mirror of
https://github.com/glitch-soc/mastodon.git
synced 2026-03-29 03:00:33 +02:00
91 lines
2.8 KiB
Ruby
91 lines
2.8 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'rails_helper'
|
|
|
|
RSpec.describe StatusLengthValidator do
|
|
subject { Fabricate.build :status }
|
|
|
|
before { stub_const 'StatusLengthValidator::MAX_CHARS', 100 }
|
|
|
|
let(:over_limit_text) { 'a' * described_class::MAX_CHARS * 2 }
|
|
|
|
context 'when status is remote' do
|
|
before { subject.update! account: Fabricate(:account, domain: 'host.example') }
|
|
|
|
it { is_expected.to allow_value(over_limit_text).for(:text) }
|
|
it { is_expected.to allow_value(over_limit_text).for(:spoiler_text).against(:text) }
|
|
end
|
|
|
|
context 'when status is a local reblog' do
|
|
before { subject.update! reblog: Fabricate(:status) }
|
|
|
|
it { is_expected.to allow_value(over_limit_text).for(:text) }
|
|
it { is_expected.to allow_value(over_limit_text).for(:spoiler_text).against(:text) }
|
|
end
|
|
|
|
context 'when text is over character limit' do
|
|
it { is_expected.to_not allow_value(over_limit_text).for(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'when content warning text is over character limit' do
|
|
it { is_expected.to_not allow_value(over_limit_text).for(:spoiler_text).against(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'when text and content warning combine to exceed limit' do
|
|
before { subject.text = 'a' * 50 }
|
|
|
|
it { is_expected.to_not allow_value('a' * 55).for(:spoiler_text).against(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'when text has space separated linkable URLs' do
|
|
let(:text) { [starting_string, example_link].join(' ') }
|
|
|
|
it { is_expected.to allow_value(text).for(:text) }
|
|
end
|
|
|
|
context 'when text has non-separated URLs' do
|
|
let(:text) { [starting_string, example_link].join }
|
|
|
|
it { is_expected.to_not allow_value(text).for(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'with excessively long URLs' do
|
|
let(:text) { "http://example.com/valid?#{'#foo?' * 1000}" }
|
|
|
|
it { is_expected.to_not allow_value(text).for(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'when remote account usernames cause limit excess' do
|
|
let(:text) { ('a' * 75) + " @alice@#{'b' * 30}.com" }
|
|
|
|
it { is_expected.to allow_value(text).for(:text) }
|
|
end
|
|
|
|
context 'when remote usernames are attached to long domains' do
|
|
let(:text) { "@alice@#{'b' * Extractor::MAX_DOMAIN_LENGTH * 2}.com" }
|
|
|
|
it { is_expected.to_not allow_value(text).for(:text).with_message(too_long_message) }
|
|
end
|
|
|
|
context 'with special character strings' do
|
|
let(:multibyte_emoji) { '✨' * described_class::MAX_CHARS }
|
|
let(:zwj_sequence) { '🏳️⚧️' * described_class::MAX_CHARS }
|
|
|
|
it { is_expected.to allow_values(multibyte_emoji, zwj_sequence).for(:text) }
|
|
end
|
|
|
|
private
|
|
|
|
def too_long_message
|
|
I18n.t('statuses.over_character_limit', max: described_class::MAX_CHARS)
|
|
end
|
|
|
|
def starting_string
|
|
'a' * 76
|
|
end
|
|
|
|
def example_link
|
|
"http://#{'b' * 30}.com/example"
|
|
end
|
|
end
|