test_command.py 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218
  1. # SPDX-License-Identifier: AGPL-3.0-or-later
  2. # pylint: disable=missing-module-docstring,disable=missing-class-docstring,invalid-name
  3. from searx.engines import command as command_engine
  4. from searx.result_types import KeyValue
  5. from tests import SearxTestCase
  6. class TestCommandEngine(SearxTestCase):
  7. def test_basic_seq_command_engine(self):
  8. ls_engine = command_engine
  9. ls_engine.command = ['seq', '{{QUERY}}']
  10. ls_engine.delimiter = {'chars': ' ', 'keys': ['number']}
  11. expected_results = [
  12. KeyValue(kvmap={'number': 1}),
  13. KeyValue(kvmap={'number': 2}),
  14. KeyValue(kvmap={'number': 3}),
  15. KeyValue(kvmap={'number': 4}),
  16. KeyValue(kvmap={'number': 5}),
  17. ]
  18. results = ls_engine.search('5', {'pageno': 1})
  19. for i, expected in enumerate(expected_results):
  20. self.assertEqual(results[i].kvmap["number"], str(expected.kvmap["number"]))
  21. def test_delimiter_parsing(self):
  22. searx_logs = '''DEBUG:searx.webapp:static directory is /home/n/p/searx/searx/static
  23. DEBUG:searx.webapp:templates directory is /home/n/p/searx/searx/templates
  24. DEBUG:searx.engines:soundcloud engine: Starting background initialization
  25. DEBUG:searx.engines:wolframalpha engine: Starting background initialization
  26. DEBUG:searx.engines:locate engine: Starting background initialization
  27. DEBUG:searx.engines:regex search in files engine: Starting background initialization
  28. DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): www.wolframalpha.com
  29. DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): soundcloud.com
  30. DEBUG:searx.engines:find engine: Starting background initialization
  31. DEBUG:searx.engines:pattern search in files engine: Starting background initialization
  32. DEBUG:searx.webapp:starting webserver on 127.0.0.1:8888
  33. WARNING:werkzeug: * Debugger is active!
  34. INFO:werkzeug: * Debugger PIN: 299-578-362'''
  35. echo_engine = command_engine
  36. echo_engine.command = ['echo', searx_logs]
  37. echo_engine.delimiter = {'chars': ':', 'keys': ['level', 'component', 'message']}
  38. page1 = [
  39. {
  40. 'component': 'searx.webapp',
  41. 'message': 'static directory is /home/n/p/searx/searx/static',
  42. 'level': 'DEBUG',
  43. },
  44. {
  45. 'component': 'searx.webapp',
  46. 'message': 'templates directory is /home/n/p/searx/searx/templates',
  47. 'level': 'DEBUG',
  48. },
  49. {
  50. 'component': 'searx.engines',
  51. 'message': 'soundcloud engine: Starting background initialization',
  52. 'level': 'DEBUG',
  53. },
  54. {
  55. 'component': 'searx.engines',
  56. 'message': 'wolframalpha engine: Starting background initialization',
  57. 'level': 'DEBUG',
  58. },
  59. {
  60. 'component': 'searx.engines',
  61. 'message': 'locate engine: Starting background initialization',
  62. 'level': 'DEBUG',
  63. },
  64. {
  65. 'component': 'searx.engines',
  66. 'message': 'regex search in files engine: Starting background initialization',
  67. 'level': 'DEBUG',
  68. },
  69. {
  70. 'component': 'urllib3.connectionpool',
  71. 'message': 'Starting new HTTPS connection (1): www.wolframalpha.com',
  72. 'level': 'DEBUG',
  73. },
  74. {
  75. 'component': 'urllib3.connectionpool',
  76. 'message': 'Starting new HTTPS connection (1): soundcloud.com',
  77. 'level': 'DEBUG',
  78. },
  79. {
  80. 'component': 'searx.engines',
  81. 'message': 'find engine: Starting background initialization',
  82. 'level': 'DEBUG',
  83. },
  84. {
  85. 'component': 'searx.engines',
  86. 'message': 'pattern search in files engine: Starting background initialization',
  87. 'level': 'DEBUG',
  88. },
  89. ]
  90. page2 = [
  91. {
  92. 'component': 'searx.webapp',
  93. 'message': 'starting webserver on 127.0.0.1:8888',
  94. 'level': 'DEBUG',
  95. },
  96. {
  97. 'component': 'werkzeug',
  98. 'message': ' * Debugger is active!',
  99. 'level': 'WARNING',
  100. },
  101. {
  102. 'component': 'werkzeug',
  103. 'message': ' * Debugger PIN: 299-578-362',
  104. 'level': 'INFO',
  105. },
  106. ]
  107. page1 = [KeyValue(kvmap=row) for row in page1]
  108. page2 = [KeyValue(kvmap=row) for row in page2]
  109. expected_results_by_page = [page1, page2]
  110. for i in [0, 1]:
  111. results = echo_engine.search('', {'pageno': i + 1})
  112. page = expected_results_by_page[i]
  113. for i, expected in enumerate(page):
  114. self.assertEqual(expected.kvmap["message"], str(results[i].kvmap["message"]))
  115. def test_regex_parsing(self):
  116. txt = '''commit 35f9a8c81d162a361b826bbcd4a1081a4fbe76a7
  117. Author: Noémi Ványi <sitbackandwait@gmail.com>
  118. Date: Tue Oct 15 11:31:33 2019 +0200
  119. first interesting message
  120. commit 6c3c206316153ccc422755512bceaa9ab0b14faa
  121. Author: Noémi Ványi <sitbackandwait@gmail.com>
  122. Date: Mon Oct 14 17:10:08 2019 +0200
  123. second interesting message
  124. commit d8594d2689b4d5e0d2f80250223886c3a1805ef5
  125. Author: Noémi Ványi <sitbackandwait@gmail.com>
  126. Date: Mon Oct 14 14:45:05 2019 +0200
  127. third interesting message
  128. commit '''
  129. git_log_engine = command_engine
  130. git_log_engine.command = ['echo', txt]
  131. git_log_engine.result_separator = '\n\ncommit '
  132. git_log_engine.delimiter = {}
  133. git_log_engine.parse_regex = {
  134. 'commit': r'\w{40}',
  135. 'author': r'[\w* ]* <\w*@?\w*\.?\w*>',
  136. 'date': r'Date: .*',
  137. 'message': r'\n\n.*$',
  138. }
  139. git_log_engine.init({"command": git_log_engine.command, "parse_regex": git_log_engine.parse_regex})
  140. expected_results = [
  141. {
  142. 'commit': '35f9a8c81d162a361b826bbcd4a1081a4fbe76a7',
  143. 'author': ' Noémi Ványi <sitbackandwait@gmail.com>',
  144. 'date': 'Date: Tue Oct 15 11:31:33 2019 +0200',
  145. 'message': '\n\nfirst interesting message',
  146. },
  147. {
  148. 'commit': '6c3c206316153ccc422755512bceaa9ab0b14faa',
  149. 'author': ' Noémi Ványi <sitbackandwait@gmail.com>',
  150. 'date': 'Date: Mon Oct 14 17:10:08 2019 +0200',
  151. 'message': '\n\nsecond interesting message',
  152. },
  153. {
  154. 'commit': 'd8594d2689b4d5e0d2f80250223886c3a1805ef5',
  155. 'author': ' Noémi Ványi <sitbackandwait@gmail.com>',
  156. 'date': 'Date: Mon Oct 14 14:45:05 2019 +0200',
  157. 'message': '\n\nthird interesting message',
  158. },
  159. ]
  160. expected_results = [KeyValue(kvmap=kvmap) for kvmap in expected_results]
  161. results = git_log_engine.search('', {'pageno': 1})
  162. for i, expected in enumerate(expected_results):
  163. self.assertEqual(expected.kvmap["message"], str(results[i].kvmap["message"]))
  164. def test_working_dir_path_query(self):
  165. ls_engine = command_engine
  166. ls_engine.command = ['ls', '{{QUERY}}']
  167. ls_engine.result_separator = '\n'
  168. ls_engine.delimiter = {'chars': ' ', 'keys': ['file']}
  169. ls_engine.query_type = 'path'
  170. results = ls_engine.search('.', {'pageno': 1})
  171. self.assertTrue(len(results) != 0)
  172. forbidden_paths = [
  173. '..',
  174. '../..',
  175. './..',
  176. '~',
  177. '/var',
  178. ]
  179. for forbidden_path in forbidden_paths:
  180. self.assertRaises(ValueError, ls_engine.search, forbidden_path, {'pageno': 1})
  181. def test_enum_queries(self):
  182. echo_engine = command_engine
  183. echo_engine.command = ['echo', '{{QUERY}}']
  184. echo_engine.query_type = 'enum'
  185. echo_engine.query_enum = ['i-am-allowed-to-say-this', 'and-that']
  186. for allowed in echo_engine.query_enum:
  187. results = echo_engine.search(allowed, {'pageno': 1})
  188. self.assertTrue(len(results) != 0)
  189. forbidden_queries = [
  190. 'forbidden',
  191. 'banned',
  192. 'prohibited',
  193. ]
  194. for forbidden in forbidden_queries:
  195. self.assertRaises(ValueError, echo_engine.search, forbidden, {'pageno': 1})