logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://anongit.hacktivis.me/git/pleroma.git/

web_finger_test.exs (9895B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.WebFingerTest do
  5. use Pleroma.DataCase, async: false
  6. alias Pleroma.Web.WebFinger
  7. import Pleroma.Factory
  8. import Tesla.Mock
  9. setup do
  10. Mox.stub_with(Pleroma.CachexMock, Pleroma.NullCache)
  11. mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
  12. :ok
  13. end
  14. describe "host meta" do
  15. test "returns a link to the xml lrdd" do
  16. host_info = WebFinger.host_meta()
  17. assert String.contains?(host_info, Pleroma.Web.Endpoint.url())
  18. end
  19. end
  20. describe "incoming webfinger request" do
  21. test "works for fqns" do
  22. user = insert(:user)
  23. {:ok, result} =
  24. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}", "XML")
  25. assert is_binary(result)
  26. end
  27. test "works for ap_ids" do
  28. user = insert(:user)
  29. {:ok, result} = WebFinger.webfinger(user.ap_id, "XML")
  30. assert is_binary(result)
  31. end
  32. end
  33. test "requires exact match for Endpoint host or WebFinger domain" do
  34. clear_config([Pleroma.Web.WebFinger, :domain], "pleroma.dev")
  35. user = insert(:user)
  36. assert {:error, "Couldn't find user"} ==
  37. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}xxxx", "JSON")
  38. assert {:error, "Couldn't find user"} ==
  39. WebFinger.webfinger("#{user.nickname}@pleroma.devxxxx", "JSON")
  40. assert {:ok, _} =
  41. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}", "JSON")
  42. assert {:ok, _} =
  43. WebFinger.webfinger("#{user.nickname}@pleroma.dev", "JSON")
  44. end
  45. describe "fingering" do
  46. test "returns error for nonsensical input" do
  47. assert {:error, _} = WebFinger.finger("bliblablu")
  48. assert {:error, _} = WebFinger.finger("pleroma.social")
  49. end
  50. test "returns error when there is no content-type header" do
  51. Tesla.Mock.mock(fn
  52. %{url: "https://social.heldscal.la/.well-known/host-meta"} ->
  53. {:ok,
  54. %Tesla.Env{
  55. status: 200,
  56. body: File.read!("test/fixtures/tesla_mock/social.heldscal.la_host_meta")
  57. }}
  58. %{
  59. url:
  60. "https://social.heldscal.la/.well-known/webfinger?resource=acct:invalid_content@social.heldscal.la"
  61. } ->
  62. {:ok, %Tesla.Env{status: 200, body: ""}}
  63. end)
  64. user = "invalid_content@social.heldscal.la"
  65. assert {:error, {:content_type, nil}} = WebFinger.finger(user)
  66. end
  67. test "returns error when fails parse xml or json" do
  68. user = "invalid_content@social.heldscal.la"
  69. assert {:error, %Jason.DecodeError{}} = WebFinger.finger(user)
  70. end
  71. test "returns the ActivityPub actor URI for an ActivityPub user" do
  72. user = "framasoft@framatube.org"
  73. {:ok, _data} = WebFinger.finger(user)
  74. end
  75. test "it works for AP-only user" do
  76. user = "kpherox@mstdn.jp"
  77. {:ok, data} = WebFinger.finger(user)
  78. assert data["magic_key"] == nil
  79. assert data["salmon"] == nil
  80. assert data["topic"] == nil
  81. assert data["subject"] == "acct:kPherox@mstdn.jp"
  82. assert data["ap_id"] == "https://mstdn.jp/users/kPherox"
  83. assert data["subscribe_address"] == "https://mstdn.jp/authorize_interaction?acct={uri}"
  84. end
  85. test "it gets the xrd endpoint" do
  86. {:ok, template} = WebFinger.find_lrdd_template("social.heldscal.la")
  87. assert template == "https://social.heldscal.la/.well-known/webfinger?resource={uri}"
  88. end
  89. test "it gets the xrd endpoint for hubzilla" do
  90. {:ok, template} = WebFinger.find_lrdd_template("macgirvin.com")
  91. assert template == "https://macgirvin.com/xrd/?uri={uri}"
  92. end
  93. test "it gets the xrd endpoint for statusnet" do
  94. {:ok, template} = WebFinger.find_lrdd_template("status.alpicola.com")
  95. assert template == "https://status.alpicola.com/main/xrd?uri={uri}"
  96. end
  97. test "it works with idna domains as nickname" do
  98. nickname = "lain@" <> to_string(:idna.encode("zetsubou.みんな"))
  99. {:ok, _data} = WebFinger.finger(nickname)
  100. end
  101. test "it works with idna domains as link" do
  102. ap_id = "https://" <> to_string(:idna.encode("zetsubou.みんな")) <> "/users/lain"
  103. {:ok, _data} = WebFinger.finger(ap_id)
  104. end
  105. test "respects json content-type" do
  106. Tesla.Mock.mock(fn
  107. %{
  108. url:
  109. "https://mastodon.social/.well-known/webfinger?resource=acct:emelie@mastodon.social"
  110. } ->
  111. {:ok,
  112. %Tesla.Env{
  113. status: 200,
  114. body: File.read!("test/fixtures/tesla_mock/webfinger_emelie.json"),
  115. headers: [{"content-type", "application/jrd+json"}]
  116. }}
  117. %{url: "https://mastodon.social/.well-known/host-meta"} ->
  118. {:ok,
  119. %Tesla.Env{
  120. status: 200,
  121. body: File.read!("test/fixtures/tesla_mock/mastodon.social_host_meta")
  122. }}
  123. end)
  124. {:ok, _data} = WebFinger.finger("emelie@mastodon.social")
  125. end
  126. test "respects xml content-type" do
  127. Tesla.Mock.mock(fn
  128. %{
  129. url: "https://pawoo.net/.well-known/webfinger?resource=acct:pekorino@pawoo.net"
  130. } ->
  131. {:ok,
  132. %Tesla.Env{
  133. status: 200,
  134. body: File.read!("test/fixtures/tesla_mock/https___pawoo.net_users_pekorino.xml"),
  135. headers: [{"content-type", "application/xrd+xml"}]
  136. }}
  137. %{url: "https://pawoo.net/.well-known/host-meta"} ->
  138. {:ok,
  139. %Tesla.Env{
  140. status: 200,
  141. body: File.read!("test/fixtures/tesla_mock/pawoo.net_host_meta")
  142. }}
  143. end)
  144. {:ok, _data} = WebFinger.finger("pekorino@pawoo.net")
  145. end
  146. test "refuses to process XML remote entities" do
  147. Tesla.Mock.mock(fn
  148. %{
  149. url: "https://pawoo.net/.well-known/webfinger?resource=acct:pekorino@pawoo.net"
  150. } ->
  151. {:ok,
  152. %Tesla.Env{
  153. status: 200,
  154. body: File.read!("test/fixtures/xml_external_entities.xml"),
  155. headers: [{"content-type", "application/xrd+xml"}]
  156. }}
  157. %{url: "https://pawoo.net/.well-known/host-meta"} ->
  158. {:ok,
  159. %Tesla.Env{
  160. status: 200,
  161. body: File.read!("test/fixtures/tesla_mock/pawoo.net_host_meta")
  162. }}
  163. end)
  164. assert :error = WebFinger.finger("pekorino@pawoo.net")
  165. end
  166. test "prevents spoofing" do
  167. Tesla.Mock.mock(fn
  168. %{
  169. url: "https://gleasonator.com/.well-known/webfinger?resource=acct:alex@gleasonator.com"
  170. } ->
  171. {:ok,
  172. %Tesla.Env{
  173. status: 200,
  174. body: File.read!("test/fixtures/tesla_mock/webfinger_spoof.json"),
  175. headers: [{"content-type", "application/jrd+json"}]
  176. }}
  177. %{url: "https://gleasonator.com/.well-known/host-meta"} ->
  178. {:ok,
  179. %Tesla.Env{
  180. status: 200,
  181. body: File.read!("test/fixtures/tesla_mock/gleasonator.com_host_meta")
  182. }}
  183. %{url: "https://whitehouse.gov/.well-known/webfinger?resource=acct:trump@whitehouse.gov"} ->
  184. {:ok, %Tesla.Env{status: 404}}
  185. end)
  186. {:error, _data} = WebFinger.finger("alex@gleasonator.com")
  187. end
  188. test "prevents forgeries" do
  189. Tesla.Mock.mock(fn
  190. %{
  191. url:
  192. "https://fba.ryona.agency/.well-known/webfinger?resource=acct:graf@fba.ryona.agency"
  193. } ->
  194. fake_webfinger =
  195. File.read!("test/fixtures/webfinger/graf-imposter-webfinger.json") |> Jason.decode!()
  196. Tesla.Mock.json(fake_webfinger)
  197. %{url: url}
  198. when url in [
  199. "https://poa.st/.well-known/webfinger?resource=acct:graf@poa.st",
  200. "https://fba.ryona.agency/.well-known/host-meta"
  201. ] ->
  202. {:ok, %Tesla.Env{status: 404}}
  203. end)
  204. assert {:error, _} = WebFinger.finger("graf@fba.ryona.agency")
  205. end
  206. test "prevents forgeries even when the spoofed subject exists on the target domain" do
  207. Tesla.Mock.mock(fn
  208. %{url: url}
  209. when url in [
  210. "https://attacker.example/.well-known/host-meta",
  211. "https://victim.example/.well-known/host-meta"
  212. ] ->
  213. {:ok, %Tesla.Env{status: 404}}
  214. %{
  215. url:
  216. "https://attacker.example/.well-known/webfinger?resource=acct:alice@attacker.example"
  217. } ->
  218. Tesla.Mock.json(%{
  219. "subject" => "acct:alice@victim.example",
  220. "links" => [
  221. %{
  222. "rel" => "self",
  223. "type" => "application/activity+json",
  224. "href" => "https://attacker.example/users/alice"
  225. }
  226. ]
  227. })
  228. %{url: "https://victim.example/.well-known/webfinger?resource=acct:alice@victim.example"} ->
  229. Tesla.Mock.json(%{
  230. "subject" => "acct:alice@victim.example",
  231. "links" => [
  232. %{
  233. "rel" => "self",
  234. "type" => "application/activity+json",
  235. "href" => "https://victim.example/users/alice"
  236. }
  237. ]
  238. })
  239. end)
  240. assert {:error, _} = WebFinger.finger("alice@attacker.example")
  241. end
  242. test "works for correctly set up split-domain instances implementing host-meta redirect" do
  243. {:ok, _data} = WebFinger.finger("a@pleroma.example")
  244. {:ok, _data} = WebFinger.finger("a@sub.pleroma.example")
  245. end
  246. test "works for correctly set up split-domain instances without host-meta redirect" do
  247. {:ok, _data} = WebFinger.finger("a@mastodon.example")
  248. {:ok, _data} = WebFinger.finger("a@sub.mastodon.example")
  249. end
  250. end
  251. end