.accountManager.createEmailToken(
sc.dids.bob,
'confirm_email',
)
await pdsAgent.api.com.atproto.server.confirmEmail(
{ email: bobsAccount.email, token: verificationToken },
{
encoding: 'application/json',
headers: sc.getHeaders(sc.dids.bob),
},
)
const { data: afterEmailVerification } =
await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.bob },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
expect(afterEmailVerification.emailConfirmedAt).toBeTruthy()
expect(
new Date(afterEmailVerification.emailConfirmedAt as string).getTime(),
).toBeGreaterThan(timestampBeforeVerification)
})
it('returns deactivation state', async () => {
const res = await agent.api.tools.ozone.moderation.getRepo(
{ did: sc.dids.dan },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
expect(res.data.deactivatedAt).toBeDefined()
})
it('fails when repo does not exist.', async () => {
const promise = agent.api.tools.ozone.moderation.getRepo(
{ did: 'did:plc:doesnotexist' },
{ headers: await ozone.modHeaders(ids.ToolsOzoneModerationGetRepo) },
)
await expect(promise).rejects.toThrow('Repo not found')
})
})