# frozen_string_literal: true require 'spec_helper' describe Spam::SpamVerdictService do include_context 'includes Spam constants' let(:fake_ip) { '1.2.3.4' } let(:fake_user_agent) { 'fake-user-agent' } let(:fake_referrer) { 'fake-http-referrer' } let(:env) do { 'action_dispatch.remote_ip' => fake_ip, 'HTTP_USER_AGENT' => fake_user_agent, 'HTTP_REFERRER' => fake_referrer } end let(:request) { double(:request, env: env) } let(:check_for_spam) { true } let_it_be(:user) { create(:user) } let(:issue) { build(:issue, author: user) } let(:service) do described_class.new(user: user, target: issue, request: request, options: {}) end describe '#execute' do subject { service.execute } before do allow(service).to receive(:akismet_verdict).and_return(nil) allow(service).to receive(:spam_verdict_verdict).and_return(nil) end context 'if all services return nil' do it 'renders ALLOW verdict' do expect(subject).to eq ALLOW end end context 'if only one service returns a verdict' do context 'and it is supported' do before do allow(service).to receive(:akismet_verdict).and_return(DISALLOW) end it 'renders that verdict' do expect(subject).to eq DISALLOW end end context 'and it is unexpected' do before do allow(service).to receive(:akismet_verdict).and_return("unexpected") end it 'allows' do expect(subject).to eq ALLOW end end end context 'if more than one service returns a verdict' do context 'and they are supported' do before do allow(service).to receive(:akismet_verdict).and_return(DISALLOW) allow(service).to receive(:spam_verdict).and_return(BLOCK_USER) end it 'renders the more restrictive verdict' do expect(subject).to eq BLOCK_USER end end context 'and one is supported' do before do allow(service).to receive(:akismet_verdict).and_return('nonsense') allow(service).to receive(:spam_verdict).and_return(BLOCK_USER) end it 'renders the more restrictive verdict' do expect(subject).to eq BLOCK_USER end end context 'and one is supported' do before do allow(service).to receive(:akismet_verdict).and_return('nonsense') allow(service).to receive(:spam_verdict).and_return(BLOCK_USER) end it 'renders the more restrictive verdict' do expect(subject).to eq BLOCK_USER end end context 'and none are supported' do before do allow(service).to receive(:akismet_verdict).and_return('nonsense') allow(service).to receive(:spam_verdict).and_return('rubbish') end it 'renders the more restrictive verdict' do expect(subject).to eq ALLOW end end end end describe '#akismet_verdict' do subject { service.send(:akismet_verdict) } context 'if Akismet is enabled' do before do stub_application_setting(akismet_enabled: true) allow_next_instance_of(Spam::AkismetService) do |service| allow(service).to receive(:spam?).and_return(akismet_result) end end context 'if Akismet considers it spam' do let(:akismet_result) { true } context 'if reCAPTCHA is enabled' do before do stub_application_setting(recaptcha_enabled: true) end it 'returns conditionally allow verdict' do expect(subject).to eq CONDITIONAL_ALLOW end end context 'if reCAPTCHA is not enabled' do before do stub_application_setting(recaptcha_enabled: false) end it 'renders disallow verdict' do expect(subject).to eq DISALLOW end end end context 'if Akismet does not consider it spam' do let(:akismet_result) { false } it 'renders allow verdict' do expect(subject).to eq ALLOW end end end context 'if Akismet is not enabled' do before do stub_application_setting(akismet_enabled: false) end it 'renders allow verdict' do expect(subject).to eq ALLOW end end end describe '#spam_verdict' do subject { service.send(:spam_verdict) } context 'if a Spam Check endpoint enabled and set to a URL' do let(:spam_check_body) { {} } let(:spam_check_http_status) { nil } before do stub_application_setting(spam_check_endpoint_enabled: true) stub_application_setting(spam_check_endpoint_url: "http://www.spamcheckurl.com/spam_check") stub_request(:post, /.*spamcheckurl.com.*/).to_return( body: spam_check_body.to_json, status: spam_check_http_status ) end context 'if the endpoint is accessible' do let(:spam_check_http_status) { 200 } let(:error) { nil } let(:verdict) { nil } let(:spam_check_body) do { verdict: verdict, error: error } end context 'the result is a valid verdict' do let(:verdict) { 'allow' } it 'returns the verdict' do expect(subject).to eq ALLOW end end context 'the verdict is an unexpected string' do let(:verdict) { 'this is fine' } it 'returns nil' do expect(subject).to be_nil end end context 'the JSON is malformed' do let(:spam_check_body) { 'this is fine' } it 'returns allow' do expect(subject).to eq ALLOW end end context 'the verdict is an empty string' do let(:verdict) { '' } it 'returns nil' do expect(subject).to be_nil end end context 'the verdict is nil' do let(:verdict) { nil } it 'returns nil' do expect(subject).to be_nil end end context 'there is an error' do let(:error) { "Sorry Dave, I can't do that" } it 'returns nil' do expect(subject).to be_nil end end context 'the HTTP status is not 200' do let(:spam_check_http_status) { 500 } it 'returns nil' do expect(subject).to be_nil end end context 'the confused API endpoint returns both an error and a verdict' do let(:verdict) { 'disallow' } let(:error) { 'oh noes!' } it 'renders the verdict' do expect(subject).to eq DISALLOW end end end context 'if the endpoint times out' do before do stub_request(:post, /.*spamcheckurl.com.*/).to_timeout end it 'returns nil' do expect(subject).to be_nil end end end context 'if a Spam Check endpoint is not set' do before do stub_application_setting(spam_check_endpoint_url: nil) end it 'returns nil' do expect(subject).to be_nil end end context 'if Spam Check endpoint is not enabled' do before do stub_application_setting(spam_check_endpoint_enabled: false) end it 'returns nil' do expect(subject).to be_nil end end end end