Mercurial > libervia-backend
changeset 4057:e807a5434f82
tests (units): tests for plugin XEP-0167:
fix 420
author | Goffi <goffi@goffi.org> |
---|---|
date | Mon, 29 May 2023 13:38:11 +0200 |
parents | 1c4f4aa36d98 |
children | adb9dc9c8114 |
files | tests/unit/test_plugin_xep_0167.py |
diffstat | 1 files changed, 377 insertions(+), 0 deletions(-) [+] |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/tests/unit/test_plugin_xep_0167.py Mon May 29 13:38:11 2023 +0200 @@ -0,0 +1,377 @@ +#!/usr/bin/env python3 + +# Libervia: an XMPP client +# Copyright (C) 2009-2023 Jérôme Poisson (goffi@goffi.org) + +# This program is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as published by +# the Free Software Foundation, either version 3 of the License, or +# (at your option) any later version. + +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. + +# You should have received a copy of the GNU Affero General Public License +# along with this program. If not, see <http://www.gnu.org/licenses/>. + +import base64 +from unittest.mock import MagicMock, patch + +from pytest import fixture +from pytest import raises +from twisted.words.protocols.jabber import jid + +from sat.plugins.plugin_xep_0166 import XEP_0166 +from sat.plugins.plugin_xep_0167 import XEP_0167, mapping +from sat.plugins.plugin_xep_0167.constants import NS_JINGLE_RTP, NS_JINGLE_RTP_INFO +from sat.tools import xml_tools +from sat.tools.common import data_format + + +@fixture(autouse=True) +def no_application_register(monkeypatch): + """Do not register the application in XEP-0166""" + monkeypatch.setattr(XEP_0166, "register_application", lambda *a, **kw: None) + + +class TestXEP0167Mapping: + @fixture(scope="class", autouse=True) + def set_mapping_host(self, host): + mapping.host = host + + def test_senders_to_sdp(self): + """Senders are mapped to SDP attribute""" + assert mapping.senders_to_sdp("both", {"role": "initiator"}) == "a=sendrecv" + assert mapping.senders_to_sdp("none", {"role": "initiator"}) == "a=inactive" + assert mapping.senders_to_sdp("initiator", {"role": "initiator"}) == "a=sendonly" + assert mapping.senders_to_sdp("responder", {"role": "initiator"}) == "a=recvonly" + + def test_generate_sdp_from_session(self): + """SDP is correctly generated from session data""" + session = { + "local_jid": jid.JID("toto@example.org/test"), + "metadata": {}, + "contents": { + "audio": { + "application_data": { + "media": "audio", + "local_data": { + "payload_types": { + 96: { + "name": "opus", + "clockrate": 48000, + "parameters": {"sprop-stereo": "1"}, + } + } + }, + }, + "transport_data": { + "local_ice_data": { + "ufrag": "ufrag", + "pwd": "pwd", + "candidates": [ + { + "foundation": "1", + "component_id": 1, + "transport": "UDP", + "priority": 1, + "address": "10.0.0.1", + "port": 12345, + "type": "host", + } + ], + } + }, + "senders": "both", + } + }, + } + + expected_sdp = ( + "v=0\r\n" + f"o={base64.b64encode('toto@example.org/test'.encode()).decode()} 1 1 IN IP4 0.0.0.0\r\n" + "s=-\r\n" + "t=0 0\r\n" + "a=sendrecv\r\n" + "a=msid-semantic:WMS *\r\n" + "m=audio 9999 UDP/TLS/RTP/SAVPF 96\r\n" + "c=IN IP4 0.0.0.0\r\n" + "a=mid:audio\r\n" + "a=rtpmap:96 opus/48000\r\n" + "a=fmtp:96 sprop-stereo=1\r\n" + "a=ice-ufrag:ufrag\r\n" + "a=ice-pwd:pwd\r\n" + "a=candidate:1 1 UDP 1 10.0.0.1 12345 typ host\r\n" + ) + + assert mapping.generate_sdp_from_session(session, True) == expected_sdp + + def test_parse_sdp(self): + """SDP is correctly parsed to session data""" + sdp = ( + "v=0\r\n" + "o=toto@example.org/test 1 1 IN IP4 0.0.0.0\r\n" + "s=-\r\n" + "t=0 0\r\n" + "a=sendrecv\r\n" + "a=msid-semantic:WMS *\r\n" + "m=audio 9999 UDP/TLS/RTP/SAVPF 96\r\n" + "c=IN IP4 0.0.0.0\r\n" + "a=mid:audio\r\n" + "a=rtpmap:96 opus/48000\r\n" + "a=fmtp:96 sprop-stereo=1\r\n" + "a=ice-ufrag:ufrag\r\n" + "a=ice-pwd:pwd\r\n" + "a=candidate:1 1 UDP 1 10.0.0.1 12345 typ host\r\n" + ) + + expected_session = { + "audio": { + "application_data": { + "media": "audio", + "payload_types": { + 96: { + "id": 96, + "name": "opus", + "clockrate": 48000, + "parameters": {"sprop-stereo": "1"}, + } + }, + }, + "transport_data": { + "port": 9999, + "pwd": "pwd", + "ufrag": "ufrag", + "candidates": [ + { + "foundation": "1", + "component_id": 1, + "transport": "UDP", + "priority": 1, + "address": "10.0.0.1", + "port": 12345, + "type": "host", + } + ], + }, + "id": "audio", + }, + "metadata": {}, + } + + assert mapping.parse_sdp(sdp) == expected_session + + def test_build_description(self): + """<description> element is generated from media data""" + session = {"metadata": {}} + + media_data = { + "payload_types": { + 96: { + "channels": "2", + "clockrate": "48000", + "id": "96", + "maxptime": "60", + "name": "opus", + "ptime": "20", + "parameters": {"sprop-stereo": "1"}, + } + }, + "bandwidth": "AS:40000", + "rtcp-mux": True, + "encryption": [ + { + "tag": "1", + "crypto-suite": "AES_CM_128_HMAC_SHA1_80", + "key-params": "inline:DPSKYRle84Ua2MjbScjadpCvFQH5Tutuls2N4/xx", + "session-params": "", + } + ], + } + + description_element = mapping.build_description("audio", media_data, session) + + # Assertions + assert description_element.name == "description" + assert description_element.uri == NS_JINGLE_RTP + assert description_element["media"] == "audio" + + # Payload types + payload_types = list(description_element.elements(NS_JINGLE_RTP, "payload-type")) + assert len(payload_types) == 1 + assert payload_types[0].name == "payload-type" + assert payload_types[0]["id"] == "96" + assert payload_types[0]["channels"] == "2" + assert payload_types[0]["clockrate"] == "48000" + assert payload_types[0]["maxptime"] == "60" + assert payload_types[0]["name"] == "opus" + assert payload_types[0]["ptime"] == "20" + + # Parameters + parameters = list(payload_types[0].elements(NS_JINGLE_RTP, "parameter")) + assert len(parameters) == 1 + assert parameters[0].name == "parameter" + assert parameters[0]["name"] == "sprop-stereo" + assert parameters[0]["value"] == "1" + + # Bandwidth + bandwidth = list(description_element.elements(NS_JINGLE_RTP, "bandwidth")) + assert len(bandwidth) == 1 + assert bandwidth[0]["type"] == "AS:40000" + + # RTCP-mux + rtcp_mux = list(description_element.elements(NS_JINGLE_RTP, "rtcp-mux")) + assert len(rtcp_mux) == 1 + + # Encryption + encryption = list(description_element.elements(NS_JINGLE_RTP, "encryption")) + assert len(encryption) == 1 + assert encryption[0]["required"] == "1" + crypto = list(encryption[0].elements("crypto")) + assert len(crypto) == 1 + assert crypto[0]["tag"] == "1" + assert crypto[0]["crypto-suite"] == "AES_CM_128_HMAC_SHA1_80" + assert ( + crypto[0]["key-params"] == "inline:DPSKYRle84Ua2MjbScjadpCvFQH5Tutuls2N4/xx" + ) + assert crypto[0]["session-params"] == "" + + def test_parse_description(self): + """Parsing <description> to a dict is successful""" + description_element = xml_tools.parse( + """ + <description xmlns="urn:xmpp:jingle:apps:rtp:1" media="audio"> + <payload-type id="96" channels="2" clockrate="48000" maxptime="60" name="opus" ptime="20"> + <parameter name="sprop-stereo" value="1" /> + </payload-type> + <bandwidth type="AS:40000" /> + <rtcp-mux /> + <encryption required="1"> + <crypto tag="1" crypto-suite="AES_CM_128_HMAC_SHA1_80" key-params="inline:DPSKYRle84Ua2MjbScjadpCvFQH5Tutuls2N4/xx" session-params="" /> + </encryption> + </description> + """ + ) + + parsed_data = mapping.parse_description(description_element) + + # Assertions + assert parsed_data["payload_types"] == { + 96: { + "channels": "2", + "clockrate": "48000", + "maxptime": "60", + "name": "opus", + "ptime": "20", + "parameters": {"sprop-stereo": "1"}, + } + } + assert parsed_data["bandwidth"] == "AS:40000" + assert parsed_data["rtcp-mux"] is True + assert parsed_data["encryption_required"] is True + assert parsed_data["encryption"] == [ + { + "tag": "1", + "crypto-suite": "AES_CM_128_HMAC_SHA1_80", + "key-params": "inline:DPSKYRle84Ua2MjbScjadpCvFQH5Tutuls2N4/xx", + "session-params": "", + } + ] + + +class TestXEP0167: + def test_jingle_session_info(self, host, client): + """Bridge's call_info method is called with correct parameters.""" + xep_0167 = XEP_0167(host) + session = {"id": "123"} + mock_call_info = MagicMock() + host.bridge.call_info = mock_call_info + + jingle_elt = xml_tools.parse( + """ + <jingle xmlns='urn:xmpp:jingle:1' + action='session-info' + initiator='client1@example.org' + sid='a73sjjvkla37jfea'> + <mute xmlns="urn:xmpp:jingle:apps:rtp:info:1" name="mute_name"/> + </jingle> + """ + ) + + xep_0167.jingle_session_info(client, "mute", session, "content_name", jingle_elt) + + mock_call_info.assert_called_with( + session["id"], + "mute", + data_format.serialise({"name": "mute_name"}), + client.profile, + ) + + def test_jingle_session_info_invalid_actions(self, host, client): + """When receiving invalid actions, no further action is taken.""" + xep_0167 = XEP_0167(host) + session = {"id": "123"} + mock_call_info = MagicMock() + host.bridge.call_info = mock_call_info + + jingle_elt = xml_tools.parse( + """ + <jingle xmlns='urn:xmpp:jingle:1' + action='session-info' + initiator='client1@example.org' + sid='a73sjjvkla37jfea'> + <invalid xmlns="urn:xmpp:jingle:apps:rtp:info:1" name="invalid_name"/> + </jingle> + """ + ) + + xep_0167.jingle_session_info( + client, "invalid", session, "content_name", jingle_elt + ) + mock_call_info.assert_not_called() + + def test_send_info(self, host, client): + """A jingle element with the correct info is created and sent.""" + xep_0167 = XEP_0167(host) + session_id = "123" + extra = {"name": "test"} + + iq_elt = xml_tools.parse( + """ + <iq from='client1@example.org' + id='yh3gr714' + to='client2@example.net' + type='set'> + <jingle xmlns='urn:xmpp:jingle:1' + action='session-info' + initiator='client1@example.org' + sid='a73sjjvkla37jfea'> + <active xmlns='urn:xmpp:jingle:apps:rtp:info:1'/> + </jingle> + </iq> + """ + ) + jingle_elt = iq_elt.firstChildElement() + mock_send = MagicMock() + iq_elt.send = mock_send + + with patch.object( + xep_0167._j, "build_session_info", return_value=(iq_elt, jingle_elt) + ): + xep_0167.send_info(client, session_id, "mute", extra) + + info_elt = jingle_elt.firstChildElement() + assert info_elt.name == "active" + assert info_elt.uri == NS_JINGLE_RTP_INFO + mock_send.assert_called() + + def test_send_info_invalid_actions(self, host, client): + """When trying to send invalid actions, an error is raised.""" + xep_0167 = XEP_0167(host) + session_id = "123" + extra = {"name": "test"} + + with raises(ValueError, match="Unkown info type 'invalid_action'"): + xep_0167.send_info(client, session_id, "invalid_action", extra)