#!/usr/bin/env python # flake8: noqa: E501 # A library that provides a Python interface to the Telegram Bot API # Copyright (C) 2015-2022 # Leandro Toledo de Souza # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser Public License for more details. # # You should have received a copy of the GNU Lesser Public License # along with this program. If not, see [http://www.gnu.org/licenses/]. from copy import deepcopy import pytest from telegram import ( PassportData, PassportFile, Bot, File, PassportElementErrorSelfie, PassportElementErrorDataField, Credentials, ) from telegram.error import PassportDecryptionError # Note: All classes in telegram.credentials (except EncryptedCredentials) aren't directly tested # here, although they are implicitly tested. Testing for those classes was too much work and not # worth it. RAW_PASSPORT_DATA = { 'credentials': { 'hash': 'qB4hz2LMcXYhglwz6EvXMMyI3PURisWLXl/iCmCXcSk=', 'secret': 'O6x3X2JrLO1lUIhw48os1gaenDuZLhesoZMKXehZwtM3vsxOdtxHKWQyLNwtbyy4snYpARXDwf8f1QHNmQ/M1PwBQvk1ozrZBXb4a6k/iYj+P4v8Xw2M++CRHqZv0LaxFtyHOXnNYZ6dXpNeF0ZvYYTmm0FsYvK+/3/F6VDB3Oe6xWlXFLwaCCP/jA9i2+dKp6iq8NLOo4VnxenPKWWYz20RZ50MdAbS3UR+NCx4AHM2P5DEGrHNW0tMXJ+FG3jpVrit5BuCbB/eRgKxNGRWNxEGV5hun5MChdxKCEHCimnUA97h7MZdoTgYxkrfvDSZ/V89BnFXLdr87t/NLvVE0Q==', 'data': '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', }, 'data': [ { 'data': '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', 'type': 'personal_details', 'hash': 'What to put here?', }, { 'reverse_side': { 'file_size': 32424112, 'file_date': 1534074942, 'file_id': 'DgADBAADNQQAAtoagFPf4wwmFZdmyQI', 'file_unique_id': 'adc3145fd2e84d95b64d68eaa22aa33e', }, 'translation': [ { 'file_size': 28640, 'file_date': 1535630933, 'file_id': 'DgADBAADswMAAisqQVAmooP-kVgLgAI', 'file_unique_id': '52a90d53d6064bb58feb582acdc3a324', }, { 'file_size': 28672, 'file_date': 1535630933, 'file_id': 'DgADBAAD1QMAAnrpQFBMZsT3HysjwwI', 'file_unique_id': '7285f864d168441ba1f7d02146250432', }, ], 'front_side': { 'file_size': 28624, 'file_date': 1534074942, 'file_id': 'DgADBAADxwMAApnQgVPK2-ckL2eXVAI', 'file_unique_id': 'd9d52a700cbb4a189a80104aa5978133', }, 'type': 'driver_license', 'selfie': { 'file_size': 28592, 'file_date': 1534074942, 'file_id': 'DgADBAADEQQAAkopgFNr6oi-wISRtAI', 'file_unique_id': 'd4e390cca57b4da5a65322b304762a12', }, 'data': 'eJUOFuY53QKmGqmBgVWlLBAQCUQJ79n405SX6M5aGFIIodOPQqnLYvMNqTwTrXGDlW+mVLZcbu+y8luLVO8WsJB/0SB7q5WaXn/IMt1G9lz5G/KMLIZG/x9zlnimsaQLg7u8srG6L4KZzv+xkbbHjZdETrxU8j0N/DoS4HvLMRSJAgeFUrY6v2YW9vSRg+fSxIqQy1jR2VKpzAT8OhOz7A==', 'hash': 'We seriously need to improve this mess! took so long to debug!', }, { 'translation': [ { 'file_size': 28480, 'file_date': 1535630939, 'file_id': 'DgADBAADyQUAAqyqQVC_eoX_KwNjJwI', 'file_unique_id': '38b2877b443542cbaf520c6e36a33ac4', }, { 'file_size': 28528, 'file_date': 1535630939, 'file_id': 'DgADBAADsQQAAubTQVDRO_FN3lOwWwI', 'file_unique_id': 'f008ca48c44b4a47895ddbcd2f76741e', }, ], 'files': [ { 'file_size': 28640, 'file_date': 1534074988, 'file_id': 'DgADBAADLAMAAhwfgVMyfGa5Nr0LvAI', 'file_unique_id': 'b170748794834644baaa3ec57ee4ce7a', }, { 'file_size': 28480, 'file_date': 1534074988, 'file_id': 'DgADBAADaQQAAsFxgVNVfLZuT-_3ZQI', 'file_unique_id': '19a12ae34dca424b85e0308f706cee75', }, ], 'type': 'utility_bill', 'hash': 'Wow over 30 minutes spent debugging passport stuff.', }, { 'data': 'j9SksVkSj128DBtZA+3aNjSFNirzv+R97guZaMgae4Gi0oDVNAF7twPR7j9VSmPedfJrEwL3O889Ei+a5F1xyLLyEI/qEBljvL70GFIhYGitS0JmNabHPHSZrjOl8b4s/0Z0Px2GpLO5siusTLQonimdUvu4UPjKquYISmlKEKhtmGATy+h+JDjNCYuOkhakeNw0Rk0BHgj0C3fCb7WZNQSyVb+2GTu6caR6eXf/AFwFp0TV3sRz3h0WIVPW8bna', 'type': 'address', 'hash': 'at least I get the pattern now', }, {'email': 'fb3e3i47zt@dispostable.com', 'type': 'email', 'hash': 'this should be it.'}, ], } @pytest.fixture(scope='function') def all_passport_data(): return [ { 'type': 'personal_details', 'data': RAW_PASSPORT_DATA['data'][0]['data'], 'hash': 'what to put here?', }, { 'type': 'passport', 'data': RAW_PASSPORT_DATA['data'][1]['data'], 'front_side': RAW_PASSPORT_DATA['data'][1]['front_side'], 'selfie': RAW_PASSPORT_DATA['data'][1]['selfie'], 'translation': RAW_PASSPORT_DATA['data'][1]['translation'], 'hash': 'more data arghh', }, { 'type': 'internal_passport', 'data': RAW_PASSPORT_DATA['data'][1]['data'], 'front_side': RAW_PASSPORT_DATA['data'][1]['front_side'], 'selfie': RAW_PASSPORT_DATA['data'][1]['selfie'], 'translation': RAW_PASSPORT_DATA['data'][1]['translation'], 'hash': 'more data arghh', }, { 'type': 'driver_license', 'data': RAW_PASSPORT_DATA['data'][1]['data'], 'front_side': RAW_PASSPORT_DATA['data'][1]['front_side'], 'reverse_side': RAW_PASSPORT_DATA['data'][1]['reverse_side'], 'selfie': RAW_PASSPORT_DATA['data'][1]['selfie'], 'translation': RAW_PASSPORT_DATA['data'][1]['translation'], 'hash': 'more data arghh', }, { 'type': 'identity_card', 'data': RAW_PASSPORT_DATA['data'][1]['data'], 'front_side': RAW_PASSPORT_DATA['data'][1]['front_side'], 'reverse_side': RAW_PASSPORT_DATA['data'][1]['reverse_side'], 'selfie': RAW_PASSPORT_DATA['data'][1]['selfie'], 'translation': RAW_PASSPORT_DATA['data'][1]['translation'], 'hash': 'more data arghh', }, { 'type': 'utility_bill', 'files': RAW_PASSPORT_DATA['data'][2]['files'], 'translation': RAW_PASSPORT_DATA['data'][2]['translation'], 'hash': 'more data arghh', }, { 'type': 'bank_statement', 'files': RAW_PASSPORT_DATA['data'][2]['files'], 'translation': RAW_PASSPORT_DATA['data'][2]['translation'], 'hash': 'more data arghh', }, { 'type': 'rental_agreement', 'files': RAW_PASSPORT_DATA['data'][2]['files'], 'translation': RAW_PASSPORT_DATA['data'][2]['translation'], 'hash': 'more data arghh', }, { 'type': 'passport_registration', 'files': RAW_PASSPORT_DATA['data'][2]['files'], 'translation': RAW_PASSPORT_DATA['data'][2]['translation'], 'hash': 'more data arghh', }, { 'type': 'temporary_registration', 'files': RAW_PASSPORT_DATA['data'][2]['files'], 'translation': RAW_PASSPORT_DATA['data'][2]['translation'], 'hash': 'more data arghh', }, { 'type': 'address', 'data': RAW_PASSPORT_DATA['data'][3]['data'], 'hash': 'more data arghh', }, {'type': 'email', 'email': 'fb3e3i47zt@dispostable.com', 'hash': 'more data arghh'}, { 'type': 'phone_number', 'phone_number': 'fb3e3i47zt@dispostable.com', 'hash': 'more data arghh', }, ] @pytest.fixture(scope='function') def passport_data(bot): return PassportData.de_json(RAW_PASSPORT_DATA, bot=bot) class TestPassport: driver_license_selfie_file_id = 'DgADBAADEQQAAkopgFNr6oi-wISRtAI' driver_license_selfie_file_unique_id = 'd4e390cca57b4da5a65322b304762a12' driver_license_front_side_file_id = 'DgADBAADxwMAApnQgVPK2-ckL2eXVAI' driver_license_front_side_file_unique_id = 'd9d52a700cbb4a189a80104aa5978133' driver_license_reverse_side_file_id = 'DgADBAADNQQAAtoagFPf4wwmFZdmyQI' driver_license_reverse_side_file_unique_id = 'adc3145fd2e84d95b64d68eaa22aa33e' driver_license_translation_1_file_id = 'DgADBAADswMAAisqQVAmooP-kVgLgAI' driver_license_translation_1_file_unique_id = '52a90d53d6064bb58feb582acdc3a324' driver_license_translation_2_file_id = 'DgADBAAD1QMAAnrpQFBMZsT3HysjwwI' driver_license_translation_2_file_unique_id = '7285f864d168441ba1f7d02146250432' utility_bill_1_file_id = 'DgADBAADLAMAAhwfgVMyfGa5Nr0LvAI' utility_bill_1_file_unique_id = 'b170748794834644baaa3ec57ee4ce7a' utility_bill_2_file_id = 'DgADBAADaQQAAsFxgVNVfLZuT-_3ZQI' utility_bill_2_file_unique_id = '19a12ae34dca424b85e0308f706cee75' utility_bill_translation_1_file_id = 'DgADBAADyQUAAqyqQVC_eoX_KwNjJwI' utility_bill_translation_1_file_unique_id = '38b2877b443542cbaf520c6e36a33ac4' utility_bill_translation_2_file_id = 'DgADBAADsQQAAubTQVDRO_FN3lOwWwI' utility_bill_translation_2_file_unique_id = 'f008ca48c44b4a47895ddbcd2f76741e' driver_license_selfie_credentials_file_hash = 'Cila/qLXSBH7DpZFbb5bRZIRxeFW2uv/ulL0u0JNsYI=' driver_license_selfie_credentials_secret = 'tivdId6RNYNsvXYPppdzrbxOBuBOr9wXRPDcCvnXU7E=' def test_slot_behaviour(self, passport_data, mro_slots): inst = passport_data for attr in inst.__slots__: assert getattr(inst, attr, 'err') != 'err', f"got extra slot '{attr}'" assert len(mro_slots(inst)) == len(set(mro_slots(inst))), "duplicate slot" def test_creation(self, passport_data): assert isinstance(passport_data, PassportData) def test_expected_encrypted_values(self, passport_data): personal_details, driver_license, utility_bill, address, email = passport_data.data assert personal_details.type == 'personal_details' assert personal_details.data == RAW_PASSPORT_DATA['data'][0]['data'] assert driver_license.type == 'driver_license' assert driver_license.data == RAW_PASSPORT_DATA['data'][1]['data'] assert isinstance(driver_license.selfie, PassportFile) assert driver_license.selfie.file_id == self.driver_license_selfie_file_id assert driver_license.selfie.file_unique_id == self.driver_license_selfie_file_unique_id assert isinstance(driver_license.front_side, PassportFile) assert driver_license.front_side.file_id == self.driver_license_front_side_file_id assert ( driver_license.front_side.file_unique_id == self.driver_license_front_side_file_unique_id ) assert isinstance(driver_license.reverse_side, PassportFile) assert driver_license.reverse_side.file_id == self.driver_license_reverse_side_file_id assert ( driver_license.reverse_side.file_unique_id == self.driver_license_reverse_side_file_unique_id ) assert isinstance(driver_license.translation[0], PassportFile) assert driver_license.translation[0].file_id == self.driver_license_translation_1_file_id assert ( driver_license.translation[0].file_unique_id == self.driver_license_translation_1_file_unique_id ) assert isinstance(driver_license.translation[1], PassportFile) assert driver_license.translation[1].file_id == self.driver_license_translation_2_file_id assert ( driver_license.translation[1].file_unique_id == self.driver_license_translation_2_file_unique_id ) assert utility_bill.type == 'utility_bill' assert isinstance(utility_bill.files[0], PassportFile) assert utility_bill.files[0].file_id == self.utility_bill_1_file_id assert utility_bill.files[0].file_unique_id == self.utility_bill_1_file_unique_id assert isinstance(utility_bill.files[1], PassportFile) assert utility_bill.files[1].file_id == self.utility_bill_2_file_id assert utility_bill.files[1].file_unique_id == self.utility_bill_2_file_unique_id assert isinstance(utility_bill.translation[0], PassportFile) assert utility_bill.translation[0].file_id == self.utility_bill_translation_1_file_id assert ( utility_bill.translation[0].file_unique_id == self.utility_bill_translation_1_file_unique_id ) assert isinstance(utility_bill.translation[1], PassportFile) assert utility_bill.translation[1].file_id == self.utility_bill_translation_2_file_id assert ( utility_bill.translation[1].file_unique_id == self.utility_bill_translation_2_file_unique_id ) assert address.type == 'address' assert address.data == RAW_PASSPORT_DATA['data'][3]['data'] assert email.type == 'email' assert email.email == 'fb3e3i47zt@dispostable.com' def test_expected_decrypted_values(self, passport_data): ( personal_details, driver_license, utility_bill, address, email, ) = passport_data.decrypted_data assert personal_details.type == 'personal_details' assert personal_details.data.to_dict() == { 'first_name': 'FIRSTNAME', 'middle_name': 'MIDDLENAME', 'first_name_native': 'FIRSTNAMENATIVE', 'residence_country_code': 'DK', 'birth_date': '01.01.2001', 'last_name_native': 'LASTNAMENATIVE', 'gender': 'female', 'middle_name_native': 'MIDDLENAMENATIVE', 'country_code': 'DK', 'last_name': 'LASTNAME', } assert driver_license.type == 'driver_license' assert driver_license.data.to_dict() == { 'expiry_date': '01.01.2001', 'document_no': 'DOCUMENT_NO', } assert isinstance(driver_license.selfie, PassportFile) assert driver_license.selfie.file_id == self.driver_license_selfie_file_id assert driver_license.selfie.file_unique_id == self.driver_license_selfie_file_unique_id assert isinstance(driver_license.front_side, PassportFile) assert driver_license.front_side.file_id == self.driver_license_front_side_file_id assert ( driver_license.front_side.file_unique_id == self.driver_license_front_side_file_unique_id ) assert isinstance(driver_license.reverse_side, PassportFile) assert driver_license.reverse_side.file_id == self.driver_license_reverse_side_file_id assert ( driver_license.reverse_side.file_unique_id == self.driver_license_reverse_side_file_unique_id ) assert address.type == 'address' assert address.data.to_dict() == { 'city': 'CITY', 'street_line2': 'STREET_LINE2', 'state': 'STATE', 'post_code': 'POSTCODE', 'country_code': 'DK', 'street_line1': 'STREET_LINE1', } assert utility_bill.type == 'utility_bill' assert isinstance(utility_bill.files[0], PassportFile) assert utility_bill.files[0].file_id == self.utility_bill_1_file_id assert utility_bill.files[0].file_unique_id == self.utility_bill_1_file_unique_id assert isinstance(utility_bill.files[1], PassportFile) assert utility_bill.files[1].file_id == self.utility_bill_2_file_id assert utility_bill.files[1].file_unique_id == self.utility_bill_2_file_unique_id assert email.type == 'email' assert email.email == 'fb3e3i47zt@dispostable.com' def test_all_types(self, passport_data, bot, all_passport_data): credentials = passport_data.decrypted_credentials.to_dict() # Copy credentials from other types to all types so we can decrypt everything sd = credentials['secure_data'] credentials['secure_data'] = { 'personal_details': sd['personal_details'].copy(), 'passport': sd['driver_license'].copy(), 'internal_passport': sd['driver_license'].copy(), 'driver_license': sd['driver_license'].copy(), 'identity_card': sd['driver_license'].copy(), 'address': sd['address'].copy(), 'utility_bill': sd['utility_bill'].copy(), 'bank_statement': sd['utility_bill'].copy(), 'rental_agreement': sd['utility_bill'].copy(), 'passport_registration': sd['utility_bill'].copy(), 'temporary_registration': sd['utility_bill'].copy(), } new = PassportData.de_json( { 'data': all_passport_data, # Replaced below 'credentials': {'data': 'data', 'hash': 'hash', 'secret': 'secret'}, }, bot=bot, ) new.credentials._decrypted_data = Credentials.de_json(credentials, bot) assert isinstance(new, PassportData) assert new.decrypted_data def test_bot_init_invalid_key(self, bot): with pytest.raises(TypeError): Bot(bot.token, private_key='Invalid key!') with pytest.raises(ValueError): Bot(bot.token, private_key=b'Invalid key!') def test_passport_data_okay_with_non_crypto_bot(self, bot): b = Bot(bot.token) assert PassportData.de_json(RAW_PASSPORT_DATA, bot=b) def test_wrong_hash(self, bot): data = deepcopy(RAW_PASSPORT_DATA) data['credentials']['hash'] = 'bm90Y29ycmVjdGhhc2g=' # Not correct hash passport_data = PassportData.de_json(data, bot=bot) with pytest.raises(PassportDecryptionError): assert passport_data.decrypted_data def test_wrong_key(self, bot): short_key = b"-----BEGIN RSA PRIVATE KEY-----\r\nMIIBOQIBAAJBAKU+OZ2jJm7sCA/ec4gngNZhXYPu+DZ/TAwSMl0W7vAPXAsLplBk\r\nO8l6IBHx8N0ZC4Bc65mO3b2G8YAzqndyqH8CAwEAAQJAWOx3jQFzeVXDsOaBPdAk\r\nYTncXVeIc6tlfUl9mOLyinSbRNCy1XicOiOZFgH1rRKOGIC1235QmqxFvdecySoY\r\nwQIhAOFeGgeX9CrEPuSsd9+kqUcA2avCwqdQgSdy2qggRFyJAiEAu7QHT8JQSkHU\r\nDELfzrzc24AhjyG0z1DpGZArM8COascCIDK42SboXj3Z2UXiQ0CEcMzYNiVgOisq\r\nBUd5pBi+2mPxAiAM5Z7G/Sv1HjbKrOGh29o0/sXPhtpckEuj5QMC6E0gywIgFY6S\r\nNjwrAA+cMmsgY0O2fAzEKkDc5YiFsiXaGaSS4eA=\r\n-----END RSA PRIVATE KEY-----" b = Bot(bot.token, private_key=short_key) passport_data = PassportData.de_json(RAW_PASSPORT_DATA, bot=b) with pytest.raises(PassportDecryptionError): assert passport_data.decrypted_data wrong_key = b"-----BEGIN RSA PRIVATE KEY-----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\r\nm4N0gQRfIu+rUjsS/4xk8UuQUT/Ossjn/hExi7ejpKdCc7N++bc=\r\n-----END RSA PRIVATE KEY-----" b = Bot(bot.token, private_key=wrong_key) passport_data = PassportData.de_json(RAW_PASSPORT_DATA, bot=b) with pytest.raises(PassportDecryptionError): assert passport_data.decrypted_data def test_mocked_download_passport_file(self, passport_data, monkeypatch): # The files are not coming from our test bot, therefore the file id is invalid/wrong # when coming from this bot, so we monkeypatch the call, to make sure that Bot.get_file # at least gets called # TODO: Actually download a passport file in a test selfie = passport_data.decrypted_data[1].selfie # NOTE: file_unique_id is not used in the get_file method, so it is passed directly def get_file(*_, **kwargs): return File(kwargs['file_id'], selfie.file_unique_id) monkeypatch.setattr(passport_data.get_bot(), 'get_file', get_file) file = selfie.get_file() assert file.file_id == selfie.file_id assert file.file_unique_id == selfie.file_unique_id assert file._credentials.file_hash == self.driver_license_selfie_credentials_file_hash assert file._credentials.secret == self.driver_license_selfie_credentials_secret def test_mocked_set_passport_data_errors(self, monkeypatch, bot, chat_id, passport_data): def test(url, data, **kwargs): return ( data['user_id'] == chat_id and data['errors'][0]['file_hash'] == ( passport_data.decrypted_credentials.secure_data.driver_license.selfie.file_hash ) and data['errors'][1]['data_hash'] == (passport_data.decrypted_credentials.secure_data.driver_license.data.data_hash) ) monkeypatch.setattr(bot.request, 'post', test) message = bot.set_passport_data_errors( chat_id, [ PassportElementErrorSelfie( 'driver_license', ( passport_data.decrypted_credentials.secure_data.driver_license.selfie.file_hash ), 'You\'re not handsome enough to use this app!', ), PassportElementErrorDataField( 'driver_license', 'expiry_date', ( passport_data.decrypted_credentials.secure_data.driver_license.data.data_hash ), 'Your driver license is expired!', ), ], ) assert message def test_de_json_and_to_dict(self, bot): passport_data = PassportData.de_json(RAW_PASSPORT_DATA, bot) assert passport_data.to_dict() == RAW_PASSPORT_DATA assert passport_data.decrypted_data assert passport_data.to_dict() == RAW_PASSPORT_DATA def test_equality(self, passport_data): a = PassportData(passport_data.data, passport_data.credentials) b = PassportData(passport_data.data, passport_data.credentials) assert a == b assert hash(a) == hash(b) assert a is not b passport_data.credentials.hash = 'NOTAPROPERHASH' c = PassportData(passport_data.data, passport_data.credentials) assert a != c assert hash(a) != hash(c)