qutebrowser/tests/unit/browser/test_adblock.py

404 lines
15 KiB
Python
Raw Normal View History

2015-12-03 22:00:39 +01:00
# vim: ft=python fileencoding=utf-8 sts=4 sw=4 et:
2015-12-04 01:52:00 +01:00
#!/usr/bin/env python3
2015-12-03 22:00:39 +01:00
2016-01-23 16:15:19 +01:00
# Copyright 2015 Corentin Julé <corentinjule@gmail.com>
2015-12-03 22:00:39 +01:00
#
# This file is part of qutebrowser.
#
# qutebrowser is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# qutebrowser is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with qutebrowser. If not, see <http://www.gnu.org/licenses/>.
2015-12-04 01:52:00 +01:00
import os
import zipfile
2015-12-06 00:10:56 +01:00
import shutil
2015-12-04 01:52:00 +01:00
import pytest
2015-12-04 01:52:00 +01:00
2015-12-06 00:10:56 +01:00
from PyQt5.QtCore import pyqtSignal, QUrl, QObject
from qutebrowser.browser import adblock
2015-12-06 00:10:56 +01:00
from qutebrowser.utils import objreg
2015-12-06 15:35:10 +01:00
from qutebrowser.commands import cmdexc
2015-12-06 00:10:56 +01:00
pytestmark = pytest.mark.usefixtures('qapp', 'config_tmpdir')
2016-05-07 22:08:55 +02:00
2016-05-07 22:09:43 +02:00
# TODO See ../utils/test_standarddirutils for OSError and caplog assertion
WHITELISTED_HOSTS = ('qutebrowser.org', 'mediumhost.io')
2015-12-08 00:52:51 +01:00
BLOCKLIST_HOSTS = ('localhost',
2015-12-08 00:52:51 +01:00
'mediumhost.io',
'malware.badhost.org',
'4-verybadhost.com',
'ads.worsthostever.net')
2015-12-08 00:52:51 +01:00
CLEAN_HOSTS = ('goodhost.gov', 'verygoodhost.com')
URLS_TO_CHECK = ('http://localhost',
'http://mediumhost.io',
2016-01-23 16:15:19 +01:00
'ftp://malware.badhost.org',
'http://4-verybadhost.com',
'http://ads.worsthostever.net',
2015-12-08 00:52:51 +01:00
'http://goodhost.gov',
2016-01-23 16:34:05 +01:00
'ftp://verygoodhost.com',
'http://qutebrowser.org')
2015-12-06 19:33:35 +01:00
2016-01-23 16:34:05 +01:00
2015-12-06 15:35:10 +01:00
class BaseDirStub:
2015-12-08 00:52:51 +01:00
"""Mock for objreg.get('args') called in adblock.HostBlocker.read_hosts."""
2015-12-06 15:35:10 +01:00
def __init__(self):
self.basedir = None
2015-12-06 00:51:44 +01:00
2015-12-08 00:52:51 +01:00
2016-07-08 19:30:17 +02:00
@pytest.fixture
def basedir(fake_args):
2015-12-06 19:33:35 +01:00
"""Register a Fake basedir."""
2016-07-08 19:30:17 +02:00
fake_args.basedir = None
2015-12-06 19:33:35 +01:00
2015-12-06 00:10:56 +01:00
class FakeDownloadItem(QObject):
2015-12-08 00:52:51 +01:00
2015-12-06 00:10:56 +01:00
"""Mock browser.downloads.DownloadItem."""
finished = pyqtSignal()
2016-01-23 16:15:19 +01:00
def __init__(self, fileobj, name, parent=None):
super().__init__(parent)
2015-12-06 00:10:56 +01:00
self.fileobj = fileobj
2015-12-08 00:52:51 +01:00
self.name = name
2015-12-06 00:10:56 +01:00
self.successful = True
2015-12-08 00:52:51 +01:00
2015-12-06 00:10:56 +01:00
class FakeDownloadManager:
2015-12-08 00:52:51 +01:00
2015-12-06 00:10:56 +01:00
"""Mock browser.downloads.DownloadManager."""
def get(self, url, target, **kwargs):
2016-05-07 22:15:27 +02:00
"""Return a FakeDownloadItem instance with a fileobj.
The content is copied from the file the given url links to.
2015-12-08 00:52:51 +01:00
"""
download_item = FakeDownloadItem(target.fileobj, name=url.path())
2015-12-06 00:51:44 +01:00
with open(url.path(), 'rb') as fake_url_file:
2015-12-06 00:10:56 +01:00
shutil.copyfileobj(fake_url_file, download_item.fileobj)
return download_item
2015-12-08 00:52:51 +01:00
2015-12-06 00:10:56 +01:00
@pytest.yield_fixture
def download_stub(win_registry):
"""Register a FakeDownloadManager."""
stub = FakeDownloadManager()
objreg.register('download-manager', stub,
scope='window', window='last-focused')
2016-01-23 16:15:19 +01:00
yield
2015-12-06 00:10:56 +01:00
objreg.delete('download-manager', scope='window', window='last-focused')
2015-12-06 15:35:10 +01:00
2015-12-08 00:52:51 +01:00
def create_zipfile(directory, files, zipname='test'):
2016-05-07 22:15:27 +02:00
"""Return a path to a newly created zip file.
2015-12-08 00:52:51 +01:00
2016-05-07 22:15:27 +02:00
Args:
directory: path object where to create the zip file
files: list of paths to each file to add in the zipfile
zipname: name to give to the zip file.
2015-12-08 00:52:51 +01:00
"""
2016-01-23 16:15:19 +01:00
zipfile_path = directory / zipname + '.zip'
with zipfile.ZipFile(str(zipfile_path), 'w') as new_zipfile:
for file_path in files:
new_zipfile.write(str(file_path),
arcname=os.path.basename(str(file_path)))
# Removes path from file name
2016-01-23 16:15:19 +01:00
return str(zipfile_path)
2015-12-08 00:52:51 +01:00
2016-01-23 16:15:19 +01:00
def create_blocklist(directory, blocked_hosts=BLOCKLIST_HOSTS,
name='hosts', line_format='one_per_line'):
"""Return a path to a blocklist file.
2015-12-08 00:52:51 +01:00
2016-05-08 11:14:42 +02:00
Args:
directory: path object where to create the blocklist file
blocked_hosts: an iterable of string hosts to add to the blocklist
name: name to give to the blocklist file
line_format: 'etc_hosts' --> /etc/hosts format
'one_per_line' --> one host per line format
'not_correct' --> Not a correct hosts file format.
2015-12-08 00:52:51 +01:00
"""
2016-01-23 16:15:19 +01:00
blocklist_file = directory / name
with open(str(blocklist_file), 'w', encoding='UTF-8') as blocklist:
2015-12-08 00:52:51 +01:00
# ensure comments are ignored when processing blocklist
2016-01-23 16:15:19 +01:00
blocklist.write('# Blocked Hosts List #\n\n')
2016-01-23 16:34:05 +01:00
if line_format == 'etc_hosts': # /etc/hosts like format
2016-01-23 16:15:19 +01:00
for host in blocked_hosts:
blocklist.write('127.0.0.1 ' + host + '\n')
2015-12-08 00:52:51 +01:00
elif line_format == 'one_per_line':
2016-01-23 16:15:19 +01:00
for host in blocked_hosts:
blocklist.write(host + '\n')
2015-12-08 00:52:51 +01:00
elif line_format == 'not_correct':
2016-01-23 16:15:19 +01:00
for host in blocked_hosts:
blocklist.write(host + ' This is not a correct hosts file\n')
else:
raise ValueError('Incorrect line_format argument')
2016-01-23 16:15:19 +01:00
return str(blocklist_file)
2015-12-08 00:52:51 +01:00
2016-01-23 16:15:19 +01:00
def assert_urls(host_blocker, blocked=BLOCKLIST_HOSTS,
whitelisted=WHITELISTED_HOSTS, urls_to_check=URLS_TO_CHECK):
2016-05-07 22:15:27 +02:00
"""Test if Urls to check are blocked or not by HostBlocker.
Ensure URLs in 'blocked' and not in 'whitelisted' are blocked.
All other URLs must not be blocked.
"""
2016-01-23 16:15:19 +01:00
whitelisted = list(whitelisted) + list(host_blocker.WHITELISTED)
2015-12-06 15:35:10 +01:00
for str_url in urls_to_check:
url = QUrl(str_url)
host = url.host()
2015-12-08 00:52:51 +01:00
if host in blocked and host not in whitelisted:
2015-12-06 15:35:10 +01:00
assert host_blocker.is_blocked(url)
else:
assert not host_blocker.is_blocked(url)
2015-12-03 22:00:39 +01:00
2015-12-08 00:52:51 +01:00
def generic_blocklists(directory):
"""Return a generic list of files to be used in hosts-block-lists option.
2016-05-07 22:15:27 +02:00
This list contains :
- a remote zip file with 1 hosts file and 2 useless files
- a remote zip file with only useless files
(Should raise a FileNotFoundError)
- a remote zip file with only one valid hosts file
- a local text file with valid hosts
- a remote text file without valid hosts format.
"""
2015-12-08 00:52:51 +01:00
# remote zip file with 1 hosts file and 2 useless files
2016-01-23 16:15:19 +01:00
file1 = create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='README', line_format='not_correct')
file2 = create_blocklist(directory, blocked_hosts=BLOCKLIST_HOSTS[:3],
name='hosts', line_format='etc_hosts')
file3 = create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='false_positive', line_format='one_per_line')
files_to_zip = [file1, file2, file3]
blocklist1 = QUrl(create_zipfile(directory, files_to_zip, 'block1'))
2015-12-08 00:52:51 +01:00
# remote zip file without file named hosts
# (Should raise a FileNotFoundError)
2016-01-23 16:15:19 +01:00
file1 = create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='md5sum', line_format='etc_hosts')
file2 = create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='README', line_format='not_correct')
file3 = create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='false_positive', line_format='one_per_line')
files_to_zip = [file1, file2, file3]
blocklist2 = QUrl(create_zipfile(directory, files_to_zip, 'block2'))
2015-12-08 00:52:51 +01:00
# remote zip file with only one valid hosts file inside
blocklist3 = create_blocklist(directory,
blocked_hosts=[BLOCKLIST_HOSTS[3]],
2016-01-23 16:15:19 +01:00
name='malwarelist', line_format='etc_hosts')
blocklist3 = QUrl(create_zipfile(directory, [blocklist3], 'block3'))
2015-12-08 00:52:51 +01:00
# local text file with valid hosts
2016-01-23 16:15:19 +01:00
blocklist4 = QUrl(create_blocklist(directory,
blocked_hosts=[BLOCKLIST_HOSTS[4]],
name='mycustomblocklist',
line_format='one_per_line'))
2015-12-08 00:52:51 +01:00
blocklist4.setScheme('file')
# remote text file without valid hosts format
2016-01-23 16:15:19 +01:00
blocklist5 = QUrl(create_blocklist(directory, blocked_hosts=CLEAN_HOSTS,
name='notcorrectlist',
line_format='not_correct'))
2015-12-08 00:52:51 +01:00
return [blocklist1, blocklist2, blocklist3, blocklist4, blocklist5]
def test_without_datadir(config_stub, tmpdir, monkeypatch, win_registry):
"""No directory for data configured so no hosts file exists.
2016-05-07 22:15:27 +02:00
Ensure CommandError is raised and no URL is blocked.
"""
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': generic_blocklists(tmpdir),
2016-05-07 22:41:22 +02:00
'host-blocking-enabled': True,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
monkeypatch.setattr('qutebrowser.utils.standarddir.data', lambda: None)
host_blocker = adblock.HostBlocker()
2016-05-07 22:39:09 +02:00
with pytest.raises(cmdexc.CommandError) as excinfo:
2015-12-06 15:35:10 +01:00
host_blocker.adblock_update(0)
2016-05-07 22:39:09 +02:00
assert str(excinfo.value) == "No data storage is configured!"
2015-12-08 00:52:51 +01:00
host_blocker.read_hosts()
for str_url in URLS_TO_CHECK:
assert not host_blocker.is_blocked(QUrl(str_url))
# To test on_config_changed
config_stub.set('content', 'host-block-lists', None)
2015-12-08 00:52:51 +01:00
def test_disabled_blocking_update(basedir, config_stub, download_stub,
data_tmpdir, tmpdir, win_registry):
2016-05-07 22:39:53 +02:00
"""Ensure no URL is blocked when host blocking is disabled."""
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': generic_blocklists(tmpdir),
2016-05-07 22:41:22 +02:00
'host-blocking-enabled': False,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.adblock_update(0)
while host_blocker._in_progress:
current_download = host_blocker._in_progress[0]
current_download.finished.emit()
host_blocker.read_hosts()
for str_url in URLS_TO_CHECK:
assert not host_blocker.is_blocked(QUrl(str_url))
def test_no_blocklist_update(config_stub, download_stub,
data_tmpdir, basedir, tmpdir, win_registry):
2016-05-07 22:15:27 +02:00
"""Ensure no URL is blocked when no block list exists."""
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': None,
2016-05-07 22:41:22 +02:00
'host-blocking-enabled': True,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.adblock_update(0)
host_blocker.read_hosts()
for str_url in URLS_TO_CHECK:
assert not host_blocker.is_blocked(QUrl(str_url))
def test_successful_update(config_stub, basedir, download_stub,
data_tmpdir, tmpdir, win_registry):
2016-01-23 16:15:19 +01:00
"""Ensure hosts from host-block-lists are blocked after an update."""
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': generic_blocklists(tmpdir),
'host-blocking-enabled': True,
2016-05-07 22:41:22 +02:00
'host-blocking-whitelist': None,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.adblock_update(0)
# Simulate download is finished
while host_blocker._in_progress:
current_download = host_blocker._in_progress[0]
current_download.finished.emit()
host_blocker.read_hosts()
2016-01-23 16:15:19 +01:00
assert_urls(host_blocker, whitelisted=[])
2015-12-08 00:52:51 +01:00
def test_failed_dl_update(config_stub, basedir, download_stub,
data_tmpdir, tmpdir, win_registry):
2016-05-07 22:15:27 +02:00
"""One blocklist fails to download.
Ensure hosts from this list are not blocked.
"""
2016-01-23 16:15:19 +01:00
dl_fail_blocklist = QUrl(create_blocklist(tmpdir,
blocked_hosts=CLEAN_HOSTS,
name='download_will_fail',
line_format='one_per_line'))
2015-12-08 00:52:51 +01:00
hosts_to_block = generic_blocklists(tmpdir) + [dl_fail_blocklist]
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': hosts_to_block,
'host-blocking-enabled': True,
2016-05-07 22:41:22 +02:00
'host-blocking-whitelist': None,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.adblock_update(0)
while host_blocker._in_progress:
current_download = host_blocker._in_progress[0]
# if current download is the file we want to fail, make it fail
if current_download.name == dl_fail_blocklist.path():
current_download.successful = False
current_download.finished.emit()
host_blocker.read_hosts()
2016-01-23 16:15:19 +01:00
assert_urls(host_blocker, whitelisted=[])
2015-12-08 00:52:51 +01:00
def test_blocking_with_whitelist(config_stub, basedir, download_stub,
data_tmpdir, tmpdir):
2016-01-23 16:15:19 +01:00
"""Ensure hosts in host-blocking-whitelist are never blocked."""
# Simulate adblock_update has already been run
# by creating a file named blocked-hosts,
# Exclude localhost from it, since localhost is in HostBlocker.WHITELISTED
2015-12-08 00:52:51 +01:00
filtered_blocked_hosts = BLOCKLIST_HOSTS[1:]
blocklist = create_blocklist(data_tmpdir,
2015-12-08 00:52:51 +01:00
blocked_hosts=filtered_blocked_hosts,
name='blocked-hosts',
line_format='one_per_line')
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': [blocklist],
'host-blocking-enabled': True,
2016-05-07 22:41:22 +02:00
'host-blocking-whitelist': WHITELISTED_HOSTS,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.read_hosts()
assert_urls(host_blocker)
2016-05-07 23:31:35 +02:00
def test_config_change_initial(config_stub, basedir, download_stub,
data_tmpdir, tmpdir):
2016-05-08 11:14:42 +02:00
"""Test emptying host-block-lists on restart with existing blocked_hosts.
2016-05-07 23:31:35 +02:00
- A blocklist is present in host-block-lists and blocked_hosts is populated
- User quits qutebrowser, empties host-block-lists from his config
- User restarts qutebrowser, does adblock-update
"""
create_blocklist(tmpdir, blocked_hosts=BLOCKLIST_HOSTS,
name='blocked-hosts', line_format='one_per_line')
config_stub.data = {
'content': {
'host-block-lists': None,
'host-blocking-enabled': True,
'host-blocking-whitelist': None,
}
}
host_blocker = adblock.HostBlocker()
host_blocker.read_hosts()
for str_url in URLS_TO_CHECK:
assert not host_blocker.is_blocked(QUrl(str_url))
2015-12-08 00:52:51 +01:00
def test_config_change(config_stub, basedir, download_stub,
data_tmpdir, tmpdir):
2016-01-23 16:15:19 +01:00
"""Ensure blocked-hosts resets if host-block-list is changed to None."""
2016-01-23 16:34:05 +01:00
filtered_blocked_hosts = BLOCKLIST_HOSTS[1:] # Exclude localhost
blocklist = QUrl(create_blocklist(tmpdir,
blocked_hosts=filtered_blocked_hosts,
name='blocked-hosts',
line_format='one_per_line'))
2016-05-07 22:34:30 +02:00
config_stub.data = {
'content': {
'host-block-lists': [blocklist],
'host-blocking-enabled': True,
2016-05-07 22:41:22 +02:00
'host-blocking-whitelist': None,
2016-05-07 22:34:30 +02:00
}
}
2015-12-08 00:52:51 +01:00
host_blocker = adblock.HostBlocker()
host_blocker.read_hosts()
config_stub.set('content', 'host-block-lists', None)
host_blocker.read_hosts()
for str_url in URLS_TO_CHECK:
assert not host_blocker.is_blocked(QUrl(str_url))