test_networking_utils.py 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208
  1. #!/usr/bin/env python3
  2. # Allow direct execution
  3. import os
  4. import sys
  5. import pytest
  6. sys.path.insert(0, os.path.dirname(os.path.dirname(os.path.abspath(__file__))))
  7. import io
  8. import random
  9. import ssl
  10. from yt_dlp.cookies import YoutubeDLCookieJar
  11. from yt_dlp.dependencies import certifi
  12. from yt_dlp.networking import Response
  13. from yt_dlp.networking._helper import (
  14. InstanceStoreMixin,
  15. add_accept_encoding_header,
  16. get_redirect_method,
  17. make_socks_proxy_opts,
  18. ssl_load_certs,
  19. )
  20. from yt_dlp.networking.exceptions import (
  21. HTTPError,
  22. IncompleteRead,
  23. )
  24. from yt_dlp.socks import ProxyType
  25. from yt_dlp.utils.networking import HTTPHeaderDict, select_proxy
  26. TEST_DIR = os.path.dirname(os.path.abspath(__file__))
  27. class TestNetworkingUtils:
  28. def test_select_proxy(self):
  29. proxies = {
  30. 'all': 'socks5://example.com',
  31. 'http': 'http://example.com:1080',
  32. 'no': 'bypass.example.com,yt-dl.org',
  33. }
  34. assert select_proxy('https://example.com', proxies) == proxies['all']
  35. assert select_proxy('http://example.com', proxies) == proxies['http']
  36. assert select_proxy('http://bypass.example.com', proxies) is None
  37. assert select_proxy('https://yt-dl.org', proxies) is None
  38. @pytest.mark.parametrize('socks_proxy,expected', [
  39. ('socks5h://example.com', {
  40. 'proxytype': ProxyType.SOCKS5,
  41. 'addr': 'example.com',
  42. 'port': 1080,
  43. 'rdns': True,
  44. 'username': None,
  45. 'password': None,
  46. }),
  47. ('socks5://user:@example.com:5555', {
  48. 'proxytype': ProxyType.SOCKS5,
  49. 'addr': 'example.com',
  50. 'port': 5555,
  51. 'rdns': False,
  52. 'username': 'user',
  53. 'password': '',
  54. }),
  55. ('socks4://u%40ser:pa%20ss@127.0.0.1:1080', {
  56. 'proxytype': ProxyType.SOCKS4,
  57. 'addr': '127.0.0.1',
  58. 'port': 1080,
  59. 'rdns': False,
  60. 'username': 'u@ser',
  61. 'password': 'pa ss',
  62. }),
  63. ('socks4a://:pa%20ss@127.0.0.1', {
  64. 'proxytype': ProxyType.SOCKS4A,
  65. 'addr': '127.0.0.1',
  66. 'port': 1080,
  67. 'rdns': True,
  68. 'username': '',
  69. 'password': 'pa ss',
  70. }),
  71. ])
  72. def test_make_socks_proxy_opts(self, socks_proxy, expected):
  73. assert make_socks_proxy_opts(socks_proxy) == expected
  74. def test_make_socks_proxy_unknown(self):
  75. with pytest.raises(ValueError, match='Unknown SOCKS proxy version: socks'):
  76. make_socks_proxy_opts('socks://127.0.0.1')
  77. @pytest.mark.skipif(not certifi, reason='certifi is not installed')
  78. def test_load_certifi(self):
  79. context_certifi = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  80. context_certifi.load_verify_locations(cafile=certifi.where())
  81. context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  82. ssl_load_certs(context, use_certifi=True)
  83. assert context.get_ca_certs() == context_certifi.get_ca_certs()
  84. context_default = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  85. context_default.load_default_certs()
  86. context = ssl.SSLContext(ssl.PROTOCOL_TLS_CLIENT)
  87. ssl_load_certs(context, use_certifi=False)
  88. assert context.get_ca_certs() == context_default.get_ca_certs()
  89. if context_default.get_ca_certs() == context_certifi.get_ca_certs():
  90. pytest.skip('System uses certifi as default. The test is not valid')
  91. @pytest.mark.parametrize('method,status,expected', [
  92. ('GET', 303, 'GET'),
  93. ('HEAD', 303, 'HEAD'),
  94. ('PUT', 303, 'GET'),
  95. ('POST', 301, 'GET'),
  96. ('HEAD', 301, 'HEAD'),
  97. ('POST', 302, 'GET'),
  98. ('HEAD', 302, 'HEAD'),
  99. ('PUT', 302, 'PUT'),
  100. ('POST', 308, 'POST'),
  101. ('POST', 307, 'POST'),
  102. ('HEAD', 308, 'HEAD'),
  103. ('HEAD', 307, 'HEAD'),
  104. ])
  105. def test_get_redirect_method(self, method, status, expected):
  106. assert get_redirect_method(method, status) == expected
  107. @pytest.mark.parametrize('headers,supported_encodings,expected', [
  108. ({'Accept-Encoding': 'br'}, ['gzip', 'br'], {'Accept-Encoding': 'br'}),
  109. ({}, ['gzip', 'br'], {'Accept-Encoding': 'gzip, br'}),
  110. ({'Content-type': 'application/json'}, [], {'Content-type': 'application/json', 'Accept-Encoding': 'identity'}),
  111. ])
  112. def test_add_accept_encoding_header(self, headers, supported_encodings, expected):
  113. headers = HTTPHeaderDict(headers)
  114. add_accept_encoding_header(headers, supported_encodings)
  115. assert headers == HTTPHeaderDict(expected)
  116. class TestInstanceStoreMixin:
  117. class FakeInstanceStoreMixin(InstanceStoreMixin):
  118. def _create_instance(self, **kwargs):
  119. return random.randint(0, 1000000)
  120. def _close_instance(self, instance):
  121. pass
  122. def test_mixin(self):
  123. mixin = self.FakeInstanceStoreMixin()
  124. assert mixin._get_instance(d={'a': 1, 'b': 2, 'c': {'d', 4}}) == mixin._get_instance(d={'a': 1, 'b': 2, 'c': {'d', 4}})
  125. assert mixin._get_instance(d={'a': 1, 'b': 2, 'c': {'e', 4}}) != mixin._get_instance(d={'a': 1, 'b': 2, 'c': {'d', 4}})
  126. assert mixin._get_instance(d={'a': 1, 'b': 2, 'c': {'d', 4}} != mixin._get_instance(d={'a': 1, 'b': 2, 'g': {'d', 4}}))
  127. assert mixin._get_instance(d={'a': 1}, e=[1, 2, 3]) == mixin._get_instance(d={'a': 1}, e=[1, 2, 3])
  128. assert mixin._get_instance(d={'a': 1}, e=[1, 2, 3]) != mixin._get_instance(d={'a': 1}, e=[1, 2, 3, 4])
  129. cookiejar = YoutubeDLCookieJar()
  130. assert mixin._get_instance(b=[1, 2], c=cookiejar) == mixin._get_instance(b=[1, 2], c=cookiejar)
  131. assert mixin._get_instance(b=[1, 2], c=cookiejar) != mixin._get_instance(b=[1, 2], c=YoutubeDLCookieJar())
  132. # Different order
  133. assert mixin._get_instance(c=cookiejar, b=[1, 2]) == mixin._get_instance(b=[1, 2], c=cookiejar)
  134. m = mixin._get_instance(t=1234)
  135. assert mixin._get_instance(t=1234) == m
  136. mixin._clear_instances()
  137. assert mixin._get_instance(t=1234) != m
  138. class TestNetworkingExceptions:
  139. @staticmethod
  140. def create_response(status):
  141. return Response(fp=io.BytesIO(b'test'), url='http://example.com', headers={'tesT': 'test'}, status=status)
  142. def test_http_error(self):
  143. response = self.create_response(403)
  144. error = HTTPError(response)
  145. assert error.status == 403
  146. assert str(error) == error.msg == 'HTTP Error 403: Forbidden'
  147. assert error.reason == response.reason
  148. assert error.response is response
  149. data = error.response.read()
  150. assert data == b'test'
  151. assert repr(error) == '<HTTPError 403: Forbidden>'
  152. def test_redirect_http_error(self):
  153. response = self.create_response(301)
  154. error = HTTPError(response, redirect_loop=True)
  155. assert str(error) == error.msg == 'HTTP Error 301: Moved Permanently (redirect loop detected)'
  156. assert error.reason == 'Moved Permanently'
  157. def test_incomplete_read_error(self):
  158. error = IncompleteRead(4, 3, cause='test')
  159. assert isinstance(error, IncompleteRead)
  160. assert repr(error) == '<IncompleteRead: 4 bytes read, 3 more expected>'
  161. assert str(error) == error.msg == '4 bytes read, 3 more expected'
  162. assert error.partial == 4
  163. assert error.expected == 3
  164. assert error.cause == 'test'
  165. error = IncompleteRead(3)
  166. assert repr(error) == '<IncompleteRead: 3 bytes read>'
  167. assert str(error) == '3 bytes read'