2019-04-29 20:27:42 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2022-07-27 22:27:38 -04:00
|
|
|
RSpec.describe Oneboxer do
|
2020-11-18 12:55:16 -05:00
|
|
|
def response(file)
|
|
|
|
file = File.join("spec", "fixtures", "onebox", "#{file}.response")
|
2022-01-05 12:45:08 -05:00
|
|
|
File.exist?(file) ? File.read(file) : ""
|
2020-11-18 12:55:16 -05:00
|
|
|
end
|
|
|
|
|
2014-05-28 03:15:10 -04:00
|
|
|
it "returns blank string for an invalid onebox" do
|
2018-02-24 06:35:57 -05:00
|
|
|
stub_request(:head, "http://boom.com")
|
2017-04-15 00:11:02 -04:00
|
|
|
stub_request(:get, "http://boom.com").to_return(body: "")
|
|
|
|
|
2020-11-18 12:55:16 -05:00
|
|
|
expect(Oneboxer.preview("http://boom.com", invalidate_oneboxes: true)).to include("Sorry, we were unable to generate a preview for this web page")
|
2015-01-09 11:34:37 -05:00
|
|
|
expect(Oneboxer.onebox("http://boom.com")).to eq("")
|
2014-05-28 03:15:10 -04:00
|
|
|
end
|
2016-10-24 06:46:22 -04:00
|
|
|
|
2019-11-27 16:48:29 -05:00
|
|
|
describe "#invalidate" do
|
|
|
|
let(:url) { "http://test.com" }
|
|
|
|
it "clears the cached preview for the onebox URL and the failed URL cache" do
|
|
|
|
Discourse.cache.write(Oneboxer.onebox_cache_key(url), "test")
|
|
|
|
Discourse.cache.write(Oneboxer.onebox_failed_cache_key(url), true)
|
|
|
|
Oneboxer.invalidate(url)
|
|
|
|
expect(Discourse.cache.read(Oneboxer.onebox_cache_key(url))).to eq(nil)
|
|
|
|
expect(Discourse.cache.read(Oneboxer.onebox_failed_cache_key(url))).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
describe "local oneboxes" do
|
2018-02-13 18:39:44 -05:00
|
|
|
def link(url)
|
|
|
|
url = "#{Discourse.base_url}#{url}"
|
|
|
|
%{<a href="#{url}">#{url}</a>}
|
|
|
|
end
|
|
|
|
|
2018-02-19 16:40:14 -05:00
|
|
|
def preview(url, user = nil, category = nil, topic = nil)
|
|
|
|
Oneboxer.preview("#{Discourse.base_url}#{url}",
|
|
|
|
user_id: user&.id,
|
|
|
|
category_id: category&.id,
|
|
|
|
topic_id: topic&.id).to_s
|
2018-02-13 18:39:44 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "links to a topic/post" do
|
|
|
|
staff = Fabricate(:user)
|
|
|
|
Group[:staff].add(staff)
|
|
|
|
|
|
|
|
secured_category = Fabricate(:category)
|
|
|
|
secured_category.permissions = { staff: :full }
|
|
|
|
secured_category.save!
|
|
|
|
|
2018-02-20 13:49:39 -05:00
|
|
|
replier = Fabricate(:user)
|
|
|
|
|
2018-10-10 06:39:03 -04:00
|
|
|
public_post = Fabricate(:post, raw: "This post has an emoji :+1:")
|
|
|
|
public_topic = public_post.topic
|
|
|
|
public_reply = Fabricate(:post, topic: public_topic, post_number: 2, user: replier)
|
|
|
|
public_hidden = Fabricate(:post, topic: public_topic, post_number: 3, hidden: true)
|
|
|
|
public_moderator_action = Fabricate(:post, topic: public_topic, post_number: 4, user: staff, post_type: Post.types[:moderator_action])
|
2018-02-13 18:39:44 -05:00
|
|
|
|
|
|
|
user = public_post.user
|
|
|
|
public_category = public_topic.category
|
|
|
|
|
|
|
|
secured_topic = Fabricate(:topic, user: staff, category: secured_category)
|
|
|
|
secured_post = Fabricate(:post, user: staff, topic: secured_topic)
|
|
|
|
secured_reply = Fabricate(:post, user: staff, topic: secured_topic, post_number: 2)
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, user, public_category)).to include(public_topic.title)
|
2018-02-26 05:16:53 -05:00
|
|
|
onebox = preview(public_post.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_topic.title)
|
|
|
|
expect(onebox).to include("/images/emoji/")
|
2018-02-20 13:49:39 -05:00
|
|
|
|
|
|
|
onebox = preview(public_reply.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_reply.excerpt)
|
2018-02-26 10:05:35 -05:00
|
|
|
expect(onebox).to include(%{data-post="2"})
|
2021-11-25 07:07:34 -05:00
|
|
|
expect(onebox).to include(PrettyText.avatar_img(replier.avatar_template_url, "tiny"))
|
2018-02-20 13:49:39 -05:00
|
|
|
|
2020-10-09 07:51:24 -04:00
|
|
|
short_url = "#{Discourse.base_path}/t/#{public_topic.id}"
|
2020-06-23 11:18:38 -04:00
|
|
|
expect(preview(short_url, user, public_category)).to include(public_topic.title)
|
|
|
|
|
2018-10-10 06:39:03 -04:00
|
|
|
onebox = preview(public_moderator_action.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_moderator_action.excerpt)
|
|
|
|
expect(onebox).to include(%{data-post="4"})
|
2021-11-25 07:07:34 -05:00
|
|
|
expect(onebox).to include(PrettyText.avatar_img(staff.avatar_template_url, "tiny"))
|
2018-10-10 06:39:03 -04:00
|
|
|
|
2018-02-20 13:49:39 -05:00
|
|
|
onebox = preview(public_reply.url, user, public_category, public_topic)
|
|
|
|
expect(onebox).not_to include(public_topic.title)
|
2021-11-25 07:07:34 -05:00
|
|
|
expect(onebox).to include(replier.avatar_template_url.sub("{size}", "40"))
|
2018-02-20 13:49:39 -05:00
|
|
|
|
2018-02-13 18:39:44 -05:00
|
|
|
expect(preview(public_hidden.url, user, public_category)).to match_html(link(public_hidden.url))
|
|
|
|
expect(preview(secured_topic.relative_url, user, public_category)).to match_html(link(secured_topic.relative_url))
|
|
|
|
expect(preview(secured_post.url, user, public_category)).to match_html(link(secured_post.url))
|
|
|
|
expect(preview(secured_reply.url, user, public_category)).to match_html(link(secured_reply.url))
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, user, secured_category)).to match_html(link(public_topic.relative_url))
|
|
|
|
expect(preview(public_reply.url, user, secured_category)).to match_html(link(public_reply.url))
|
|
|
|
expect(preview(secured_post.url, user, secured_category)).to match_html(link(secured_post.url))
|
|
|
|
expect(preview(secured_reply.url, user, secured_category)).to match_html(link(secured_reply.url))
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, staff, secured_category)).to include(public_topic.title)
|
|
|
|
expect(preview(public_post.url, staff, secured_category)).to include(public_topic.title)
|
2018-02-19 16:40:14 -05:00
|
|
|
expect(preview(public_reply.url, staff, secured_category)).to include(public_reply.excerpt)
|
2018-02-13 18:39:44 -05:00
|
|
|
expect(preview(public_hidden.url, staff, secured_category)).to match_html(link(public_hidden.url))
|
|
|
|
expect(preview(secured_topic.relative_url, staff, secured_category)).to include(secured_topic.title)
|
|
|
|
expect(preview(secured_post.url, staff, secured_category)).to include(secured_topic.title)
|
2018-02-19 16:40:14 -05:00
|
|
|
expect(preview(secured_reply.url, staff, secured_category)).to include(secured_reply.excerpt)
|
|
|
|
expect(preview(secured_reply.url, staff, secured_category, secured_topic)).not_to include(secured_topic.title)
|
2018-02-13 18:39:44 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it "links to an user profile" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
2018-02-19 16:40:14 -05:00
|
|
|
expect(preview("/u/does-not-exist")).to match_html(link("/u/does-not-exist"))
|
|
|
|
expect(preview("/u/#{user.username}")).to include(user.name)
|
2018-02-13 18:39:44 -05:00
|
|
|
end
|
|
|
|
|
2019-03-25 03:20:14 -04:00
|
|
|
it "should respect enable_names site setting" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
SiteSetting.enable_names = true
|
|
|
|
expect(preview("/u/#{user.username}")).to include(user.name)
|
|
|
|
SiteSetting.enable_names = false
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include(user.name)
|
|
|
|
end
|
|
|
|
|
2018-02-13 18:39:44 -05:00
|
|
|
it "links to an upload" do
|
|
|
|
path = "/uploads/default/original/3X/e/8/e8fcfa624e4fb6623eea57f54941a58ba797f14d"
|
|
|
|
|
2018-02-19 16:40:14 -05:00
|
|
|
expect(preview("#{path}.pdf")).to match_html(link("#{path}.pdf"))
|
|
|
|
expect(preview("#{path}.MP3")).to include("<audio ")
|
|
|
|
expect(preview("#{path}.mov")).to include("<video ")
|
2018-02-13 18:39:44 -05:00
|
|
|
end
|
|
|
|
|
2019-09-17 16:12:50 -04:00
|
|
|
it "strips HTML from user profile location" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
profile = user.reload.user_profile
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include("<span class=\"location\">")
|
|
|
|
|
|
|
|
profile.update!(
|
|
|
|
location: "<img src=x onerror=alert(document.domain)>",
|
|
|
|
)
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).to include("<span class=\"location\">")
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include("<img src=x")
|
|
|
|
|
|
|
|
profile.update!(
|
|
|
|
location: "Thunderland",
|
|
|
|
)
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).to include("Thunderland")
|
|
|
|
end
|
2022-11-29 21:42:15 -05:00
|
|
|
|
|
|
|
it "includes hashtag HTML and icons" do
|
|
|
|
SiteSetting.enable_experimental_hashtag_autocomplete = true
|
|
|
|
category = Fabricate(:category, slug: "random")
|
|
|
|
Fabricate(:tag, name: "bug")
|
|
|
|
public_post = Fabricate(:post, raw: "This post has some hashtags, #random and #bug")
|
|
|
|
expect(preview(public_post.url).chomp).to include(<<~HTML.chomp)
|
|
|
|
<a class="hashtag-cooked" href="#{category.url}" data-type="category" data-slug="random"><svg class="fa d-icon d-icon-folder svg-icon svg-node"><use href="#folder"></use></svg>#{category.name}</a> and <a class="hashtag-cooked" href="/tag/bug" data-type="tag" data-slug="bug"><svg class="fa d-icon d-icon-tag svg-icon svg-node"><use href="#tag"></use></svg>bug</a>
|
|
|
|
HTML
|
|
|
|
end
|
2018-02-13 18:39:44 -05:00
|
|
|
end
|
|
|
|
|
2022-07-27 06:21:10 -04:00
|
|
|
describe ".onebox_raw" do
|
2018-03-15 10:27:55 -04:00
|
|
|
it "should escape the onebox URL before processing" do
|
|
|
|
post = Fabricate(:post, raw: Discourse.base_url + "/new?'class=black")
|
|
|
|
cpp = CookedPostProcessor.new(post, invalidate_oneboxes: true)
|
|
|
|
cpp.post_process_oneboxes
|
2018-04-11 15:33:45 -04:00
|
|
|
expect(cpp.html).to eq("<p><a href=\"#{Discourse.base_url}/new?%27class=black\">http://test.localhost/new?%27class=black</a></p>")
|
2018-03-15 10:27:55 -04:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 06:21:10 -04:00
|
|
|
describe ".external_onebox" do
|
2022-01-31 02:35:12 -05:00
|
|
|
html = <<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="Cats">
|
|
|
|
<meta property="og:description" content="Meow">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
2018-08-26 10:31:02 -04:00
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
context "with blacklisted domains" do
|
2022-01-31 02:35:12 -05:00
|
|
|
it "does not return a onebox if redirect uri final destination is in blacklist" do
|
|
|
|
SiteSetting.blocked_onebox_domains = "kitten.com"
|
2018-09-17 14:00:16 -04:00
|
|
|
|
2022-01-31 02:35:12 -05:00
|
|
|
stub_request(:get, "http://cat.com/meow").to_return(status: 301, body: "", headers: { "location" => "https://kitten.com" })
|
|
|
|
stub_request(:head, "http://cat.com/meow").to_return(status: 301, body: "", headers: { "location" => "https://kitten.com" })
|
|
|
|
|
|
|
|
stub_request(:get, "https://kitten.com").to_return(status: 200, body: html, headers: {})
|
|
|
|
stub_request(:head, "https://kitten.com").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
2022-03-11 01:18:12 -05:00
|
|
|
result = Oneboxer.external_onebox("http://cat.com/meow")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
|
|
|
|
|
|
|
result = Oneboxer.external_onebox("http://kitten.com")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
2022-01-31 02:35:12 -05:00
|
|
|
end
|
|
|
|
|
2022-03-11 01:18:12 -05:00
|
|
|
it "does not return onebox if anything in the redirect chain is blocked" do
|
2022-01-31 02:35:12 -05:00
|
|
|
SiteSetting.blocked_onebox_domains = "middle.com"
|
2020-02-06 10:32:42 -05:00
|
|
|
|
2022-01-31 02:35:12 -05:00
|
|
|
stub_request(:get, "https://cat.com/start").to_return(status: 301, body: "a", headers: { "location" => "https://middle.com/midway" })
|
|
|
|
stub_request(:head, "https://cat.com/start").to_return(status: 301, body: "a", headers: { "location" => "https://middle.com/midway" })
|
2021-06-02 21:39:12 -04:00
|
|
|
|
2022-01-31 02:35:12 -05:00
|
|
|
stub_request(:head, "https://middle.com/midway").to_return(status: 301, body: "b", headers: { "location" => "https://cat.com/end" })
|
|
|
|
|
|
|
|
stub_request(:get, "https://cat.com/end").to_return(status: 200, body: html)
|
|
|
|
stub_request(:head, "https://cat.com/end").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
2022-03-11 01:18:12 -05:00
|
|
|
result = Oneboxer.external_onebox("https://cat.com/start")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not return onebox if the Discourse-No-Onebox header == 1" do
|
|
|
|
stub_request(:get, "https://website.com/discourse-no-onebox")
|
|
|
|
.to_return(status: 200, body: "abc", headers: { "Discourse-No-Onebox" => "1" })
|
|
|
|
stub_request(:head, "https://website.com/discourse-no-onebox")
|
|
|
|
.to_return(status: 200, body: "", headers: { "Discourse-No-Onebox" => "1" })
|
|
|
|
|
|
|
|
result = Oneboxer.external_onebox("https://website.com/discourse-no-onebox")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
|
|
|
end
|
|
|
|
|
|
|
|
it "does not return onebox if the Discourse-No-Onebox header == 1 anywhere in the redirect chain" do
|
|
|
|
stub_request(:get, "https://website.com/redirect-no-onebox")
|
|
|
|
.to_return(status: 301, body: "", headers: { "Discourse-No-Onebox" => "1", "location" => "https://willneverreach.com" })
|
|
|
|
stub_request(:head, "https://website.com/redirect-no-onebox")
|
|
|
|
.to_return(status: 301, body: "", headers: { "Discourse-No-Onebox" => "1", "location" => "https://willneverreach.com" })
|
|
|
|
|
|
|
|
result = Oneboxer.external_onebox("https://website.com/redirect-no-onebox")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
|
|
|
|
|
|
|
stub_request(:get, "https://website.com/redirect")
|
|
|
|
.to_return(status: 301, body: "", headers: { "location" => "https://website.com/redirect/dont-onebox" })
|
|
|
|
stub_request(:head, "https://website.com/redirect")
|
|
|
|
.to_return(status: 301, body: "", headers: { "location" => "https://website.com/redirect/dont-onebox" })
|
|
|
|
stub_request(:get, "https://website.com/redirect/dont-onebox")
|
|
|
|
.to_return(status: 301, body: "", headers: { "Discourse-No-Onebox" => "1", "location" => "https://wontreachme.com" })
|
|
|
|
stub_request(:head, "https://website.com/redirect/dont-onebox")
|
|
|
|
.to_return(status: 301, body: "", headers: { "Discourse-No-Onebox" => "1", "location" => "https://wontreachme.com" })
|
|
|
|
|
|
|
|
result = Oneboxer.external_onebox("https://website.com/redirect")
|
|
|
|
expect(result[:onebox]).to be_empty
|
|
|
|
expect(result[:preview]).to be_empty
|
2022-01-31 02:35:12 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-05-23 06:52:06 -04:00
|
|
|
context "when block_onebox_on_redirect setting is enabled" do
|
|
|
|
before do
|
|
|
|
Discourse.cache.clear
|
|
|
|
SiteSetting.block_onebox_on_redirect = true
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
FinalDestination.clear_https_cache!("redirects2.com")
|
|
|
|
FinalDestination.clear_https_cache!("redirects3.com")
|
|
|
|
FinalDestination.clear_https_cache!("redirects4.com")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't return onebox if the URL redirects" do
|
|
|
|
stub_request(:head, "https://redirects2.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects2.com/real-full-onebox" }
|
|
|
|
)
|
|
|
|
stub_request(:get, "https://redirects2.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects2.com/real-full-onebox" }
|
|
|
|
)
|
|
|
|
result = Oneboxer.external_onebox("https://redirects2.com/full-onebox")
|
|
|
|
expect(result[:onebox]).to be_blank
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows an initial http -> https redirect if the redirect URL is identical to the original" do
|
|
|
|
stub_request(:get, "http://redirects3.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects3.com/full-onebox" }
|
|
|
|
)
|
|
|
|
stub_request(:head, "http://redirects3.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects3.com/full-onebox" }
|
|
|
|
)
|
|
|
|
|
|
|
|
stub_request(:get, "https://redirects3.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 200,
|
|
|
|
body: html
|
|
|
|
)
|
|
|
|
stub_request(:head, "https://redirects3.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 200,
|
|
|
|
body: "",
|
|
|
|
)
|
|
|
|
result = Oneboxer.external_onebox("http://redirects3.com/full-onebox")
|
|
|
|
onebox = result[:onebox]
|
|
|
|
expect(onebox).to include("https://redirects3.com/full-onebox")
|
|
|
|
expect(onebox).to include("Cats")
|
|
|
|
expect(onebox).to include("Meow")
|
|
|
|
end
|
|
|
|
|
|
|
|
it "doesn't allow an initial http -> https redirect if the redirect URL is different to the original" do
|
|
|
|
stub_request(:get, "http://redirects4.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects4.com/full-onebox/2" }
|
|
|
|
)
|
|
|
|
stub_request(:head, "http://redirects4.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects4.com/full-onebox/2" }
|
|
|
|
)
|
|
|
|
|
|
|
|
stub_request(:get, "https://redirects4.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects4.com/full-onebox/2" }
|
|
|
|
)
|
|
|
|
stub_request(:head, "https://redirects4.com/full-onebox")
|
|
|
|
.to_return(
|
|
|
|
status: 301,
|
|
|
|
body: "",
|
|
|
|
headers: { "location" => "https://redirects4.com/full-onebox/2" }
|
|
|
|
)
|
|
|
|
result = Oneboxer.external_onebox("http://redirects4.com/full-onebox")
|
|
|
|
expect(result[:onebox]).to be_blank
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-01-31 02:35:12 -05:00
|
|
|
it "censors external oneboxes" do
|
|
|
|
Fabricate(:watched_word, action: WatchedWord.actions[:censor], word: "bad word")
|
|
|
|
|
|
|
|
url = 'https://example.com/'
|
|
|
|
stub_request(:any, url).to_return(status: 200, body: <<~HTML, headers: {})
|
2021-06-02 21:39:12 -04:00
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="title with bad word">
|
|
|
|
<meta property="og:description" content="description with bad word">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>content with bad word</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
2022-01-31 02:35:12 -05:00
|
|
|
HTML
|
2021-06-02 21:39:12 -04:00
|
|
|
|
2022-01-31 02:35:12 -05:00
|
|
|
onebox = Oneboxer.external_onebox(url)
|
|
|
|
expect(onebox[:onebox]).to include('title with')
|
|
|
|
expect(onebox[:onebox]).not_to include('bad word')
|
|
|
|
expect(onebox[:preview]).to include('title with')
|
|
|
|
expect(onebox[:preview]).not_to include('bad word')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns onebox" do
|
|
|
|
SiteSetting.blocked_onebox_domains = "not.me"
|
|
|
|
|
|
|
|
stub_request(:get, "https://its.me").to_return(status: 200, body: html)
|
|
|
|
stub_request(:head, "https://its.me").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.external_onebox("https://its.me")[:onebox]).to be_present
|
|
|
|
end
|
2021-06-02 21:39:12 -04:00
|
|
|
end
|
|
|
|
|
2020-02-06 10:32:42 -05:00
|
|
|
it "uses the Onebox custom user agent on specified hosts" do
|
2020-02-06 11:56:54 -05:00
|
|
|
SiteSetting.force_custom_user_agent_hosts = "http://codepen.io|https://video.discourse.org/"
|
2020-02-06 10:32:42 -05:00
|
|
|
url = 'https://video.discourse.org/presentation.mp4'
|
|
|
|
|
|
|
|
stub_request(:head, url).to_return(status: 403, body: "", headers: {})
|
|
|
|
stub_request(:get, url).to_return(status: 403, body: "", headers: {})
|
|
|
|
stub_request(:head, url).with(headers: { "User-Agent" => Onebox.options.user_agent }).to_return(status: 200, body: "", headers: {})
|
|
|
|
stub_request(:get, url).with(headers: { "User-Agent" => Onebox.options.user_agent }).to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to be_present
|
|
|
|
end
|
2020-08-27 15:12:13 -04:00
|
|
|
|
|
|
|
context "with youtube stub" do
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
2022-06-08 01:42:37 -04:00
|
|
|
<meta property="og:title" content="Onebox1 - ceci n'est pas un titre">
|
2020-08-27 15:12:13 -04:00
|
|
|
<meta property="og:description" content="this is bodycontent">
|
2020-11-18 12:55:16 -05:00
|
|
|
<meta property="og:image" content="https://i.ytimg.com/vi/dQw4w9WgXcQ/maxresdefault.jpg">
|
2020-08-27 15:12:13 -04:00
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:any, "https://www.youtube.com/watch?v=dQw4w9WgXcQ").to_return(status: 200, body: html)
|
2021-04-07 13:32:27 -04:00
|
|
|
stub_request(:any, "https://www.youtube.com/embed/dQw4w9WgXcQ").to_return(status: 403, body: nil)
|
2020-08-27 15:12:13 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows restricting engines based on the allowed_onebox_iframes setting" do
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
|
|
|
expect(output).to include("<iframe") # Regular youtube onebox
|
|
|
|
|
|
|
|
# Disable all onebox iframes:
|
|
|
|
SiteSetting.allowed_onebox_iframes = ""
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
2020-11-18 12:55:16 -05:00
|
|
|
|
2020-08-27 15:12:13 -04:00
|
|
|
expect(output).not_to include("<iframe") # Generic onebox
|
|
|
|
expect(output).to include("allowlistedgeneric")
|
|
|
|
|
|
|
|
# Just enable youtube:
|
|
|
|
SiteSetting.allowed_onebox_iframes = "https://www.youtube.com"
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
|
|
|
expect(output).to include("<iframe") # Regular youtube onebox
|
|
|
|
end
|
2022-06-08 01:42:37 -04:00
|
|
|
|
|
|
|
it "appropriately escapes youtube titles" do
|
|
|
|
preview = Oneboxer.preview("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
|
|
|
expect(preview).to include("ceci n'est pas un titre")
|
|
|
|
end
|
2020-08-27 15:12:13 -04:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows iframes from generic sites via the allowed_iframes setting" do
|
|
|
|
allowlisted_body = '<html><head><link rel="alternate" type="application/json+oembed" href="https://allowlist.ed/iframes.json" />'
|
|
|
|
blocklisted_body = '<html><head><link rel="alternate" type="application/json+oembed" href="https://blocklist.ed/iframes.json" />'
|
|
|
|
|
|
|
|
allowlisted_oembed = {
|
|
|
|
type: "rich",
|
|
|
|
height: "100",
|
|
|
|
html: "<iframe src='https://ifram.es/foo/bar'></iframe>"
|
|
|
|
}
|
|
|
|
|
|
|
|
blocklisted_oembed = {
|
|
|
|
type: "rich",
|
|
|
|
height: "100",
|
|
|
|
html: "<iframe src='https://malicious/discourse.org/'></iframe>"
|
|
|
|
}
|
|
|
|
|
|
|
|
stub_request(:any, "https://blocklist.ed/iframes").to_return(status: 200, body: blocklisted_body)
|
|
|
|
stub_request(:any, "https://blocklist.ed/iframes.json").to_return(status: 200, body: blocklisted_oembed.to_json)
|
|
|
|
|
|
|
|
stub_request(:any, "https://allowlist.ed/iframes").to_return(status: 200, body: allowlisted_body)
|
|
|
|
stub_request(:any, "https://allowlist.ed/iframes.json").to_return(status: 200, body: allowlisted_oembed.to_json)
|
|
|
|
|
|
|
|
SiteSetting.allowed_iframes = "discourse.org|https://ifram.es"
|
|
|
|
|
|
|
|
expect(Oneboxer.onebox("https://blocklist.ed/iframes", invalidate_oneboxes: true)).to be_empty
|
|
|
|
expect(Oneboxer.onebox("https://allowlist.ed/iframes", invalidate_oneboxes: true)).to match("iframe src")
|
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
describe 'missing attributes' do
|
2020-11-18 12:55:16 -05:00
|
|
|
before do
|
|
|
|
stub_request(:head, url)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:url) { "https://example.com/fake-url/" }
|
|
|
|
|
|
|
|
it 'handles a missing description' do
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_description"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("could not be found: description")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles a missing description and image' do
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_description_and_image"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("could not be found: description, image")
|
|
|
|
end
|
|
|
|
|
FIX: Don’t display error if only error is a missing image (#12216)
`Onebox.preview` can return 0-to-n errors, where the errors are missing OpenGraph attributes (e.g. title, description, image, etc.). If any of these attributes are missing, we construct an error message and attach it to the Oneboxer preview HTML. The error message is something like:
“Sorry, we were unable to generate a preview for this web page, because the following oEmbed / OpenGraph tags could not be found: description, image”
However, if the only missing tag is `image` we don’t need to display the error, as we have enough other data (title, description, etc.) to construct a useful/complete Onebox.
2021-02-25 14:30:40 -05:00
|
|
|
it 'handles a missing image' do
|
|
|
|
# Note: If the only error is a missing image, we shouldn't return an error
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_image"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).not_to include("could not be found")
|
|
|
|
end
|
|
|
|
|
2020-11-18 12:55:16 -05:00
|
|
|
it 'video with missing description returns a placeholder' do
|
|
|
|
stub_request(:get, url).to_return(body: response("video_missing_description"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("onebox-placeholder-container")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
describe 'instagram' do
|
2020-11-18 12:55:16 -05:00
|
|
|
it 'providing a token should attempt to use new endpoint' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
access_token = 'abc123'
|
|
|
|
|
|
|
|
SiteSetting.facebook_app_access_token = access_token
|
|
|
|
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://graph.facebook.com/v9.0/instagram_oembed?url=#{url}&access_token=#{access_token}").to_return(body: response("instagram_new"))
|
|
|
|
|
2021-11-02 14:34:51 -04:00
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include('placeholder-icon image')
|
2020-11-18 12:55:16 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'unconfigured token should attempt to use old endpoint' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://api.instagram.com/oembed/?url=#{url}").to_return(body: response("instagram_old"))
|
|
|
|
|
2021-11-02 14:34:51 -04:00
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include('placeholder-icon image')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'renders result using an iframe' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://api.instagram.com/oembed/?url=#{url}").to_return(body: response("instagram_old"))
|
|
|
|
|
|
|
|
expect(Oneboxer.onebox(url, invalidate_oneboxes: true)).to include('iframe')
|
2020-11-18 12:55:16 -05:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-08-17 11:32:48 -04:00
|
|
|
describe 'Twitter' do
|
|
|
|
let(:url) { 'https://twitter.com/discourse/status/1428031057186627589' }
|
|
|
|
|
|
|
|
before do
|
|
|
|
SiteSetting.twitter_consumer_key = 'twitter_consumer_key'
|
|
|
|
SiteSetting.twitter_consumer_secret = 'twitter_consumer_secret'
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'works with rate limit' do
|
|
|
|
stub_request(:head, "https://twitter.com/discourse/status/1428031057186627589")
|
|
|
|
.to_return(status: 200, body: "", headers: {})
|
|
|
|
|
2022-08-20 05:19:19 -04:00
|
|
|
stub_request(:get, "https://api.twitter.com/1.1/statuses/show.json?id=1428031057186627589&tweet_mode=extended")
|
|
|
|
.to_return(status: 429, body: "{}", headers: {})
|
2022-08-17 11:32:48 -04:00
|
|
|
|
|
|
|
stub_request(:post, "https://api.twitter.com/oauth2/token")
|
2022-08-20 05:19:19 -04:00
|
|
|
.to_return(status: 200, body: "{\"access_token\":\"token\"}", headers: {})
|
2022-08-17 11:32:48 -04:00
|
|
|
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to eq('')
|
|
|
|
expect(Oneboxer.onebox(url, invalidate_oneboxes: true)).to eq('')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-12-14 10:49:37 -05:00
|
|
|
describe '#apply' do
|
|
|
|
it 'generates valid HTML' do
|
|
|
|
raw = "Before Onebox\nhttps://example.com\nAfter Onebox"
|
|
|
|
cooked = Oneboxer.apply(PrettyText.cook(raw)) { '<div>onebox</div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Before Onebox</p>
|
|
|
|
<div>onebox</div>
|
|
|
|
<p>After Onebox</p>
|
|
|
|
HTML
|
|
|
|
|
|
|
|
raw = "Before Onebox\nhttps://example.com\nhttps://example.com\nAfter Onebox"
|
|
|
|
cooked = Oneboxer.apply(PrettyText.cook(raw)) { '<div>onebox</div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Before Onebox</p>
|
|
|
|
<div>onebox</div>
|
|
|
|
<div>onebox</div>
|
|
|
|
<p>After Onebox</p>
|
|
|
|
HTML
|
|
|
|
end
|
2021-04-14 11:09:55 -04:00
|
|
|
|
|
|
|
it 'does keeps SVGs valid' do
|
|
|
|
raw = "Onebox\n\nhttps://example.com"
|
|
|
|
cooked = PrettyText.cook(raw)
|
|
|
|
cooked = Oneboxer.apply(Loofah.fragment(cooked)) { '<div><svg><path></path></svg></div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Onebox</p>
|
|
|
|
<div><svg><path></path></svg></div>
|
|
|
|
HTML
|
|
|
|
end
|
2020-12-14 10:49:37 -05:00
|
|
|
end
|
|
|
|
|
2021-03-10 14:42:17 -05:00
|
|
|
describe '#force_get_hosts' do
|
2021-03-31 13:19:34 -04:00
|
|
|
before do
|
|
|
|
SiteSetting.cache_onebox_response_body_domains = "example.net|example.com|example.org"
|
|
|
|
end
|
|
|
|
|
2021-03-10 14:42:17 -05:00
|
|
|
it "includes Amazon sites" do
|
|
|
|
expect(Oneboxer.force_get_hosts).to include('https://www.amazon.ca')
|
|
|
|
end
|
2021-03-31 13:19:34 -04:00
|
|
|
|
|
|
|
it "includes cache_onebox_response_body_domains" do
|
|
|
|
expect(Oneboxer.force_get_hosts).to include('https://www.example.com')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
describe 'strategies' do
|
2021-05-13 15:48:35 -04:00
|
|
|
it "has a 'default' strategy" do
|
|
|
|
expect(Oneboxer.strategies.keys.first).to eq(:default)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "has a strategy with overrides" do
|
|
|
|
strategy = Oneboxer.strategies.keys[1]
|
|
|
|
expect(Oneboxer.strategies[strategy].keys).not_to eq([])
|
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
context "when using a non-default strategy" do
|
2021-05-13 15:48:35 -04:00
|
|
|
let(:hostname) { "my.interesting.site" }
|
|
|
|
let(:url) { "https://#{hostname}/cool/content" }
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="Page Title">
|
|
|
|
<meta property="og:description" content="Here is some cool content">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:head, url).to_return(status: 509)
|
|
|
|
stub_request(:get, url).to_return(status: 200, body: html)
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
Oneboxer.clear_preferred_strategy!(hostname)
|
|
|
|
end
|
|
|
|
|
2021-05-14 15:23:20 -04:00
|
|
|
it "uses multiple strategies" do
|
2021-05-13 15:48:35 -04:00
|
|
|
default_ordered = Oneboxer.strategies.keys
|
|
|
|
custom_ordered = Oneboxer.ordered_strategies(hostname)
|
|
|
|
expect(custom_ordered).to eq(default_ordered)
|
|
|
|
|
|
|
|
expect(Oneboxer.preferred_strategy(hostname)).to eq(nil)
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("Here is some cool content")
|
|
|
|
|
|
|
|
custom_ordered = Oneboxer.ordered_strategies(hostname)
|
|
|
|
|
|
|
|
expect(custom_ordered.count).to eq(default_ordered.count)
|
|
|
|
expect(custom_ordered).not_to eq(default_ordered)
|
|
|
|
|
|
|
|
expect(Oneboxer.preferred_strategy(hostname)).not_to eq(:default)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-03-31 13:19:34 -04:00
|
|
|
describe 'cache_onebox_response_body' do
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<body>
|
|
|
|
<p>cache me if you can</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:url) { "https://www.example.com/my/great/content" }
|
|
|
|
let(:url2) { "https://www.example2.com/my/great/content" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:any, url).to_return(status: 200, body: html)
|
|
|
|
stub_request(:any, url2).to_return(status: 200, body: html)
|
|
|
|
|
|
|
|
SiteSetting.cache_onebox_response_body = true
|
|
|
|
SiteSetting.cache_onebox_response_body_domains = "example.net|example.com|example.org"
|
|
|
|
end
|
|
|
|
|
|
|
|
it "caches when domain matches" do
|
|
|
|
preview = Oneboxer.preview(url, invalidate_oneboxes: true)
|
|
|
|
expect(Oneboxer.cached_response_body_exists?(url)).to eq(true)
|
|
|
|
expect(Oneboxer.fetch_cached_response_body(url)).to eq(html)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "ignores cache when domain not present" do
|
|
|
|
preview = Oneboxer.preview(url2, invalidate_oneboxes: true)
|
|
|
|
expect(Oneboxer.cached_response_body_exists?(url2)).to eq(false)
|
|
|
|
end
|
2021-03-10 14:42:17 -05:00
|
|
|
end
|
|
|
|
|
2022-07-27 12:14:14 -04:00
|
|
|
describe "register_local_handler" do
|
2022-05-23 13:02:02 -04:00
|
|
|
it "calls registered local handler" do
|
|
|
|
Oneboxer.register_local_handler('wizard') do |url, route|
|
|
|
|
'Custom Onebox for Wizard'
|
|
|
|
end
|
|
|
|
|
|
|
|
url = "#{Discourse.base_url}/wizard"
|
|
|
|
expect(Oneboxer.preview(url)).to eq('Custom Onebox for Wizard')
|
|
|
|
end
|
|
|
|
end
|
2014-05-28 03:15:10 -04:00
|
|
|
end
|