162 lines
		
	
	
	
		
			5.1 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
			
		
		
	
	
			162 lines
		
	
	
	
		
			5.1 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
# Pleroma: A lightweight social networking server
 | 
						|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
 | 
						|
# SPDX-License-Identifier: AGPL-3.0-only
 | 
						|
 | 
						|
defmodule Pleroma.Web.ActivityPub.MRFTest do
 | 
						|
  use ExUnit.Case, async: true
 | 
						|
  use Pleroma.Tests.Helpers
 | 
						|
  alias Pleroma.Web.ActivityPub.MRF
 | 
						|
 | 
						|
  test "subdomains_regex/1" do
 | 
						|
    assert MRF.subdomains_regex(["unsafe.tld", "*.unsafe.tld"]) == [
 | 
						|
             ~r/^(.+\.)?unsafe\.tld$/i,
 | 
						|
             ~r/^(.+\.)?unsafe\.tld$/i
 | 
						|
           ]
 | 
						|
  end
 | 
						|
 | 
						|
  describe "subdomain_match/2" do
 | 
						|
    test "common domains" do
 | 
						|
      regexes = MRF.subdomains_regex(["unsafe.tld", "unsafe2.tld"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?unsafe\.tld$/i, ~r/^(.+\.)?unsafe2\.tld$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe.tld")
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe2.tld")
 | 
						|
 | 
						|
      refute MRF.subdomain_match?(regexes, "example.com")
 | 
						|
    end
 | 
						|
 | 
						|
    test "wildcard domains with one subdomain" do
 | 
						|
      regexes = MRF.subdomains_regex(["unsafe.tld"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?unsafe\.tld$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe.tld")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.unsafe.tld")
 | 
						|
      refute MRF.subdomain_match?(regexes, "anotherunsafe.tld")
 | 
						|
      refute MRF.subdomain_match?(regexes, "unsafe.tldanother")
 | 
						|
    end
 | 
						|
 | 
						|
    test "wildcard domains with two subdomains" do
 | 
						|
      regexes = MRF.subdomains_regex(["unsafe.tld"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?unsafe\.tld$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe.tld")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.sub.unsafe.tld")
 | 
						|
      refute MRF.subdomain_match?(regexes, "sub.anotherunsafe.tld")
 | 
						|
      refute MRF.subdomain_match?(regexes, "sub.unsafe.tldanother")
 | 
						|
    end
 | 
						|
 | 
						|
    test "wildcard on the tld" do
 | 
						|
      regexes = MRF.subdomains_regex(["somewhere.*"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?somewhere\.(.+)$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "somewhere.net")
 | 
						|
      assert MRF.subdomain_match?(regexes, "somewhere.com")
 | 
						|
      assert MRF.subdomain_match?(regexes, "somewhere.somewherelese.net")
 | 
						|
      refute MRF.subdomain_match?(regexes, "somewhere")
 | 
						|
    end
 | 
						|
 | 
						|
    test "wildcards on subdomain _and_ tld" do
 | 
						|
      regexes = MRF.subdomains_regex(["*.somewhere.*"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?somewhere\.(.+)$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "somewhere.net")
 | 
						|
      assert MRF.subdomain_match?(regexes, "somewhere.com")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.somewhere.net")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.somewhere.com")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.sub.somewhere.net")
 | 
						|
      assert MRF.subdomain_match?(regexes, "sub.sub.somewhere.com")
 | 
						|
      refute MRF.subdomain_match?(regexes, "somewhere")
 | 
						|
    end
 | 
						|
 | 
						|
    test "matches are case-insensitive" do
 | 
						|
      regexes = MRF.subdomains_regex(["UnSafe.TLD", "UnSAFE2.Tld"])
 | 
						|
 | 
						|
      assert regexes == [~r/^(.+\.)?UnSafe\.TLD$/i, ~r/^(.+\.)?UnSAFE2\.Tld$/i]
 | 
						|
 | 
						|
      assert MRF.subdomain_match?(regexes, "UNSAFE.TLD")
 | 
						|
      assert MRF.subdomain_match?(regexes, "UNSAFE2.TLD")
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe.tld")
 | 
						|
      assert MRF.subdomain_match?(regexes, "unsafe2.tld")
 | 
						|
 | 
						|
      refute MRF.subdomain_match?(regexes, "EXAMPLE.COM")
 | 
						|
      refute MRF.subdomain_match?(regexes, "example.com")
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "instance_list_from_tuples/1" do
 | 
						|
    test "returns a list of instances from a list of {instance, reason} tuples" do
 | 
						|
      list = [{"some.tld", "a reason"}, {"other.tld", "another reason"}]
 | 
						|
      expected = ["some.tld", "other.tld"]
 | 
						|
 | 
						|
      assert MRF.instance_list_from_tuples(list) == expected
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  describe "describe/0" do
 | 
						|
    test "it works as expected with noop policy" do
 | 
						|
      clear_config([:mrf, :policies], [Pleroma.Web.ActivityPub.MRF.NoOpPolicy])
 | 
						|
 | 
						|
      expected = %{
 | 
						|
        mrf_policies: [
 | 
						|
          "NoOpPolicy",
 | 
						|
          "HashtagPolicy",
 | 
						|
          "InlineQuotePolicy",
 | 
						|
          "NormalizeMarkup",
 | 
						|
          "DirectMessageDisabledPolicy"
 | 
						|
        ],
 | 
						|
        mrf_hashtag: %{
 | 
						|
          federated_timeline_removal: [],
 | 
						|
          reject: [],
 | 
						|
          sensitive: ["nsfw"]
 | 
						|
        },
 | 
						|
        exclusions: false
 | 
						|
      }
 | 
						|
 | 
						|
      {:ok, ^expected} = MRF.describe()
 | 
						|
    end
 | 
						|
 | 
						|
    test "it works as expected with mock policy" do
 | 
						|
      clear_config([:mrf, :policies], [MRFModuleMock])
 | 
						|
 | 
						|
      expected = %{
 | 
						|
        mrf_policies: [
 | 
						|
          "MRFModuleMock",
 | 
						|
          "HashtagPolicy",
 | 
						|
          "InlineQuotePolicy",
 | 
						|
          "NormalizeMarkup",
 | 
						|
          "DirectMessageDisabledPolicy"
 | 
						|
        ],
 | 
						|
        mrf_module_mock: "some config data",
 | 
						|
        mrf_hashtag: %{
 | 
						|
          federated_timeline_removal: [],
 | 
						|
          reject: [],
 | 
						|
          sensitive: ["nsfw"]
 | 
						|
        },
 | 
						|
        exclusions: false
 | 
						|
      }
 | 
						|
 | 
						|
      {:ok, ^expected} = MRF.describe()
 | 
						|
    end
 | 
						|
  end
 | 
						|
 | 
						|
  test "config_descriptions/0" do
 | 
						|
    descriptions = MRF.config_descriptions()
 | 
						|
 | 
						|
    good_mrf = Enum.find(descriptions, fn %{key: key} -> key == :good_mrf end)
 | 
						|
 | 
						|
    assert good_mrf == %{
 | 
						|
             key: :good_mrf,
 | 
						|
             related_policy: "Fixtures.Modules.GoodMRF",
 | 
						|
             label: "Good MRF",
 | 
						|
             description: "Some description",
 | 
						|
             group: :pleroma,
 | 
						|
             tab: :mrf,
 | 
						|
             type: :group
 | 
						|
           }
 | 
						|
  end
 | 
						|
end
 |