X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=tests%2Fsrc%2FConsole%2FServerBlockConsoleTest.php;h=2ea1a66696b2762f9ba3d1cf49da88c2f29ccd0e;hb=dce86be58efad2db2e4a473bbf8dd4d1f281d5b7;hp=d671020e6f59c458bb416d72f97ba1ddb8160604;hpb=e8459cce3419f7aecdf41c8164bcd37761fc80e8;p=friendica.git diff --git a/tests/src/Console/ServerBlockConsoleTest.php b/tests/src/Console/ServerBlockConsoleTest.php index d671020e6f..2ea1a66696 100644 --- a/tests/src/Console/ServerBlockConsoleTest.php +++ b/tests/src/Console/ServerBlockConsoleTest.php @@ -1,9 +1,30 @@ . + * + */ namespace Friendica\Test\src\Console; use Friendica\Console\ServerBlock; -use Friendica\Core\Config\Configuration; +use Friendica\Core\Config\Capability\IManageConfigValues; +use Friendica\Moderation\DomainPatternBlocklist; +use Mockery; class ServerBlockConsoleTest extends ConsoleTest { @@ -17,12 +38,16 @@ class ServerBlockConsoleTest extends ConsoleTest 'reason' => 'Illegal content', ] ]; + /** + * @var DomainPatternBlocklist|Mockery\LegacyMockInterface|Mockery\MockInterface + */ + private $blocklistMock; - protected function setUp() + protected function setUp() : void { parent::setUp(); - $this->configMock = \Mockery::mock(Configuration::class); + $this->blocklistMock = Mockery::mock(DomainPatternBlocklist::class); } /** @@ -30,27 +55,22 @@ class ServerBlockConsoleTest extends ConsoleTest */ public function testBlockedServersList() { - $this->configMock + $this->blocklistMock ->shouldReceive('get') - ->with('system', 'blocklist', []) ->andReturn($this->defaultBlockList) ->once(); - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $txt = $this->dumpExecute($console); - $output = <<assertEquals($output, $txt); + self::assertEquals($output, $txt); } /** @@ -58,62 +78,19 @@ CONS; */ public function testAddBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('testme.now', 'I like it!') + ->andReturn(1) ->once(); - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => 'I like it!', - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'testme.now'); $console->setArgument(2, 'I like it!'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'I like it!\')' . PHP_EOL, $txt); - } - - /** - * Test blockedservers add command with the default reason - */ - public function testAddBlockedServerWithDefaultReason() - { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => ServerBlock::DEFAULT_REASON, - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) - ->once(); - - $console = new ServerBlock($this->configMock, $this->consoleArgv); - $console->setArgument(0, 'add'); - $console->setArgument(1, 'testme.now'); - $txt = $this->dumpExecute($console); - - $this->assertEquals('The domain \'testme.now\' is now blocked. (Reason: \'' . ServerBlock::DEFAULT_REASON . '\')' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'testme.now\' is now blocked. (Reason: \'I like it!\')' . "\n", $txt); } /** @@ -121,36 +98,19 @@ CONS; */ public function testUpdateBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - [ - 'domain' => 'pod.ordoevangelistarum.com', - 'reason' => 'Other reason', - ] - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('pod.ordoevangelistarum.com', 'Other reason') + ->andReturn(2) ->once(); - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $console->setArgument(2, 'Other reason'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'pod.ordoevangelistarum.com\' is now updated. (Reason: \'Other reason\')' . "\n", $txt); } /** @@ -158,31 +118,18 @@ CONS; */ public function testRemoveBlockedServer() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(true) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('pod.ordoevangelistarum.com') + ->andReturn(2) ->once(); - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'pod.ordoevangelistarum.com\' is not more blocked' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'pod.ordoevangelistarum.com\' isn\'t blocked anymore' . "\n", $txt); } /** @@ -190,11 +137,11 @@ CONS; */ public function testBlockedServersWrongCommand() { - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'wrongcommand'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Unknown command', $txt); + self::assertStringStartsWith('[Warning] Unknown command', $txt); } /** @@ -202,18 +149,18 @@ CONS; */ public function testRemoveBlockedServerNotExist() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('not.existing') + ->andReturn(1) ->once(); - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); - $console->setArgument(1, 'not.exiting'); + $console->setArgument(1, 'not.existing'); $txt = $this->dumpExecute($console); - $this->assertEquals('The domain \'not.exiting\' is not blocked.' . PHP_EOL, $txt); + self::assertEquals('The domain pattern \'not.existing\' wasn\'t blocked.' . "\n", $txt); } /** @@ -221,11 +168,18 @@ CONS; */ public function testAddBlockedServerMissingArgument() { - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Add needs a domain and optional a reason.', $txt); + self::assertStringStartsWith('[Warning] Add needs a domain pattern and a reason.', $txt); + + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); + $console->setArgument(0, 'add'); + $console->setArgument(1, 'testme.now'); + $txt = $this->dumpExecute($console); + + self::assertStringStartsWith('[Warning] Add needs a domain pattern and a reason.', $txt); } /** @@ -233,30 +187,19 @@ CONS; */ public function testAddBlockedServerNoSave() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) - ->once(); - - $newBlockList = $this->defaultBlockList; - $newBlockList[] = [ - 'domain' => 'testme.now', - 'reason' => ServerBlock::DEFAULT_REASON, - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(false) + $this->blocklistMock + ->shouldReceive('addPattern') + ->with('testme.now', 'I like it!') + ->andReturn(0) ->once(); - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'add'); $console->setArgument(1, 'testme.now'); + $console->setArgument(2, 'I like it!'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t save \'testme.now\' as blocked server' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t save \'testme.now\' as blocked domain pattern' . "\n", $txt); } /** @@ -264,31 +207,18 @@ CONS; */ public function testRemoveBlockedServerNoSave() { - $this->configMock - ->shouldReceive('get') - ->with('system', 'blocklist', []) - ->andReturn($this->defaultBlockList) + $this->blocklistMock + ->shouldReceive('removePattern') + ->with('pod.ordoevangelistarum.com') + ->andReturn(0) ->once(); - $newBlockList = [ - [ - 'domain' => 'social.nobodyhasthe.biz', - 'reason' => 'Illegal content', - ], - ]; - - $this->configMock - ->shouldReceive('set') - ->with('system', 'blocklist', $newBlockList) - ->andReturn(false) - ->once(); - - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $console->setArgument(1, 'pod.ordoevangelistarum.com'); $txt = $this->dumpExecute($console); - $this->assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked servers' . PHP_EOL, $txt); + self::assertEquals('Couldn\'t remove \'pod.ordoevangelistarum.com\' from blocked domain patterns' . "\n", $txt); } /** @@ -296,11 +226,11 @@ CONS; */ public function testRemoveBlockedServerMissingArgument() { - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setArgument(0, 'remove'); $txt = $this->dumpExecute($console); - $this->assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); + self::assertStringStartsWith('[Warning] Remove needs a second parameter.', $txt); } /** @@ -308,21 +238,25 @@ CONS; */ public function testBlockedServersHelp() { - $console = new ServerBlock($this->configMock, $this->consoleArgv); + $console = new ServerBlock($this->blocklistMock, $this->consoleArgv); $console->setOption('help', true); $txt = $this->dumpExecute($console); $help = << [-h|--help|-?] [-v] - bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock [-h|--help|-?] [-v] + bin/console serverblock add [-h|--help|-?] [-v] + bin/console serverblock remove [-h|--help|-?] [-v] + bin/console serverblock export + bin/console serverblock import Description - With this tool, you can list the current blocked server domain patterns + With this tool, you can list the current blocked server domain patterns or you can add / remove a blocked server domain pattern from the list. - + Using the export and import options you can share your server blocklist + with other node admins by CSV files. + Patterns are case-insensitive shell wildcard comprising the following special characters: - * : Any number of characters - ? : Any single character @@ -334,6 +268,6 @@ Options HELP; - $this->assertEquals($help, $txt); + self::assertEquals($help, $txt); } }