this repo has no description
1use aws_config::BehaviorVersion; 2use aws_sdk_s3::Client as S3Client; 3use aws_sdk_s3::config::Credentials; 4use bspds::state::AppState; 5use chrono::Utc; 6use reqwest::{Client, StatusCode, header}; 7use serde_json::{Value, json}; 8use sqlx::postgres::PgPoolOptions; 9#[allow(unused_imports)] 10use std::collections::HashMap; 11use std::sync::OnceLock; 12#[allow(unused_imports)] 13use std::time::Duration; 14use testcontainers::core::ContainerPort; 15use testcontainers::{ContainerAsync, GenericImage, ImageExt, runners::AsyncRunner}; 16use testcontainers_modules::postgres::Postgres; 17use tokio::net::TcpListener; 18use wiremock::matchers::{method, path}; 19use wiremock::{Mock, MockServer, ResponseTemplate}; 20 21static SERVER_URL: OnceLock<String> = OnceLock::new(); 22static DB_CONTAINER: OnceLock<ContainerAsync<Postgres>> = OnceLock::new(); 23static S3_CONTAINER: OnceLock<ContainerAsync<GenericImage>> = OnceLock::new(); 24static MOCK_APPVIEW: OnceLock<MockServer> = OnceLock::new(); 25 26#[allow(dead_code)] 27pub const AUTH_TOKEN: &str = "test-token"; 28#[allow(dead_code)] 29pub const BAD_AUTH_TOKEN: &str = "bad-token"; 30#[allow(dead_code)] 31pub const AUTH_DID: &str = "did:plc:fake"; 32#[allow(dead_code)] 33pub const TARGET_DID: &str = "did:plc:target"; 34 35#[allow(dead_code)] 36pub fn client() -> Client { 37 Client::new() 38} 39 40pub async fn base_url() -> &'static str { 41 SERVER_URL.get_or_init(|| { 42 let (tx, rx) = std::sync::mpsc::channel(); 43 44 std::thread::spawn(move || { 45 if std::env::var("DOCKER_HOST").is_err() { 46 if let Ok(runtime_dir) = std::env::var("XDG_RUNTIME_DIR") { 47 let podman_sock = std::path::Path::new(&runtime_dir).join("podman/podman.sock"); 48 if podman_sock.exists() { 49 unsafe { 50 std::env::set_var( 51 "DOCKER_HOST", 52 format!("unix://{}", podman_sock.display()), 53 ); 54 } 55 } 56 } 57 } 58 59 let rt = tokio::runtime::Runtime::new().unwrap(); 60 rt.block_on(async move { 61 let s3_container = GenericImage::new("minio/minio", "latest") 62 .with_exposed_port(ContainerPort::Tcp(9000)) 63 .with_env_var("MINIO_ROOT_USER", "minioadmin") 64 .with_env_var("MINIO_ROOT_PASSWORD", "minioadmin") 65 .with_cmd(vec!["server".to_string(), "/data".to_string()]) 66 .start() 67 .await 68 .expect("Failed to start MinIO"); 69 70 let s3_port = s3_container 71 .get_host_port_ipv4(9000) 72 .await 73 .expect("Failed to get S3 port"); 74 let s3_endpoint = format!("http://127.0.0.1:{}", s3_port); 75 76 unsafe { 77 std::env::set_var("S3_BUCKET", "test-bucket"); 78 std::env::set_var("AWS_ACCESS_KEY_ID", "minioadmin"); 79 std::env::set_var("AWS_SECRET_ACCESS_KEY", "minioadmin"); 80 std::env::set_var("AWS_REGION", "us-east-1"); 81 std::env::set_var("S3_ENDPOINT", &s3_endpoint); 82 } 83 84 let sdk_config = aws_config::defaults(BehaviorVersion::latest()) 85 .region("us-east-1") 86 .endpoint_url(&s3_endpoint) 87 .credentials_provider(Credentials::new( 88 "minioadmin", 89 "minioadmin", 90 None, 91 None, 92 "test", 93 )) 94 .load() 95 .await; 96 97 let s3_config = aws_sdk_s3::config::Builder::from(&sdk_config) 98 .force_path_style(true) 99 .build(); 100 let s3_client = S3Client::from_conf(s3_config); 101 102 let _ = s3_client.create_bucket().bucket("test-bucket").send().await; 103 104 let mock_server = MockServer::start().await; 105 106 Mock::given(method("GET")) 107 .and(path("/xrpc/app.bsky.actor.getProfile")) 108 .respond_with(ResponseTemplate::new(200).set_body_json(json!({ 109 "handle": "mock.handle", 110 "did": "did:plc:mock", 111 "displayName": "Mock User" 112 }))) 113 .mount(&mock_server) 114 .await; 115 116 Mock::given(method("GET")) 117 .and(path("/xrpc/app.bsky.actor.searchActors")) 118 .respond_with(ResponseTemplate::new(200).set_body_json(json!({ 119 "actors": [], 120 "cursor": null 121 }))) 122 .mount(&mock_server) 123 .await; 124 125 unsafe { 126 std::env::set_var("APPVIEW_URL", mock_server.uri()); 127 } 128 MOCK_APPVIEW.set(mock_server).ok(); 129 130 S3_CONTAINER.set(s3_container).ok(); 131 132 let container = Postgres::default() 133 .with_tag("18-alpine") 134 .start() 135 .await 136 .expect("Failed to start Postgres"); 137 let connection_string = format!( 138 "postgres://postgres:postgres@127.0.0.1:{}/postgres", 139 container 140 .get_host_port_ipv4(5432) 141 .await 142 .expect("Failed to get port") 143 ); 144 145 DB_CONTAINER.set(container).ok(); 146 147 let url = spawn_app(connection_string).await; 148 tx.send(url).unwrap(); 149 std::future::pending::<()>().await; 150 }); 151 }); 152 153 rx.recv().expect("Failed to start test server") 154 }) 155} 156 157async fn spawn_app(database_url: String) -> String { 158 let pool = PgPoolOptions::new() 159 .connect(&database_url) 160 .await 161 .expect("Failed to connect to Postgres. Make sure the database is running."); 162 163 sqlx::migrate!("./migrations") 164 .run(&pool) 165 .await 166 .expect("Failed to run migrations"); 167 168 let state = AppState::new(pool).await; 169 let app = bspds::app(state); 170 171 let listener = TcpListener::bind("127.0.0.1:0").await.unwrap(); 172 let addr = listener.local_addr().unwrap(); 173 174 tokio::spawn(async move { 175 axum::serve(listener, app).await.unwrap(); 176 }); 177 178 format!("http://{}", addr) 179} 180 181#[allow(dead_code)] 182pub async fn upload_test_blob(client: &Client, data: &'static str, mime: &'static str) -> Value { 183 let res = client 184 .post(format!( 185 "{}/xrpc/com.atproto.repo.uploadBlob", 186 base_url().await 187 )) 188 .header(header::CONTENT_TYPE, mime) 189 .bearer_auth(AUTH_TOKEN) 190 .body(data) 191 .send() 192 .await 193 .expect("Failed to send uploadBlob request"); 194 195 assert_eq!(res.status(), StatusCode::OK, "Failed to upload blob"); 196 let body: Value = res.json().await.expect("Blob upload response was not JSON"); 197 body["blob"].clone() 198} 199 200#[allow(dead_code)] 201pub async fn create_test_post( 202 client: &Client, 203 text: &str, 204 reply_to: Option<Value>, 205) -> (String, String, String) { 206 let collection = "app.bsky.feed.post"; 207 let mut record = json!({ 208 "$type": collection, 209 "text": text, 210 "createdAt": Utc::now().to_rfc3339() 211 }); 212 213 if let Some(reply_obj) = reply_to { 214 record["reply"] = reply_obj; 215 } 216 217 let payload = json!({ 218 "repo": AUTH_DID, 219 "collection": collection, 220 "record": record 221 }); 222 223 let res = client 224 .post(format!( 225 "{}/xrpc/com.atproto.repo.createRecord", 226 base_url().await 227 )) 228 .bearer_auth(AUTH_TOKEN) 229 .json(&payload) 230 .send() 231 .await 232 .expect("Failed to send createRecord"); 233 234 assert_eq!(res.status(), StatusCode::OK, "Failed to create post record"); 235 let body: Value = res 236 .json() 237 .await 238 .expect("createRecord response was not JSON"); 239 240 let uri = body["uri"] 241 .as_str() 242 .expect("Response had no URI") 243 .to_string(); 244 let cid = body["cid"] 245 .as_str() 246 .expect("Response had no CID") 247 .to_string(); 248 let rkey = uri 249 .split('/') 250 .last() 251 .expect("URI was malformed") 252 .to_string(); 253 254 (uri, cid, rkey) 255} 256 257#[allow(dead_code)] 258pub async fn create_account_and_login(client: &Client) -> (String, String) { 259 let handle = format!("user_{}", uuid::Uuid::new_v4()); 260 let payload = json!({ 261 "handle": handle, 262 "email": format!("{}@example.com", handle), 263 "password": "password" 264 }); 265 266 let res = client 267 .post(format!( 268 "{}/xrpc/com.atproto.server.createAccount", 269 base_url().await 270 )) 271 .json(&payload) 272 .send() 273 .await 274 .expect("Failed to create account"); 275 276 if res.status() != StatusCode::OK { 277 panic!("Failed to create account: {:?}", res.text().await); 278 } 279 280 let body: Value = res.json().await.expect("Invalid JSON"); 281 let access_jwt = body["accessJwt"] 282 .as_str() 283 .expect("No accessJwt") 284 .to_string(); 285 let did = body["did"].as_str().expect("No did").to_string(); 286 (access_jwt, did) 287}