Pigeon-Ruby/spec/pigeon/message_spec.rb

164 lines
5.0 KiB
Ruby

require "spec_helper"
RSpec.describe Pigeon::Message do
before(:each) do
Pigeon::Storage.reset
Pigeon::LocalIdentity.reset
end
def create_draft(params)
draft = Pigeon::Draft.create(kind: "unit_test")
params.each { |(k, v)| draft[k] = v }
draft
end
def create_message(params)
draft = create_draft(params)
draft.publish
end
let(:draft) do
hash = Pigeon::Storage.current.set_blob(File.read("./logo.png"))
create_draft({ "a" => "bar",
"b" => hash })
end
let (:template) do
Pigeon::MessageSerializer.new(create_message({ "a" => "b" }))
end
it "discards a draft after signing" do
expect(draft.internal_id).to eq(Pigeon::Draft.current.internal_id)
draft.publish
expect { Pigeon::Draft.current }.to raise_error("NO DRAFT FOUND")
end
it "creates a single message" do
message = draft.publish
expect(message.author.multihash).to eq(Pigeon::LocalIdentity.current.multihash)
expect(message.body).to eq(draft.body)
expect(message.depth).to eq(0)
expect(message.kind).to eq("unit_test")
expect(message.prev).to eq(Pigeon::EMPTY_MESSAGE)
expect(message.signature.include?(Pigeon::SIG_FOOTER)).to eq(true)
expect(message.signature.length).to be > 99
actual = message.render
expected = [
"author __AUTHOR__",
"kind unit_test",
"prev NONE",
"depth 0",
"",
"a:\"bar\"",
"b:&CHHABX8Q9D9Q0BY2BBZ6FA7SMAFNE9GGMSDTZVZZC9TK2N9F15QG.sha256",
"",
"signature __SIGNATURE__",
].join("\n")
.gsub("__AUTHOR__", message.author.multihash)
.gsub("__SIGNATURE__", message.signature)
expect(actual).to eq(expected)
end
it "creates a chain of messages" do
all = []
0.upto(4) do |expected_depth|
draft1 = Pigeon::Draft.create(kind: "unit_test")
draft1["description"] = "Message number #{expected_depth}"
message = draft1.publish
all.push(message)
expect(message.depth).to eq(expected_depth)
if expected_depth == 0
expect(message.prev).to eq(Pigeon::EMPTY_MESSAGE)
else
expect(message.prev).to eq(all[expected_depth - 1].multihash)
end
end
end
it "verifies accuracy of hash chain" do
m1 = create_message({ "a" => "b" })
m2 = create_message({ "c" => "d" })
m3 = create_message({ "e" => "f" })
m4 = create_message({ "g" => "h" })
expect(m1.prev).to eq(Pigeon::EMPTY_MESSAGE)
expect(m2.prev).to be
expect(m2.prev).to eq(m1.multihash)
expect(m3.prev).to eq(m2.multihash)
expect(m3.prev).to be
expect(m4.prev).to eq(m3.multihash)
expect(m4.prev).to be
end
# Init LocalIdentity
# Get secret
# Create signing key
it "verifies accuracy of signatures" do
# === Initial setup
Pigeon::LocalIdentity.current
secret = Pigeon::Storage.current.get_config(Pigeon::SEED_CONFIG_KEY)
message = template.message
plaintext = template.render_without_signature
# Make fake pairs of data for cross-checking
key1 = Pigeon::LocalIdentity.current.instance_variable_get(:@signing_key)
key2 = Ed25519::SigningKey.new(secret)
sig1 = key1.sign(plaintext)
sig2 = key2.sign(plaintext)
expect(key1.seed).to eq(key2.seed)
expect(sig1).to eq(sig2)
combinations = [[key1, sig1], [key1, sig2], [key2, sig1], [key2, sig2]]
combinations.map { |(key, sig)| key.verify_key.verify(sig, plaintext) }
sig1_b64 = Pigeon::Helpers.b32_encode(sig1) + Pigeon::SIG_FOOTER
sig2_b64 = Pigeon::Helpers.b32_encode(sig2) + Pigeon::SIG_FOOTER
expect(message.signature).to eq(sig1_b64)
expect(message.signature).to eq(sig2_b64)
end
it "crashes on forged fields" do
msg = Pigeon::Parser.parse([
[:AUTHOR, "@DYdgK1KUInVtG3lS45hA1HZ-jTuvfLKsxDpXPFCve04=.ed25519"],
[:KIND, "invalid"],
[:PREV, "NONE"],
[:DEPTH, 10],
[:HEADER_END],
[:BODY_ENTRY, "duplicate", "This key is a duplicate."],
[:SIGNATURE, "DN7yPTE-m433ND3jBL4oM23XGxBKafjq0Dp9ArBQa_TIGU7DmCxTumieuPBN-NKxlx_0N7-c5zjLb5XXVHYPCQ==.sig.ed25519"],
[:MESSAGE_END],
])
m = "Expected field `depth` to equal 0, got: 10"
expect { msg.first.save! }.to raise_error(Pigeon::Message::VerificationError, m)
end
# Every ASCII character that is not a letter:
WHITESPACE = (0..32).to_a.map(&:chr).push(127.chr)
it "does not allow whitespace in `kind` attributes" do
WHITESPACE.map do |n|
kind = SecureRandom.alphanumeric(8)
kind[rand(0...8)] = n
draft = Pigeon::Draft.create(kind: kind)
draft["body"] = "empty"
tpl = draft.publish.render
boom = ->() { Pigeon::Lexer.tokenize(tpl) }
expect(boom).to raise_error(Pigeon::Lexer::LexError)
end
end
it "does not allow whitespace in key names" do
WHITESPACE.map do |n|
draft = Pigeon::Draft.create(kind: "unit_test")
key = SecureRandom.alphanumeric(8)
key[rand(0...8)] = n
draft[key] = "should crash"
tpl = draft.publish.render
boom = ->() { Pigeon::Lexer.tokenize(tpl) }
expect(boom).to raise_error(Pigeon::Lexer::LexError)
end
end
end