You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
228 lines
6.1 KiB
228 lines
6.1 KiB
package validation |
|
|
|
import ( |
|
"testing" |
|
"time" |
|
|
|
"git.mleku.dev/mleku/nostr/encoders/event" |
|
"git.mleku.dev/mleku/nostr/encoders/tag" |
|
"git.mleku.dev/mleku/nostr/interfaces/signer/p8k" |
|
) |
|
|
|
func TestNew(t *testing.T) { |
|
s := New() |
|
if s == nil { |
|
t.Fatal("New() returned nil") |
|
} |
|
if s.cfg == nil { |
|
t.Fatal("New() returned service with nil config") |
|
} |
|
if s.cfg.MaxFutureSeconds != 3600 { |
|
t.Errorf("expected MaxFutureSeconds=3600, got %d", s.cfg.MaxFutureSeconds) |
|
} |
|
} |
|
|
|
func TestNewWithConfig(t *testing.T) { |
|
cfg := &Config{MaxFutureSeconds: 7200} |
|
s := NewWithConfig(cfg) |
|
if s.cfg.MaxFutureSeconds != 7200 { |
|
t.Errorf("expected MaxFutureSeconds=7200, got %d", s.cfg.MaxFutureSeconds) |
|
} |
|
|
|
// Test nil config defaults |
|
s = NewWithConfig(nil) |
|
if s.cfg.MaxFutureSeconds != 3600 { |
|
t.Errorf("expected default MaxFutureSeconds=3600, got %d", s.cfg.MaxFutureSeconds) |
|
} |
|
} |
|
|
|
func TestResultConstructors(t *testing.T) { |
|
// Test OK |
|
r := OK() |
|
if !r.Valid || r.Code != ReasonNone || r.Msg != "" { |
|
t.Error("OK() should return Valid=true with no code/msg") |
|
} |
|
|
|
// Test Blocked |
|
r = Blocked("test blocked") |
|
if r.Valid || r.Code != ReasonBlocked || r.Msg != "test blocked" { |
|
t.Error("Blocked() should return Valid=false with ReasonBlocked") |
|
} |
|
|
|
// Test Invalid |
|
r = Invalid("test invalid") |
|
if r.Valid || r.Code != ReasonInvalid || r.Msg != "test invalid" { |
|
t.Error("Invalid() should return Valid=false with ReasonInvalid") |
|
} |
|
|
|
// Test Error |
|
r = Error("test error") |
|
if r.Valid || r.Code != ReasonError || r.Msg != "test error" { |
|
t.Error("Error() should return Valid=false with ReasonError") |
|
} |
|
} |
|
|
|
func TestValidateRawJSON_LowercaseHex(t *testing.T) { |
|
s := New() |
|
|
|
// Valid lowercase hex |
|
validJSON := []byte(`["EVENT",{"id":"abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789","pubkey":"fedcba9876543210fedcba9876543210fedcba9876543210fedcba9876543210","created_at":1234567890,"kind":1,"tags":[],"content":"test","sig":"abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"}]`) |
|
|
|
result := s.ValidateRawJSON(validJSON) |
|
if !result.Valid { |
|
t.Errorf("valid lowercase JSON should pass: %s", result.Msg) |
|
} |
|
|
|
// Invalid - uppercase in id |
|
invalidID := []byte(`["EVENT",{"id":"ABCDEF0123456789abcdef0123456789abcdef0123456789abcdef0123456789","pubkey":"fedcba9876543210fedcba9876543210fedcba9876543210fedcba9876543210","created_at":1234567890,"kind":1,"tags":[],"content":"test","sig":"abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789"}]`) |
|
|
|
result = s.ValidateRawJSON(invalidID) |
|
if result.Valid { |
|
t.Error("uppercase in id should fail validation") |
|
} |
|
if result.Code != ReasonBlocked { |
|
t.Error("uppercase hex should return ReasonBlocked") |
|
} |
|
} |
|
|
|
func TestValidateEvent_ValidEvent(t *testing.T) { |
|
s := New() |
|
|
|
// Create and sign a valid event |
|
sign := p8k.MustNew() |
|
if err := sign.Generate(); err != nil { |
|
t.Fatalf("failed to generate signer: %v", err) |
|
} |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.CreatedAt = time.Now().Unix() |
|
ev.Content = []byte("test content") |
|
ev.Tags = tag.NewS() |
|
|
|
if err := ev.Sign(sign); err != nil { |
|
t.Fatalf("failed to sign event: %v", err) |
|
} |
|
|
|
result := s.ValidateEvent(ev) |
|
if !result.Valid { |
|
t.Errorf("valid event should pass validation: %s", result.Msg) |
|
} |
|
} |
|
|
|
func TestValidateEvent_InvalidID(t *testing.T) { |
|
s := New() |
|
|
|
// Create a valid event then corrupt the ID |
|
sign := p8k.MustNew() |
|
if err := sign.Generate(); err != nil { |
|
t.Fatalf("failed to generate signer: %v", err) |
|
} |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.CreatedAt = time.Now().Unix() |
|
ev.Content = []byte("test content") |
|
ev.Tags = tag.NewS() |
|
|
|
if err := ev.Sign(sign); err != nil { |
|
t.Fatalf("failed to sign event: %v", err) |
|
} |
|
|
|
// Corrupt the ID |
|
ev.ID[0] ^= 0xFF |
|
|
|
result := s.ValidateEvent(ev) |
|
if result.Valid { |
|
t.Error("event with corrupted ID should fail validation") |
|
} |
|
if result.Code != ReasonInvalid { |
|
t.Errorf("invalid ID should return ReasonInvalid, got %d", result.Code) |
|
} |
|
} |
|
|
|
func TestValidateEvent_FutureTimestamp(t *testing.T) { |
|
// Use short max future time for testing |
|
s := NewWithConfig(&Config{MaxFutureSeconds: 10}) |
|
|
|
sign := p8k.MustNew() |
|
if err := sign.Generate(); err != nil { |
|
t.Fatalf("failed to generate signer: %v", err) |
|
} |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.CreatedAt = time.Now().Unix() + 3600 // 1 hour in future |
|
ev.Content = []byte("test content") |
|
ev.Tags = tag.NewS() |
|
|
|
if err := ev.Sign(sign); err != nil { |
|
t.Fatalf("failed to sign event: %v", err) |
|
} |
|
|
|
result := s.ValidateEvent(ev) |
|
if result.Valid { |
|
t.Error("event with future timestamp should fail validation") |
|
} |
|
if result.Code != ReasonInvalid { |
|
t.Errorf("future timestamp should return ReasonInvalid, got %d", result.Code) |
|
} |
|
} |
|
|
|
func TestValidateProtectedTag_NoTag(t *testing.T) { |
|
s := New() |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.Tags = tag.NewS() |
|
|
|
result := s.ValidateProtectedTag(ev, []byte("somepubkey")) |
|
if !result.Valid { |
|
t.Error("event without protected tag should pass validation") |
|
} |
|
} |
|
|
|
func TestValidateProtectedTag_MatchingPubkey(t *testing.T) { |
|
s := New() |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.Pubkey = make([]byte, 32) |
|
for i := range ev.Pubkey { |
|
ev.Pubkey[i] = byte(i) |
|
} |
|
ev.Tags = tag.NewS() |
|
*ev.Tags = append(*ev.Tags, tag.NewFromAny("-")) |
|
|
|
result := s.ValidateProtectedTag(ev, ev.Pubkey) |
|
if !result.Valid { |
|
t.Errorf("protected tag with matching pubkey should pass: %s", result.Msg) |
|
} |
|
} |
|
|
|
func TestValidateProtectedTag_MismatchedPubkey(t *testing.T) { |
|
s := New() |
|
|
|
ev := event.New() |
|
ev.Kind = 1 |
|
ev.Pubkey = make([]byte, 32) |
|
for i := range ev.Pubkey { |
|
ev.Pubkey[i] = byte(i) |
|
} |
|
ev.Tags = tag.NewS() |
|
*ev.Tags = append(*ev.Tags, tag.NewFromAny("-")) |
|
|
|
// Different pubkey for auth |
|
differentPubkey := make([]byte, 32) |
|
for i := range differentPubkey { |
|
differentPubkey[i] = byte(i + 100) |
|
} |
|
|
|
result := s.ValidateProtectedTag(ev, differentPubkey) |
|
if result.Valid { |
|
t.Error("protected tag with different pubkey should fail validation") |
|
} |
|
if result.Code != ReasonBlocked { |
|
t.Errorf("mismatched protected tag should return ReasonBlocked, got %d", result.Code) |
|
} |
|
}
|
|
|