mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2024-12-15 18:19:04 +01:00
183eaa5b29
* love like winter! wohoah, wohoah * domain allow side effects * tests! logging! unallow! * document federation modes * linty linterson * test * further adventures in documentation * finish up domain block documentation (i think) * change wording a wee little bit * docs, example * consolidate shared domainPermission code * call mode once * fetch federation mode within domain blocked func * read domain perm import in streaming manner * don't use pointer to slice for domain perms * don't bother copying blocks + allows before deleting * admonish! * change wording just a scooch * update docs
218 lines
6.2 KiB
Go
218 lines
6.2 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package bundb_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
)
|
|
|
|
type DomainTestSuite struct {
|
|
BunDBStandardTestSuite
|
|
}
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlocked() {
|
|
ctx := context.Background()
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
Domain: "some.bad.apples",
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
// no domain block exists for the given domain yet
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
|
suite.NoError(err)
|
|
|
|
// domain block now exists
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
|
|
}
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedWithAllow() {
|
|
ctx := context.Background()
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
Domain: "some.bad.apples",
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
// no domain block exists for the given domain yet
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
if err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
suite.False(blocked)
|
|
|
|
// Block this domain.
|
|
if err := suite.db.CreateDomainBlock(ctx, domainBlock); err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
// domain block now exists
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
if err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
suite.True(blocked)
|
|
suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
|
|
|
|
// Explicitly allow this domain.
|
|
domainAllow := >smodel.DomainAllow{
|
|
ID: "01H8KY9MJQFWE712EG3VN02Y3J",
|
|
Domain: "some.bad.apples",
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
if err := suite.db.CreateDomainAllow(ctx, domainAllow); err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
// Domain allow now exists
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
if err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
suite.False(blocked)
|
|
}
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedWildcard() {
|
|
ctx := context.Background()
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
Domain: "bad.apples",
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
// no domain block exists for the given domain yet
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
|
suite.NoError(err)
|
|
|
|
// Start with the base block domain
|
|
domain := domainBlock.Domain
|
|
|
|
for _, part := range []string{"extra", "domain", "parts"} {
|
|
// Prepend the next domain part
|
|
domain = part + "." + domain
|
|
|
|
// Check that domain block is wildcarded for this subdomain
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
}
|
|
}
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII() {
|
|
ctx := context.Background()
|
|
|
|
now := time.Now()
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
Domain: "xn--80aaa1bbb1h.com",
|
|
CreatedAt: now,
|
|
UpdatedAt: now,
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
// no domain block exists for the given domain yet
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
|
suite.NoError(err)
|
|
|
|
// domain block now exists
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
}
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII2() {
|
|
ctx := context.Background()
|
|
|
|
now := time.Now()
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
Domain: "какашка.com",
|
|
CreatedAt: now,
|
|
UpdatedAt: now,
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
}
|
|
|
|
// no domain block exists for the given domain yet
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
suite.NoError(err)
|
|
suite.False(blocked)
|
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
|
suite.NoError(err)
|
|
|
|
// domain block now exists
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
suite.NoError(err)
|
|
suite.True(blocked)
|
|
}
|
|
|
|
func TestDomainTestSuite(t *testing.T) {
|
|
suite.Run(t, new(DomainTestSuite))
|
|
}
|