2019-07-09 22:13:23 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 14:44:49 -08:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2019-07-09 22:13:23 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-12-01 14:29:41 -08:00
|
|
|
defmodule Pleroma.Object.ContainmentTest do
|
|
|
|
use Pleroma.DataCase
|
|
|
|
|
|
|
|
alias Pleroma.Object.Containment
|
2019-04-17 04:52:01 -07:00
|
|
|
alias Pleroma.User
|
2018-12-01 14:29:41 -08:00
|
|
|
|
|
|
|
import Pleroma.Factory
|
2019-06-16 03:49:24 -07:00
|
|
|
import ExUnit.CaptureLog
|
2018-12-01 14:29:41 -08:00
|
|
|
|
2019-06-03 22:46:19 -07:00
|
|
|
setup_all do
|
|
|
|
Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
|
|
|
|
:ok
|
|
|
|
end
|
|
|
|
|
2018-12-01 14:29:41 -08:00
|
|
|
describe "general origin containment" do
|
2019-11-12 03:07:17 -08:00
|
|
|
test "works for completely actorless posts" do
|
|
|
|
assert :error ==
|
|
|
|
Containment.contain_origin("https://glaceon.social/users/monorail", %{
|
|
|
|
"deleted" => "2019-10-30T05:48:50.249606Z",
|
|
|
|
"formerType" => "Note",
|
|
|
|
"id" => "https://glaceon.social/users/monorail/statuses/103049757364029187",
|
|
|
|
"type" => "Tombstone"
|
|
|
|
})
|
|
|
|
end
|
|
|
|
|
2018-12-01 14:29:41 -08:00
|
|
|
test "contain_origin_from_id() catches obvious spoofing attempts" do
|
|
|
|
data = %{
|
|
|
|
"id" => "http://example.com/~alyssa/activities/1234.json"
|
|
|
|
}
|
|
|
|
|
|
|
|
:error =
|
|
|
|
Containment.contain_origin_from_id(
|
|
|
|
"http://example.org/~alyssa/activities/1234.json",
|
|
|
|
data
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "contain_origin_from_id() allows alternate IDs within the same origin domain" do
|
|
|
|
data = %{
|
|
|
|
"id" => "http://example.com/~alyssa/activities/1234.json"
|
|
|
|
}
|
|
|
|
|
|
|
|
:ok =
|
|
|
|
Containment.contain_origin_from_id(
|
|
|
|
"http://example.com/~alyssa/activities/1234",
|
|
|
|
data
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "contain_origin_from_id() allows matching IDs" do
|
|
|
|
data = %{
|
|
|
|
"id" => "http://example.com/~alyssa/activities/1234.json"
|
|
|
|
}
|
|
|
|
|
|
|
|
:ok =
|
|
|
|
Containment.contain_origin_from_id(
|
|
|
|
"http://example.com/~alyssa/activities/1234.json",
|
|
|
|
data
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "users cannot be collided through fake direction spoofing attempts" do
|
2019-04-17 02:27:29 -07:00
|
|
|
_user =
|
2018-12-01 14:29:41 -08:00
|
|
|
insert(:user, %{
|
|
|
|
nickname: "rye@niu.moe",
|
|
|
|
local: false,
|
|
|
|
ap_id: "https://niu.moe/users/rye",
|
|
|
|
follower_address: User.ap_followers(%User{nickname: "rye@niu.moe"})
|
|
|
|
})
|
|
|
|
|
2019-06-16 03:49:24 -07:00
|
|
|
assert capture_log(fn ->
|
|
|
|
{:error, _} = User.get_or_fetch_by_ap_id("https://n1u.moe/users/rye")
|
|
|
|
end) =~
|
2019-10-17 17:51:53 -07:00
|
|
|
"[error] Could not decode user at fetch https://n1u.moe/users/rye"
|
2018-12-01 14:29:41 -08:00
|
|
|
end
|
2019-11-08 12:51:28 -08:00
|
|
|
|
|
|
|
test "contain_origin_from_id() gracefully handles cases where no ID is present" do
|
|
|
|
data = %{
|
|
|
|
"type" => "Create",
|
|
|
|
"object" => %{
|
|
|
|
"id" => "http://example.net/~alyssa/activities/1234",
|
|
|
|
"attributedTo" => "http://example.org/~alyssa"
|
|
|
|
},
|
|
|
|
"actor" => "http://example.com/~bob"
|
|
|
|
}
|
|
|
|
|
|
|
|
:error =
|
|
|
|
Containment.contain_origin_from_id("http://example.net/~alyssa/activities/1234", data)
|
|
|
|
end
|
2018-12-01 14:29:41 -08:00
|
|
|
end
|
2019-07-14 10:47:08 -07:00
|
|
|
|
|
|
|
describe "containment of children" do
|
|
|
|
test "contain_child() catches spoofing attempts" do
|
|
|
|
data = %{
|
|
|
|
"id" => "http://example.com/whatever",
|
|
|
|
"type" => "Create",
|
|
|
|
"object" => %{
|
|
|
|
"id" => "http://example.net/~alyssa/activities/1234",
|
|
|
|
"attributedTo" => "http://example.org/~alyssa"
|
|
|
|
},
|
|
|
|
"actor" => "http://example.com/~bob"
|
|
|
|
}
|
|
|
|
|
|
|
|
:error = Containment.contain_child(data)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "contain_child() allows correct origins" do
|
|
|
|
data = %{
|
|
|
|
"id" => "http://example.org/~alyssa/activities/5678",
|
|
|
|
"type" => "Create",
|
|
|
|
"object" => %{
|
|
|
|
"id" => "http://example.org/~alyssa/activities/1234",
|
|
|
|
"attributedTo" => "http://example.org/~alyssa"
|
|
|
|
},
|
|
|
|
"actor" => "http://example.org/~alyssa"
|
|
|
|
}
|
|
|
|
|
|
|
|
:ok = Containment.contain_child(data)
|
|
|
|
end
|
|
|
|
end
|
2018-12-01 14:29:41 -08:00
|
|
|
end
|