2023-03-12 15:00:57 +00:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2022-05-02 10:53:46 +00:00
|
|
|
|
|
|
|
package bundb_test
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"testing"
|
2022-09-02 10:17:46 +00:00
|
|
|
"time"
|
2022-05-02 10:53:46 +00:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
|
|
)
|
|
|
|
|
|
|
|
type DomainTestSuite struct {
|
|
|
|
BunDBStandardTestSuite
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlocked() {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
|
|
Domain: "some.bad.apples",
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
2022-09-02 10:17:46 +00:00
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
2022-05-02 10:53:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// no domain block exists for the given domain yet
|
|
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
2022-10-06 10:48:17 +00:00
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
2022-09-02 10:17:46 +00:00
|
|
|
suite.NoError(err)
|
2022-05-02 10:53:46 +00:00
|
|
|
|
|
|
|
// domain block now exists
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
2022-10-06 10:48:17 +00:00
|
|
|
suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
|
2022-05-02 10:53:46 +00:00
|
|
|
}
|
|
|
|
|
2023-09-21 10:12:04 +00:00
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedWithAllow() {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
|
|
Domain: "some.bad.apples",
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// no domain block exists for the given domain yet
|
|
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
if err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
suite.False(blocked)
|
|
|
|
|
|
|
|
// Block this domain.
|
|
|
|
if err := suite.db.CreateDomainBlock(ctx, domainBlock); err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// domain block now exists
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
if err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
suite.True(blocked)
|
|
|
|
suite.WithinDuration(time.Now(), domainBlock.CreatedAt, 10*time.Second)
|
|
|
|
|
|
|
|
// Explicitly allow this domain.
|
|
|
|
domainAllow := >smodel.DomainAllow{
|
|
|
|
ID: "01H8KY9MJQFWE712EG3VN02Y3J",
|
|
|
|
Domain: "some.bad.apples",
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := suite.db.CreateDomainAllow(ctx, domainAllow); err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
// Domain allow now exists
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
if err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
suite.False(blocked)
|
|
|
|
}
|
|
|
|
|
2022-12-14 09:55:36 +00:00
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedWildcard() {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
|
|
Domain: "bad.apples",
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// no domain block exists for the given domain yet
|
|
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
|
|
|
suite.NoError(err)
|
|
|
|
|
|
|
|
// Start with the base block domain
|
|
|
|
domain := domainBlock.Domain
|
|
|
|
|
|
|
|
for _, part := range []string{"extra", "domain", "parts"} {
|
|
|
|
// Prepend the next domain part
|
|
|
|
domain = part + "." + domain
|
|
|
|
|
|
|
|
// Check that domain block is wildcarded for this subdomain
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, domainBlock.Domain)
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-01 15:48:38 +00:00
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII() {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
|
|
Domain: "xn--80aaa1bbb1h.com",
|
|
|
|
CreatedAt: now,
|
|
|
|
UpdatedAt: now,
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// no domain block exists for the given domain yet
|
|
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
2022-10-06 10:48:17 +00:00
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
2022-10-01 15:48:38 +00:00
|
|
|
suite.NoError(err)
|
|
|
|
|
|
|
|
// domain block now exists
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
|
|
|
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (suite *DomainTestSuite) TestIsDomainBlockedNonASCII2() {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
now := time.Now()
|
|
|
|
|
|
|
|
domainBlock := >smodel.DomainBlock{
|
|
|
|
ID: "01G204214Y9TNJEBX39C7G88SW",
|
|
|
|
Domain: "какашка.com",
|
|
|
|
CreatedAt: now,
|
|
|
|
UpdatedAt: now,
|
|
|
|
CreatedByAccountID: suite.testAccounts["admin_account"].ID,
|
|
|
|
CreatedByAccount: suite.testAccounts["admin_account"],
|
|
|
|
}
|
|
|
|
|
|
|
|
// no domain block exists for the given domain yet
|
|
|
|
blocked, err := suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.False(blocked)
|
|
|
|
|
2022-10-06 10:48:17 +00:00
|
|
|
err = suite.db.CreateDomainBlock(ctx, domainBlock)
|
2022-10-01 15:48:38 +00:00
|
|
|
suite.NoError(err)
|
|
|
|
|
|
|
|
// domain block now exists
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "какашка.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
|
|
|
|
|
|
|
blocked, err = suite.db.IsDomainBlocked(ctx, "xn--80aaa1bbb1h.com")
|
|
|
|
suite.NoError(err)
|
|
|
|
suite.True(blocked)
|
|
|
|
}
|
|
|
|
|
2022-05-02 10:53:46 +00:00
|
|
|
func TestDomainTestSuite(t *testing.T) {
|
|
|
|
suite.Run(t, new(DomainTestSuite))
|
|
|
|
}
|