diff options
| author | kaniini <nenolod@gmail.com> | 2019-07-10 05:12:21 +0000 |
|---|---|---|
| committer | kaniini <nenolod@gmail.com> | 2019-07-10 05:12:21 +0000 |
| commit | 37b0bd0d868c192241976684c59a8cbe648901bf (patch) | |
| tree | ae4ac3661d39e4bc7d7f31bc929c90ee7a761f8e /test/web/activity_pub/mrf/normalize_markup_test.exs | |
| parent | 81f1017b84bbe1a493aaf6f43687af2f2546b6a1 (diff) | |
| parent | bb8065a1fd41459961e9c03735de281fcee0eefe (diff) | |
| download | pleroma-37b0bd0d868c192241976684c59a8cbe648901bf.tar.gz pleroma-37b0bd0d868c192241976684c59a8cbe648901bf.zip | |
Merge branch 'tests/mrf_policy' into 'develop'
tests MRF filters
See merge request pleroma/pleroma!1379
Diffstat (limited to 'test/web/activity_pub/mrf/normalize_markup_test.exs')
| -rw-r--r-- | test/web/activity_pub/mrf/normalize_markup_test.exs | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/test/web/activity_pub/mrf/normalize_markup_test.exs b/test/web/activity_pub/mrf/normalize_markup_test.exs new file mode 100644 index 000000000..3916a1f35 --- /dev/null +++ b/test/web/activity_pub/mrf/normalize_markup_test.exs @@ -0,0 +1,42 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.ActivityPub.MRF.NormalizeMarkupTest do + use Pleroma.DataCase + alias Pleroma.Web.ActivityPub.MRF.NormalizeMarkup + + @html_sample """ + <b>this is in bold</b> + <p>this is a paragraph</p> + this is a linebreak<br /> + this is a link with allowed "rel" attribute: <a href="http://example.com/" rel="tag">example.com</a> + this is a link with not allowed "rel" attribute: <a href="http://example.com/" rel="tag noallowed">example.com</a> + this is an image: <img src="http://example.com/image.jpg"><br /> + <script>alert('hacked')</script> + """ + + test "it filter html tags" do + expected = """ + <b>this is in bold</b> + <p>this is a paragraph</p> + this is a linebreak<br /> + this is a link with allowed "rel" attribute: <a href="http://example.com/" rel="tag">example.com</a> + this is a link with not allowed "rel" attribute: <a href="http://example.com/">example.com</a> + this is an image: <img src="http://example.com/image.jpg" /><br /> + alert('hacked') + """ + + message = %{"type" => "Create", "object" => %{"content" => @html_sample}} + + assert {:ok, res} = NormalizeMarkup.filter(message) + assert res["object"]["content"] == expected + end + + test "it skips filter if type isn't `Create`" do + message = %{"type" => "Note", "object" => %{}} + + assert {:ok, res} = NormalizeMarkup.filter(message) + assert res == message + end +end |
