2020-10-12 17:00:50 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2024-01-02 14:12:33 +00:00
|
|
|
# Copyright © 2017-2023 Pleroma Authors <https://pleroma.social/>
|
2020-10-12 17:00:50 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2019-07-22 14:33:58 +00:00
|
|
|
defmodule Pleroma.Web.ActivityPub.MRFTest do
|
2023-12-10 12:27:23 +00:00
|
|
|
use ExUnit.Case
|
2019-08-19 15:34:29 +00:00
|
|
|
use Pleroma.Tests.Helpers
|
2024-01-02 14:12:33 +00:00
|
|
|
|
|
|
|
import ExUnit.CaptureLog
|
|
|
|
|
2019-07-22 14:33:58 +00:00
|
|
|
alias Pleroma.Web.ActivityPub.MRF
|
|
|
|
|
|
|
|
test "subdomains_regex/1" do
|
|
|
|
assert MRF.subdomains_regex(["unsafe.tld", "*.unsafe.tld"]) == [
|
2019-08-10 21:18:26 +00:00
|
|
|
~r/^unsafe.tld$/i,
|
|
|
|
~r/^(.*\.)*unsafe.tld$/i
|
2019-07-22 14:33:58 +00:00
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "subdomain_match/2" do
|
|
|
|
test "common domains" do
|
|
|
|
regexes = MRF.subdomains_regex(["unsafe.tld", "unsafe2.tld"])
|
|
|
|
|
2019-08-10 21:18:26 +00:00
|
|
|
assert regexes == [~r/^unsafe.tld$/i, ~r/^unsafe2.tld$/i]
|
2019-07-22 14:33:58 +00:00
|
|
|
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe.tld")
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe2.tld")
|
|
|
|
|
|
|
|
refute MRF.subdomain_match?(regexes, "example.com")
|
|
|
|
end
|
|
|
|
|
|
|
|
test "wildcard domains with one subdomain" do
|
|
|
|
regexes = MRF.subdomains_regex(["*.unsafe.tld"])
|
|
|
|
|
2019-08-10 21:18:26 +00:00
|
|
|
assert regexes == [~r/^(.*\.)*unsafe.tld$/i]
|
2019-07-22 14:33:58 +00:00
|
|
|
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe.tld")
|
|
|
|
assert MRF.subdomain_match?(regexes, "sub.unsafe.tld")
|
|
|
|
refute MRF.subdomain_match?(regexes, "anotherunsafe.tld")
|
|
|
|
refute MRF.subdomain_match?(regexes, "unsafe.tldanother")
|
|
|
|
end
|
|
|
|
|
|
|
|
test "wildcard domains with two subdomains" do
|
|
|
|
regexes = MRF.subdomains_regex(["*.unsafe.tld"])
|
|
|
|
|
2019-08-10 21:18:26 +00:00
|
|
|
assert regexes == [~r/^(.*\.)*unsafe.tld$/i]
|
2019-07-22 14:33:58 +00:00
|
|
|
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe.tld")
|
|
|
|
assert MRF.subdomain_match?(regexes, "sub.sub.unsafe.tld")
|
|
|
|
refute MRF.subdomain_match?(regexes, "sub.anotherunsafe.tld")
|
|
|
|
refute MRF.subdomain_match?(regexes, "sub.unsafe.tldanother")
|
|
|
|
end
|
2019-08-10 21:18:26 +00:00
|
|
|
|
|
|
|
test "matches are case-insensitive" do
|
|
|
|
regexes = MRF.subdomains_regex(["UnSafe.TLD", "UnSAFE2.Tld"])
|
|
|
|
|
|
|
|
assert regexes == [~r/^UnSafe.TLD$/i, ~r/^UnSAFE2.Tld$/i]
|
|
|
|
|
|
|
|
assert MRF.subdomain_match?(regexes, "UNSAFE.TLD")
|
|
|
|
assert MRF.subdomain_match?(regexes, "UNSAFE2.TLD")
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe.tld")
|
|
|
|
assert MRF.subdomain_match?(regexes, "unsafe2.tld")
|
|
|
|
|
|
|
|
refute MRF.subdomain_match?(regexes, "EXAMPLE.COM")
|
|
|
|
refute MRF.subdomain_match?(regexes, "example.com")
|
|
|
|
end
|
2024-01-02 14:12:33 +00:00
|
|
|
|
|
|
|
@tag capture_log: true
|
|
|
|
test "logs sensible error on accidental wildcard" do
|
|
|
|
assert_raise Regex.CompileError, fn ->
|
|
|
|
assert capture_log(MRF.subdomains_regex(["*unsafe.tld"])) =~
|
|
|
|
"MRF: Invalid subdomain Regex: *unsafe.tld"
|
|
|
|
end
|
|
|
|
end
|
2019-07-22 14:33:58 +00:00
|
|
|
end
|
2019-08-13 22:19:15 +00:00
|
|
|
|
2020-10-02 12:51:39 +00:00
|
|
|
describe "instance_list_from_tuples/1" do
|
|
|
|
test "returns a list of instances from a list of {instance, reason} tuples" do
|
|
|
|
list = [{"some.tld", "a reason"}, {"other.tld", "another reason"}]
|
|
|
|
expected = ["some.tld", "other.tld"]
|
|
|
|
|
|
|
|
assert MRF.instance_list_from_tuples(list) == expected
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-08-13 22:19:15 +00:00
|
|
|
describe "describe/0" do
|
|
|
|
test "it works as expected with noop policy" do
|
2020-09-25 17:46:49 +00:00
|
|
|
clear_config([:mrf, :policies], [Pleroma.Web.ActivityPub.MRF.NoOpPolicy])
|
|
|
|
|
2019-08-13 22:19:15 +00:00
|
|
|
expected = %{
|
2020-12-28 22:21:53 +00:00
|
|
|
mrf_policies: ["NoOpPolicy", "HashtagPolicy"],
|
|
|
|
mrf_hashtag: %{
|
|
|
|
federated_timeline_removal: [],
|
|
|
|
reject: [],
|
|
|
|
sensitive: ["nsfw"]
|
|
|
|
},
|
2019-08-13 22:19:15 +00:00
|
|
|
exclusions: false
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, ^expected} = MRF.describe()
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it works as expected with mock policy" do
|
2020-03-21 06:47:05 +00:00
|
|
|
clear_config([:mrf, :policies], [MRFModuleMock])
|
2019-08-13 22:19:15 +00:00
|
|
|
|
|
|
|
expected = %{
|
2020-12-28 22:21:53 +00:00
|
|
|
mrf_policies: ["MRFModuleMock", "HashtagPolicy"],
|
2019-08-13 22:19:15 +00:00
|
|
|
mrf_module_mock: "some config data",
|
2020-12-28 22:21:53 +00:00
|
|
|
mrf_hashtag: %{
|
|
|
|
federated_timeline_removal: [],
|
|
|
|
reject: [],
|
|
|
|
sensitive: ["nsfw"]
|
|
|
|
},
|
2019-08-13 22:19:15 +00:00
|
|
|
exclusions: false
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, ^expected} = MRF.describe()
|
|
|
|
end
|
|
|
|
end
|
2020-11-10 16:18:53 +00:00
|
|
|
|
|
|
|
test "config_descriptions/0" do
|
|
|
|
descriptions = MRF.config_descriptions()
|
|
|
|
|
|
|
|
good_mrf = Enum.find(descriptions, fn %{key: key} -> key == :good_mrf end)
|
|
|
|
|
|
|
|
assert good_mrf == %{
|
|
|
|
key: :good_mrf,
|
|
|
|
related_policy: "Fixtures.Modules.GoodMRF",
|
|
|
|
label: "Good MRF",
|
|
|
|
description: "Some description",
|
|
|
|
group: :pleroma,
|
|
|
|
tab: :mrf,
|
|
|
|
type: :group
|
|
|
|
}
|
|
|
|
end
|
2019-07-22 14:33:58 +00:00
|
|
|
end
|