2019-04-30 08:27:42 +08:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2015-10-11 17:41:23 +08:00
|
|
|
require 'rails_helper'
|
2014-05-28 15:15:10 +08:00
|
|
|
|
|
|
|
describe Oneboxer do
|
2020-11-19 01:55:16 +08:00
|
|
|
def response(file)
|
|
|
|
file = File.join("spec", "fixtures", "onebox", "#{file}.response")
|
2022-01-06 01:45:08 +08:00
|
|
|
File.exist?(file) ? File.read(file) : ""
|
2020-11-19 01:55:16 +08:00
|
|
|
end
|
|
|
|
|
2014-05-28 15:15:10 +08:00
|
|
|
it "returns blank string for an invalid onebox" do
|
2018-02-24 19:35:57 +08:00
|
|
|
stub_request(:head, "http://boom.com")
|
2017-04-15 12:11:02 +08:00
|
|
|
stub_request(:get, "http://boom.com").to_return(body: "")
|
|
|
|
|
2020-11-19 01:55:16 +08:00
|
|
|
expect(Oneboxer.preview("http://boom.com", invalidate_oneboxes: true)).to include("Sorry, we were unable to generate a preview for this web page")
|
2015-01-10 00:34:37 +08:00
|
|
|
expect(Oneboxer.onebox("http://boom.com")).to eq("")
|
2014-05-28 15:15:10 +08:00
|
|
|
end
|
2016-10-24 18:46:22 +08:00
|
|
|
|
2019-11-28 05:48:29 +08:00
|
|
|
describe "#invalidate" do
|
|
|
|
let(:url) { "http://test.com" }
|
|
|
|
it "clears the cached preview for the onebox URL and the failed URL cache" do
|
|
|
|
Discourse.cache.write(Oneboxer.onebox_cache_key(url), "test")
|
|
|
|
Discourse.cache.write(Oneboxer.onebox_failed_cache_key(url), true)
|
|
|
|
Oneboxer.invalidate(url)
|
|
|
|
expect(Discourse.cache.read(Oneboxer.onebox_cache_key(url))).to eq(nil)
|
|
|
|
expect(Discourse.cache.read(Oneboxer.onebox_failed_cache_key(url))).to eq(nil)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-02-14 07:39:44 +08:00
|
|
|
context "local oneboxes" do
|
|
|
|
|
|
|
|
def link(url)
|
|
|
|
url = "#{Discourse.base_url}#{url}"
|
|
|
|
%{<a href="#{url}">#{url}</a>}
|
|
|
|
end
|
|
|
|
|
2018-02-20 05:40:14 +08:00
|
|
|
def preview(url, user = nil, category = nil, topic = nil)
|
|
|
|
Oneboxer.preview("#{Discourse.base_url}#{url}",
|
|
|
|
user_id: user&.id,
|
|
|
|
category_id: category&.id,
|
|
|
|
topic_id: topic&.id).to_s
|
2018-02-14 07:39:44 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "links to a topic/post" do
|
|
|
|
staff = Fabricate(:user)
|
|
|
|
Group[:staff].add(staff)
|
|
|
|
|
|
|
|
secured_category = Fabricate(:category)
|
|
|
|
secured_category.permissions = { staff: :full }
|
|
|
|
secured_category.save!
|
|
|
|
|
2018-02-21 02:49:39 +08:00
|
|
|
replier = Fabricate(:user)
|
|
|
|
|
2018-10-10 18:39:03 +08:00
|
|
|
public_post = Fabricate(:post, raw: "This post has an emoji :+1:")
|
|
|
|
public_topic = public_post.topic
|
|
|
|
public_reply = Fabricate(:post, topic: public_topic, post_number: 2, user: replier)
|
|
|
|
public_hidden = Fabricate(:post, topic: public_topic, post_number: 3, hidden: true)
|
|
|
|
public_moderator_action = Fabricate(:post, topic: public_topic, post_number: 4, user: staff, post_type: Post.types[:moderator_action])
|
2018-02-14 07:39:44 +08:00
|
|
|
|
|
|
|
user = public_post.user
|
|
|
|
public_category = public_topic.category
|
|
|
|
|
|
|
|
secured_topic = Fabricate(:topic, user: staff, category: secured_category)
|
|
|
|
secured_post = Fabricate(:post, user: staff, topic: secured_topic)
|
|
|
|
secured_reply = Fabricate(:post, user: staff, topic: secured_topic, post_number: 2)
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, user, public_category)).to include(public_topic.title)
|
2018-02-26 18:16:53 +08:00
|
|
|
onebox = preview(public_post.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_topic.title)
|
|
|
|
expect(onebox).to include("/images/emoji/")
|
2018-02-21 02:49:39 +08:00
|
|
|
|
|
|
|
onebox = preview(public_reply.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_reply.excerpt)
|
2018-02-26 23:05:35 +08:00
|
|
|
expect(onebox).to include(%{data-post="2"})
|
2021-11-25 20:07:34 +08:00
|
|
|
expect(onebox).to include(PrettyText.avatar_img(replier.avatar_template_url, "tiny"))
|
2018-02-21 02:49:39 +08:00
|
|
|
|
2020-10-09 19:51:24 +08:00
|
|
|
short_url = "#{Discourse.base_path}/t/#{public_topic.id}"
|
2020-06-23 23:18:38 +08:00
|
|
|
expect(preview(short_url, user, public_category)).to include(public_topic.title)
|
|
|
|
|
2018-10-10 18:39:03 +08:00
|
|
|
onebox = preview(public_moderator_action.url, user, public_category)
|
|
|
|
expect(onebox).to include(public_moderator_action.excerpt)
|
|
|
|
expect(onebox).to include(%{data-post="4"})
|
2021-11-25 20:07:34 +08:00
|
|
|
expect(onebox).to include(PrettyText.avatar_img(staff.avatar_template_url, "tiny"))
|
2018-10-10 18:39:03 +08:00
|
|
|
|
2018-02-21 02:49:39 +08:00
|
|
|
onebox = preview(public_reply.url, user, public_category, public_topic)
|
|
|
|
expect(onebox).not_to include(public_topic.title)
|
2021-11-25 20:07:34 +08:00
|
|
|
expect(onebox).to include(replier.avatar_template_url.sub("{size}", "40"))
|
2018-02-21 02:49:39 +08:00
|
|
|
|
2018-02-14 07:39:44 +08:00
|
|
|
expect(preview(public_hidden.url, user, public_category)).to match_html(link(public_hidden.url))
|
|
|
|
expect(preview(secured_topic.relative_url, user, public_category)).to match_html(link(secured_topic.relative_url))
|
|
|
|
expect(preview(secured_post.url, user, public_category)).to match_html(link(secured_post.url))
|
|
|
|
expect(preview(secured_reply.url, user, public_category)).to match_html(link(secured_reply.url))
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, user, secured_category)).to match_html(link(public_topic.relative_url))
|
|
|
|
expect(preview(public_reply.url, user, secured_category)).to match_html(link(public_reply.url))
|
|
|
|
expect(preview(secured_post.url, user, secured_category)).to match_html(link(secured_post.url))
|
|
|
|
expect(preview(secured_reply.url, user, secured_category)).to match_html(link(secured_reply.url))
|
|
|
|
|
|
|
|
expect(preview(public_topic.relative_url, staff, secured_category)).to include(public_topic.title)
|
|
|
|
expect(preview(public_post.url, staff, secured_category)).to include(public_topic.title)
|
2018-02-20 05:40:14 +08:00
|
|
|
expect(preview(public_reply.url, staff, secured_category)).to include(public_reply.excerpt)
|
2018-02-14 07:39:44 +08:00
|
|
|
expect(preview(public_hidden.url, staff, secured_category)).to match_html(link(public_hidden.url))
|
|
|
|
expect(preview(secured_topic.relative_url, staff, secured_category)).to include(secured_topic.title)
|
|
|
|
expect(preview(secured_post.url, staff, secured_category)).to include(secured_topic.title)
|
2018-02-20 05:40:14 +08:00
|
|
|
expect(preview(secured_reply.url, staff, secured_category)).to include(secured_reply.excerpt)
|
|
|
|
expect(preview(secured_reply.url, staff, secured_category, secured_topic)).not_to include(secured_topic.title)
|
2018-02-14 07:39:44 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "links to an user profile" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
2018-02-20 05:40:14 +08:00
|
|
|
expect(preview("/u/does-not-exist")).to match_html(link("/u/does-not-exist"))
|
|
|
|
expect(preview("/u/#{user.username}")).to include(user.name)
|
2018-02-14 07:39:44 +08:00
|
|
|
end
|
|
|
|
|
2019-03-25 15:20:14 +08:00
|
|
|
it "should respect enable_names site setting" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
|
|
|
|
SiteSetting.enable_names = true
|
|
|
|
expect(preview("/u/#{user.username}")).to include(user.name)
|
|
|
|
SiteSetting.enable_names = false
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include(user.name)
|
|
|
|
end
|
|
|
|
|
2018-02-14 07:39:44 +08:00
|
|
|
it "links to an upload" do
|
|
|
|
path = "/uploads/default/original/3X/e/8/e8fcfa624e4fb6623eea57f54941a58ba797f14d"
|
|
|
|
|
2018-02-20 05:40:14 +08:00
|
|
|
expect(preview("#{path}.pdf")).to match_html(link("#{path}.pdf"))
|
|
|
|
expect(preview("#{path}.MP3")).to include("<audio ")
|
|
|
|
expect(preview("#{path}.mov")).to include("<video ")
|
2018-02-14 07:39:44 +08:00
|
|
|
end
|
|
|
|
|
2019-09-18 04:12:50 +08:00
|
|
|
it "strips HTML from user profile location" do
|
|
|
|
user = Fabricate(:user)
|
|
|
|
profile = user.reload.user_profile
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include("<span class=\"location\">")
|
|
|
|
|
|
|
|
profile.update!(
|
|
|
|
location: "<img src=x onerror=alert(document.domain)>",
|
|
|
|
)
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).to include("<span class=\"location\">")
|
|
|
|
expect(preview("/u/#{user.username}")).not_to include("<img src=x")
|
|
|
|
|
|
|
|
profile.update!(
|
|
|
|
location: "Thunderland",
|
|
|
|
)
|
|
|
|
|
|
|
|
expect(preview("/u/#{user.username}")).to include("Thunderland")
|
|
|
|
end
|
2018-02-14 07:39:44 +08:00
|
|
|
end
|
|
|
|
|
2018-03-15 22:27:55 +08:00
|
|
|
context ".onebox_raw" do
|
|
|
|
it "should escape the onebox URL before processing" do
|
|
|
|
post = Fabricate(:post, raw: Discourse.base_url + "/new?'class=black")
|
|
|
|
cpp = CookedPostProcessor.new(post, invalidate_oneboxes: true)
|
|
|
|
cpp.post_process_oneboxes
|
2018-04-12 03:33:45 +08:00
|
|
|
expect(cpp.html).to eq("<p><a href=\"#{Discourse.base_url}/new?%27class=black\">http://test.localhost/new?%27class=black</a></p>")
|
2018-03-15 22:27:55 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
context ".external_onebox" do
|
|
|
|
html = <<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="Cats">
|
|
|
|
<meta property="og:description" content="Meow">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
2018-08-26 22:31:02 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
context "blacklisted domains" do
|
2018-08-26 22:31:02 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
it "does not return a onebox if redirect uri final destination is in blacklist" do
|
|
|
|
SiteSetting.blocked_onebox_domains = "kitten.com"
|
2018-09-18 02:00:16 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
stub_request(:get, "http://cat.com/meow").to_return(status: 301, body: "", headers: { "location" => "https://kitten.com" })
|
|
|
|
stub_request(:head, "http://cat.com/meow").to_return(status: 301, body: "", headers: { "location" => "https://kitten.com" })
|
|
|
|
|
|
|
|
stub_request(:get, "https://kitten.com").to_return(status: 200, body: html, headers: {})
|
|
|
|
stub_request(:head, "https://kitten.com").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.external_onebox("http://cat.com/meow")[:onebox]).to be_empty
|
|
|
|
expect(Oneboxer.external_onebox("https://kitten.com")[:onebox]).to be_empty
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns onebox if 'midway redirect' is blocked but final redirect uri is not blocked" do
|
|
|
|
SiteSetting.blocked_onebox_domains = "middle.com"
|
2020-02-06 23:32:42 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
stub_request(:get, "https://cat.com/start").to_return(status: 301, body: "a", headers: { "location" => "https://middle.com/midway" })
|
|
|
|
stub_request(:head, "https://cat.com/start").to_return(status: 301, body: "a", headers: { "location" => "https://middle.com/midway" })
|
2021-06-03 09:39:12 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
stub_request(:head, "https://middle.com/midway").to_return(status: 301, body: "b", headers: { "location" => "https://cat.com/end" })
|
|
|
|
|
|
|
|
stub_request(:get, "https://cat.com/end").to_return(status: 200, body: html)
|
|
|
|
stub_request(:head, "https://cat.com/end").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.external_onebox("https://cat.com/start")[:onebox]).to be_present
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "censors external oneboxes" do
|
|
|
|
Fabricate(:watched_word, action: WatchedWord.actions[:censor], word: "bad word")
|
|
|
|
|
|
|
|
url = 'https://example.com/'
|
|
|
|
stub_request(:any, url).to_return(status: 200, body: <<~HTML, headers: {})
|
2021-06-03 09:39:12 +08:00
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="title with bad word">
|
|
|
|
<meta property="og:description" content="description with bad word">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>content with bad word</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
2022-02-03 09:42:06 +08:00
|
|
|
HTML
|
2021-06-03 09:39:12 +08:00
|
|
|
|
2022-02-03 09:42:06 +08:00
|
|
|
onebox = Oneboxer.external_onebox(url)
|
|
|
|
expect(onebox[:onebox]).to include('title with')
|
|
|
|
expect(onebox[:onebox]).not_to include('bad word')
|
|
|
|
expect(onebox[:preview]).to include('title with')
|
|
|
|
expect(onebox[:preview]).not_to include('bad word')
|
|
|
|
end
|
|
|
|
|
|
|
|
it "returns onebox" do
|
|
|
|
SiteSetting.blocked_onebox_domains = "not.me"
|
|
|
|
|
|
|
|
stub_request(:get, "https://its.me").to_return(status: 200, body: html)
|
|
|
|
stub_request(:head, "https://its.me").to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.external_onebox("https://its.me")[:onebox]).to be_present
|
|
|
|
end
|
2021-06-03 09:39:12 +08:00
|
|
|
end
|
|
|
|
|
2020-02-06 23:32:42 +08:00
|
|
|
it "uses the Onebox custom user agent on specified hosts" do
|
2020-02-07 00:56:54 +08:00
|
|
|
SiteSetting.force_custom_user_agent_hosts = "http://codepen.io|https://video.discourse.org/"
|
2020-02-06 23:32:42 +08:00
|
|
|
url = 'https://video.discourse.org/presentation.mp4'
|
|
|
|
|
|
|
|
stub_request(:head, url).to_return(status: 403, body: "", headers: {})
|
|
|
|
stub_request(:get, url).to_return(status: 403, body: "", headers: {})
|
|
|
|
stub_request(:head, url).with(headers: { "User-Agent" => Onebox.options.user_agent }).to_return(status: 200, body: "", headers: {})
|
|
|
|
stub_request(:get, url).with(headers: { "User-Agent" => Onebox.options.user_agent }).to_return(status: 200, body: "", headers: {})
|
|
|
|
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to be_present
|
|
|
|
end
|
2020-08-28 03:12:13 +08:00
|
|
|
|
|
|
|
context "with youtube stub" do
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="Onebox1">
|
|
|
|
<meta property="og:description" content="this is bodycontent">
|
2020-11-19 01:55:16 +08:00
|
|
|
<meta property="og:image" content="https://i.ytimg.com/vi/dQw4w9WgXcQ/maxresdefault.jpg">
|
2020-08-28 03:12:13 +08:00
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:any, "https://www.youtube.com/watch?v=dQw4w9WgXcQ").to_return(status: 200, body: html)
|
2021-04-08 01:32:27 +08:00
|
|
|
stub_request(:any, "https://www.youtube.com/embed/dQw4w9WgXcQ").to_return(status: 403, body: nil)
|
2020-08-28 03:12:13 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it "allows restricting engines based on the allowed_onebox_iframes setting" do
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
|
|
|
expect(output).to include("<iframe") # Regular youtube onebox
|
|
|
|
|
|
|
|
# Disable all onebox iframes:
|
|
|
|
SiteSetting.allowed_onebox_iframes = ""
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
2020-11-19 01:55:16 +08:00
|
|
|
|
2020-08-28 03:12:13 +08:00
|
|
|
expect(output).not_to include("<iframe") # Generic onebox
|
|
|
|
expect(output).to include("allowlistedgeneric")
|
|
|
|
|
|
|
|
# Just enable youtube:
|
|
|
|
SiteSetting.allowed_onebox_iframes = "https://www.youtube.com"
|
|
|
|
output = Oneboxer.onebox("https://www.youtube.com/watch?v=dQw4w9WgXcQ", invalidate_oneboxes: true)
|
|
|
|
expect(output).to include("<iframe") # Regular youtube onebox
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
it "allows iframes from generic sites via the allowed_iframes setting" do
|
|
|
|
allowlisted_body = '<html><head><link rel="alternate" type="application/json+oembed" href="https://allowlist.ed/iframes.json" />'
|
|
|
|
blocklisted_body = '<html><head><link rel="alternate" type="application/json+oembed" href="https://blocklist.ed/iframes.json" />'
|
|
|
|
|
|
|
|
allowlisted_oembed = {
|
|
|
|
type: "rich",
|
|
|
|
height: "100",
|
|
|
|
html: "<iframe src='https://ifram.es/foo/bar'></iframe>"
|
|
|
|
}
|
|
|
|
|
|
|
|
blocklisted_oembed = {
|
|
|
|
type: "rich",
|
|
|
|
height: "100",
|
|
|
|
html: "<iframe src='https://malicious/discourse.org/'></iframe>"
|
|
|
|
}
|
|
|
|
|
|
|
|
stub_request(:any, "https://blocklist.ed/iframes").to_return(status: 200, body: blocklisted_body)
|
|
|
|
stub_request(:any, "https://blocklist.ed/iframes.json").to_return(status: 200, body: blocklisted_oembed.to_json)
|
|
|
|
|
|
|
|
stub_request(:any, "https://allowlist.ed/iframes").to_return(status: 200, body: allowlisted_body)
|
|
|
|
stub_request(:any, "https://allowlist.ed/iframes.json").to_return(status: 200, body: allowlisted_oembed.to_json)
|
|
|
|
|
|
|
|
SiteSetting.allowed_iframes = "discourse.org|https://ifram.es"
|
|
|
|
|
|
|
|
expect(Oneboxer.onebox("https://blocklist.ed/iframes", invalidate_oneboxes: true)).to be_empty
|
|
|
|
expect(Oneboxer.onebox("https://allowlist.ed/iframes", invalidate_oneboxes: true)).to match("iframe src")
|
|
|
|
end
|
|
|
|
|
2020-11-19 01:55:16 +08:00
|
|
|
context 'missing attributes' do
|
|
|
|
before do
|
|
|
|
stub_request(:head, url)
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:url) { "https://example.com/fake-url/" }
|
|
|
|
|
|
|
|
it 'handles a missing description' do
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_description"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("could not be found: description")
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'handles a missing description and image' do
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_description_and_image"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("could not be found: description, image")
|
|
|
|
end
|
|
|
|
|
FIX: Don’t display error if only error is a missing image (#12216)
`Onebox.preview` can return 0-to-n errors, where the errors are missing OpenGraph attributes (e.g. title, description, image, etc.). If any of these attributes are missing, we construct an error message and attach it to the Oneboxer preview HTML. The error message is something like:
“Sorry, we were unable to generate a preview for this web page, because the following oEmbed / OpenGraph tags could not be found: description, image”
However, if the only missing tag is `image` we don’t need to display the error, as we have enough other data (title, description, etc.) to construct a useful/complete Onebox.
2021-02-26 03:30:40 +08:00
|
|
|
it 'handles a missing image' do
|
|
|
|
# Note: If the only error is a missing image, we shouldn't return an error
|
|
|
|
stub_request(:get, url).to_return(body: response("missing_image"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).not_to include("could not be found")
|
|
|
|
end
|
|
|
|
|
2020-11-19 01:55:16 +08:00
|
|
|
it 'video with missing description returns a placeholder' do
|
|
|
|
stub_request(:get, url).to_return(body: response("video_missing_description"))
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("onebox-placeholder-container")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-11-03 02:34:51 +08:00
|
|
|
context 'instagram' do
|
2020-11-19 01:55:16 +08:00
|
|
|
it 'providing a token should attempt to use new endpoint' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
access_token = 'abc123'
|
|
|
|
|
|
|
|
SiteSetting.facebook_app_access_token = access_token
|
|
|
|
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://graph.facebook.com/v9.0/instagram_oembed?url=#{url}&access_token=#{access_token}").to_return(body: response("instagram_new"))
|
|
|
|
|
2021-11-03 02:34:51 +08:00
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include('placeholder-icon image')
|
2020-11-19 01:55:16 +08:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'unconfigured token should attempt to use old endpoint' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://api.instagram.com/oembed/?url=#{url}").to_return(body: response("instagram_old"))
|
|
|
|
|
2021-11-03 02:34:51 +08:00
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include('placeholder-icon image')
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'renders result using an iframe' do
|
|
|
|
url = "https://www.instagram.com/p/CHLkBERAiLa"
|
|
|
|
stub_request(:head, url)
|
|
|
|
stub_request(:get, "https://api.instagram.com/oembed/?url=#{url}").to_return(body: response("instagram_old"))
|
|
|
|
|
|
|
|
expect(Oneboxer.onebox(url, invalidate_oneboxes: true)).to include('iframe')
|
2020-11-19 01:55:16 +08:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-12-14 23:49:37 +08:00
|
|
|
describe '#apply' do
|
|
|
|
it 'generates valid HTML' do
|
|
|
|
raw = "Before Onebox\nhttps://example.com\nAfter Onebox"
|
|
|
|
cooked = Oneboxer.apply(PrettyText.cook(raw)) { '<div>onebox</div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Before Onebox</p>
|
|
|
|
<div>onebox</div>
|
|
|
|
<p>After Onebox</p>
|
|
|
|
HTML
|
|
|
|
|
|
|
|
raw = "Before Onebox\nhttps://example.com\nhttps://example.com\nAfter Onebox"
|
|
|
|
cooked = Oneboxer.apply(PrettyText.cook(raw)) { '<div>onebox</div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Before Onebox</p>
|
|
|
|
<div>onebox</div>
|
|
|
|
<div>onebox</div>
|
|
|
|
<p>After Onebox</p>
|
|
|
|
HTML
|
|
|
|
end
|
2021-04-14 23:09:55 +08:00
|
|
|
|
|
|
|
it 'does keeps SVGs valid' do
|
|
|
|
raw = "Onebox\n\nhttps://example.com"
|
|
|
|
cooked = PrettyText.cook(raw)
|
|
|
|
cooked = Oneboxer.apply(Loofah.fragment(cooked)) { '<div><svg><path></path></svg></div>' }
|
|
|
|
doc = Nokogiri::HTML5::fragment(cooked.to_html)
|
|
|
|
expect(doc.to_html).to match_html <<~HTML
|
|
|
|
<p>Onebox</p>
|
|
|
|
<div><svg><path></path></svg></div>
|
|
|
|
HTML
|
|
|
|
end
|
2020-12-14 23:49:37 +08:00
|
|
|
end
|
|
|
|
|
2021-03-11 03:42:17 +08:00
|
|
|
describe '#force_get_hosts' do
|
2021-04-01 01:19:34 +08:00
|
|
|
before do
|
|
|
|
SiteSetting.cache_onebox_response_body_domains = "example.net|example.com|example.org"
|
|
|
|
end
|
|
|
|
|
2021-03-11 03:42:17 +08:00
|
|
|
it "includes Amazon sites" do
|
|
|
|
expect(Oneboxer.force_get_hosts).to include('https://www.amazon.ca')
|
|
|
|
end
|
2021-04-01 01:19:34 +08:00
|
|
|
|
|
|
|
it "includes cache_onebox_response_body_domains" do
|
|
|
|
expect(Oneboxer.force_get_hosts).to include('https://www.example.com')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-05-14 03:48:35 +08:00
|
|
|
context 'strategies' do
|
|
|
|
it "has a 'default' strategy" do
|
|
|
|
expect(Oneboxer.strategies.keys.first).to eq(:default)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "has a strategy with overrides" do
|
|
|
|
strategy = Oneboxer.strategies.keys[1]
|
|
|
|
expect(Oneboxer.strategies[strategy].keys).not_to eq([])
|
|
|
|
end
|
|
|
|
|
|
|
|
context "using a non-default strategy" do
|
|
|
|
let(:hostname) { "my.interesting.site" }
|
|
|
|
let(:url) { "https://#{hostname}/cool/content" }
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<head>
|
|
|
|
<meta property="og:title" content="Page Title">
|
|
|
|
<meta property="og:description" content="Here is some cool content">
|
|
|
|
</head>
|
|
|
|
<body>
|
|
|
|
<p>body</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:head, url).to_return(status: 509)
|
|
|
|
stub_request(:get, url).to_return(status: 200, body: html)
|
|
|
|
end
|
|
|
|
|
|
|
|
after do
|
|
|
|
Oneboxer.clear_preferred_strategy!(hostname)
|
|
|
|
end
|
|
|
|
|
2021-05-15 03:23:20 +08:00
|
|
|
it "uses multiple strategies" do
|
2021-05-14 03:48:35 +08:00
|
|
|
default_ordered = Oneboxer.strategies.keys
|
|
|
|
custom_ordered = Oneboxer.ordered_strategies(hostname)
|
|
|
|
expect(custom_ordered).to eq(default_ordered)
|
|
|
|
|
|
|
|
expect(Oneboxer.preferred_strategy(hostname)).to eq(nil)
|
|
|
|
expect(Oneboxer.preview(url, invalidate_oneboxes: true)).to include("Here is some cool content")
|
|
|
|
|
|
|
|
custom_ordered = Oneboxer.ordered_strategies(hostname)
|
|
|
|
|
|
|
|
expect(custom_ordered.count).to eq(default_ordered.count)
|
|
|
|
expect(custom_ordered).not_to eq(default_ordered)
|
|
|
|
|
|
|
|
expect(Oneboxer.preferred_strategy(hostname)).not_to eq(:default)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2021-04-01 01:19:34 +08:00
|
|
|
describe 'cache_onebox_response_body' do
|
|
|
|
let(:html) do
|
|
|
|
<<~HTML
|
|
|
|
<html>
|
|
|
|
<body>
|
|
|
|
<p>cache me if you can</p>
|
|
|
|
</body>
|
|
|
|
<html>
|
|
|
|
HTML
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:url) { "https://www.example.com/my/great/content" }
|
|
|
|
let(:url2) { "https://www.example2.com/my/great/content" }
|
|
|
|
|
|
|
|
before do
|
|
|
|
stub_request(:any, url).to_return(status: 200, body: html)
|
|
|
|
stub_request(:any, url2).to_return(status: 200, body: html)
|
|
|
|
|
|
|
|
SiteSetting.cache_onebox_response_body = true
|
|
|
|
SiteSetting.cache_onebox_response_body_domains = "example.net|example.com|example.org"
|
|
|
|
end
|
|
|
|
|
|
|
|
it "caches when domain matches" do
|
|
|
|
preview = Oneboxer.preview(url, invalidate_oneboxes: true)
|
|
|
|
expect(Oneboxer.cached_response_body_exists?(url)).to eq(true)
|
|
|
|
expect(Oneboxer.fetch_cached_response_body(url)).to eq(html)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "ignores cache when domain not present" do
|
|
|
|
preview = Oneboxer.preview(url2, invalidate_oneboxes: true)
|
|
|
|
expect(Oneboxer.cached_response_body_exists?(url2)).to eq(false)
|
|
|
|
end
|
2021-03-11 03:42:17 +08:00
|
|
|
end
|
|
|
|
|
2014-05-28 15:15:10 +08:00
|
|
|
end
|