2018-12-23 13:11:29 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 15:44:49 -07:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:11:29 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-12-11 10:22:48 -07:00
|
|
|
defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
2019-08-09 11:08:01 -06:00
|
|
|
use Oban.Testing, repo: Pleroma.Repo
|
|
|
|
|
2017-12-11 10:22:48 -07:00
|
|
|
import Pleroma.Factory
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Activity
|
2020-03-09 11:51:44 -06:00
|
|
|
alias Pleroma.Config
|
2019-09-12 12:37:36 -06:00
|
|
|
alias Pleroma.Delivery
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Instances
|
2019-02-10 14:57:38 -07:00
|
|
|
alias Pleroma.Object
|
2019-08-13 11:20:26 -06:00
|
|
|
alias Pleroma.Tests.ObanHelpers
|
2019-02-10 14:57:38 -07:00
|
|
|
alias Pleroma.User
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Web.ActivityPub.ObjectView
|
2019-08-22 12:32:40 -06:00
|
|
|
alias Pleroma.Web.ActivityPub.Relay
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Web.ActivityPub.UserView
|
2019-05-31 21:26:45 -06:00
|
|
|
alias Pleroma.Web.ActivityPub.Utils
|
2019-07-12 11:54:20 -06:00
|
|
|
alias Pleroma.Web.CommonAPI
|
2019-08-31 10:08:56 -06:00
|
|
|
alias Pleroma.Workers.ReceiverWorker
|
2018-09-08 06:02:38 -06:00
|
|
|
|
2018-12-04 06:39:08 -07:00
|
|
|
setup_all do
|
|
|
|
Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
|
|
|
|
:ok
|
|
|
|
end
|
2018-12-04 07:48:55 -07:00
|
|
|
|
2020-03-20 09:33:00 -06:00
|
|
|
setup do: clear_config([:instance, :federating], true)
|
2019-08-19 09:34:29 -06:00
|
|
|
|
2018-09-08 06:02:38 -06:00
|
|
|
describe "/relay" do
|
2020-03-20 09:33:00 -06:00
|
|
|
setup do: clear_config([:instance, :allow_relay])
|
2019-08-19 09:34:29 -06:00
|
|
|
|
2018-09-08 06:02:38 -06:00
|
|
|
test "with the relay active, it returns the relay user", %{conn: conn} do
|
|
|
|
res =
|
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert res["id"] =~ "/relay"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "with the relay disabled, it returns 404", %{conn: conn} do
|
2020-03-09 11:51:44 -06:00
|
|
|
Config.put([:instance, :allow_relay], false)
|
2018-09-08 06:02:38 -06:00
|
|
|
|
2018-12-11 05:31:52 -07:00
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(404)
|
2020-03-09 11:51:44 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(404)
|
2018-09-08 06:02:38 -06:00
|
|
|
end
|
|
|
|
end
|
2017-12-11 10:22:48 -07:00
|
|
|
|
2019-07-17 11:48:08 -06:00
|
|
|
describe "/internal/fetch" do
|
|
|
|
test "it returns the internal fetch user", %{conn: conn} do
|
|
|
|
res =
|
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :internal_fetch))
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert res["id"] =~ "/fetch"
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_pub_path(conn, :internal_fetch))
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-07-17 11:48:08 -06:00
|
|
|
end
|
|
|
|
|
2017-12-11 10:22:48 -07:00
|
|
|
describe "/users/:nickname" do
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the user with accept application/json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 13:45:09 -07:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/#{user.nickname}")
|
|
|
|
|
2019-04-22 01:20:43 -06:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2019-02-20 13:45:09 -07:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
|
|
|
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the user with accept application/activity+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2017-12-11 10:22:48 -07:00
|
|
|
user = insert(:user)
|
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}")
|
2017-12-11 10:22:48 -07:00
|
|
|
|
2019-04-22 01:20:43 -06:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2017-12-11 10:22:48 -07:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
2019-02-20 13:45:09 -07:00
|
|
|
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the user with accept application/ld+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 13:45:09 -07:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-20 13:49:10 -07:00
|
|
|
|> put_req_header(
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
2019-02-20 13:45:09 -07:00
|
|
|
|> get("/users/#{user.nickname}")
|
|
|
|
|
2019-04-22 01:20:43 -06:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2019-02-20 13:45:09 -07:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
2019-11-25 07:19:33 -07:00
|
|
|
|
|
|
|
test "it returns 404 for remote users", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user, local: false, nickname: "remoteuser@example.com")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/#{user.nickname}.json")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "it returns error when user is not found", %{conn: conn} do
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/jimm")
|
|
|
|
|> json_response(404)
|
|
|
|
|
|
|
|
assert response == "Not found"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
put_req_header(
|
|
|
|
conn,
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/users/#{user.nickname}.json", user)
|
|
|
|
end
|
2017-12-11 10:22:48 -07:00
|
|
|
end
|
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
describe "/objects/:uuid" do
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the object with accept application/json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 13:45:09 -07:00
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
|
|
|
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the object with accept application/activity+json",
|
|
|
|
%{conn: conn} do
|
2017-12-11 10:22:48 -07:00
|
|
|
note = insert(:note)
|
2018-03-30 07:01:53 -06:00
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
2017-12-11 10:22:48 -07:00
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
2017-12-11 10:22:48 -07:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
2018-05-30 12:00:27 -06:00
|
|
|
|
2019-02-20 13:49:10 -07:00
|
|
|
test "it returns a json representation of the object with accept application/ld+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 13:45:09 -07:00
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-20 13:49:10 -07:00
|
|
|
|> put_req_header(
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
2019-02-20 13:45:09 -07:00
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
|
|
|
|
2018-05-30 12:00:27 -06:00
|
|
|
test "it returns 404 for non-public messages", %{conn: conn} do
|
|
|
|
note = insert(:direct_note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-01-05 02:38:38 -07:00
|
|
|
|
|
|
|
test "it returns 404 for tombstone objects", %{conn: conn} do
|
|
|
|
tombstone = insert(:tombstone)
|
|
|
|
uuid = String.split(tombstone.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-09-09 12:53:08 -06:00
|
|
|
|
|
|
|
test "it caches a response", %{conn: conn} do
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok) == json_response(conn2, :ok)
|
|
|
|
assert Enum.any?(conn2.resp_headers, &(&1 == {"x-cache", "HIT from Pleroma"}))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "cached purged after object deletion", %{conn: conn} do
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
Object.delete(note)
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert "Not found" == json_response(conn2, :not_found)
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/objects/#{uuid}", user)
|
|
|
|
end
|
2017-12-11 10:22:48 -07:00
|
|
|
end
|
|
|
|
|
2019-01-08 15:22:15 -07:00
|
|
|
describe "/activities/:uuid" do
|
|
|
|
test "it returns a json representation of the activity", %{conn: conn} do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: activity})
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 404 for non-public activities", %{conn: conn} do
|
|
|
|
activity = insert(:direct_note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-09-09 12:53:08 -06:00
|
|
|
|
|
|
|
test "it caches a response", %{conn: conn} do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok) == json_response(conn2, :ok)
|
|
|
|
assert Enum.any?(conn2.resp_headers, &(&1 == {"x-cache", "HIT from Pleroma"}))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "cached purged after activity deletion", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{"status" => "cofe"})
|
|
|
|
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
2019-12-04 16:50:38 -07:00
|
|
|
Activity.delete_all_by_object_ap_id(activity.object.data["id"])
|
2019-09-09 12:53:08 -06:00
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert "Not found" == json_response(conn2, :not_found)
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/activities/#{uuid}", user)
|
|
|
|
end
|
2019-01-08 15:22:15 -07:00
|
|
|
end
|
|
|
|
|
2018-10-24 23:24:17 -06:00
|
|
|
describe "/inbox" do
|
2018-02-15 12:00:43 -07:00
|
|
|
test "it inserts an incoming activity into the database", %{conn: conn} do
|
2018-03-30 07:01:53 -06:00
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
2018-02-15 12:00:43 -07:00
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", data)
|
2018-02-15 12:00:43 -07:00
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 11:08:01 -06:00
|
|
|
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2018-02-25 08:40:37 -07:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
2017-12-11 10:22:48 -07:00
|
|
|
end
|
2019-01-25 10:38:54 -07:00
|
|
|
|
|
|
|
test "it clears `unreachable` federation status of the sender", %{conn: conn} do
|
2019-01-29 03:12:28 -07:00
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
|
|
|
|
|
|
|
sender_url = data["actor"]
|
2019-01-28 05:25:06 -07:00
|
|
|
Instances.set_consistently_unreachable(sender_url)
|
2019-01-25 10:38:54 -07:00
|
|
|
refute Instances.reachable?(sender_url)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
assert Instances.reachable?(sender_url)
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
2020-02-25 06:21:48 -07:00
|
|
|
test "accept follow activity", %{conn: conn} do
|
|
|
|
Pleroma.Config.put([:instance, :federating], true)
|
|
|
|
relay = Relay.get_actor()
|
|
|
|
|
|
|
|
assert {:ok, %Activity{} = activity} = Relay.follow("https://relay.mastodon.host/actor")
|
|
|
|
|
|
|
|
followed_relay = Pleroma.User.get_by_ap_id("https://relay.mastodon.host/actor")
|
|
|
|
relay = refresh_record(relay)
|
|
|
|
|
|
|
|
accept =
|
|
|
|
File.read!("test/fixtures/relay/accept-follow.json")
|
|
|
|
|> String.replace("{{ap_id}}", relay.ap_id)
|
|
|
|
|> String.replace("{{activity_id}}", activity.data["id"])
|
|
|
|
|
|
|
|
assert "ok" ==
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", accept)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
|
|
|
|
assert Pleroma.FollowingRelationship.following?(
|
|
|
|
relay,
|
|
|
|
followed_relay
|
|
|
|
)
|
|
|
|
|
|
|
|
Mix.shell(Mix.Shell.Process)
|
|
|
|
|
|
|
|
on_exit(fn ->
|
|
|
|
Mix.shell(Mix.Shell.IO)
|
|
|
|
end)
|
|
|
|
|
|
|
|
:ok = Mix.Tasks.Pleroma.Relay.run(["list"])
|
|
|
|
assert_receive {:mix_shell, :info, ["relay.mastodon.host"]}
|
|
|
|
end
|
2020-03-12 03:07:07 -06:00
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
test "without valid signature, " <>
|
|
|
|
"it only accepts Create activities and requires enabled federation",
|
|
|
|
%{conn: conn} do
|
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
|
|
|
non_create_data = File.read!("test/fixtures/mastodon-announce.json") |> Poison.decode!()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "content-type", "application/activity+json")
|
|
|
|
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", data)
|
|
|
|
|> json_response(403)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", non_create_data)
|
|
|
|
|> json_response(403)
|
|
|
|
|
|
|
|
Config.put([:instance, :federating], true)
|
|
|
|
|
|
|
|
ret_conn = post(conn, "/inbox", data)
|
|
|
|
assert "ok" == json_response(ret_conn, 200)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", non_create_data)
|
|
|
|
|> json_response(400)
|
|
|
|
end
|
2017-12-11 10:22:48 -07:00
|
|
|
end
|
2018-03-31 12:02:09 -06:00
|
|
|
|
2018-10-24 23:24:17 -06:00
|
|
|
describe "/users/:nickname/inbox" do
|
2019-05-31 21:26:45 -06:00
|
|
|
setup do
|
2018-10-24 23:24:17 -06:00
|
|
|
data =
|
|
|
|
File.read!("test/fixtures/mastodon-post-activity.json")
|
|
|
|
|> Poison.decode!()
|
2019-05-31 21:26:45 -06:00
|
|
|
|
|
|
|
[data: data]
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it inserts an incoming activity into the database", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
data = Map.put(data, "bcc", [user.ap_id])
|
2018-10-24 23:24:17 -06:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 11:08:01 -06:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2018-10-24 23:24:17 -06:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
2018-12-29 10:01:15 -07:00
|
|
|
|
2019-10-22 19:50:25 -06:00
|
|
|
test "it accepts messages with to as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "to", user.ap_id)
|
|
|
|
|> Map.delete("cc")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts messages with cc as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "cc", user.ap_id)
|
|
|
|
|> Map.delete("to")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
%Activity{} = activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
assert user.ap_id in activity.recipients
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts messages with bcc as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "bcc", user.ap_id)
|
|
|
|
|> Map.delete("to")
|
|
|
|
|> Map.delete("cc")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts announces with to as string instead of array", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
|
|
|
"actor" => "http://mastodon.example.org/users/admin",
|
|
|
|
"id" => "http://mastodon.example.org/users/admin/statuses/19512778738411822/activity",
|
|
|
|
"object" => "https://mastodon.social/users/emelie/statuses/101849165031453009",
|
|
|
|
"to" => "https://www.w3.org/ns/activitystreams#Public",
|
|
|
|
"cc" => [user.ap_id],
|
|
|
|
"type" => "Announce"
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
%Activity{} = activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
assert "https://www.w3.org/ns/activitystreams#Public" in activity.recipients
|
|
|
|
end
|
|
|
|
|
2019-05-31 21:26:45 -06:00
|
|
|
test "it accepts messages from actors that are followed by the user", %{
|
|
|
|
conn: conn,
|
|
|
|
data: data
|
|
|
|
} do
|
2019-04-16 12:10:15 -06:00
|
|
|
recipient = insert(:user)
|
|
|
|
actor = insert(:user, %{ap_id: "http://mastodon.example.org/users/actor"})
|
|
|
|
|
|
|
|
{:ok, recipient} = User.follow(recipient, actor)
|
|
|
|
|
|
|
|
object =
|
|
|
|
data["object"]
|
|
|
|
|> Map.put("attributedTo", actor.ap_id)
|
|
|
|
|
|
|
|
data =
|
|
|
|
data
|
|
|
|
|> Map.put("actor", actor.ap_id)
|
|
|
|
|> Map.put("object", object)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{recipient.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 11:08:01 -06:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2019-04-16 12:10:15 -06:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
2018-12-29 10:01:15 -07:00
|
|
|
test "it rejects reads from other users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
2020-03-09 11:51:44 -06:00
|
|
|
other_user = insert(:user)
|
2019-09-09 12:11:57 -06:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, other_user)
|
2019-09-09 12:11:57 -06:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}/inbox")
|
|
|
|
|
|
|
|
assert json_response(conn, 403)
|
|
|
|
end
|
|
|
|
|
2018-12-29 10:15:28 -07:00
|
|
|
test "it returns a note activity in a collection", %{conn: conn} do
|
|
|
|
note_activity = insert(:direct_note_activity)
|
2019-07-08 10:53:02 -06:00
|
|
|
note_object = Object.normalize(note_activity)
|
2018-12-29 10:15:28 -07:00
|
|
|
user = User.get_cached_by_ap_id(hd(note_activity.data["to"]))
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 06:59:04 -06:00
|
|
|
|> get("/users/#{user.nickname}/inbox?page=true")
|
2018-12-29 10:15:28 -07:00
|
|
|
|
2019-07-08 10:53:02 -06:00
|
|
|
assert response(conn, 200) =~ note_object.data["content"]
|
2018-12-29 10:15:28 -07:00
|
|
|
end
|
2019-01-25 10:38:54 -07:00
|
|
|
|
2019-05-31 21:26:45 -06:00
|
|
|
test "it clears `unreachable` federation status of the sender", %{conn: conn, data: data} do
|
2019-01-25 10:38:54 -07:00
|
|
|
user = insert(:user)
|
2019-05-31 21:26:45 -06:00
|
|
|
data = Map.put(data, "bcc", [user.ap_id])
|
2019-01-25 10:38:54 -07:00
|
|
|
|
2019-01-29 03:12:28 -07:00
|
|
|
sender_host = URI.parse(data["actor"]).host
|
|
|
|
Instances.set_consistently_unreachable(sender_host)
|
|
|
|
refute Instances.reachable?(sender_host)
|
|
|
|
|
2019-01-25 10:38:54 -07:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
assert Instances.reachable?(sender_host)
|
|
|
|
end
|
2019-05-31 21:26:45 -06:00
|
|
|
|
|
|
|
test "it removes all follower collections but actor's", %{conn: conn} do
|
|
|
|
[actor, recipient] = insert_pair(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
File.read!("test/fixtures/activitypub-client-post-activity.json")
|
|
|
|
|> Poison.decode!()
|
|
|
|
|
|
|
|
object = Map.put(data["object"], "attributedTo", actor.ap_id)
|
|
|
|
|
|
|
|
data =
|
|
|
|
data
|
|
|
|
|> Map.put("id", Utils.generate_object_id())
|
|
|
|
|> Map.put("actor", actor.ap_id)
|
|
|
|
|> Map.put("object", object)
|
|
|
|
|> Map.put("cc", [
|
|
|
|
recipient.follower_address,
|
|
|
|
actor.follower_address
|
|
|
|
])
|
|
|
|
|> Map.put("to", [
|
|
|
|
recipient.ap_id,
|
|
|
|
recipient.follower_address,
|
|
|
|
"https://www.w3.org/ns/activitystreams#Public"
|
|
|
|
])
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{recipient.nickname}/inbox", data)
|
|
|
|
|> json_response(200)
|
|
|
|
|
2019-08-09 11:08:01 -06:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
|
2019-05-31 21:26:45 -06:00
|
|
|
activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
|
|
|
|
assert activity.id
|
|
|
|
assert actor.follower_address in activity.recipients
|
|
|
|
assert actor.follower_address in activity.data["cc"]
|
|
|
|
|
|
|
|
refute recipient.follower_address in activity.recipients
|
|
|
|
refute recipient.follower_address in activity.data["cc"]
|
|
|
|
refute recipient.follower_address in activity.data["to"]
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "it requires authentication", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ret_conn = get(conn, "/users/#{user.nickname}/inbox")
|
|
|
|
assert json_response(ret_conn, 403)
|
|
|
|
|
|
|
|
ret_conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/inbox")
|
|
|
|
|
|
|
|
assert json_response(ret_conn, 200)
|
|
|
|
end
|
2018-10-24 23:24:17 -06:00
|
|
|
end
|
|
|
|
|
2020-03-05 11:19:21 -07:00
|
|
|
describe "GET /users/:nickname/outbox" do
|
2020-03-09 11:51:44 -06:00
|
|
|
test "it returns 200 even if there're no activities", %{conn: conn} do
|
2019-02-21 21:37:48 -07:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2019-02-21 21:37:48 -07:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}/outbox")
|
|
|
|
|
|
|
|
result = json_response(conn, 200)
|
|
|
|
assert user.ap_id <> "/outbox" == result["id"]
|
|
|
|
end
|
|
|
|
|
2018-07-20 11:57:56 -06:00
|
|
|
test "it returns a note activity in a collection", %{conn: conn} do
|
2018-07-20 10:44:35 -06:00
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 10:53:02 -06:00
|
|
|
note_object = Object.normalize(note_activity)
|
2018-07-20 10:44:35 -06:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-07-20 11:19:20 -06:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 06:59:04 -06:00
|
|
|
|> get("/users/#{user.nickname}/outbox?page=true")
|
2018-07-20 10:44:35 -06:00
|
|
|
|
2019-07-08 10:53:02 -06:00
|
|
|
assert response(conn, 200) =~ note_object.data["content"]
|
2018-07-20 10:44:35 -06:00
|
|
|
end
|
2018-07-20 11:57:56 -06:00
|
|
|
|
|
|
|
test "it returns an announce activity in a collection", %{conn: conn} do
|
|
|
|
announce_activity = insert(:announce_activity)
|
|
|
|
user = User.get_cached_by_ap_id(announce_activity.data["actor"])
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-07-20 11:57:56 -06:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 06:59:04 -06:00
|
|
|
|> get("/users/#{user.nickname}/outbox?page=true")
|
2018-07-20 11:57:56 -06:00
|
|
|
|
|
|
|
assert response(conn, 200) =~ announce_activity.data["object"]
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/users/#{user.nickname}/outbox", user)
|
|
|
|
end
|
2020-03-05 11:19:21 -07:00
|
|
|
end
|
2018-12-29 10:01:15 -07:00
|
|
|
|
2020-03-05 11:19:21 -07:00
|
|
|
describe "POST /users/:nickname/outbox" do
|
2020-03-09 11:51:44 -06:00
|
|
|
test "it rejects posts from other users / unauuthenticated users", %{conn: conn} do
|
2018-12-29 10:01:15 -07:00
|
|
|
data = File.read!("test/fixtures/activitypub-client-post-activity.json") |> Poison.decode!()
|
|
|
|
user = insert(:user)
|
2020-03-09 11:51:44 -06:00
|
|
|
other_user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "content-type", "application/activity+json")
|
2018-12-29 10:01:15 -07:00
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
conn
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|> json_response(403)
|
2018-12-29 10:01:15 -07:00
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
conn
|
|
|
|
|> assign(:user, other_user)
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|> json_response(403)
|
2018-12-29 10:01:15 -07:00
|
|
|
end
|
2018-12-29 10:21:45 -07:00
|
|
|
|
2019-01-01 15:19:40 -07:00
|
|
|
test "it inserts an incoming create activity into the database", %{conn: conn} do
|
2018-12-29 10:21:45 -07:00
|
|
|
data = File.read!("test/fixtures/activitypub-client-post-activity.json") |> Poison.decode!()
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
result = json_response(conn, 201)
|
2019-08-09 11:08:01 -06:00
|
|
|
|
2018-12-29 10:21:45 -07:00
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
end
|
2019-01-01 14:16:46 -07:00
|
|
|
|
|
|
|
test "it rejects an incoming activity with bogus type", %{conn: conn} do
|
|
|
|
data = File.read!("test/fixtures/activitypub-client-post-activity.json") |> Poison.decode!()
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
data
|
|
|
|
|> Map.put("type", "BadType")
|
|
|
|
|
2019-01-01 15:19:40 -07:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
assert json_response(conn, 400)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it erects a tombstone when receiving a delete activity", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 10:53:02 -06:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-01 15:19:40 -07:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Delete",
|
|
|
|
object: %{
|
2019-07-08 10:53:02 -06:00
|
|
|
id: note_object.data["id"]
|
2019-01-01 15:19:40 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
result = json_response(conn, 201)
|
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
|
2019-07-08 10:53:02 -06:00
|
|
|
assert object = Object.get_by_ap_id(note_object.data["id"])
|
2019-01-01 15:19:40 -07:00
|
|
|
assert object.data["type"] == "Tombstone"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it rejects delete activity of object from other actor", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 10:53:02 -06:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-01 15:19:40 -07:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Delete",
|
|
|
|
object: %{
|
2019-07-08 10:53:02 -06:00
|
|
|
id: note_object.data["id"]
|
2019-01-01 15:19:40 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-01 14:16:46 -07:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
assert json_response(conn, 400)
|
|
|
|
end
|
2019-01-08 11:22:26 -07:00
|
|
|
|
|
|
|
test "it increases like count when receiving a like action", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 10:53:02 -06:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-08 11:22:26 -07:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Like",
|
|
|
|
object: %{
|
2019-07-08 10:53:02 -06:00
|
|
|
id: note_object.data["id"]
|
2019-01-08 11:22:26 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
result = json_response(conn, 201)
|
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
|
2019-07-08 10:53:02 -06:00
|
|
|
assert object = Object.get_by_ap_id(note_object.data["id"])
|
2019-01-08 11:22:26 -07:00
|
|
|
assert object.data["like_count"] == 1
|
|
|
|
end
|
2018-07-20 10:44:35 -06:00
|
|
|
end
|
|
|
|
|
2019-08-21 21:57:55 -06:00
|
|
|
describe "/relay/followers" do
|
|
|
|
test "it returns relay followers", %{conn: conn} do
|
|
|
|
relay_actor = Relay.get_actor()
|
|
|
|
user = insert(:user)
|
|
|
|
User.follow(user, relay_actor)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> get("/relay/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user.ap_id]
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/relay/followers")
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-08-21 21:57:55 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "/relay/following" do
|
|
|
|
test "it returns relay following", %{conn: conn} do
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> get("/relay/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == []
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/relay/following")
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-08-21 21:57:55 -06:00
|
|
|
end
|
|
|
|
|
2018-03-31 12:02:09 -06:00
|
|
|
describe "/users/:nickname/followers" do
|
|
|
|
test "it returns the followers in a collection", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user_two)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user_two.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user.ap_id]
|
|
|
|
end
|
|
|
|
|
2020-03-03 12:22:02 -07:00
|
|
|
test "it returns a uri if the user has 'hide_followers' set", %{conn: conn} do
|
2018-12-02 09:35:32 -07:00
|
|
|
user = insert(:user)
|
2019-10-16 12:59:21 -06:00
|
|
|
user_two = insert(:user, hide_followers: true)
|
2018-12-02 09:35:32 -07:00
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-12-02 09:35:32 -07:00
|
|
|
|> get("/users/#{user_two.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
2019-07-12 10:41:05 -06:00
|
|
|
assert is_binary(result["first"])
|
2018-12-02 09:35:32 -07:00
|
|
|
end
|
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
test "it returns a 403 error on pages, if the user has 'hide_followers' set and the request is from another user",
|
2019-07-12 11:54:20 -06:00
|
|
|
%{conn: conn} do
|
2020-03-09 11:51:44 -06:00
|
|
|
user = insert(:user)
|
|
|
|
other_user = insert(:user, hide_followers: true)
|
2019-07-12 11:54:20 -06:00
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{other_user.nickname}/followers?page=1")
|
2019-07-12 11:54:20 -06:00
|
|
|
|
|
|
|
assert result.status == 403
|
|
|
|
assert result.resp_body == ""
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it renders the page, if the user has 'hide_followers' set and the request is authenticated with the same user",
|
|
|
|
%{conn: conn} do
|
2019-10-16 12:59:21 -06:00
|
|
|
user = insert(:user, hide_followers: true)
|
2019-07-12 11:54:20 -06:00
|
|
|
other_user = insert(:user)
|
|
|
|
{:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/followers?page=1")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["totalItems"] == 1
|
|
|
|
assert result["orderedItems"] == [other_user.ap_id]
|
|
|
|
end
|
|
|
|
|
2018-03-31 12:02:09 -06:00
|
|
|
test "it works for more than 10 users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
Enum.each(1..15, fn _ ->
|
|
|
|
other_user = insert(:user)
|
|
|
|
User.follow(other_user, user)
|
|
|
|
end)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["first"]["orderedItems"]) == 10
|
|
|
|
assert result["first"]["totalItems"] == 15
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user.nickname}/followers?page=2")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["orderedItems"]) == 5
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "returns 403 if requester is not logged in", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/users/#{user.nickname}/followers")
|
|
|
|
|> json_response(403)
|
|
|
|
end
|
2018-03-31 12:02:09 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "/users/:nickname/following" do
|
|
|
|
test "it returns the following in a collection", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user_two.ap_id]
|
|
|
|
end
|
|
|
|
|
2019-07-12 10:41:05 -06:00
|
|
|
test "it returns a uri if the user has 'hide_follows' set", %{conn: conn} do
|
2020-03-09 11:51:44 -06:00
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user, hide_follows: true)
|
2018-12-02 09:35:32 -07:00
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user_two.nickname}/following")
|
2018-12-02 09:35:32 -07:00
|
|
|
|> json_response(200)
|
|
|
|
|
2019-07-12 10:41:05 -06:00
|
|
|
assert is_binary(result["first"])
|
2018-12-02 09:35:32 -07:00
|
|
|
end
|
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
test "it returns a 403 error on pages, if the user has 'hide_follows' set and the request is from another user",
|
2019-07-12 11:54:20 -06:00
|
|
|
%{conn: conn} do
|
2020-03-09 11:51:44 -06:00
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user, hide_follows: true)
|
2019-07-12 11:54:20 -06:00
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user_two.nickname}/following?page=1")
|
2019-07-12 11:54:20 -06:00
|
|
|
|
|
|
|
assert result.status == 403
|
|
|
|
assert result.resp_body == ""
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it renders the page, if the user has 'hide_follows' set and the request is authenticated with the same user",
|
|
|
|
%{conn: conn} do
|
2019-10-16 12:59:21 -06:00
|
|
|
user = insert(:user, hide_follows: true)
|
2019-07-12 11:54:20 -06:00
|
|
|
other_user = insert(:user)
|
|
|
|
{:ok, user, _other_user, _activity} = CommonAPI.follow(user, other_user)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/following?page=1")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["totalItems"] == 1
|
|
|
|
assert result["orderedItems"] == [other_user.ap_id]
|
|
|
|
end
|
|
|
|
|
2018-03-31 12:02:09 -06:00
|
|
|
test "it works for more than 10 users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
Enum.each(1..15, fn _ ->
|
2019-04-22 01:20:43 -06:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2018-03-31 12:02:09 -06:00
|
|
|
other_user = insert(:user)
|
|
|
|
User.follow(user, other_user)
|
|
|
|
end)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["first"]["orderedItems"]) == 10
|
|
|
|
assert result["first"]["totalItems"] == 15
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 11:51:44 -06:00
|
|
|
|> assign(:user, user)
|
2018-03-31 12:02:09 -06:00
|
|
|
|> get("/users/#{user.nickname}/following?page=2")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["orderedItems"]) == 5
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
end
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
test "returns 403 if requester is not logged in", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(403)
|
|
|
|
end
|
2018-03-31 12:02:09 -06:00
|
|
|
end
|
2019-09-12 12:37:36 -06:00
|
|
|
|
|
|
|
describe "delivery tracking" do
|
|
|
|
test "it tracks a signed object fetch", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed activity fetch", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
activity_path = String.trim_leading(activity.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed object fetch when the json is cached", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
other_user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
build_conn()
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, other_user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
assert Delivery.get(object.id, other_user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed activity fetch when the json is cached", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
other_user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
activity_path = String.trim_leading(activity.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
build_conn()
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, other_user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
assert Delivery.get(object.id, other_user.id)
|
|
|
|
end
|
|
|
|
end
|
2019-09-23 10:54:23 -06:00
|
|
|
|
2020-03-02 11:43:18 -07:00
|
|
|
describe "Additional ActivityPub C2S endpoints" do
|
2020-03-09 11:51:44 -06:00
|
|
|
test "GET /api/ap/whoami", %{conn: conn} do
|
2019-09-23 10:54:23 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/api/ap/whoami")
|
|
|
|
|
|
|
|
user = User.get_cached_by_id(user.id)
|
|
|
|
|
|
|
|
assert UserView.render("user.json", %{user: user}) == json_response(conn, 200)
|
2020-03-09 11:51:44 -06:00
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/api/ap/whoami")
|
|
|
|
|> json_response(403)
|
2019-09-23 10:54:23 -06:00
|
|
|
end
|
2019-09-23 11:16:36 -06:00
|
|
|
|
2020-03-20 09:33:00 -06:00
|
|
|
setup do: clear_config([:media_proxy])
|
|
|
|
setup do: clear_config([Pleroma.Upload])
|
2019-09-23 11:16:36 -06:00
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
test "POST /api/ap/upload_media", %{conn: conn} do
|
2019-09-23 11:16:36 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
desc = "Description of the image"
|
|
|
|
|
|
|
|
image = %Plug.Upload{
|
|
|
|
content_type: "image/jpg",
|
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-09-24 11:03:06 -06:00
|
|
|
|> post("/api/ap/upload_media", %{"file" => image, "description" => desc})
|
2019-09-23 11:16:36 -06:00
|
|
|
|
|
|
|
assert object = json_response(conn, :created)
|
|
|
|
assert object["name"] == desc
|
|
|
|
assert object["type"] == "Document"
|
|
|
|
assert object["actor"] == user.ap_id
|
2020-03-02 11:43:18 -07:00
|
|
|
|
2020-03-09 11:51:44 -06:00
|
|
|
conn
|
|
|
|
|> post("/api/ap/upload_media", %{"file" => image, "description" => desc})
|
|
|
|
|> json_response(403)
|
2020-03-02 11:43:18 -07:00
|
|
|
end
|
|
|
|
end
|
2017-12-11 10:22:48 -07:00
|
|
|
end
|