Support TLD wildcards in MRF matches
[akkoma] / test / pleroma / web / activity_pub / mrf_test.exs
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Web.ActivityPub.MRFTest do
6 use ExUnit.Case, async: true
7 use Pleroma.Tests.Helpers
8 alias Pleroma.Web.ActivityPub.MRF
9
10 test "subdomains_regex/1" do
11 assert MRF.subdomains_regex(["unsafe.tld", "*.unsafe.tld"]) == [
12 ~r/^(.+\.)?unsafe\.tld$/i,
13 ~r/^(.+\.)?unsafe\.tld$/i
14 ]
15 end
16
17 describe "subdomain_match/2" do
18 test "common domains" do
19 regexes = MRF.subdomains_regex(["unsafe.tld", "unsafe2.tld"])
20
21 assert regexes == [~r/^(.+\.)?unsafe\.tld$/i, ~r/^(.+\.)?unsafe2\.tld$/i]
22
23 assert MRF.subdomain_match?(regexes, "unsafe.tld")
24 assert MRF.subdomain_match?(regexes, "unsafe2.tld")
25
26 refute MRF.subdomain_match?(regexes, "example.com")
27 end
28
29 test "wildcard domains with one subdomain" do
30 regexes = MRF.subdomains_regex(["unsafe.tld"])
31
32 assert regexes == [~r/^(.+\.)?unsafe\.tld$/i]
33
34 assert MRF.subdomain_match?(regexes, "unsafe.tld")
35 assert MRF.subdomain_match?(regexes, "sub.unsafe.tld")
36 refute MRF.subdomain_match?(regexes, "anotherunsafe.tld")
37 refute MRF.subdomain_match?(regexes, "unsafe.tldanother")
38 end
39
40 test "wildcard domains with two subdomains" do
41 regexes = MRF.subdomains_regex(["unsafe.tld"])
42
43 assert regexes == [~r/^(.+\.)?unsafe\.tld$/i]
44
45 assert MRF.subdomain_match?(regexes, "unsafe.tld")
46 assert MRF.subdomain_match?(regexes, "sub.sub.unsafe.tld")
47 refute MRF.subdomain_match?(regexes, "sub.anotherunsafe.tld")
48 refute MRF.subdomain_match?(regexes, "sub.unsafe.tldanother")
49 end
50
51 test "wildcard on the tld" do
52 regexes = MRF.subdomains_regex(["somewhere.*"])
53
54 assert regexes == [~r/^(.+\.)?somewhere\.(.+)$/i]
55
56 assert MRF.subdomain_match?(regexes, "somewhere.net")
57 assert MRF.subdomain_match?(regexes, "somewhere.com")
58 assert MRF.subdomain_match?(regexes, "somewhere.somewherelese.net")
59 refute MRF.subdomain_match?(regexes, "somewhere")
60 end
61
62 test "wildcards on subdomain _and_ tld" do
63 regexes = MRF.subdomains_regex(["*.somewhere.*"])
64
65 assert regexes == [~r/^(.+\.)?somewhere\.(.+)$/i]
66
67 assert MRF.subdomain_match?(regexes, "somewhere.net")
68 assert MRF.subdomain_match?(regexes, "somewhere.com")
69 assert MRF.subdomain_match?(regexes, "sub.somewhere.net")
70 assert MRF.subdomain_match?(regexes, "sub.somewhere.com")
71 assert MRF.subdomain_match?(regexes, "sub.sub.somewhere.net")
72 assert MRF.subdomain_match?(regexes, "sub.sub.somewhere.com")
73 refute MRF.subdomain_match?(regexes, "somewhere")
74 end
75
76 test "matches are case-insensitive" do
77 regexes = MRF.subdomains_regex(["UnSafe.TLD", "UnSAFE2.Tld"])
78
79 assert regexes == [~r/^(.+\.)?UnSafe\.TLD$/i, ~r/^(.+\.)?UnSAFE2\.Tld$/i]
80
81 assert MRF.subdomain_match?(regexes, "UNSAFE.TLD")
82 assert MRF.subdomain_match?(regexes, "UNSAFE2.TLD")
83 assert MRF.subdomain_match?(regexes, "unsafe.tld")
84 assert MRF.subdomain_match?(regexes, "unsafe2.tld")
85
86 refute MRF.subdomain_match?(regexes, "EXAMPLE.COM")
87 refute MRF.subdomain_match?(regexes, "example.com")
88 end
89 end
90
91 describe "instance_list_from_tuples/1" do
92 test "returns a list of instances from a list of {instance, reason} tuples" do
93 list = [{"some.tld", "a reason"}, {"other.tld", "another reason"}]
94 expected = ["some.tld", "other.tld"]
95
96 assert MRF.instance_list_from_tuples(list) == expected
97 end
98 end
99
100 describe "describe/0" do
101 test "it works as expected with noop policy" do
102 clear_config([:mrf, :policies], [Pleroma.Web.ActivityPub.MRF.NoOpPolicy])
103
104 expected = %{
105 mrf_policies: ["NoOpPolicy", "HashtagPolicy", "InlineQuotePolicy", "NormalizeMarkup"],
106 mrf_hashtag: %{
107 federated_timeline_removal: [],
108 reject: [],
109 sensitive: ["nsfw"]
110 },
111 exclusions: false
112 }
113
114 {:ok, ^expected} = MRF.describe()
115 end
116
117 test "it works as expected with mock policy" do
118 clear_config([:mrf, :policies], [MRFModuleMock])
119
120 expected = %{
121 mrf_policies: ["MRFModuleMock", "HashtagPolicy", "InlineQuotePolicy", "NormalizeMarkup"],
122 mrf_module_mock: "some config data",
123 mrf_hashtag: %{
124 federated_timeline_removal: [],
125 reject: [],
126 sensitive: ["nsfw"]
127 },
128 exclusions: false
129 }
130
131 {:ok, ^expected} = MRF.describe()
132 end
133 end
134
135 test "config_descriptions/0" do
136 descriptions = MRF.config_descriptions()
137
138 good_mrf = Enum.find(descriptions, fn %{key: key} -> key == :good_mrf end)
139
140 assert good_mrf == %{
141 key: :good_mrf,
142 related_policy: "Fixtures.Modules.GoodMRF",
143 label: "Good MRF",
144 description: "Some description",
145 group: :pleroma,
146 tab: :mrf,
147 type: :group
148 }
149 end
150 end