summaryrefslogtreecommitdiff
path: root/test/web/activity_pub/mrf/normalize_markup_test.exs
diff options
context:
space:
mode:
authorkaniini <nenolod@gmail.com>2019-07-10 05:12:21 +0000
committerkaniini <nenolod@gmail.com>2019-07-10 05:12:21 +0000
commit37b0bd0d868c192241976684c59a8cbe648901bf (patch)
treeae4ac3661d39e4bc7d7f31bc929c90ee7a761f8e /test/web/activity_pub/mrf/normalize_markup_test.exs
parent81f1017b84bbe1a493aaf6f43687af2f2546b6a1 (diff)
parentbb8065a1fd41459961e9c03735de281fcee0eefe (diff)
downloadpleroma-37b0bd0d868c192241976684c59a8cbe648901bf.tar.gz
pleroma-37b0bd0d868c192241976684c59a8cbe648901bf.zip
Merge branch 'tests/mrf_policy' into 'develop'
tests MRF filters See merge request pleroma/pleroma!1379
Diffstat (limited to 'test/web/activity_pub/mrf/normalize_markup_test.exs')
-rw-r--r--test/web/activity_pub/mrf/normalize_markup_test.exs42
1 files changed, 42 insertions, 0 deletions
diff --git a/test/web/activity_pub/mrf/normalize_markup_test.exs b/test/web/activity_pub/mrf/normalize_markup_test.exs
new file mode 100644
index 000000000..3916a1f35
--- /dev/null
+++ b/test/web/activity_pub/mrf/normalize_markup_test.exs
@@ -0,0 +1,42 @@
+# Pleroma: A lightweight social networking server
+# Copyright © 2019 Pleroma Authors <https://pleroma.social/>
+# SPDX-License-Identifier: AGPL-3.0-only
+
+defmodule Pleroma.Web.ActivityPub.MRF.NormalizeMarkupTest do
+ use Pleroma.DataCase
+ alias Pleroma.Web.ActivityPub.MRF.NormalizeMarkup
+
+ @html_sample """
+ <b>this is in bold</b>
+ <p>this is a paragraph</p>
+ this is a linebreak<br />
+ this is a link with allowed "rel" attribute: <a href="http://example.com/" rel="tag">example.com</a>
+ this is a link with not allowed "rel" attribute: <a href="http://example.com/" rel="tag noallowed">example.com</a>
+ this is an image: <img src="http://example.com/image.jpg"><br />
+ <script>alert('hacked')</script>
+ """
+
+ test "it filter html tags" do
+ expected = """
+ <b>this is in bold</b>
+ <p>this is a paragraph</p>
+ this is a linebreak<br />
+ this is a link with allowed "rel" attribute: <a href="http://example.com/" rel="tag">example.com</a>
+ this is a link with not allowed "rel" attribute: <a href="http://example.com/">example.com</a>
+ this is an image: <img src="http://example.com/image.jpg" /><br />
+ alert('hacked')
+ """
+
+ message = %{"type" => "Create", "object" => %{"content" => @html_sample}}
+
+ assert {:ok, res} = NormalizeMarkup.filter(message)
+ assert res["object"]["content"] == expected
+ end
+
+ test "it skips filter if type isn't `Create`" do
+ message = %{"type" => "Note", "object" => %{}}
+
+ assert {:ok, res} = NormalizeMarkup.filter(message)
+ assert res == message
+ end
+end