2023-02-22 11:55:31 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2020-07-16 05:08:19 +10:00
|
|
|
require 'rails_helper'
|
|
|
|
|
2024-03-13 19:39:26 +11:00
|
|
|
RSpec.describe UnallowDomainService do
|
2023-06-06 21:58:33 +10:00
|
|
|
subject { described_class.new }
|
2023-02-20 15:24:14 +11:00
|
|
|
|
2024-01-18 21:11:10 +11:00
|
|
|
let(:bad_domain) { 'evil.org' }
|
|
|
|
let!(:bad_account) { Fabricate(:account, username: 'badguy666', domain: bad_domain) }
|
2023-06-15 00:44:37 +10:00
|
|
|
let!(:bad_status_harassment) { Fabricate(:status, account: bad_account, text: 'You suck') }
|
|
|
|
let!(:bad_status_mean) { Fabricate(:status, account: bad_account, text: 'Hahaha') }
|
|
|
|
let!(:bad_attachment) { Fabricate(:media_attachment, account: bad_account, status: bad_status_mean, file: attachment_fixture('attachment.jpg')) }
|
2024-01-18 21:11:10 +11:00
|
|
|
let!(:already_banned_account) { Fabricate(:account, username: 'badguy', domain: bad_domain, suspended: true, silenced: true) }
|
|
|
|
let!(:domain_allow) { Fabricate(:domain_allow, domain: bad_domain) }
|
2020-07-16 05:08:19 +10:00
|
|
|
|
2024-07-09 02:01:08 +10:00
|
|
|
context 'with limited federation mode', :inline_jobs do
|
2020-07-16 05:08:19 +10:00
|
|
|
before do
|
2023-08-03 03:32:48 +10:00
|
|
|
allow(Rails.configuration.x).to receive(:limited_federation_mode).and_return(true)
|
2020-07-16 05:08:19 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
describe '#call' do
|
2024-01-18 21:11:10 +11:00
|
|
|
it 'makes the domain not allowed and removes accounts from that domain' do
|
|
|
|
expect { subject.call(domain_allow) }
|
|
|
|
.to change { bad_domain_allowed }.from(true).to(false)
|
|
|
|
.and change { bad_domain_account_exists }.from(true).to(false)
|
2020-07-16 05:08:19 +10:00
|
|
|
|
2023-12-22 01:23:53 +11:00
|
|
|
expect { already_banned_account.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
2024-01-18 21:11:10 +11:00
|
|
|
expect { bad_status_harassment.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
expect { bad_status_mean.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
|
|
|
expect { bad_attachment.reload }.to raise_error(ActiveRecord::RecordNotFound)
|
2020-07-16 05:08:19 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'without limited federation mode' do
|
|
|
|
before do
|
2023-08-03 03:32:48 +10:00
|
|
|
allow(Rails.configuration.x).to receive(:limited_federation_mode).and_return(false)
|
2020-07-16 05:08:19 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
describe '#call' do
|
2024-01-18 21:11:10 +11:00
|
|
|
it 'makes the domain not allowed but preserves accounts from the domain' do
|
|
|
|
expect { subject.call(domain_allow) }
|
|
|
|
.to change { bad_domain_allowed }.from(true).to(false)
|
|
|
|
.and not_change { bad_domain_account_exists }.from(true)
|
2020-07-16 05:08:19 +10:00
|
|
|
|
2023-06-15 00:44:37 +10:00
|
|
|
expect { bad_status_harassment.reload }.to_not raise_error
|
|
|
|
expect { bad_status_mean.reload }.to_not raise_error
|
2020-09-05 04:22:26 +10:00
|
|
|
expect { bad_attachment.reload }.to_not raise_error
|
2020-07-16 05:08:19 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2024-01-18 21:11:10 +11:00
|
|
|
|
|
|
|
def bad_domain_allowed
|
|
|
|
DomainAllow.allowed?(bad_domain)
|
|
|
|
end
|
|
|
|
|
|
|
|
def bad_domain_account_exists
|
|
|
|
Account.exists?(domain: bad_domain)
|
|
|
|
end
|
2020-07-16 05:08:19 +10:00
|
|
|
end
|