logo

pleroma

My custom branche(s) on git.pleroma.social/pleroma/pleroma git clone https://anongit.hacktivis.me/git/pleroma.git/

web_finger_test.exs (9837B)


  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.Web.WebFingerTest do
  5. use Pleroma.DataCase, async: true
  6. alias Pleroma.Web.WebFinger
  7. import Pleroma.Factory
  8. import Tesla.Mock
  9. setup do
  10. mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
  11. :ok
  12. end
  13. describe "host meta" do
  14. test "returns a link to the xml lrdd" do
  15. host_info = WebFinger.host_meta()
  16. assert String.contains?(host_info, Pleroma.Web.Endpoint.url())
  17. end
  18. end
  19. describe "incoming webfinger request" do
  20. test "works for fqns" do
  21. user = insert(:user)
  22. {:ok, result} =
  23. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}", "XML")
  24. assert is_binary(result)
  25. end
  26. test "works for ap_ids" do
  27. user = insert(:user)
  28. {:ok, result} = WebFinger.webfinger(user.ap_id, "XML")
  29. assert is_binary(result)
  30. end
  31. end
  32. test "requires exact match for Endpoint host or WebFinger domain" do
  33. clear_config([Pleroma.Web.WebFinger, :domain], "pleroma.dev")
  34. user = insert(:user)
  35. assert {:error, "Couldn't find user"} ==
  36. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}xxxx", "JSON")
  37. assert {:error, "Couldn't find user"} ==
  38. WebFinger.webfinger("#{user.nickname}@pleroma.devxxxx", "JSON")
  39. assert {:ok, _} =
  40. WebFinger.webfinger("#{user.nickname}@#{Pleroma.Web.Endpoint.host()}", "JSON")
  41. assert {:ok, _} =
  42. WebFinger.webfinger("#{user.nickname}@pleroma.dev", "JSON")
  43. end
  44. describe "fingering" do
  45. test "returns error for nonsensical input" do
  46. assert {:error, _} = WebFinger.finger("bliblablu")
  47. assert {:error, _} = WebFinger.finger("pleroma.social")
  48. end
  49. test "returns error when there is no content-type header" do
  50. Tesla.Mock.mock(fn
  51. %{url: "https://social.heldscal.la/.well-known/host-meta"} ->
  52. {:ok,
  53. %Tesla.Env{
  54. status: 200,
  55. body: File.read!("test/fixtures/tesla_mock/social.heldscal.la_host_meta")
  56. }}
  57. %{
  58. url:
  59. "https://social.heldscal.la/.well-known/webfinger?resource=acct:invalid_content@social.heldscal.la"
  60. } ->
  61. {:ok, %Tesla.Env{status: 200, body: ""}}
  62. end)
  63. user = "invalid_content@social.heldscal.la"
  64. assert {:error, {:content_type, nil}} = WebFinger.finger(user)
  65. end
  66. test "returns error when fails parse xml or json" do
  67. user = "invalid_content@social.heldscal.la"
  68. assert {:error, %Jason.DecodeError{}} = WebFinger.finger(user)
  69. end
  70. test "returns the ActivityPub actor URI for an ActivityPub user" do
  71. user = "framasoft@framatube.org"
  72. {:ok, _data} = WebFinger.finger(user)
  73. end
  74. test "it works for AP-only user" do
  75. user = "kpherox@mstdn.jp"
  76. {:ok, data} = WebFinger.finger(user)
  77. assert data["magic_key"] == nil
  78. assert data["salmon"] == nil
  79. assert data["topic"] == nil
  80. assert data["subject"] == "acct:kPherox@mstdn.jp"
  81. assert data["ap_id"] == "https://mstdn.jp/users/kPherox"
  82. assert data["subscribe_address"] == "https://mstdn.jp/authorize_interaction?acct={uri}"
  83. end
  84. test "it gets the xrd endpoint" do
  85. {:ok, template} = WebFinger.find_lrdd_template("social.heldscal.la")
  86. assert template == "https://social.heldscal.la/.well-known/webfinger?resource={uri}"
  87. end
  88. test "it gets the xrd endpoint for hubzilla" do
  89. {:ok, template} = WebFinger.find_lrdd_template("macgirvin.com")
  90. assert template == "https://macgirvin.com/xrd/?uri={uri}"
  91. end
  92. test "it gets the xrd endpoint for statusnet" do
  93. {:ok, template} = WebFinger.find_lrdd_template("status.alpicola.com")
  94. assert template == "https://status.alpicola.com/main/xrd?uri={uri}"
  95. end
  96. test "it works with idna domains as nickname" do
  97. nickname = "lain@" <> to_string(:idna.encode("zetsubou.みんな"))
  98. {:ok, _data} = WebFinger.finger(nickname)
  99. end
  100. test "it works with idna domains as link" do
  101. ap_id = "https://" <> to_string(:idna.encode("zetsubou.みんな")) <> "/users/lain"
  102. {:ok, _data} = WebFinger.finger(ap_id)
  103. end
  104. test "respects json content-type" do
  105. Tesla.Mock.mock(fn
  106. %{
  107. url:
  108. "https://mastodon.social/.well-known/webfinger?resource=acct:emelie@mastodon.social"
  109. } ->
  110. {:ok,
  111. %Tesla.Env{
  112. status: 200,
  113. body: File.read!("test/fixtures/tesla_mock/webfinger_emelie.json"),
  114. headers: [{"content-type", "application/jrd+json"}]
  115. }}
  116. %{url: "https://mastodon.social/.well-known/host-meta"} ->
  117. {:ok,
  118. %Tesla.Env{
  119. status: 200,
  120. body: File.read!("test/fixtures/tesla_mock/mastodon.social_host_meta")
  121. }}
  122. end)
  123. {:ok, _data} = WebFinger.finger("emelie@mastodon.social")
  124. end
  125. test "respects xml content-type" do
  126. Tesla.Mock.mock(fn
  127. %{
  128. url: "https://pawoo.net/.well-known/webfinger?resource=acct:pekorino@pawoo.net"
  129. } ->
  130. {:ok,
  131. %Tesla.Env{
  132. status: 200,
  133. body: File.read!("test/fixtures/tesla_mock/https___pawoo.net_users_pekorino.xml"),
  134. headers: [{"content-type", "application/xrd+xml"}]
  135. }}
  136. %{url: "https://pawoo.net/.well-known/host-meta"} ->
  137. {:ok,
  138. %Tesla.Env{
  139. status: 200,
  140. body: File.read!("test/fixtures/tesla_mock/pawoo.net_host_meta")
  141. }}
  142. end)
  143. {:ok, _data} = WebFinger.finger("pekorino@pawoo.net")
  144. end
  145. test "refuses to process XML remote entities" do
  146. Tesla.Mock.mock(fn
  147. %{
  148. url: "https://pawoo.net/.well-known/webfinger?resource=acct:pekorino@pawoo.net"
  149. } ->
  150. {:ok,
  151. %Tesla.Env{
  152. status: 200,
  153. body: File.read!("test/fixtures/xml_external_entities.xml"),
  154. headers: [{"content-type", "application/xrd+xml"}]
  155. }}
  156. %{url: "https://pawoo.net/.well-known/host-meta"} ->
  157. {:ok,
  158. %Tesla.Env{
  159. status: 200,
  160. body: File.read!("test/fixtures/tesla_mock/pawoo.net_host_meta")
  161. }}
  162. end)
  163. assert :error = WebFinger.finger("pekorino@pawoo.net")
  164. end
  165. test "prevents spoofing" do
  166. Tesla.Mock.mock(fn
  167. %{
  168. url: "https://gleasonator.com/.well-known/webfinger?resource=acct:alex@gleasonator.com"
  169. } ->
  170. {:ok,
  171. %Tesla.Env{
  172. status: 200,
  173. body: File.read!("test/fixtures/tesla_mock/webfinger_spoof.json"),
  174. headers: [{"content-type", "application/jrd+json"}]
  175. }}
  176. %{url: "https://gleasonator.com/.well-known/host-meta"} ->
  177. {:ok,
  178. %Tesla.Env{
  179. status: 200,
  180. body: File.read!("test/fixtures/tesla_mock/gleasonator.com_host_meta")
  181. }}
  182. %{url: "https://whitehouse.gov/.well-known/webfinger?resource=acct:trump@whitehouse.gov"} ->
  183. {:ok, %Tesla.Env{status: 404}}
  184. end)
  185. {:error, _data} = WebFinger.finger("alex@gleasonator.com")
  186. end
  187. test "prevents forgeries" do
  188. Tesla.Mock.mock(fn
  189. %{
  190. url:
  191. "https://fba.ryona.agency/.well-known/webfinger?resource=acct:graf@fba.ryona.agency"
  192. } ->
  193. fake_webfinger =
  194. File.read!("test/fixtures/webfinger/graf-imposter-webfinger.json") |> Jason.decode!()
  195. Tesla.Mock.json(fake_webfinger)
  196. %{url: url}
  197. when url in [
  198. "https://poa.st/.well-known/webfinger?resource=acct:graf@poa.st",
  199. "https://fba.ryona.agency/.well-known/host-meta"
  200. ] ->
  201. {:ok, %Tesla.Env{status: 404}}
  202. end)
  203. assert {:error, _} = WebFinger.finger("graf@fba.ryona.agency")
  204. end
  205. test "prevents forgeries even when the spoofed subject exists on the target domain" do
  206. Tesla.Mock.mock(fn
  207. %{url: url}
  208. when url in [
  209. "https://attacker.example/.well-known/host-meta",
  210. "https://victim.example/.well-known/host-meta"
  211. ] ->
  212. {:ok, %Tesla.Env{status: 404}}
  213. %{
  214. url:
  215. "https://attacker.example/.well-known/webfinger?resource=acct:alice@attacker.example"
  216. } ->
  217. Tesla.Mock.json(%{
  218. "subject" => "acct:alice@victim.example",
  219. "links" => [
  220. %{
  221. "rel" => "self",
  222. "type" => "application/activity+json",
  223. "href" => "https://attacker.example/users/alice"
  224. }
  225. ]
  226. })
  227. %{url: "https://victim.example/.well-known/webfinger?resource=acct:alice@victim.example"} ->
  228. Tesla.Mock.json(%{
  229. "subject" => "acct:alice@victim.example",
  230. "links" => [
  231. %{
  232. "rel" => "self",
  233. "type" => "application/activity+json",
  234. "href" => "https://victim.example/users/alice"
  235. }
  236. ]
  237. })
  238. end)
  239. assert {:error, _} = WebFinger.finger("alice@attacker.example")
  240. end
  241. test "works for correctly set up split-domain instances implementing host-meta redirect" do
  242. {:ok, _data} = WebFinger.finger("a@pleroma.example")
  243. {:ok, _data} = WebFinger.finger("a@sub.pleroma.example")
  244. end
  245. test "works for correctly set up split-domain instances without host-meta redirect" do
  246. {:ok, _data} = WebFinger.finger("a@mastodon.example")
  247. {:ok, _data} = WebFinger.finger("a@sub.mastodon.example")
  248. end
  249. end
  250. end