125 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
			
		
		
	
	
			125 lines
		
	
	
	
		
			3.7 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
# Pleroma: A lightweight social networking server
 | 
						|
# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
 | 
						|
# SPDX-License-Identifier: AGPL-3.0-only
 | 
						|
 | 
						|
defmodule Pleroma.Object.ContainmentTest do
 | 
						|
  use Pleroma.DataCase
 | 
						|
 | 
						|
  alias Pleroma.Object.Containment
 | 
						|
  alias Pleroma.User
 | 
						|
 | 
						|
  import Pleroma.Factory
 | 
						|
  import ExUnit.CaptureLog
 | 
						|
 | 
						|
  setup_all do
 | 
						|
    Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
 | 
						|
    :ok
 | 
						|
  end
 | 
						|
 | 
						|
  describe "general origin containment" do
 | 
						|
    test "works for completely actorless posts" do
 | 
						|
      assert :error ==
 | 
						|
               Containment.contain_origin("https://glaceon.social/users/monorail", %{
 | 
						|
                 "deleted" => "2019-10-30T05:48:50.249606Z",
 | 
						|
                 "formerType" => "Note",
 | 
						|
                 "id" => "https://glaceon.social/users/monorail/statuses/103049757364029187",
 | 
						|
                 "type" => "Tombstone"
 | 
						|
               })
 | 
						|
    end
 | 
						|
 | 
						|
    test "contain_origin_from_id() catches obvious spoofing attempts" do
 | 
						|
      data = %{
 | 
						|
        "id" => "http://example.com/~alyssa/activities/1234.json"
 | 
						|
      }
 | 
						|
 | 
						|
      :error =
 | 
						|
        Containment.contain_origin_from_id(
 | 
						|
          "http://example.org/~alyssa/activities/1234.json",
 | 
						|
          data
 | 
						|
        )
 | 
						|
    end
 | 
						|
 | 
						|
    test "contain_origin_from_id() allows alternate IDs within the same origin domain" do
 | 
						|
      data = %{
 | 
						|
        "id" => "http://example.com/~alyssa/activities/1234.json"
 | 
						|
      }
 | 
						|
 | 
						|
      :ok =
 | 
						|
        Containment.contain_origin_from_id(
 | 
						|
          "http://example.com/~alyssa/activities/1234",
 | 
						|
          data
 | 
						|
        )
 | 
						|
    end
 | 
						|
 | 
						|
    test "contain_origin_from_id() allows matching IDs" do
 | 
						|
      data = %{
 | 
						|
        "id" => "http://example.com/~alyssa/activities/1234.json"
 | 
						|
      }
 | 
						|
 | 
						|
      :ok =
 | 
						|
        Containment.contain_origin_from_id(
 | 
						|
          "http://example.com/~alyssa/activities/1234.json",
 | 
						|
          data
 | 
						|
        )
 | 
						|
    end
 | 
						|
 | 
						|
    test "users cannot be collided through fake direction spoofing attempts" do
 | 
						|
      _user =
 | 
						|
        insert(:user, %{
 | 
						|
          nickname: "rye@niu.moe",
 | 
						|
          local: false,
 | 
						|
          ap_id: "https://niu.moe/users/rye",
 | 
						|
          follower_address: User.ap_followers(%User{nickname: "rye@niu.moe"})
 | 
						|
        })
 | 
						|
 | 
						|
      assert capture_log(fn ->
 | 
						|
               {:error, _} = User.get_or_fetch_by_ap_id("https://n1u.moe/users/rye")
 | 
						|
             end) =~
 | 
						|
               "[error] Could not decode user at fetch https://n1u.moe/users/rye"
 | 
						|
    end
 | 
						|
 | 
						|
    test "contain_origin_from_id() gracefully handles cases where no ID is present" do
 | 
						|
      data = %{
 | 
						|
        "type" => "Create",
 | 
						|
        "object" => %{
 | 
						|
          "id" => "http://example.net/~alyssa/activities/1234",
 | 
						|
          "attributedTo" => "http://example.org/~alyssa"
 | 
						|
        },
 | 
						|
        "actor" => "http://example.com/~bob"
 | 
						|
      }
 | 
						|
 | 
						|
      :error =
 | 
						|
        Containment.contain_origin_from_id("http://example.net/~alyssa/activities/1234", data)
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "containment of children" do
 | 
						|
    test "contain_child() catches spoofing attempts" do
 | 
						|
      data = %{
 | 
						|
        "id" => "http://example.com/whatever",
 | 
						|
        "type" => "Create",
 | 
						|
        "object" => %{
 | 
						|
          "id" => "http://example.net/~alyssa/activities/1234",
 | 
						|
          "attributedTo" => "http://example.org/~alyssa"
 | 
						|
        },
 | 
						|
        "actor" => "http://example.com/~bob"
 | 
						|
      }
 | 
						|
 | 
						|
      :error = Containment.contain_child(data)
 | 
						|
    end
 | 
						|
 | 
						|
    test "contain_child() allows correct origins" do
 | 
						|
      data = %{
 | 
						|
        "id" => "http://example.org/~alyssa/activities/5678",
 | 
						|
        "type" => "Create",
 | 
						|
        "object" => %{
 | 
						|
          "id" => "http://example.org/~alyssa/activities/1234",
 | 
						|
          "attributedTo" => "http://example.org/~alyssa"
 | 
						|
        },
 | 
						|
        "actor" => "http://example.org/~alyssa"
 | 
						|
      }
 | 
						|
 | 
						|
      :ok = Containment.contain_child(data)
 | 
						|
    end
 | 
						|
  end
 | 
						|
end
 |