X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=tests%2Fsrc%2FConsole%2FServerBlockConsoleTest.php;h=2ea1a66696b2762f9ba3d1cf49da88c2f29ccd0e;hb=dce86be58efad2db2e4a473bbf8dd4d1f281d5b7;hp=11856eac165d60d3533b0dade1f229620b142f78;hpb=4dcdc56e8173d6db3410014fa4c4ae3445a2436d;p=friendica.git diff --git a/tests/src/Console/ServerBlockConsoleTest.php b/tests/src/Console/ServerBlockConsoleTest.php index 11856eac16..2ea1a66696 100644 --- a/tests/src/Console/ServerBlockConsoleTest.php +++ b/tests/src/Console/ServerBlockConsoleTest.php @@ -1,13 +1,31 @@ . + * + */ namespace Friendica\Test\src\Console; use Friendica\Console\ServerBlock; +use Friendica\Core\Config\Capability\IManageConfigValues; +use Friendica\Moderation\DomainPatternBlocklist; +use Mockery; -/** - * @runTestsInSeparateProcesses - * @preserveGlobalState disabled - */ class ServerBlockConsoleTest extends ConsoleTest { protected $defaultBlockList = [ @@ -20,12 +38,16 @@ class ServerBlockConsoleTest extends ConsoleTest 'reason' => 'Illegal content', ] ]; + /** + * @var DomainPatternBlocklist|Mockery\LegacyMockInterface|Mockery\MockInterface + */ + private $blocklistMock; - protected function setUp() + protected function setUp() : void { parent::setUp(); - $this->mockApp($this->root); + $this->blocklistMock = Mockery::mock(DomainPatternBlocklist::class); } /** @@ -33,27 +55,22 @@ class ServerBlockConsoleTest extends ConsoleTest */ public function testBlockedServersList() { - $this->configMock + $this->blocklistMock ->shouldReceive('get') - ->with('system', 'blocklist') ->andReturn($this->defaultBlockList) ->once(); - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $txt = $this->dumpExecute($console); - $output = <<assertEquals($output, $txt); + self::assertEquals($output, $txt); } /** @@ -61,62 +78,19 @@ CONS; */ public function testAddBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('testme.now', 'I like it!') + ->andReturn(1) ->once(); - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => 'I like it!', - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'testme.now'); $console->setArgument(2, 'I like it!'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'I like it!\')' . PHP_EOL, $txt); - } - - /** - * Test blockedservers add command with the default reason - */ - public function testAddBlockedServerWithDefaultReason() - { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => ServerBlock::DEFAULT_REASON, - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->consoleArgv); - $console->setArgument(0, 'add'); - $console->setArgument(1, 'testme.now'); - $txt = $this->dumpExecute($console); - - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'' . ServerBlock::DEFAULT_REASON . '\')' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'testme.now\' is now blocked. (Reason: \'I like it!\')' . "\n", $txt); } /** @@ -124,36 +98,19 @@ CONS; */ public function testUpdateBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('pod.ordoevangelistarum.com', 'Other reason') + ->andReturn(2) ->once(); - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - [ - 'domain' => 'pod.ordoevangelistarum.com', - 'reason' => 'Other reason', - ] - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $console->setArgument(2, 'Other reason'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . "\n", $txt); } /** @@ -161,31 +118,18 @@ CONS; */ public function testRemoveBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('pod.ordoevangelistarum.com') + ->andReturn(2) ->once(); - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is not more blocked' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'pod.ordoevangelistarum.com\' isn\'t blocked anymore' . "\n", $txt); } /** @@ -193,11 +137,11 @@ CONS; */ public function testBlockedServersWrongCommand() { - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'wrongcommand'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Unknown command', $txt); + self::assertStringStartsWith('[Warning] Unknown command', $txt); } /** @@ -205,18 +149,18 @@ CONS; */ public function testRemoveBlockedServerNotExist() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('not.existing') + ->andReturn(1) ->once(); - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); - $console->setArgument(1, 'not.exiting'); + $console->setArgument(1, 'not.existing'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'not.exiting\' is not blocked.' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'not.existing\' wasn\'t blocked.' . "\n", $txt); } /** @@ -224,11 +168,18 @@ CONS; */ public function testAddBlockedServerMissingArgument() { - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Add needs a domain and optional a reason.', $txt); + self::assertStringStartsWith('[Warning] Add needs a domain pattern and a reason.', $txt); + + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); + $console->setArgument(0, 'add'); + $console->setArgument(1, 'testme.now'); + $txt = $this->dumpExecute($console); + + self::assertStringStartsWith('[Warning] Add needs a domain pattern and a reason.', $txt); } /** @@ -236,30 +187,19 @@ CONS; */ public function testAddBlockedServerNoSave() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => ServerBlock::DEFAULT_REASON, - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(false) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('testme.now', 'I like it!') + ->andReturn(0) ->once(); - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'testme.now'); + $console->setArgument(2, 'I like it!'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t save \'testme.now\' as blocked server' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t save \'testme.now\' as blocked domain pattern' . "\n", $txt); } /** @@ -267,31 +207,18 @@ CONS; */ public function testRemoveBlockedServerNoSave() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist') - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('pod.ordoevangelistarum.com') + ->andReturn(0) ->once(); - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(false) - ->once(); - - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked servers' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked domain patterns' . "\n", $txt); } /** @@ -299,11 +226,11 @@ CONS; */ public function testRemoveBlockedServerMissingArgument() { - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); + self::assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); } /** @@ -311,20 +238,29 @@ CONS; */ public function testBlockedServersHelp() { - $console = new ServerBlock($this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setOption('help', true); $txt = $this->dumpExecute($console); $help = << [-h|--help|-?] [-v] - bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock [-h|--help|-?] [-v] + bin/console serverblock add [-h|--help|-?] [-v] + bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock export + bin/console serverblock import Description - With this tool, you can list the current blocked servers - or you can add / remove a blocked server from the list + With this tool, you can list the current blocked server domain patterns + or you can add / remove a blocked server domain pattern from the list. + Using the export and import options you can share your server blocklist + with other node admins by CSV files. + + Patterns are case-insensitive shell wildcard comprising the following special characters: + - * : Any number of characters + - ? : Any single character + - [...] : char1 or char2 or... Options -h|--help|-? Show help information @@ -332,6 +268,6 @@ Options HELP; - $this->assertEquals($help, $txt); + self::assertEquals($help, $txt); } }