2018-12-23 13:11:29 -07:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-12 23:49:20 -07:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 13:11:29 -07:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-03-21 02:21:52 -06:00
|
|
|
defmodule Pleroma.Web.ActivityPub.ActivityPubTest do
|
2023-08-01 04:43:50 -06:00
|
|
|
use Pleroma.DataCase, async: false
|
2023-08-04 05:50:50 -06:00
|
|
|
@moduletag :mocked
|
2019-10-30 05:21:49 -06:00
|
|
|
use Oban.Testing, repo: Pleroma.Repo
|
|
|
|
|
2019-02-10 14:57:38 -07:00
|
|
|
alias Pleroma.Activity
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Builders.ActivityBuilder
|
2022-12-01 08:00:53 -07:00
|
|
|
alias Pleroma.Web.ActivityPub.Builder
|
2019-12-30 01:30:20 -07:00
|
|
|
alias Pleroma.Config
|
2019-11-12 04:48:14 -07:00
|
|
|
alias Pleroma.Notification
|
2019-02-10 14:57:38 -07:00
|
|
|
alias Pleroma.Object
|
|
|
|
alias Pleroma.User
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Web.ActivityPub.ActivityPub
|
|
|
|
alias Pleroma.Web.ActivityPub.Utils
|
2019-10-23 13:27:22 -06:00
|
|
|
alias Pleroma.Web.AdminAPI.AccountView
|
2019-03-04 19:52:23 -07:00
|
|
|
alias Pleroma.Web.CommonAPI
|
2017-03-21 02:21:52 -06:00
|
|
|
|
2020-05-04 06:22:54 -06:00
|
|
|
import ExUnit.CaptureLog
|
|
|
|
import Mock
|
2017-04-13 07:50:05 -06:00
|
|
|
import Pleroma.Factory
|
2018-12-03 08:53:22 -07:00
|
|
|
import Tesla.Mock
|
|
|
|
|
|
|
|
setup do
|
2022-07-17 18:56:35 -06:00
|
|
|
clear_config([Pleroma.Upload, :uploader], Pleroma.Uploaders.Local)
|
|
|
|
clear_config([Pleroma.Uploaders.Local, :uploads], "uploads")
|
2018-12-03 08:53:22 -07:00
|
|
|
mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
|
|
|
|
:ok
|
|
|
|
end
|
2017-04-13 07:50:05 -06:00
|
|
|
|
2020-03-20 09:33:00 -06:00
|
|
|
setup do: clear_config([:instance, :federating])
|
2019-08-27 07:21:03 -06:00
|
|
|
|
2019-05-03 05:39:14 -06:00
|
|
|
describe "streaming out participations" do
|
|
|
|
test "it streams them out" do
|
|
|
|
user = insert(:user)
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
|
2019-05-03 05:39:14 -06:00
|
|
|
|
|
|
|
{:ok, conversation} = Pleroma.Conversation.create_or_bump_for(activity)
|
|
|
|
|
|
|
|
participations =
|
|
|
|
conversation.participations
|
|
|
|
|> Repo.preload(:user)
|
|
|
|
|
|
|
|
with_mock Pleroma.Web.Streamer,
|
|
|
|
stream: fn _, _ -> nil end do
|
|
|
|
ActivityPub.stream_out_participations(conversation.participations)
|
|
|
|
|
2019-09-16 04:03:37 -06:00
|
|
|
assert called(Pleroma.Web.Streamer.stream("participation", participations))
|
2019-05-03 05:39:14 -06:00
|
|
|
end
|
|
|
|
end
|
2019-10-17 06:25:15 -06:00
|
|
|
|
|
|
|
test "streams them out on activity creation" do
|
|
|
|
user_one = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
|
|
|
|
with_mock Pleroma.Web.Streamer,
|
|
|
|
stream: fn _, _ -> nil end do
|
|
|
|
{:ok, activity} =
|
|
|
|
CommonAPI.post(user_one, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{user_two.nickname}",
|
|
|
|
visibility: "direct"
|
2019-10-17 06:25:15 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
conversation =
|
|
|
|
activity.data["context"]
|
|
|
|
|> Pleroma.Conversation.get_for_ap_id()
|
|
|
|
|> Repo.preload(participations: :user)
|
|
|
|
|
|
|
|
assert called(Pleroma.Web.Streamer.stream("participation", conversation.participations))
|
|
|
|
end
|
|
|
|
end
|
2019-05-03 05:39:14 -06:00
|
|
|
end
|
|
|
|
|
2019-01-09 08:45:09 -07:00
|
|
|
describe "fetching restricted by visibility" do
|
|
|
|
test "it restricts by the appropriate visibility" do
|
|
|
|
user = insert(:user)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, public_activity} = CommonAPI.post(user, %{status: ".", visibility: "public"})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, direct_activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, unlisted_activity} = CommonAPI.post(user, %{status: ".", visibility: "unlisted"})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, private_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{visibility: "direct", actor_id: user.ap_id})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
|
|
|
assert activities == [direct_activity]
|
|
|
|
|
|
|
|
activities =
|
2020-06-04 11:33:16 -06:00
|
|
|
ActivityPub.fetch_activities([], %{visibility: "unlisted", actor_id: user.ap_id})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
|
|
|
assert activities == [unlisted_activity]
|
|
|
|
|
|
|
|
activities =
|
2020-06-04 11:33:16 -06:00
|
|
|
ActivityPub.fetch_activities([], %{visibility: "private", actor_id: user.ap_id})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
|
|
|
assert activities == [private_activity]
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{visibility: "public", actor_id: user.ap_id})
|
2019-01-09 08:45:09 -07:00
|
|
|
|
|
|
|
assert activities == [public_activity]
|
2019-02-28 23:37:29 -07:00
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
visibility: ~w[private public],
|
|
|
|
actor_id: user.ap_id
|
2019-02-28 23:37:29 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
assert activities == [public_activity, private_activity]
|
2019-01-09 08:45:09 -07:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-10-08 14:05:57 -06:00
|
|
|
describe "fetching excluded by visibility" do
|
|
|
|
test "it excludes by the appropriate visibility" do
|
|
|
|
user = insert(:user)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, public_activity} = CommonAPI.post(user, %{status: ".", visibility: "public"})
|
2019-10-08 14:05:57 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, direct_activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
|
2019-10-08 14:05:57 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, unlisted_activity} = CommonAPI.post(user, %{status: ".", visibility: "unlisted"})
|
2019-10-08 14:05:57 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, private_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
|
2019-10-08 14:05:57 -06:00
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
exclude_visibilities: "direct",
|
|
|
|
actor_id: user.ap_id
|
2019-10-08 14:05:57 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
assert public_activity in activities
|
|
|
|
assert unlisted_activity in activities
|
|
|
|
assert private_activity in activities
|
|
|
|
refute direct_activity in activities
|
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
exclude_visibilities: "unlisted",
|
|
|
|
actor_id: user.ap_id
|
2019-10-08 14:05:57 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
assert public_activity in activities
|
|
|
|
refute unlisted_activity in activities
|
|
|
|
assert private_activity in activities
|
|
|
|
assert direct_activity in activities
|
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
exclude_visibilities: "private",
|
|
|
|
actor_id: user.ap_id
|
2019-10-08 14:05:57 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
assert public_activity in activities
|
|
|
|
assert unlisted_activity in activities
|
|
|
|
refute private_activity in activities
|
|
|
|
assert direct_activity in activities
|
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
exclude_visibilities: "public",
|
|
|
|
actor_id: user.ap_id
|
2019-10-08 14:05:57 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
refute public_activity in activities
|
|
|
|
assert unlisted_activity in activities
|
|
|
|
assert private_activity in activities
|
|
|
|
assert direct_activity in activities
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-02-11 09:20:02 -07:00
|
|
|
describe "building a user from his ap id" do
|
|
|
|
test "it returns a user" do
|
|
|
|
user_id = "http://mastodon.example.org/users/admin"
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
|
|
|
assert user.ap_id == user_id
|
|
|
|
assert user.nickname == "admin@mastodon.example.org"
|
2019-10-16 12:59:21 -06:00
|
|
|
assert user.ap_enabled
|
2018-02-11 09:20:02 -07:00
|
|
|
assert user.follower_address == "http://mastodon.example.org/users/admin/followers"
|
|
|
|
end
|
2019-01-10 08:07:32 -07:00
|
|
|
|
2019-10-05 14:41:33 -06:00
|
|
|
test "it returns a user that is invisible" do
|
|
|
|
user_id = "http://mastodon.example.org/users/relay"
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
2019-10-08 14:59:43 -06:00
|
|
|
assert User.invisible?(user)
|
2019-10-05 14:41:33 -06:00
|
|
|
end
|
|
|
|
|
2021-01-07 08:20:30 -07:00
|
|
|
test "works for guppe actors" do
|
|
|
|
user_id = "https://gup.pe/u/bernie2020"
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: ^user_id} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: File.read!("test/fixtures/guppe-actor.json"),
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
|
|
|
|
|
|
|
assert user.name == "Bernie2020 group"
|
|
|
|
assert user.actor_type == "Group"
|
|
|
|
end
|
2021-03-14 23:43:12 -06:00
|
|
|
|
|
|
|
test "works for bridgy actors" do
|
|
|
|
user_id = "https://fed.brid.gy/jk.nipponalba.scot"
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: ^user_id} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: File.read!("test/fixtures/bridgy/actor.json"),
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
|
|
|
|
|
|
|
assert user.actor_type == "Person"
|
|
|
|
|
|
|
|
assert user.avatar == %{
|
|
|
|
"type" => "Image",
|
|
|
|
"url" => [%{"href" => "https://jk.nipponalba.scot/images/profile.jpg"}]
|
|
|
|
}
|
|
|
|
|
|
|
|
assert user.banner == %{
|
|
|
|
"type" => "Image",
|
|
|
|
"url" => [%{"href" => "https://jk.nipponalba.scot/images/profile.jpg"}]
|
|
|
|
}
|
|
|
|
end
|
2021-02-03 06:09:28 -07:00
|
|
|
|
2024-05-26 10:09:26 -06:00
|
|
|
test "works for takahe actors" do
|
|
|
|
user_id = "https://fedi.vision/@vote@fedi.vision/"
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: ^user_id} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: File.read!("test/fixtures/users_mock/takahe_user.json"),
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
|
|
|
|
|
|
|
assert user.actor_type == "Person"
|
|
|
|
|
|
|
|
assert [
|
|
|
|
%{
|
|
|
|
"name" => "More details"
|
|
|
|
}
|
|
|
|
] = user.fields
|
|
|
|
end
|
|
|
|
|
2024-05-26 19:09:48 -06:00
|
|
|
test "works for actors with malformed attachment fields" do
|
|
|
|
user_id = "https://fedi.vision/@vote@fedi.vision/"
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: ^user_id} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: File.read!("test/fixtures/users_mock/nonsense_attachment_user.json"),
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
|
|
|
|
|
|
|
|
assert user.actor_type == "Person"
|
|
|
|
|
|
|
|
assert [] = user.fields
|
|
|
|
end
|
|
|
|
|
2021-02-03 06:09:28 -07:00
|
|
|
test "fetches user featured collection" do
|
|
|
|
ap_id = "https://example.com/users/lain"
|
|
|
|
|
|
|
|
featured_url = "https://example.com/users/lain/collections/featured"
|
|
|
|
|
|
|
|
user_data =
|
|
|
|
"test/fixtures/users_mock/user.json"
|
|
|
|
|> File.read!()
|
|
|
|
|> String.replace("{{nickname}}", "lain")
|
|
|
|
|> Jason.decode!()
|
|
|
|
|> Map.put("featured", featured_url)
|
|
|
|
|> Jason.encode!()
|
|
|
|
|
|
|
|
object_id = Ecto.UUID.generate()
|
|
|
|
|
|
|
|
featured_data =
|
2021-03-08 23:00:20 -07:00
|
|
|
"test/fixtures/mastodon/collections/featured.json"
|
2021-02-03 06:09:28 -07:00
|
|
|
|> File.read!()
|
|
|
|
|> String.replace("{{domain}}", "example.com")
|
|
|
|
|> String.replace("{{nickname}}", "lain")
|
|
|
|
|> String.replace("{{object_id}}", object_id)
|
|
|
|
|
|
|
|
object_url = "https://example.com/objects/#{object_id}"
|
|
|
|
|
|
|
|
object_data =
|
|
|
|
"test/fixtures/statuses/note.json"
|
|
|
|
|> File.read!()
|
|
|
|
|> String.replace("{{object_id}}", object_id)
|
|
|
|
|> String.replace("{{nickname}}", "lain")
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^ap_id
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: user_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^featured_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: featured_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^object_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: object_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id(ap_id)
|
2024-05-31 02:58:52 -06:00
|
|
|
# wait for oban
|
|
|
|
Pleroma.Tests.ObanHelpers.perform_all()
|
2021-02-03 06:09:28 -07:00
|
|
|
|
|
|
|
assert user.featured_address == featured_url
|
|
|
|
assert Map.has_key?(user.pinned_objects, object_url)
|
|
|
|
|
|
|
|
in_db = Pleroma.User.get_by_ap_id(ap_id)
|
|
|
|
assert in_db.featured_address == featured_url
|
|
|
|
assert Map.has_key?(user.pinned_objects, object_url)
|
|
|
|
|
|
|
|
assert %{data: %{"id" => ^object_url}} = Object.get_by_ap_id(object_url)
|
|
|
|
end
|
2020-07-03 05:58:34 -06:00
|
|
|
end
|
2019-01-10 08:07:32 -07:00
|
|
|
|
2022-07-03 09:59:12 -06:00
|
|
|
test "fetches user featured collection using the first property" do
|
Only allow exact id matches
This protects us from falling for obvious spoofs as from the current
upload exploit (unfortunately we can’t reasonably do anything about
spoofs with exact matches as was possible via emoji and proxy).
Such objects being invalid is supported by the spec, sepcifically
sections 3.1 and 3.2: https://www.w3.org/TR/activitypub/#obj-id
Anonymous objects are not relevant here (they can only exists within
parent objects iiuc) and neither is client-to-server or transient objects
(as those cannot be fetched in the first place).
This leaves us with the requirement for `id` to (a) exist and
(b) be a publicly dereferencable URI from the originating server.
This alone does not yet demand strict equivalence, but the spec then
further explains objects ought to be fetchable _via their ID_.
Meaning an object not retrievable via its ID, is invalid.
This reading is supported by the fact, e.g. GoToSocial (recently) and
Mastodon (for 6+ years) do already implement such strict ID checks,
additionally proving this doesn’t cause federation issues in practice.
However, apart from canonical IDs there can also be additional display
URLs. *omas first redirect those to their canonical location, but *keys
and Mastodon directly serve the AP representation without redirects.
Mastodon and GTS deal with this in two different ways,
but both constitute an effective countermeasure:
- Mastodon:
Unless it already is a known AP id, two fetches occur.
The first fetch just reads the `id` property and then refetches from
the id. The last fetch requires the returned id to exactly match the
URL the content was fetched from. (This can be optimised by skipping
the second fetch if it already matches)
https://github.com/mastodon/mastodon/blob/05eda8d19330a9c27c0cf07de19a87edff269057/app/helpers/jsonld_helper.rb#L168
https://github.com/mastodon/mastodon/commit/63f097979990bf5ba9db848b8a253056bad781af
- GTS:
Only does a single fetch and then checks if _either_ the id
_or_ url property (which can be an object) match the original fetch
URL. This relies on implementations always including their display URL
as "url" if differing from the id. For actors this is true for all
investigated implementations, for posts only Mastodon includes an
"url", but it is also the only one with a differing display URL.
https://github.com/superseriousbusiness/gotosocial/commit/2bafd7daf542d985ee76d9079a30a602cb7be827#diff-943bbb02c8ac74ac5dc5d20807e561dcdfaebdc3b62b10730f643a20ac23c24fR222
Albeit Mastodon’s refetch offers higher compatibility with theoretical
implmentations using either multiple different display URL or not
denoting any of them as "url" at all, for now we chose to adopt a
GTS-like refetch-free approach to avoid additional implementation
concerns wrt to whether redirects should be allowed when fetching a
canonical AP id and potential for accidentally loosening some checks
(e.g. cross-domain refetches) for one of the fetches.
This may be reconsidered in the future.
2024-03-15 18:00:19 -06:00
|
|
|
featured_url = "https://friendica.example.com/featured/raha"
|
2022-07-03 10:25:20 -06:00
|
|
|
first_url = "https://friendica.example.com/featured/raha?page=1"
|
2022-07-03 09:59:12 -06:00
|
|
|
|
|
|
|
featured_data =
|
|
|
|
"test/fixtures/friendica/friendica_featured_collection.json"
|
|
|
|
|> File.read!()
|
|
|
|
|
|
|
|
page_data =
|
2022-07-03 10:25:20 -06:00
|
|
|
"test/fixtures/friendica/friendica_featured_collection_first.json"
|
2022-07-03 09:59:12 -06:00
|
|
|
|> File.read!()
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^featured_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: featured_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^first_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: page_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, data} = ActivityPub.fetch_and_prepare_featured_from_ap_id(featured_url)
|
2022-07-03 10:25:20 -06:00
|
|
|
assert Map.has_key?(data, "http://inserted")
|
2022-07-03 09:59:12 -06:00
|
|
|
end
|
|
|
|
|
2022-07-26 08:08:35 -06:00
|
|
|
test "fetches user featured when it has string IDs" do
|
Only allow exact id matches
This protects us from falling for obvious spoofs as from the current
upload exploit (unfortunately we can’t reasonably do anything about
spoofs with exact matches as was possible via emoji and proxy).
Such objects being invalid is supported by the spec, sepcifically
sections 3.1 and 3.2: https://www.w3.org/TR/activitypub/#obj-id
Anonymous objects are not relevant here (they can only exists within
parent objects iiuc) and neither is client-to-server or transient objects
(as those cannot be fetched in the first place).
This leaves us with the requirement for `id` to (a) exist and
(b) be a publicly dereferencable URI from the originating server.
This alone does not yet demand strict equivalence, but the spec then
further explains objects ought to be fetchable _via their ID_.
Meaning an object not retrievable via its ID, is invalid.
This reading is supported by the fact, e.g. GoToSocial (recently) and
Mastodon (for 6+ years) do already implement such strict ID checks,
additionally proving this doesn’t cause federation issues in practice.
However, apart from canonical IDs there can also be additional display
URLs. *omas first redirect those to their canonical location, but *keys
and Mastodon directly serve the AP representation without redirects.
Mastodon and GTS deal with this in two different ways,
but both constitute an effective countermeasure:
- Mastodon:
Unless it already is a known AP id, two fetches occur.
The first fetch just reads the `id` property and then refetches from
the id. The last fetch requires the returned id to exactly match the
URL the content was fetched from. (This can be optimised by skipping
the second fetch if it already matches)
https://github.com/mastodon/mastodon/blob/05eda8d19330a9c27c0cf07de19a87edff269057/app/helpers/jsonld_helper.rb#L168
https://github.com/mastodon/mastodon/commit/63f097979990bf5ba9db848b8a253056bad781af
- GTS:
Only does a single fetch and then checks if _either_ the id
_or_ url property (which can be an object) match the original fetch
URL. This relies on implementations always including their display URL
as "url" if differing from the id. For actors this is true for all
investigated implementations, for posts only Mastodon includes an
"url", but it is also the only one with a differing display URL.
https://github.com/superseriousbusiness/gotosocial/commit/2bafd7daf542d985ee76d9079a30a602cb7be827#diff-943bbb02c8ac74ac5dc5d20807e561dcdfaebdc3b62b10730f643a20ac23c24fR222
Albeit Mastodon’s refetch offers higher compatibility with theoretical
implmentations using either multiple different display URL or not
denoting any of them as "url" at all, for now we chose to adopt a
GTS-like refetch-free approach to avoid additional implementation
concerns wrt to whether redirects should be allowed when fetching a
canonical AP id and potential for accidentally loosening some checks
(e.g. cross-domain refetches) for one of the fetches.
This may be reconsidered in the future.
2024-03-15 18:00:19 -06:00
|
|
|
featured_url = "https://example.com/users/alisaie/collections/featured"
|
2022-07-26 08:08:35 -06:00
|
|
|
dead_url = "https://example.com/users/alisaie/statuses/108311386746229284"
|
|
|
|
|
|
|
|
featured_data =
|
|
|
|
"test/fixtures/mastodon/featured_collection.json"
|
|
|
|
|> File.read!()
|
|
|
|
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^featured_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
body: featured_data,
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
|
|
|
|
%{
|
|
|
|
method: :get,
|
|
|
|
url: ^dead_url
|
|
|
|
} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 404,
|
|
|
|
body: "{}",
|
|
|
|
headers: [{"content-type", "application/activity+json"}]
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, %{}} = ActivityPub.fetch_and_prepare_featured_from_ap_id(featured_url)
|
|
|
|
end
|
|
|
|
|
2020-07-03 05:58:34 -06:00
|
|
|
test "it fetches the appropriate tag-restricted posts" do
|
|
|
|
user = insert(:user)
|
2019-04-17 16:37:04 -06:00
|
|
|
|
2021-02-15 11:13:14 -07:00
|
|
|
{:ok, status_one} = CommonAPI.post(user, %{status: ". #TEST"})
|
2020-07-03 05:58:34 -06:00
|
|
|
{:ok, status_two} = CommonAPI.post(user, %{status: ". #essais"})
|
2021-02-15 11:13:14 -07:00
|
|
|
{:ok, status_three} = CommonAPI.post(user, %{status: ". #test #Reject"})
|
2019-01-10 08:07:32 -07:00
|
|
|
|
2021-02-15 11:13:14 -07:00
|
|
|
{:ok, status_four} = CommonAPI.post(user, %{status: ". #Any1 #any2"})
|
|
|
|
{:ok, status_five} = CommonAPI.post(user, %{status: ". #Any2 #any1"})
|
2019-01-10 08:07:32 -07:00
|
|
|
|
2021-03-03 13:09:30 -07:00
|
|
|
for hashtag_timeline_strategy <- [:enabled, :disabled] do
|
2021-02-23 03:52:28 -07:00
|
|
|
clear_config([:features, :improved_hashtag_timeline], hashtag_timeline_strategy)
|
2019-01-10 08:44:28 -07:00
|
|
|
|
2020-12-26 12:20:55 -07:00
|
|
|
fetch_one = ActivityPub.fetch_activities([], %{type: "Create", tag: "test"})
|
2020-07-03 05:58:34 -06:00
|
|
|
|
2021-02-15 11:13:14 -07:00
|
|
|
fetch_two = ActivityPub.fetch_activities([], %{type: "Create", tag: ["TEST", "essais"]})
|
2020-12-26 12:20:55 -07:00
|
|
|
|
|
|
|
fetch_three =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
|
|
|
type: "Create",
|
2021-02-15 11:13:14 -07:00
|
|
|
tag: ["test", "Essais"],
|
2020-12-26 12:20:55 -07:00
|
|
|
tag_reject: ["reject"]
|
|
|
|
})
|
2020-07-03 05:58:34 -06:00
|
|
|
|
2020-12-26 12:20:55 -07:00
|
|
|
fetch_four =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
|
|
|
type: "Create",
|
|
|
|
tag: ["test"],
|
2021-02-15 11:13:14 -07:00
|
|
|
tag_all: ["test", "REJECT"]
|
2020-12-26 12:20:55 -07:00
|
|
|
})
|
|
|
|
|
2021-01-31 10:37:33 -07:00
|
|
|
# Testing that deduplication (if needed) is done on DB (not Ecto) level; :limit is important
|
2021-01-28 14:17:33 -07:00
|
|
|
fetch_five =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
|
|
|
type: "Create",
|
2021-02-15 11:13:14 -07:00
|
|
|
tag: ["ANY1", "any2"],
|
2021-01-28 14:17:33 -07:00
|
|
|
limit: 2
|
|
|
|
})
|
|
|
|
|
2021-01-31 13:06:38 -07:00
|
|
|
fetch_six =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
|
|
|
type: "Create",
|
2021-02-15 11:13:14 -07:00
|
|
|
tag: ["any1", "Any2"],
|
2021-01-31 13:06:38 -07:00
|
|
|
tag_all: [],
|
|
|
|
tag_reject: []
|
|
|
|
})
|
|
|
|
|
|
|
|
# Regression test: passing empty lists as filter options shouldn't affect the results
|
|
|
|
assert fetch_five == fetch_six
|
|
|
|
|
2021-01-28 14:17:33 -07:00
|
|
|
[fetch_one, fetch_two, fetch_three, fetch_four, fetch_five] =
|
|
|
|
Enum.map([fetch_one, fetch_two, fetch_three, fetch_four, fetch_five], fn statuses ->
|
2020-12-26 12:20:55 -07:00
|
|
|
Enum.map(statuses, fn s -> Repo.preload(s, object: :hashtags) end)
|
|
|
|
end)
|
|
|
|
|
|
|
|
assert fetch_one == [status_one, status_three]
|
|
|
|
assert fetch_two == [status_one, status_two, status_three]
|
|
|
|
assert fetch_three == [status_one, status_two]
|
|
|
|
assert fetch_four == [status_three]
|
2021-01-28 14:17:33 -07:00
|
|
|
assert fetch_five == [status_four, status_five]
|
2020-12-26 12:20:55 -07:00
|
|
|
end
|
2018-02-11 09:20:02 -07:00
|
|
|
end
|
|
|
|
|
2017-03-21 02:21:52 -06:00
|
|
|
describe "insertion" do
|
2018-12-26 04:39:35 -07:00
|
|
|
test "drops activities beyond a certain limit" do
|
2019-12-30 01:30:20 -07:00
|
|
|
limit = Config.get([:instance, :remote_limit])
|
2018-12-26 04:39:35 -07:00
|
|
|
|
|
|
|
random_text =
|
|
|
|
:crypto.strong_rand_bytes(limit + 1)
|
|
|
|
|> Base.encode64()
|
|
|
|
|> binary_part(0, limit + 1)
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
"ok" => true,
|
|
|
|
"object" => %{
|
|
|
|
"content" => random_text
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
assert {:error, :remote_limit} = ActivityPub.insert(data)
|
2018-12-26 04:39:35 -07:00
|
|
|
end
|
|
|
|
|
2019-01-25 20:23:52 -07:00
|
|
|
test "doesn't drop activities with content being null" do
|
2019-04-11 05:20:46 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
2019-01-25 20:23:52 -07:00
|
|
|
data = %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
2019-01-25 20:23:52 -07:00
|
|
|
"object" => %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"type" => "Note",
|
2019-01-25 20:23:52 -07:00
|
|
|
"content" => nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
assert {:ok, _} = ActivityPub.insert(data)
|
|
|
|
end
|
|
|
|
|
2017-05-07 12:13:10 -06:00
|
|
|
test "returns the activity if one with the same id is already in" do
|
|
|
|
activity = insert(:note_activity)
|
2018-03-30 07:01:53 -06:00
|
|
|
{:ok, new_activity} = ActivityPub.insert(activity.data)
|
2017-05-07 12:13:10 -06:00
|
|
|
|
2019-03-22 21:16:50 -06:00
|
|
|
assert activity.id == new_activity.id
|
2017-05-07 12:13:10 -06:00
|
|
|
end
|
|
|
|
|
2017-03-23 10:56:49 -06:00
|
|
|
test "inserts a given map into the activity database, giving it an id if it has none." do
|
2019-04-11 05:20:46 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
2017-03-21 02:21:52 -06:00
|
|
|
data = %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"object" => %{
|
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "hey"
|
|
|
|
}
|
2017-03-21 02:21:52 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
|
2017-03-23 10:56:49 -06:00
|
|
|
assert activity.data["ok"] == data["ok"]
|
|
|
|
assert is_binary(activity.data["id"])
|
|
|
|
|
|
|
|
given_id = "bla"
|
2018-03-30 07:01:53 -06:00
|
|
|
|
2017-03-23 10:56:49 -06:00
|
|
|
data = %{
|
2018-04-02 07:17:09 -06:00
|
|
|
"id" => given_id,
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"context" => "blabla",
|
|
|
|
"object" => %{
|
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "hey"
|
|
|
|
}
|
2017-03-23 10:56:49 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
|
|
|
|
assert activity.data["ok"] == data["ok"]
|
|
|
|
assert activity.data["id"] == given_id
|
2018-04-02 07:17:09 -06:00
|
|
|
assert activity.data["context"] == "blabla"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "adds a context when none is there" do
|
2019-04-11 05:20:46 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
2018-04-02 07:17:09 -06:00
|
|
|
data = %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
2018-04-02 07:17:09 -06:00
|
|
|
"object" => %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "hey"
|
2018-04-02 08:27:36 -06:00
|
|
|
}
|
2018-04-02 07:17:09 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
|
2021-01-04 05:38:31 -07:00
|
|
|
object = Pleroma.Object.normalize(activity, fetch: false)
|
2018-04-02 07:17:09 -06:00
|
|
|
|
|
|
|
assert is_binary(activity.data["context"])
|
2019-04-28 14:44:04 -06:00
|
|
|
assert is_binary(object.data["context"])
|
2017-03-21 02:21:52 -06:00
|
|
|
end
|
2017-03-23 14:22:49 -06:00
|
|
|
|
2018-02-25 13:02:44 -07:00
|
|
|
test "adds an id to a given object if it lacks one and is a note and inserts it to the object database" do
|
2019-04-11 05:20:46 -06:00
|
|
|
user = insert(:user)
|
|
|
|
|
2017-03-23 14:22:49 -06:00
|
|
|
data = %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
2017-03-23 14:22:49 -06:00
|
|
|
"object" => %{
|
2019-04-11 05:20:46 -06:00
|
|
|
"actor" => user.ap_id,
|
|
|
|
"to" => [],
|
2018-02-25 13:02:44 -07:00
|
|
|
"type" => "Note",
|
2019-04-11 05:20:46 -06:00
|
|
|
"content" => "hey"
|
2017-03-23 14:22:49 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
|
2021-01-04 05:38:31 -07:00
|
|
|
assert object = Object.normalize(activity, fetch: false)
|
2018-11-25 15:31:07 -07:00
|
|
|
assert is_binary(object.data["id"])
|
2017-03-23 14:22:49 -06:00
|
|
|
end
|
2017-03-21 02:21:52 -06:00
|
|
|
end
|
|
|
|
|
2017-05-03 08:08:24 -06:00
|
|
|
describe "create activities" do
|
2020-09-03 04:30:39 -06:00
|
|
|
setup do
|
|
|
|
[user: insert(:user)]
|
|
|
|
end
|
2019-12-30 01:30:20 -07:00
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
test "it reverts create", %{user: user} do
|
2019-12-30 01:30:20 -07:00
|
|
|
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
|
|
|
|
assert {:error, :reverted} =
|
|
|
|
ActivityPub.create(%{
|
|
|
|
to: ["user1", "user2"],
|
|
|
|
actor: user,
|
|
|
|
context: "",
|
|
|
|
object: %{
|
|
|
|
"to" => ["user1", "user2"],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "testing"
|
|
|
|
}
|
|
|
|
})
|
|
|
|
end
|
|
|
|
|
|
|
|
assert Repo.aggregate(Activity, :count, :id) == 0
|
|
|
|
assert Repo.aggregate(Object, :count, :id) == 0
|
|
|
|
end
|
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
test "creates activity if expiration is not configured and expires_at is not passed", %{
|
|
|
|
user: user
|
|
|
|
} do
|
|
|
|
clear_config([Pleroma.Workers.PurgeExpiredActivity, :enabled], false)
|
|
|
|
|
|
|
|
assert {:ok, _} =
|
|
|
|
ActivityPub.create(%{
|
|
|
|
to: ["user1", "user2"],
|
|
|
|
actor: user,
|
|
|
|
context: "",
|
|
|
|
object: %{
|
|
|
|
"to" => ["user1", "user2"],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "testing"
|
|
|
|
}
|
|
|
|
})
|
|
|
|
end
|
|
|
|
|
|
|
|
test "rejects activity if expires_at present but expiration is not configured", %{user: user} do
|
|
|
|
clear_config([Pleroma.Workers.PurgeExpiredActivity, :enabled], false)
|
|
|
|
|
|
|
|
assert {:error, :expired_activities_disabled} =
|
|
|
|
ActivityPub.create(%{
|
|
|
|
to: ["user1", "user2"],
|
|
|
|
actor: user,
|
|
|
|
context: "",
|
|
|
|
object: %{
|
|
|
|
"to" => ["user1", "user2"],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "testing"
|
|
|
|
},
|
|
|
|
additional: %{
|
|
|
|
"expires_at" => DateTime.utc_now()
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
assert Repo.aggregate(Activity, :count, :id) == 0
|
|
|
|
assert Repo.aggregate(Object, :count, :id) == 0
|
|
|
|
end
|
2018-04-21 03:58:04 -06:00
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
test "removes doubled 'to' recipients", %{user: user} do
|
2018-03-30 07:01:53 -06:00
|
|
|
{:ok, activity} =
|
|
|
|
ActivityPub.create(%{
|
|
|
|
to: ["user1", "user1", "user2"],
|
2018-04-21 03:58:04 -06:00
|
|
|
actor: user,
|
2018-03-30 07:01:53 -06:00
|
|
|
context: "",
|
2018-11-28 20:27:59 -07:00
|
|
|
object: %{
|
|
|
|
"to" => ["user1", "user1", "user2"],
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "testing"
|
|
|
|
}
|
2018-03-30 07:01:53 -06:00
|
|
|
})
|
|
|
|
|
2017-05-03 08:08:24 -06:00
|
|
|
assert activity.data["to"] == ["user1", "user2"]
|
2018-04-21 03:58:04 -06:00
|
|
|
assert activity.actor == user.ap_id
|
2019-01-18 18:25:15 -07:00
|
|
|
assert activity.recipients == ["user1", "user2", user.ap_id]
|
2017-05-03 08:08:24 -06:00
|
|
|
end
|
2019-03-03 03:21:03 -07:00
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
test "increases user note count only for public activities", %{user: user} do
|
2019-03-03 03:21:03 -07:00
|
|
|
{:ok, _} =
|
2019-04-22 01:20:43 -06:00
|
|
|
CommonAPI.post(User.get_cached_by_id(user.id), %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "1",
|
|
|
|
visibility: "public"
|
2019-04-22 01:20:43 -06:00
|
|
|
})
|
2019-03-03 03:21:03 -07:00
|
|
|
|
|
|
|
{:ok, _} =
|
2019-04-22 01:20:43 -06:00
|
|
|
CommonAPI.post(User.get_cached_by_id(user.id), %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "2",
|
|
|
|
visibility: "unlisted"
|
2019-04-22 01:20:43 -06:00
|
|
|
})
|
2019-03-03 03:21:03 -07:00
|
|
|
|
|
|
|
{:ok, _} =
|
2019-04-22 01:20:43 -06:00
|
|
|
CommonAPI.post(User.get_cached_by_id(user.id), %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "2",
|
|
|
|
visibility: "private"
|
2019-04-22 01:20:43 -06:00
|
|
|
})
|
2019-03-03 03:21:03 -07:00
|
|
|
|
|
|
|
{:ok, _} =
|
2019-04-22 01:20:43 -06:00
|
|
|
CommonAPI.post(User.get_cached_by_id(user.id), %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "3",
|
|
|
|
visibility: "direct"
|
2019-04-22 01:20:43 -06:00
|
|
|
})
|
2019-03-03 03:21:03 -07:00
|
|
|
|
2019-04-22 01:20:43 -06:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2019-10-16 12:59:21 -06:00
|
|
|
assert user.note_count == 2
|
2019-03-03 03:21:03 -07:00
|
|
|
end
|
2019-03-25 11:21:48 -06:00
|
|
|
|
2020-09-03 04:30:39 -06:00
|
|
|
test "increases replies count", %{user: user} do
|
2019-03-25 11:21:48 -06:00
|
|
|
user2 = insert(:user)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "1", visibility: "public"})
|
2019-03-25 11:21:48 -06:00
|
|
|
ap_id = activity.data["id"]
|
2020-05-12 13:59:26 -06:00
|
|
|
reply_data = %{status: "1", in_reply_to_status_id: activity.id}
|
2019-03-25 11:21:48 -06:00
|
|
|
|
|
|
|
# public
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "public"))
|
2020-10-15 06:54:59 -06:00
|
|
|
assert %{data: _data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
|
2019-03-25 11:21:48 -06:00
|
|
|
assert object.data["repliesCount"] == 1
|
|
|
|
|
|
|
|
# unlisted
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "unlisted"))
|
2020-10-15 06:54:59 -06:00
|
|
|
assert %{data: _data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
|
2019-03-25 11:21:48 -06:00
|
|
|
assert object.data["repliesCount"] == 2
|
|
|
|
|
|
|
|
# private
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "private"))
|
2020-10-15 06:54:59 -06:00
|
|
|
assert %{data: _data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
|
2019-03-25 11:21:48 -06:00
|
|
|
assert object.data["repliesCount"] == 2
|
|
|
|
|
|
|
|
# direct
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "direct"))
|
2020-10-15 06:54:59 -06:00
|
|
|
assert %{data: _data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
|
2019-03-25 11:21:48 -06:00
|
|
|
assert object.data["repliesCount"] == 2
|
|
|
|
end
|
2017-05-03 08:08:24 -06:00
|
|
|
end
|
|
|
|
|
2017-03-22 07:45:17 -06:00
|
|
|
describe "fetch activities for recipients" do
|
|
|
|
test "retrieve the activities for certain recipients" do
|
|
|
|
{:ok, activity_one} = ActivityBuilder.insert(%{"to" => ["someone"]})
|
|
|
|
{:ok, activity_two} = ActivityBuilder.insert(%{"to" => ["someone_else"]})
|
2017-03-22 09:51:20 -06:00
|
|
|
{:ok, _activity_three} = ActivityBuilder.insert(%{"to" => ["noone"]})
|
2017-03-22 07:45:17 -06:00
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities(["someone", "someone_else"])
|
|
|
|
assert length(activities) == 2
|
|
|
|
assert activities == [activity_one, activity_two]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-12-05 05:58:48 -07:00
|
|
|
describe "fetch activities for followed hashtags" do
|
|
|
|
test "it should return public activities that reference a given hashtag" do
|
|
|
|
hashtag = insert(:hashtag, name: "tenshi")
|
|
|
|
user = insert(:user)
|
|
|
|
other_user = insert(:user)
|
|
|
|
|
2022-12-06 03:57:10 -07:00
|
|
|
{:ok, normally_visible} =
|
|
|
|
CommonAPI.post(other_user, %{status: "hello :)", visibility: "public"})
|
|
|
|
|
2022-12-05 05:58:48 -07:00
|
|
|
{:ok, public} = CommonAPI.post(user, %{status: "maji #tenshi", visibility: "public"})
|
|
|
|
{:ok, _unrelated} = CommonAPI.post(user, %{status: "dai #tensh", visibility: "public"})
|
|
|
|
{:ok, unlisted} = CommonAPI.post(user, %{status: "maji #tenshi", visibility: "unlisted"})
|
|
|
|
{:ok, _private} = CommonAPI.post(user, %{status: "maji #tenshi", visibility: "private"})
|
|
|
|
|
2022-12-06 03:57:10 -07:00
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([other_user.follower_address], %{
|
|
|
|
followed_hashtags: [hashtag.id]
|
|
|
|
})
|
|
|
|
|
2022-12-05 05:58:48 -07:00
|
|
|
assert length(activities) == 3
|
|
|
|
normal_id = normally_visible.id
|
|
|
|
public_id = public.id
|
|
|
|
unlisted_id = unlisted.id
|
|
|
|
assert [%{id: ^normal_id}, %{id: ^public_id}, %{id: ^unlisted_id}] = activities
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-23 17:09:08 -06:00
|
|
|
describe "fetch activities in context" do
|
|
|
|
test "retrieves activities that have a given context" do
|
2017-06-30 08:41:09 -06:00
|
|
|
{:ok, activity} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
|
|
|
|
{:ok, activity_two} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
|
|
|
|
{:ok, _activity_three} = ActivityBuilder.insert(%{"type" => "Create", "context" => "3hu"})
|
|
|
|
{:ok, _activity_four} = ActivityBuilder.insert(%{"type" => "Announce", "context" => "2hu"})
|
2017-11-02 15:44:36 -06:00
|
|
|
activity_five = insert(:note_activity)
|
|
|
|
user = insert(:user)
|
2017-03-23 17:09:08 -06:00
|
|
|
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_five.data["actor"]})
|
2017-03-23 17:09:08 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities_for_context("2hu", %{blocking_user: user})
|
2017-06-30 08:30:19 -06:00
|
|
|
assert activities == [activity_two, activity]
|
2017-03-23 17:09:08 -06:00
|
|
|
end
|
2019-11-25 08:59:55 -07:00
|
|
|
|
|
|
|
test "doesn't return activities with filtered words" do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
insert(:filter, user: user, phrase: "test", hide: true)
|
|
|
|
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, %{id: id1, data: %{"context" => context}}} = CommonAPI.post(user, %{status: "1"})
|
2019-11-25 08:59:55 -07:00
|
|
|
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, %{id: id2}} = CommonAPI.post(user_two, %{status: "2", in_reply_to_status_id: id1})
|
2019-11-25 08:59:55 -07:00
|
|
|
|
|
|
|
{:ok, %{id: id3} = user_activity} =
|
2020-06-17 03:34:27 -06:00
|
|
|
CommonAPI.post(user, %{status: "3 test?", in_reply_to_status_id: id2})
|
2019-11-25 08:59:55 -07:00
|
|
|
|
|
|
|
{:ok, %{id: id4} = filtered_activity} =
|
2020-06-17 03:34:27 -06:00
|
|
|
CommonAPI.post(user_two, %{status: "4 test!", in_reply_to_status_id: id3})
|
2019-11-25 08:59:55 -07:00
|
|
|
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "5", in_reply_to_status_id: id4})
|
2019-11-25 08:59:55 -07:00
|
|
|
|
|
|
|
activities =
|
|
|
|
context
|
2020-06-17 03:34:27 -06:00
|
|
|
|> ActivityPub.fetch_activities_for_context(%{user: user})
|
2019-11-25 08:59:55 -07:00
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities) == 4
|
|
|
|
assert user_activity.id in activities
|
|
|
|
refute filtered_activity.id in activities
|
|
|
|
end
|
2017-03-23 17:09:08 -06:00
|
|
|
end
|
|
|
|
|
2017-11-02 15:37:26 -06:00
|
|
|
test "doesn't return blocked activities" do
|
|
|
|
activity_one = insert(:note_activity)
|
|
|
|
activity_two = insert(:note_activity)
|
2018-04-14 05:26:20 -06:00
|
|
|
activity_three = insert(:note_activity)
|
2017-11-02 15:37:26 -06:00
|
|
|
user = insert(:user)
|
2018-04-14 05:26:20 -06:00
|
|
|
booster = insert(:user)
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_one.data["actor"]})
|
2017-11-02 15:37:26 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user, skip_preload: true})
|
2017-11-02 15:37:26 -06:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
2018-04-14 05:26:20 -06:00
|
|
|
assert Enum.member?(activities, activity_three)
|
2017-11-02 15:37:26 -06:00
|
|
|
refute Enum.member?(activities, activity_one)
|
|
|
|
|
2019-11-10 06:30:21 -07:00
|
|
|
{:ok, _user_block} = User.unblock(user, %{ap_id: activity_one.data["actor"]})
|
2017-11-02 15:37:26 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user, skip_preload: true})
|
2017-11-02 15:37:26 -06:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
2018-04-14 05:26:20 -06:00
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_three.data["actor"]})
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, %{data: %{"object" => id}}} = CommonAPI.repeat(activity_three.id, booster)
|
2019-01-20 23:14:20 -07:00
|
|
|
%Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
|
2019-04-02 04:08:03 -06:00
|
|
|
activity_three = Activity.get_by_id(activity_three.id)
|
2018-04-14 05:26:20 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user, skip_preload: true})
|
2018-04-14 05:26:20 -06:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
refute Enum.member?(activities, activity_three)
|
|
|
|
refute Enum.member?(activities, boost_activity)
|
2017-11-02 15:37:26 -06:00
|
|
|
assert Enum.member?(activities, activity_one)
|
2017-11-02 15:47:11 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: nil, skip_preload: true})
|
2017-11-02 15:47:11 -06:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
2018-04-14 05:26:20 -06:00
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
assert Enum.member?(activities, boost_activity)
|
2017-11-02 15:47:11 -06:00
|
|
|
assert Enum.member?(activities, activity_one)
|
2017-11-02 15:37:26 -06:00
|
|
|
end
|
|
|
|
|
2021-12-06 04:44:17 -07:00
|
|
|
test "doesn't return activities from deactivated users" do
|
|
|
|
_user = insert(:user)
|
|
|
|
deactivated = insert(:user)
|
|
|
|
active = insert(:user)
|
|
|
|
{:ok, activity_one} = CommonAPI.post(deactivated, %{status: "hey!"})
|
|
|
|
{:ok, activity_two} = CommonAPI.post(active, %{status: "yay!"})
|
|
|
|
{:ok, _updated_user} = User.set_activation(deactivated, false)
|
2021-12-06 04:50:51 -07:00
|
|
|
|
2021-12-06 04:44:17 -07:00
|
|
|
activities = ActivityPub.fetch_activities([], %{})
|
2021-12-06 04:50:51 -07:00
|
|
|
|
2021-12-06 04:44:17 -07:00
|
|
|
refute Enum.member?(activities, activity_one)
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
end
|
|
|
|
|
2020-10-10 00:21:57 -06:00
|
|
|
test "always see your own posts even when they address people you block" do
|
|
|
|
user = insert(:user)
|
|
|
|
blockee = insert(:user)
|
|
|
|
|
|
|
|
{:ok, _} = User.block(user, blockee)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey! @#{blockee.nickname}"})
|
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user})
|
|
|
|
|
|
|
|
assert Enum.member?(activities, activity)
|
|
|
|
end
|
|
|
|
|
2019-04-17 14:05:09 -06:00
|
|
|
test "doesn't return transitive interactions concerning blocked users" do
|
|
|
|
blocker = insert(:user)
|
|
|
|
blockee = insert(:user)
|
|
|
|
friend = insert(:user)
|
|
|
|
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationship} = User.block(blocker, blockee)
|
2019-04-17 14:05:09 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey!"})
|
2019-04-17 14:05:09 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_two} = CommonAPI.post(friend, %{status: "hey! @#{blockee.nickname}"})
|
2019-04-17 14:05:09 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_three} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
|
2019-04-17 14:05:09 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_four} = CommonAPI.post(blockee, %{status: "hey! @#{blocker.nickname}"})
|
2019-04-17 14:05:09 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: blocker})
|
2019-04-17 14:05:09 -06:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
refute Enum.member?(activities, activity_two)
|
|
|
|
refute Enum.member?(activities, activity_three)
|
|
|
|
refute Enum.member?(activities, activity_four)
|
|
|
|
end
|
|
|
|
|
2020-06-07 10:21:11 -06:00
|
|
|
test "doesn't return announce activities with blocked users in 'to'" do
|
2019-04-17 16:27:59 -06:00
|
|
|
blocker = insert(:user)
|
|
|
|
blockee = insert(:user)
|
|
|
|
friend = insert(:user)
|
|
|
|
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationship} = User.block(blocker, blockee)
|
2019-04-17 16:27:59 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey!"})
|
2019-04-17 16:27:59 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
|
2019-04-17 16:27:59 -06:00
|
|
|
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, activity_three} = CommonAPI.repeat(activity_two.id, friend)
|
2019-04-17 16:27:59 -06:00
|
|
|
|
|
|
|
activities =
|
2020-06-04 11:33:16 -06:00
|
|
|
ActivityPub.fetch_activities([], %{blocking_user: blocker})
|
2019-04-17 16:27:59 -06:00
|
|
|
|> Enum.map(fn act -> act.id end)
|
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_one.id)
|
|
|
|
refute Enum.member?(activities, activity_two.id)
|
|
|
|
refute Enum.member?(activities, activity_three.id)
|
|
|
|
end
|
|
|
|
|
2020-06-07 10:21:11 -06:00
|
|
|
test "doesn't return announce activities with blocked users in 'cc'" do
|
|
|
|
blocker = insert(:user)
|
|
|
|
blockee = insert(:user)
|
|
|
|
friend = insert(:user)
|
|
|
|
|
|
|
|
{:ok, _user_relationship} = User.block(blocker, blockee)
|
|
|
|
|
|
|
|
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey!"})
|
|
|
|
|
|
|
|
{:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
|
|
|
|
|
2021-01-04 05:38:31 -07:00
|
|
|
assert object = Pleroma.Object.normalize(activity_two, fetch: false)
|
2020-06-07 10:21:11 -06:00
|
|
|
|
|
|
|
data = %{
|
|
|
|
"actor" => friend.ap_id,
|
|
|
|
"object" => object.data["id"],
|
|
|
|
"context" => object.data["context"],
|
|
|
|
"type" => "Announce",
|
|
|
|
"to" => ["https://www.w3.org/ns/activitystreams#Public"],
|
|
|
|
"cc" => [blockee.ap_id]
|
|
|
|
}
|
|
|
|
|
|
|
|
assert {:ok, activity_three} = ActivityPub.insert(data)
|
|
|
|
|
|
|
|
activities =
|
2020-06-10 08:55:30 -06:00
|
|
|
ActivityPub.fetch_activities([], %{blocking_user: blocker})
|
2020-06-07 10:21:11 -06:00
|
|
|
|> Enum.map(fn act -> act.id end)
|
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_one.id)
|
|
|
|
refute Enum.member?(activities, activity_two.id)
|
|
|
|
refute Enum.member?(activities, activity_three.id)
|
|
|
|
end
|
|
|
|
|
2019-05-14 16:13:47 -06:00
|
|
|
test "doesn't return activities from blocked domains" do
|
|
|
|
domain = "dogwhistle.zone"
|
|
|
|
domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
|
|
|
|
note = insert(:note, %{data: %{"actor" => domain_user.ap_id}})
|
|
|
|
activity = insert(:note_activity, %{note: note})
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, user} = User.block_domain(user, domain)
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user, skip_preload: true})
|
2019-05-14 16:13:47 -06:00
|
|
|
|
|
|
|
refute activity in activities
|
2019-05-14 17:59:24 -06:00
|
|
|
|
|
|
|
followed_user = insert(:user)
|
2020-07-08 09:07:24 -06:00
|
|
|
CommonAPI.follow(user, followed_user)
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, repeat_activity} = CommonAPI.repeat(activity.id, followed_user)
|
2019-05-14 17:59:24 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user, skip_preload: true})
|
2019-05-14 17:59:24 -06:00
|
|
|
|
|
|
|
refute repeat_activity in activities
|
2019-05-14 16:13:47 -06:00
|
|
|
end
|
|
|
|
|
2020-10-10 00:21:57 -06:00
|
|
|
test "see your own posts even when they adress actors from blocked domains" do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
domain = "dogwhistle.zone"
|
|
|
|
domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
|
|
|
|
|
|
|
|
{:ok, user} = User.block_domain(user, domain)
|
|
|
|
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey! @#{domain_user.nickname}"})
|
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: user})
|
|
|
|
|
|
|
|
assert Enum.member?(activities, activity)
|
|
|
|
end
|
|
|
|
|
2019-12-10 09:40:12 -07:00
|
|
|
test "does return activities from followed users on blocked domains" do
|
|
|
|
domain = "meanies.social"
|
|
|
|
domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
|
|
|
|
blocker = insert(:user)
|
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, blocker, domain_user} = User.follow(blocker, domain_user)
|
2019-12-10 09:40:12 -07:00
|
|
|
{:ok, blocker} = User.block_domain(blocker, domain)
|
|
|
|
|
|
|
|
assert User.following?(blocker, domain_user)
|
|
|
|
assert User.blocks_domain?(blocker, domain_user)
|
|
|
|
refute User.blocks?(blocker, domain_user)
|
|
|
|
|
|
|
|
note = insert(:note, %{data: %{"actor" => domain_user.ap_id}})
|
|
|
|
activity = insert(:note_activity, %{note: note})
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: blocker, skip_preload: true})
|
2019-12-10 09:40:12 -07:00
|
|
|
|
|
|
|
assert activity in activities
|
|
|
|
|
2019-12-10 09:50:58 -07:00
|
|
|
# And check that if the guy we DO follow boosts someone else from their domain,
|
|
|
|
# that should be hidden
|
2019-12-10 09:40:12 -07:00
|
|
|
another_user = insert(:user, %{ap_id: "https://#{domain}/@meanie2"})
|
|
|
|
bad_note = insert(:note, %{data: %{"actor" => another_user.ap_id}})
|
|
|
|
bad_activity = insert(:note_activity, %{note: bad_note})
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, repeat_activity} = CommonAPI.repeat(bad_activity.id, domain_user)
|
2019-12-10 09:40:12 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{blocking_user: blocker, skip_preload: true})
|
2019-12-10 09:40:12 -07:00
|
|
|
|
|
|
|
refute repeat_activity in activities
|
|
|
|
end
|
|
|
|
|
2020-10-15 04:28:25 -06:00
|
|
|
test "returns your own posts regardless of mute" do
|
|
|
|
user = insert(:user)
|
|
|
|
muted = insert(:user)
|
|
|
|
|
|
|
|
{:ok, muted_post} = CommonAPI.post(muted, %{status: "Im stupid"})
|
|
|
|
|
|
|
|
{:ok, reply} =
|
|
|
|
CommonAPI.post(user, %{status: "I'm muting you", in_reply_to_status_id: muted_post.id})
|
|
|
|
|
|
|
|
{:ok, _} = User.mute(user, muted)
|
|
|
|
|
|
|
|
[activity] = ActivityPub.fetch_activities([], %{muting_user: user, skip_preload: true})
|
|
|
|
|
|
|
|
assert activity.id == reply.id
|
|
|
|
end
|
|
|
|
|
2019-02-20 05:47:44 -07:00
|
|
|
test "doesn't return muted activities" do
|
|
|
|
activity_one = insert(:note_activity)
|
|
|
|
activity_two = insert(:note_activity)
|
|
|
|
activity_three = insert(:note_activity)
|
|
|
|
user = insert(:user)
|
|
|
|
booster = insert(:user)
|
2019-11-15 11:38:54 -07:00
|
|
|
|
|
|
|
activity_one_actor = User.get_by_ap_id(activity_one.data["actor"])
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationships} = User.mute(user, activity_one_actor)
|
2019-02-20 05:47:44 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: user, skip_preload: true})
|
2019-02-20 05:47:44 -07:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
refute Enum.member?(activities, activity_one)
|
|
|
|
|
2019-02-27 08:37:42 -07:00
|
|
|
# Calling with 'with_muted' will deliver muted activities, too.
|
2019-03-22 19:09:12 -06:00
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-04 11:33:16 -06:00
|
|
|
muting_user: user,
|
|
|
|
with_muted: true,
|
|
|
|
skip_preload: true
|
2019-03-22 19:09:12 -06:00
|
|
|
})
|
2019-02-27 08:37:42 -07:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
|
2019-11-15 11:38:54 -07:00
|
|
|
{:ok, _user_mute} = User.unmute(user, activity_one_actor)
|
2019-02-20 05:47:44 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: user, skip_preload: true})
|
2019-02-20 05:47:44 -07:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
|
2019-11-15 11:38:54 -07:00
|
|
|
activity_three_actor = User.get_by_ap_id(activity_three.data["actor"])
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _user_relationships} = User.mute(user, activity_three_actor)
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, %{data: %{"object" => id}}} = CommonAPI.repeat(activity_three.id, booster)
|
2019-02-20 05:47:44 -07:00
|
|
|
%Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
|
2019-04-02 04:08:03 -06:00
|
|
|
activity_three = Activity.get_by_id(activity_three.id)
|
2019-02-20 05:47:44 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: user, skip_preload: true})
|
2019-02-20 05:47:44 -07:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
refute Enum.member?(activities, activity_three)
|
|
|
|
refute Enum.member?(activities, boost_activity)
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: nil, skip_preload: true})
|
2019-02-20 05:47:44 -07:00
|
|
|
|
|
|
|
assert Enum.member?(activities, activity_two)
|
|
|
|
assert Enum.member?(activities, activity_three)
|
|
|
|
assert Enum.member?(activities, boost_activity)
|
|
|
|
assert Enum.member?(activities, activity_one)
|
|
|
|
end
|
|
|
|
|
2019-08-15 08:37:30 -06:00
|
|
|
test "doesn't return thread muted activities" do
|
|
|
|
user = insert(:user)
|
2019-08-18 16:21:31 -06:00
|
|
|
_activity_one = insert(:note_activity)
|
2019-08-15 08:37:30 -06:00
|
|
|
note_two = insert(:note, data: %{"context" => "suya.."})
|
|
|
|
activity_two = insert(:note_activity, note: note_two)
|
|
|
|
|
|
|
|
{:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
assert [_activity_one] = ActivityPub.fetch_activities([], %{muting_user: user})
|
2019-08-15 08:37:30 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
test "returns thread muted activities when with_muted is set" do
|
|
|
|
user = insert(:user)
|
2019-08-18 16:21:31 -06:00
|
|
|
_activity_one = insert(:note_activity)
|
2019-08-15 08:37:30 -06:00
|
|
|
note_two = insert(:note, data: %{"context" => "suya.."})
|
|
|
|
activity_two = insert(:note_activity, note: note_two)
|
|
|
|
|
2019-08-21 12:24:35 -06:00
|
|
|
{:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
|
2019-08-15 08:37:30 -06:00
|
|
|
|
2019-08-18 16:21:31 -06:00
|
|
|
assert [_activity_two, _activity_one] =
|
2020-06-04 11:33:16 -06:00
|
|
|
ActivityPub.fetch_activities([], %{muting_user: user, with_muted: true})
|
2019-08-15 08:37:30 -06:00
|
|
|
end
|
|
|
|
|
2019-03-24 21:32:19 -06:00
|
|
|
test "does include announces on request" do
|
|
|
|
activity_three = insert(:note_activity)
|
|
|
|
user = insert(:user)
|
|
|
|
booster = insert(:user)
|
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, user, booster} = User.follow(user, booster)
|
2019-03-24 21:32:19 -06:00
|
|
|
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, announce} = CommonAPI.repeat(activity_three.id, booster)
|
2019-03-24 21:32:19 -06:00
|
|
|
|
2019-10-10 13:35:32 -06:00
|
|
|
[announce_activity] = ActivityPub.fetch_activities([user.ap_id | User.following(user)])
|
2019-03-24 21:32:19 -06:00
|
|
|
|
|
|
|
assert announce_activity.id == announce.id
|
|
|
|
end
|
|
|
|
|
2018-12-26 22:30:01 -07:00
|
|
|
test "excludes reblogs on request" do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, expected_activity} = ActivityBuilder.insert(%{"type" => "Create"}, %{:user => user})
|
|
|
|
{:ok, _} = ActivityBuilder.insert(%{"type" => "Announce"}, %{:user => user})
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
[activity] = ActivityPub.fetch_user_activities(user, nil, %{exclude_reblogs: true})
|
2018-12-26 22:30:01 -07:00
|
|
|
|
|
|
|
assert activity == expected_activity
|
|
|
|
end
|
|
|
|
|
2019-11-16 14:54:13 -07:00
|
|
|
describe "irreversible filters" do
|
|
|
|
setup do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
|
|
|
|
insert(:filter, user: user_two, phrase: "cofe", hide: true)
|
|
|
|
insert(:filter, user: user_two, phrase: "ok boomer", hide: true)
|
|
|
|
insert(:filter, user: user_two, phrase: "test", hide: false)
|
|
|
|
|
|
|
|
params = %{
|
2020-06-17 03:34:27 -06:00
|
|
|
type: ["Create", "Announce"],
|
|
|
|
user: user_two
|
2019-11-16 14:54:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %{user: user, user_two: user_two, params: params}}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns statuses if they don't contain exact filter words", %{
|
|
|
|
user: user,
|
|
|
|
params: params
|
|
|
|
} do
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "hey"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "got cofefe?"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "I am not a boomer"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "ok boomers"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "ccofee is not a word"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "this is a test"})
|
2019-11-16 14:54:13 -07:00
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities([], params)
|
|
|
|
|
|
|
|
assert Enum.count(activities) == 6
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it does not filter user's own statuses", %{user_two: user_two, params: params} do
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user_two, %{status: "Give me some cofe!"})
|
|
|
|
{:ok, _} = CommonAPI.post(user_two, %{status: "ok boomer"})
|
2019-11-16 14:54:13 -07:00
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities([], params)
|
|
|
|
|
|
|
|
assert Enum.count(activities) == 2
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it excludes statuses with filter words", %{user: user, params: params} do
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "Give me some cofe!"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "ok boomer"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "is it a cOfE?"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "cofe is all I need"})
|
|
|
|
{:ok, _} = CommonAPI.post(user, %{status: "— ok BOOMER\n"})
|
2019-11-16 14:54:13 -07:00
|
|
|
|
|
|
|
activities = ActivityPub.fetch_activities([], params)
|
|
|
|
|
|
|
|
assert Enum.empty?(activities)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns all statuses if user does not have any filters" do
|
|
|
|
another_user = insert(:user)
|
2020-06-17 03:34:27 -06:00
|
|
|
{:ok, _} = CommonAPI.post(another_user, %{status: "got cofe?"})
|
|
|
|
{:ok, _} = CommonAPI.post(another_user, %{status: "test!"})
|
2019-11-16 14:54:13 -07:00
|
|
|
|
|
|
|
activities =
|
|
|
|
ActivityPub.fetch_activities([], %{
|
2020-06-17 03:34:27 -06:00
|
|
|
type: ["Create", "Announce"],
|
|
|
|
user: another_user
|
2019-11-16 14:54:13 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
assert Enum.count(activities) == 2
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2017-03-21 13:22:05 -06:00
|
|
|
describe "public fetch activities" do
|
2018-05-13 03:18:48 -06:00
|
|
|
test "doesn't retrieve unlisted activities" do
|
|
|
|
user = insert(:user)
|
2018-05-13 05:02:24 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _unlisted_activity} = CommonAPI.post(user, %{status: "yeah", visibility: "unlisted"})
|
2018-05-13 05:02:24 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, listed_activity} = CommonAPI.post(user, %{status: "yeah"})
|
2018-05-13 03:18:48 -06:00
|
|
|
|
|
|
|
[activity] = ActivityPub.fetch_public_activities()
|
|
|
|
|
|
|
|
assert activity == listed_activity
|
|
|
|
end
|
|
|
|
|
2017-03-21 13:22:05 -06:00
|
|
|
test "retrieves public activities" do
|
2018-03-30 07:01:53 -06:00
|
|
|
_activities = ActivityPub.fetch_public_activities()
|
2017-11-05 04:05:25 -07:00
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
%{public: public} = ActivityBuilder.public_and_non_public()
|
2017-03-21 10:53:20 -06:00
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
activities = ActivityPub.fetch_public_activities()
|
2017-03-21 10:53:20 -06:00
|
|
|
assert length(activities) == 1
|
|
|
|
assert Enum.at(activities, 0) == public
|
|
|
|
end
|
2017-03-21 13:22:05 -06:00
|
|
|
|
|
|
|
test "retrieves a maximum of 20 activities" do
|
2019-11-07 23:23:24 -07:00
|
|
|
ActivityBuilder.insert_list(10)
|
|
|
|
expected_activities = ActivityBuilder.insert_list(20)
|
2017-03-21 13:22:05 -06:00
|
|
|
|
2018-03-30 07:01:53 -06:00
|
|
|
activities = ActivityPub.fetch_public_activities()
|
2017-03-21 13:22:05 -06:00
|
|
|
|
2019-11-07 23:23:24 -07:00
|
|
|
assert collect_ids(activities) == collect_ids(expected_activities)
|
2017-03-21 13:22:05 -06:00
|
|
|
assert length(activities) == 20
|
|
|
|
end
|
2017-03-21 13:31:48 -06:00
|
|
|
|
|
|
|
test "retrieves ids starting from a since_id" do
|
|
|
|
activities = ActivityBuilder.insert_list(30)
|
2019-11-07 23:23:24 -07:00
|
|
|
expected_activities = ActivityBuilder.insert_list(10)
|
2017-03-21 13:31:48 -06:00
|
|
|
since_id = List.last(activities).id
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_public_activities(%{since_id: since_id})
|
2017-03-21 13:31:48 -06:00
|
|
|
|
2019-11-07 23:23:24 -07:00
|
|
|
assert collect_ids(activities) == collect_ids(expected_activities)
|
2017-03-21 13:31:48 -06:00
|
|
|
assert length(activities) == 10
|
|
|
|
end
|
2017-04-12 09:11:01 -06:00
|
|
|
|
|
|
|
test "retrieves ids up to max_id" do
|
2019-11-07 23:23:24 -07:00
|
|
|
ActivityBuilder.insert_list(10)
|
|
|
|
expected_activities = ActivityBuilder.insert_list(20)
|
|
|
|
|
|
|
|
%{id: max_id} =
|
|
|
|
10
|
|
|
|
|> ActivityBuilder.insert_list()
|
|
|
|
|> List.first()
|
2017-04-12 09:11:01 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_public_activities(%{max_id: max_id})
|
2017-04-12 09:11:01 -06:00
|
|
|
|
|
|
|
assert length(activities) == 20
|
2019-11-07 23:23:24 -07:00
|
|
|
assert collect_ids(activities) == collect_ids(expected_activities)
|
2017-04-12 09:11:01 -06:00
|
|
|
end
|
2019-03-15 07:06:58 -06:00
|
|
|
|
2019-09-24 16:25:42 -06:00
|
|
|
test "paginates via offset/limit" do
|
2019-11-07 23:23:24 -07:00
|
|
|
_first_part_activities = ActivityBuilder.insert_list(10)
|
|
|
|
second_part_activities = ActivityBuilder.insert_list(10)
|
|
|
|
|
|
|
|
later_activities = ActivityBuilder.insert_list(10)
|
2019-09-24 16:25:42 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_public_activities(%{page: "2", page_size: "20"}, :offset)
|
2019-09-24 16:25:42 -06:00
|
|
|
|
|
|
|
assert length(activities) == 20
|
2019-11-07 23:23:24 -07:00
|
|
|
|
|
|
|
assert collect_ids(activities) ==
|
|
|
|
collect_ids(second_part_activities) ++ collect_ids(later_activities)
|
2019-09-24 16:25:42 -06:00
|
|
|
end
|
|
|
|
|
2019-03-15 07:06:58 -06:00
|
|
|
test "doesn't return reblogs for users for whom reblogs have been muted" do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
user = insert(:user)
|
|
|
|
booster = insert(:user)
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _reblog_mute} = CommonAPI.hide_reblogs(user, booster)
|
2019-03-15 07:06:58 -06:00
|
|
|
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, activity} = CommonAPI.repeat(activity.id, booster)
|
2019-03-15 07:06:58 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: user})
|
2019-03-15 07:06:58 -06:00
|
|
|
|
2019-03-27 04:43:43 -06:00
|
|
|
refute Enum.any?(activities, fn %{id: id} -> id == activity.id end)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns reblogs for users for whom reblogs have not been muted" do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
user = insert(:user)
|
|
|
|
booster = insert(:user)
|
2019-11-19 13:22:10 -07:00
|
|
|
{:ok, _reblog_mute} = CommonAPI.hide_reblogs(user, booster)
|
|
|
|
{:ok, _reblog_mute} = CommonAPI.show_reblogs(user, booster)
|
2019-03-27 04:43:43 -06:00
|
|
|
|
2020-05-21 05:16:21 -06:00
|
|
|
{:ok, activity} = CommonAPI.repeat(activity.id, booster)
|
2019-03-27 04:43:43 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
activities = ActivityPub.fetch_activities([], %{muting_user: user})
|
2019-03-27 04:43:43 -06:00
|
|
|
|
|
|
|
assert Enum.any?(activities, fn %{id: id} -> id == activity.id end)
|
2019-03-15 07:06:58 -06:00
|
|
|
end
|
2017-03-21 10:53:20 -06:00
|
|
|
end
|
2017-03-28 18:05:51 -06:00
|
|
|
|
|
|
|
describe "uploading files" do
|
2020-08-18 05:21:30 -06:00
|
|
|
setup do
|
|
|
|
test_file = %Plug.Upload{
|
2020-10-13 09:37:24 -06:00
|
|
|
content_type: "image/jpeg",
|
2018-03-30 07:01:53 -06:00
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
2017-03-28 18:05:51 -06:00
|
|
|
|
2020-08-18 05:21:30 -06:00
|
|
|
%{test_file: test_file}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "sets a description if given", %{test_file: file} do
|
|
|
|
{:ok, %Object{} = object} = ActivityPub.upload(file, description: "a cool file")
|
|
|
|
assert object.data["name"] == "a cool file"
|
|
|
|
end
|
|
|
|
|
2017-04-16 06:23:30 -06:00
|
|
|
test "works with base64 encoded images" do
|
|
|
|
file = %{
|
2020-05-13 09:06:25 -06:00
|
|
|
img: data_uri()
|
2017-04-16 06:23:30 -06:00
|
|
|
}
|
|
|
|
|
2017-04-16 07:28:28 -06:00
|
|
|
{:ok, %Object{}} = ActivityPub.upload(file)
|
2017-04-16 06:23:30 -06:00
|
|
|
end
|
2017-03-28 18:05:51 -06:00
|
|
|
end
|
2017-04-16 08:06:19 -06:00
|
|
|
|
2017-04-21 10:54:21 -06:00
|
|
|
describe "fetch the latest Follow" do
|
|
|
|
test "fetches the latest Follow activity" do
|
|
|
|
%Activity{data: %{"type" => "Follow"}} = activity = insert(:follow_activity)
|
|
|
|
follower = Repo.get_by(User, ap_id: activity.data["actor"])
|
|
|
|
followed = Repo.get_by(User, ap_id: activity.data["object"])
|
2018-02-23 07:00:41 -07:00
|
|
|
|
2017-05-16 07:31:11 -06:00
|
|
|
assert activity == Utils.fetch_latest_follow(follower, followed)
|
2018-02-23 07:00:41 -07:00
|
|
|
end
|
2018-02-17 13:56:33 -07:00
|
|
|
end
|
|
|
|
|
2020-07-08 09:07:24 -06:00
|
|
|
describe "unfollowing" do
|
2019-12-30 01:30:20 -07:00
|
|
|
test "it reverts unfollow activity" do
|
|
|
|
follower = insert(:user)
|
|
|
|
followed = insert(:user)
|
|
|
|
|
2020-07-08 09:07:24 -06:00
|
|
|
{:ok, _, _, follow_activity} = CommonAPI.follow(follower, followed)
|
2019-12-30 01:30:20 -07:00
|
|
|
|
|
|
|
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
|
|
|
|
assert {:error, :reverted} = ActivityPub.unfollow(follower, followed)
|
|
|
|
end
|
|
|
|
|
|
|
|
activity = Activity.get_by_id(follow_activity.id)
|
|
|
|
assert activity.data["type"] == "Follow"
|
|
|
|
assert activity.data["actor"] == follower.ap_id
|
|
|
|
|
|
|
|
assert activity.data["object"] == followed.ap_id
|
|
|
|
end
|
|
|
|
|
2017-05-07 11:28:23 -06:00
|
|
|
test "creates an undo activity for the last follow" do
|
|
|
|
follower = insert(:user)
|
|
|
|
followed = insert(:user)
|
|
|
|
|
2020-07-08 09:07:24 -06:00
|
|
|
{:ok, _, _, follow_activity} = CommonAPI.follow(follower, followed)
|
2020-02-04 09:35:32 -07:00
|
|
|
{:ok, activity} = ActivityPub.unfollow(follower, followed)
|
|
|
|
|
|
|
|
assert activity.data["type"] == "Undo"
|
|
|
|
assert activity.data["actor"] == follower.ap_id
|
|
|
|
|
|
|
|
embedded_object = activity.data["object"]
|
|
|
|
assert is_map(embedded_object)
|
|
|
|
assert embedded_object["type"] == "Follow"
|
|
|
|
assert embedded_object["object"] == followed.ap_id
|
|
|
|
assert embedded_object["id"] == follow_activity.data["id"]
|
|
|
|
end
|
|
|
|
|
|
|
|
test "creates an undo activity for a pending follow request" do
|
|
|
|
follower = insert(:user)
|
2020-10-13 08:31:13 -06:00
|
|
|
followed = insert(:user, %{is_locked: true})
|
2020-02-04 09:35:32 -07:00
|
|
|
|
2020-07-08 09:07:24 -06:00
|
|
|
{:ok, _, _, follow_activity} = CommonAPI.follow(follower, followed)
|
2017-05-07 11:28:23 -06:00
|
|
|
{:ok, activity} = ActivityPub.unfollow(follower, followed)
|
|
|
|
|
|
|
|
assert activity.data["type"] == "Undo"
|
|
|
|
assert activity.data["actor"] == follower.ap_id
|
2018-05-22 02:27:40 -06:00
|
|
|
|
2019-07-08 10:53:02 -06:00
|
|
|
embedded_object = activity.data["object"]
|
|
|
|
assert is_map(embedded_object)
|
|
|
|
assert embedded_object["type"] == "Follow"
|
|
|
|
assert embedded_object["object"] == followed.ap_id
|
|
|
|
assert embedded_object["id"] == follow_activity.data["id"]
|
2017-05-07 11:28:23 -06:00
|
|
|
end
|
2022-08-05 07:28:56 -06:00
|
|
|
|
2022-08-31 12:00:36 -06:00
|
|
|
test "it removes the follow activity if it was local" do
|
|
|
|
follower = insert(:user, local: true)
|
|
|
|
followed = insert(:user)
|
|
|
|
|
|
|
|
{:ok, _, _, follow_activity} = CommonAPI.follow(follower, followed)
|
|
|
|
{:ok, activity} = ActivityPub.unfollow(follower, followed, nil, true)
|
|
|
|
|
|
|
|
assert activity.data["type"] == "Undo"
|
|
|
|
assert activity.data["actor"] == follower.ap_id
|
|
|
|
|
|
|
|
follow_activity = Activity.get_by_id(follow_activity.id)
|
|
|
|
assert is_nil(follow_activity)
|
|
|
|
assert is_nil(Utils.fetch_latest_follow(follower, followed))
|
|
|
|
|
|
|
|
# We need to keep our own undo
|
|
|
|
undo_activity = Activity.get_by_ap_id(activity.data["id"])
|
|
|
|
refute is_nil(undo_activity)
|
|
|
|
end
|
|
|
|
|
2022-08-05 07:28:56 -06:00
|
|
|
test "it removes the follow activity if it was remote" do
|
|
|
|
follower = insert(:user, local: false)
|
|
|
|
followed = insert(:user)
|
|
|
|
|
|
|
|
{:ok, _, _, follow_activity} = CommonAPI.follow(follower, followed)
|
|
|
|
{:ok, activity} = ActivityPub.unfollow(follower, followed, nil, false)
|
|
|
|
|
|
|
|
assert activity.data["type"] == "Undo"
|
|
|
|
assert activity.data["actor"] == follower.ap_id
|
|
|
|
|
2022-08-31 12:00:36 -06:00
|
|
|
follow_activity = Activity.get_by_id(follow_activity.id)
|
|
|
|
assert is_nil(follow_activity)
|
2022-08-05 07:28:56 -06:00
|
|
|
assert is_nil(Utils.fetch_latest_follow(follower, followed))
|
2022-08-31 12:00:36 -06:00
|
|
|
|
|
|
|
undo_activity = Activity.get_by_ap_id(activity.data["id"])
|
|
|
|
assert is_nil(undo_activity)
|
2022-08-05 07:28:56 -06:00
|
|
|
end
|
2017-05-07 11:28:23 -06:00
|
|
|
end
|
|
|
|
|
2018-10-26 00:35:06 -06:00
|
|
|
describe "timeline post-processing" do
|
|
|
|
test "it filters broken threads" do
|
|
|
|
user1 = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
user3 = insert(:user)
|
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, user1, user3} = User.follow(user1, user3)
|
2018-10-26 00:35:06 -06:00
|
|
|
assert User.following?(user1, user3)
|
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, user2, user3} = User.follow(user2, user3)
|
2018-10-26 00:35:06 -06:00
|
|
|
assert User.following?(user2, user3)
|
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, user3, user2} = User.follow(user3, user2)
|
2018-10-26 00:35:06 -06:00
|
|
|
assert User.following?(user3, user2)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, public_activity} = CommonAPI.post(user3, %{status: "hi 1"})
|
2018-10-26 00:35:06 -06:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, private_activity_1} = CommonAPI.post(user3, %{status: "hi 2", visibility: "private"})
|
2018-10-26 00:37:00 -06:00
|
|
|
|
|
|
|
{:ok, private_activity_2} =
|
|
|
|
CommonAPI.post(user2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "hi 3",
|
|
|
|
visibility: "private",
|
|
|
|
in_reply_to_status_id: private_activity_1.id
|
2018-10-26 00:37:00 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, private_activity_3} =
|
|
|
|
CommonAPI.post(user3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "hi 4",
|
|
|
|
visibility: "private",
|
|
|
|
in_reply_to_status_id: private_activity_2.id
|
2018-10-26 00:37:00 -06:00
|
|
|
})
|
2018-10-26 00:35:06 -06:00
|
|
|
|
2019-05-15 10:23:01 -06:00
|
|
|
activities =
|
2019-10-10 13:35:32 -06:00
|
|
|
ActivityPub.fetch_activities([user1.ap_id | User.following(user1)])
|
2019-05-15 10:23:01 -06:00
|
|
|
|> Enum.map(fn a -> a.id end)
|
2018-10-26 00:35:06 -06:00
|
|
|
|
2019-03-25 11:21:48 -06:00
|
|
|
private_activity_1 = Activity.get_by_ap_id_with_object(private_activity_1.data["id"])
|
2019-04-17 16:37:04 -06:00
|
|
|
|
2019-05-15 10:23:01 -06:00
|
|
|
assert [public_activity.id, private_activity_1.id, private_activity_3.id] == activities
|
2019-04-17 08:59:15 -06:00
|
|
|
|
2018-10-26 00:35:06 -06:00
|
|
|
assert length(activities) == 3
|
|
|
|
|
2019-03-24 19:23:15 -06:00
|
|
|
activities =
|
2020-06-04 11:33:16 -06:00
|
|
|
ActivityPub.fetch_activities([user1.ap_id | User.following(user1)], %{user: user1})
|
2019-05-15 10:23:01 -06:00
|
|
|
|> Enum.map(fn a -> a.id end)
|
2018-10-26 00:35:06 -06:00
|
|
|
|
2019-05-15 10:23:01 -06:00
|
|
|
assert [public_activity.id, private_activity_1.id] == activities
|
2018-10-26 00:35:06 -06:00
|
|
|
assert length(activities) == 2
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-10-27 07:05:32 -06:00
|
|
|
describe "flag/1" do
|
|
|
|
setup do
|
|
|
|
reporter = insert(:user)
|
|
|
|
target_account = insert(:user)
|
|
|
|
content = "foobar"
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(target_account, %{status: content})
|
2019-10-27 07:05:32 -06:00
|
|
|
context = Utils.generate_context_id()
|
|
|
|
|
|
|
|
reporter_ap_id = reporter.ap_id
|
|
|
|
target_ap_id = target_account.ap_id
|
|
|
|
activity_ap_id = activity.data["id"]
|
|
|
|
|
|
|
|
activity_with_object = Activity.get_by_ap_id_with_object(activity_ap_id)
|
|
|
|
|
|
|
|
{:ok,
|
|
|
|
%{
|
|
|
|
reporter: reporter,
|
|
|
|
context: context,
|
|
|
|
target_account: target_account,
|
|
|
|
reported_activity: activity,
|
|
|
|
content: content,
|
|
|
|
activity_ap_id: activity_ap_id,
|
|
|
|
activity_with_object: activity_with_object,
|
|
|
|
reporter_ap_id: reporter_ap_id,
|
|
|
|
target_ap_id: target_ap_id
|
|
|
|
}}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it can create a Flag activity",
|
|
|
|
%{
|
|
|
|
reporter: reporter,
|
|
|
|
context: context,
|
|
|
|
target_account: target_account,
|
|
|
|
reported_activity: reported_activity,
|
|
|
|
content: content,
|
|
|
|
activity_ap_id: activity_ap_id,
|
|
|
|
activity_with_object: activity_with_object,
|
|
|
|
reporter_ap_id: reporter_ap_id,
|
|
|
|
target_ap_id: target_ap_id
|
|
|
|
} do
|
|
|
|
assert {:ok, activity} =
|
|
|
|
ActivityPub.flag(%{
|
|
|
|
actor: reporter,
|
|
|
|
context: context,
|
|
|
|
account: target_account,
|
|
|
|
statuses: [reported_activity],
|
|
|
|
content: content
|
|
|
|
})
|
|
|
|
|
|
|
|
note_obj = %{
|
|
|
|
"type" => "Note",
|
|
|
|
"id" => activity_ap_id,
|
|
|
|
"content" => content,
|
|
|
|
"published" => activity_with_object.object.data["published"],
|
2020-07-23 06:08:30 -06:00
|
|
|
"actor" =>
|
|
|
|
AccountView.render("show.json", %{user: target_account, skip_visibility_check: true})
|
2019-10-27 07:05:32 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
assert %Activity{
|
|
|
|
actor: ^reporter_ap_id,
|
|
|
|
data: %{
|
|
|
|
"type" => "Flag",
|
|
|
|
"content" => ^content,
|
|
|
|
"context" => ^context,
|
|
|
|
"object" => [^target_ap_id, ^note_obj]
|
|
|
|
}
|
|
|
|
} = activity
|
|
|
|
end
|
|
|
|
|
|
|
|
test_with_mock "strips status data from Flag, before federating it",
|
|
|
|
%{
|
|
|
|
reporter: reporter,
|
|
|
|
context: context,
|
|
|
|
target_account: target_account,
|
|
|
|
reported_activity: reported_activity,
|
|
|
|
content: content
|
|
|
|
},
|
|
|
|
Utils,
|
|
|
|
[:passthrough],
|
|
|
|
[] do
|
|
|
|
{:ok, activity} =
|
|
|
|
ActivityPub.flag(%{
|
|
|
|
actor: reporter,
|
|
|
|
context: context,
|
|
|
|
account: target_account,
|
|
|
|
statuses: [reported_activity],
|
|
|
|
content: content
|
|
|
|
})
|
|
|
|
|
|
|
|
new_data =
|
|
|
|
put_in(activity.data, ["object"], [target_account.ap_id, reported_activity.data["id"]])
|
|
|
|
|
|
|
|
assert_called(Utils.maybe_federate(%{activity | data: new_data}))
|
|
|
|
end
|
2020-11-16 09:22:32 -07:00
|
|
|
|
|
|
|
test_with_mock "reverts on error",
|
|
|
|
%{
|
|
|
|
reporter: reporter,
|
|
|
|
context: context,
|
|
|
|
target_account: target_account,
|
|
|
|
reported_activity: reported_activity,
|
|
|
|
content: content
|
|
|
|
},
|
|
|
|
Utils,
|
|
|
|
[:passthrough],
|
|
|
|
maybe_federate: fn _ -> {:error, :reverted} end do
|
|
|
|
assert {:error, :reverted} =
|
|
|
|
ActivityPub.flag(%{
|
|
|
|
actor: reporter,
|
|
|
|
context: context,
|
|
|
|
account: target_account,
|
|
|
|
statuses: [reported_activity],
|
|
|
|
content: content
|
|
|
|
})
|
|
|
|
|
|
|
|
assert Repo.aggregate(Activity, :count, :id) == 1
|
2022-08-06 14:59:15 -06:00
|
|
|
assert Repo.aggregate(Object, :count, :id) == 1
|
2020-11-16 09:22:32 -07:00
|
|
|
assert Repo.aggregate(Notification, :count, :id) == 0
|
|
|
|
end
|
2019-02-20 09:51:25 -07:00
|
|
|
end
|
|
|
|
|
2019-05-14 07:12:47 -06:00
|
|
|
test "fetch_activities/2 returns activities addressed to a list " do
|
|
|
|
user = insert(:user)
|
|
|
|
member = insert(:user)
|
|
|
|
{:ok, list} = Pleroma.List.create("foo", user)
|
|
|
|
{:ok, list} = Pleroma.List.follow(list, member)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "foobar", visibility: "list:#{list.id}"})
|
2019-05-14 07:12:47 -06:00
|
|
|
|
|
|
|
activity = Repo.preload(activity, :bookmark)
|
2019-05-24 08:41:11 -06:00
|
|
|
activity = %Activity{activity | thread_muted?: !!activity.thread_muted?}
|
2019-05-14 07:12:47 -06:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
assert ActivityPub.fetch_activities([], %{user: user}) == [activity]
|
2019-05-14 07:12:47 -06:00
|
|
|
end
|
|
|
|
|
2017-04-16 08:06:19 -06:00
|
|
|
def data_uri do
|
2018-02-25 09:48:31 -07:00
|
|
|
File.read!("test/fixtures/avatar_data_uri")
|
2017-04-16 08:06:19 -06:00
|
|
|
end
|
2019-05-31 06:25:17 -06:00
|
|
|
|
|
|
|
describe "fetch_activities_bounded" do
|
|
|
|
test "fetches private posts for followed users" do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
{:ok, activity} =
|
|
|
|
CommonAPI.post(user, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "thought I looked cute might delete later :3",
|
|
|
|
visibility: "private"
|
2019-05-31 06:25:17 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
[result] = ActivityPub.fetch_activities_bounded([user.follower_address], [])
|
|
|
|
assert result.id == activity.id
|
|
|
|
end
|
|
|
|
|
|
|
|
test "fetches only public posts for other users" do
|
|
|
|
user = insert(:user)
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "#cofe", visibility: "public"})
|
2019-05-31 06:25:17 -06:00
|
|
|
|
|
|
|
{:ok, _private_activity} =
|
|
|
|
CommonAPI.post(user, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "why is tenshi eating a corndog so cute?",
|
|
|
|
visibility: "private"
|
2019-05-31 06:25:17 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
[result] = ActivityPub.fetch_activities_bounded([], [user.follower_address])
|
|
|
|
assert result.id == activity.id
|
|
|
|
end
|
|
|
|
end
|
2019-07-13 15:56:02 -06:00
|
|
|
|
|
|
|
describe "fetch_follow_information_for_user" do
|
2022-10-19 04:01:14 -06:00
|
|
|
test "synchronizes following/followers counters" do
|
2019-07-13 15:56:02 -06:00
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
local: false,
|
2024-03-13 16:00:23 -06:00
|
|
|
follower_address: "http://remote.org/users/fuser2/followers",
|
|
|
|
following_address: "http://remote.org/users/fuser2/following"
|
2019-07-13 15:56:02 -06:00
|
|
|
)
|
|
|
|
|
2019-07-13 16:58:39 -06:00
|
|
|
{:ok, info} = ActivityPub.fetch_follow_information_for_user(user)
|
|
|
|
assert info.follower_count == 527
|
|
|
|
assert info.following_count == 267
|
2019-07-13 15:56:02 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
test "detects hidden followers" do
|
|
|
|
mock(fn env ->
|
|
|
|
case env.url do
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_closed/followers?page=1" ->
|
2019-07-13 15:56:02 -06:00
|
|
|
%Tesla.Env{status: 403, body: ""}
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
apply(HttpRequestMock, :request, [env])
|
|
|
|
end
|
|
|
|
end)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
local: false,
|
2024-03-13 16:00:23 -06:00
|
|
|
follower_address: "http://remote.org/users/masto_closed/followers",
|
|
|
|
following_address: "http://remote.org/users/masto_closed/following"
|
2019-07-13 15:56:02 -06:00
|
|
|
)
|
|
|
|
|
2019-10-16 12:59:21 -06:00
|
|
|
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
|
|
|
|
assert follow_info.hide_followers == true
|
|
|
|
assert follow_info.hide_follows == false
|
2019-07-13 15:56:02 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
test "detects hidden follows" do
|
|
|
|
mock(fn env ->
|
|
|
|
case env.url do
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_closed/following?page=1" ->
|
2019-07-13 15:56:02 -06:00
|
|
|
%Tesla.Env{status: 403, body: ""}
|
|
|
|
|
|
|
|
_ ->
|
|
|
|
apply(HttpRequestMock, :request, [env])
|
|
|
|
end
|
|
|
|
end)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
local: false,
|
2024-03-13 16:00:23 -06:00
|
|
|
follower_address: "http://remote.org/users/masto_closed/followers",
|
|
|
|
following_address: "http://remote.org/users/masto_closed/following"
|
2019-07-13 15:56:02 -06:00
|
|
|
)
|
|
|
|
|
2019-10-16 12:59:21 -06:00
|
|
|
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
|
|
|
|
assert follow_info.hide_followers == false
|
|
|
|
assert follow_info.hide_follows == true
|
2019-07-13 15:56:02 -06:00
|
|
|
end
|
2019-11-29 23:24:08 -07:00
|
|
|
|
|
|
|
test "detects hidden follows/followers for friendica" do
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
local: false,
|
2024-03-13 16:00:23 -06:00
|
|
|
follower_address: "http://remote.org/followers/fuser3",
|
|
|
|
following_address: "http://remote.org/following/fuser3"
|
2019-11-29 23:24:08 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
|
|
|
|
assert follow_info.hide_followers == true
|
|
|
|
assert follow_info.follower_count == 296
|
|
|
|
assert follow_info.following_count == 32
|
|
|
|
assert follow_info.hide_follows == true
|
|
|
|
end
|
2019-12-19 05:25:23 -07:00
|
|
|
|
|
|
|
test "doesn't crash when follower and following counters are hidden" do
|
|
|
|
mock(fn env ->
|
|
|
|
case env.url do
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_hidden_counters/following" ->
|
2020-10-28 09:08:23 -06:00
|
|
|
json(
|
|
|
|
%{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
Only allow exact id matches
This protects us from falling for obvious spoofs as from the current
upload exploit (unfortunately we can’t reasonably do anything about
spoofs with exact matches as was possible via emoji and proxy).
Such objects being invalid is supported by the spec, sepcifically
sections 3.1 and 3.2: https://www.w3.org/TR/activitypub/#obj-id
Anonymous objects are not relevant here (they can only exists within
parent objects iiuc) and neither is client-to-server or transient objects
(as those cannot be fetched in the first place).
This leaves us with the requirement for `id` to (a) exist and
(b) be a publicly dereferencable URI from the originating server.
This alone does not yet demand strict equivalence, but the spec then
further explains objects ought to be fetchable _via their ID_.
Meaning an object not retrievable via its ID, is invalid.
This reading is supported by the fact, e.g. GoToSocial (recently) and
Mastodon (for 6+ years) do already implement such strict ID checks,
additionally proving this doesn’t cause federation issues in practice.
However, apart from canonical IDs there can also be additional display
URLs. *omas first redirect those to their canonical location, but *keys
and Mastodon directly serve the AP representation without redirects.
Mastodon and GTS deal with this in two different ways,
but both constitute an effective countermeasure:
- Mastodon:
Unless it already is a known AP id, two fetches occur.
The first fetch just reads the `id` property and then refetches from
the id. The last fetch requires the returned id to exactly match the
URL the content was fetched from. (This can be optimised by skipping
the second fetch if it already matches)
https://github.com/mastodon/mastodon/blob/05eda8d19330a9c27c0cf07de19a87edff269057/app/helpers/jsonld_helper.rb#L168
https://github.com/mastodon/mastodon/commit/63f097979990bf5ba9db848b8a253056bad781af
- GTS:
Only does a single fetch and then checks if _either_ the id
_or_ url property (which can be an object) match the original fetch
URL. This relies on implementations always including their display URL
as "url" if differing from the id. For actors this is true for all
investigated implementations, for posts only Mastodon includes an
"url", but it is also the only one with a differing display URL.
https://github.com/superseriousbusiness/gotosocial/commit/2bafd7daf542d985ee76d9079a30a602cb7be827#diff-943bbb02c8ac74ac5dc5d20807e561dcdfaebdc3b62b10730f643a20ac23c24fR222
Albeit Mastodon’s refetch offers higher compatibility with theoretical
implmentations using either multiple different display URL or not
denoting any of them as "url" at all, for now we chose to adopt a
GTS-like refetch-free approach to avoid additional implementation
concerns wrt to whether redirects should be allowed when fetching a
canonical AP id and potential for accidentally loosening some checks
(e.g. cross-domain refetches) for one of the fetches.
This may be reconsidered in the future.
2024-03-15 18:00:19 -06:00
|
|
|
"id" => "http://remote.org/users/masto_hidden_counters/following"
|
2020-10-28 09:08:23 -06:00
|
|
|
},
|
|
|
|
headers: HttpRequestMock.activitypub_object_headers()
|
|
|
|
)
|
2019-12-19 05:25:23 -07:00
|
|
|
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_hidden_counters/following?page=1" ->
|
2019-12-19 05:25:23 -07:00
|
|
|
%Tesla.Env{status: 403, body: ""}
|
|
|
|
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_hidden_counters/followers" ->
|
2020-10-28 09:08:23 -06:00
|
|
|
json(
|
|
|
|
%{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
Only allow exact id matches
This protects us from falling for obvious spoofs as from the current
upload exploit (unfortunately we can’t reasonably do anything about
spoofs with exact matches as was possible via emoji and proxy).
Such objects being invalid is supported by the spec, sepcifically
sections 3.1 and 3.2: https://www.w3.org/TR/activitypub/#obj-id
Anonymous objects are not relevant here (they can only exists within
parent objects iiuc) and neither is client-to-server or transient objects
(as those cannot be fetched in the first place).
This leaves us with the requirement for `id` to (a) exist and
(b) be a publicly dereferencable URI from the originating server.
This alone does not yet demand strict equivalence, but the spec then
further explains objects ought to be fetchable _via their ID_.
Meaning an object not retrievable via its ID, is invalid.
This reading is supported by the fact, e.g. GoToSocial (recently) and
Mastodon (for 6+ years) do already implement such strict ID checks,
additionally proving this doesn’t cause federation issues in practice.
However, apart from canonical IDs there can also be additional display
URLs. *omas first redirect those to their canonical location, but *keys
and Mastodon directly serve the AP representation without redirects.
Mastodon and GTS deal with this in two different ways,
but both constitute an effective countermeasure:
- Mastodon:
Unless it already is a known AP id, two fetches occur.
The first fetch just reads the `id` property and then refetches from
the id. The last fetch requires the returned id to exactly match the
URL the content was fetched from. (This can be optimised by skipping
the second fetch if it already matches)
https://github.com/mastodon/mastodon/blob/05eda8d19330a9c27c0cf07de19a87edff269057/app/helpers/jsonld_helper.rb#L168
https://github.com/mastodon/mastodon/commit/63f097979990bf5ba9db848b8a253056bad781af
- GTS:
Only does a single fetch and then checks if _either_ the id
_or_ url property (which can be an object) match the original fetch
URL. This relies on implementations always including their display URL
as "url" if differing from the id. For actors this is true for all
investigated implementations, for posts only Mastodon includes an
"url", but it is also the only one with a differing display URL.
https://github.com/superseriousbusiness/gotosocial/commit/2bafd7daf542d985ee76d9079a30a602cb7be827#diff-943bbb02c8ac74ac5dc5d20807e561dcdfaebdc3b62b10730f643a20ac23c24fR222
Albeit Mastodon’s refetch offers higher compatibility with theoretical
implmentations using either multiple different display URL or not
denoting any of them as "url" at all, for now we chose to adopt a
GTS-like refetch-free approach to avoid additional implementation
concerns wrt to whether redirects should be allowed when fetching a
canonical AP id and potential for accidentally loosening some checks
(e.g. cross-domain refetches) for one of the fetches.
This may be reconsidered in the future.
2024-03-15 18:00:19 -06:00
|
|
|
"id" => "http://remote.org/users/masto_hidden_counters/followers"
|
2020-10-28 09:08:23 -06:00
|
|
|
},
|
|
|
|
headers: HttpRequestMock.activitypub_object_headers()
|
|
|
|
)
|
2019-12-19 05:25:23 -07:00
|
|
|
|
2024-03-13 16:00:23 -06:00
|
|
|
"http://remote.org/users/masto_hidden_counters/followers?page=1" ->
|
2019-12-19 05:25:23 -07:00
|
|
|
%Tesla.Env{status: 403, body: ""}
|
|
|
|
end
|
|
|
|
end)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
local: false,
|
2024-03-13 16:00:23 -06:00
|
|
|
follower_address: "http://remote.org/users/masto_hidden_counters/followers",
|
|
|
|
following_address: "http://remote.org/users/masto_hidden_counters/following"
|
2019-12-19 05:25:23 -07:00
|
|
|
)
|
|
|
|
|
|
|
|
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
|
|
|
|
|
|
|
|
assert follow_info.hide_followers == true
|
|
|
|
assert follow_info.follower_count == 0
|
|
|
|
assert follow_info.hide_follows == true
|
|
|
|
assert follow_info.following_count == 0
|
|
|
|
end
|
2019-07-13 15:56:02 -06:00
|
|
|
end
|
2019-11-18 12:32:43 -07:00
|
|
|
|
|
|
|
describe "fetch_favourites/3" do
|
|
|
|
test "returns a favourite activities sorted by adds to favorite" do
|
|
|
|
user = insert(:user)
|
2019-11-19 10:19:41 -07:00
|
|
|
other_user = insert(:user)
|
2019-11-18 12:32:43 -07:00
|
|
|
user1 = insert(:user)
|
|
|
|
user2 = insert(:user)
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a1} = CommonAPI.post(user1, %{status: "bla"})
|
|
|
|
{:ok, _a2} = CommonAPI.post(user2, %{status: "traps are happy"})
|
|
|
|
{:ok, a3} = CommonAPI.post(user2, %{status: "Trees Are "})
|
|
|
|
{:ok, a4} = CommonAPI.post(user2, %{status: "Agent Smith "})
|
|
|
|
{:ok, a5} = CommonAPI.post(user1, %{status: "Red or Blue "})
|
2019-11-18 12:32:43 -07:00
|
|
|
|
2020-03-19 11:00:55 -06:00
|
|
|
{:ok, _} = CommonAPI.favorite(user, a4.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(other_user, a3.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(user, a3.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(other_user, a5.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(user, a5.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(other_user, a4.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(user, a1.id)
|
|
|
|
{:ok, _} = CommonAPI.favorite(other_user, a1.id)
|
2019-11-18 12:32:43 -07:00
|
|
|
result = ActivityPub.fetch_favourites(user)
|
|
|
|
|
|
|
|
assert Enum.map(result, & &1.id) == [a1.id, a5.id, a3.id, a4.id]
|
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
result = ActivityPub.fetch_favourites(user, %{limit: 2})
|
2019-11-18 12:32:43 -07:00
|
|
|
assert Enum.map(result, & &1.id) == [a1.id, a5.id]
|
|
|
|
end
|
|
|
|
end
|
2019-12-05 02:18:59 -07:00
|
|
|
|
2019-10-30 05:21:49 -06:00
|
|
|
describe "Move activity" do
|
|
|
|
test "create" do
|
|
|
|
%{ap_id: old_ap_id} = old_user = insert(:user)
|
|
|
|
%{ap_id: new_ap_id} = new_user = insert(:user, also_known_as: [old_ap_id])
|
|
|
|
follower = insert(:user)
|
2019-11-12 04:36:50 -07:00
|
|
|
follower_move_opted_out = insert(:user, allow_following_move: false)
|
2019-10-30 05:21:49 -06:00
|
|
|
|
|
|
|
User.follow(follower, old_user)
|
2019-11-12 04:36:50 -07:00
|
|
|
User.follow(follower_move_opted_out, old_user)
|
2019-10-30 05:21:49 -06:00
|
|
|
|
|
|
|
assert User.following?(follower, old_user)
|
2019-11-12 04:36:50 -07:00
|
|
|
assert User.following?(follower_move_opted_out, old_user)
|
2019-10-30 05:21:49 -06:00
|
|
|
|
|
|
|
assert {:ok, activity} = ActivityPub.move(old_user, new_user)
|
|
|
|
|
|
|
|
assert %Activity{
|
|
|
|
actor: ^old_ap_id,
|
|
|
|
data: %{
|
|
|
|
"actor" => ^old_ap_id,
|
|
|
|
"object" => ^old_ap_id,
|
|
|
|
"target" => ^new_ap_id,
|
|
|
|
"type" => "Move"
|
|
|
|
},
|
2022-07-04 10:29:39 -06:00
|
|
|
local: true,
|
|
|
|
recipients: recipients
|
2019-10-30 05:21:49 -06:00
|
|
|
} = activity
|
|
|
|
|
2022-07-04 10:29:39 -06:00
|
|
|
assert old_user.follower_address in recipients
|
|
|
|
|
2019-10-30 05:21:49 -06:00
|
|
|
params = %{
|
|
|
|
"op" => "move_following",
|
|
|
|
"origin_id" => old_user.id,
|
|
|
|
"target_id" => new_user.id
|
|
|
|
}
|
|
|
|
|
|
|
|
assert_enqueued(worker: Pleroma.Workers.BackgroundWorker, args: params)
|
|
|
|
|
2020-06-23 06:09:01 -06:00
|
|
|
Pleroma.Workers.BackgroundWorker.perform(%Oban.Job{args: params})
|
2019-10-30 05:21:49 -06:00
|
|
|
|
|
|
|
refute User.following?(follower, old_user)
|
|
|
|
assert User.following?(follower, new_user)
|
2019-11-12 04:36:50 -07:00
|
|
|
|
|
|
|
assert User.following?(follower_move_opted_out, old_user)
|
|
|
|
refute User.following?(follower_move_opted_out, new_user)
|
2019-11-12 04:48:14 -07:00
|
|
|
|
|
|
|
activity = %Activity{activity | object: nil}
|
|
|
|
|
2020-03-16 11:05:21 -06:00
|
|
|
assert [%Notification{activity: ^activity}] = Notification.for_user(follower)
|
2019-11-12 04:48:14 -07:00
|
|
|
|
2020-03-16 11:05:21 -06:00
|
|
|
assert [%Notification{activity: ^activity}] = Notification.for_user(follower_move_opted_out)
|
2019-10-30 05:21:49 -06:00
|
|
|
end
|
|
|
|
|
|
|
|
test "old user must be in the new user's `also_known_as` list" do
|
|
|
|
old_user = insert(:user)
|
|
|
|
new_user = insert(:user)
|
|
|
|
|
|
|
|
assert {:error, "Target account must have the origin in `alsoKnownAs`"} =
|
|
|
|
ActivityPub.move(old_user, new_user)
|
|
|
|
end
|
2022-07-04 10:29:39 -06:00
|
|
|
|
|
|
|
test "do not move remote user following relationships" do
|
|
|
|
%{ap_id: old_ap_id} = old_user = insert(:user)
|
|
|
|
%{ap_id: new_ap_id} = new_user = insert(:user, also_known_as: [old_ap_id])
|
|
|
|
follower_remote = insert(:user, local: false)
|
|
|
|
|
|
|
|
User.follow(follower_remote, old_user)
|
|
|
|
|
|
|
|
assert User.following?(follower_remote, old_user)
|
|
|
|
|
|
|
|
assert {:ok, activity} = ActivityPub.move(old_user, new_user)
|
|
|
|
|
|
|
|
assert %Activity{
|
|
|
|
actor: ^old_ap_id,
|
|
|
|
data: %{
|
|
|
|
"actor" => ^old_ap_id,
|
|
|
|
"object" => ^old_ap_id,
|
|
|
|
"target" => ^new_ap_id,
|
|
|
|
"type" => "Move"
|
|
|
|
},
|
|
|
|
local: true
|
|
|
|
} = activity
|
|
|
|
|
|
|
|
params = %{
|
|
|
|
"op" => "move_following",
|
|
|
|
"origin_id" => old_user.id,
|
|
|
|
"target_id" => new_user.id
|
|
|
|
}
|
|
|
|
|
|
|
|
assert_enqueued(worker: Pleroma.Workers.BackgroundWorker, args: params)
|
|
|
|
|
|
|
|
Pleroma.Workers.BackgroundWorker.perform(%Oban.Job{args: params})
|
|
|
|
|
|
|
|
assert User.following?(follower_remote, old_user)
|
|
|
|
refute User.following?(follower_remote, new_user)
|
|
|
|
end
|
2019-10-30 05:21:49 -06:00
|
|
|
end
|
2020-02-20 11:04:02 -07:00
|
|
|
|
2019-12-03 23:49:17 -07:00
|
|
|
test "doesn't retrieve replies activities with exclude_replies" do
|
|
|
|
user = insert(:user)
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "yeah"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, _reply} = CommonAPI.post(user, %{status: "yeah", in_reply_to_status_id: activity.id})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-06-04 11:33:16 -06:00
|
|
|
[result] = ActivityPub.fetch_public_activities(%{exclude_replies: true})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
assert result.id == activity.id
|
|
|
|
|
|
|
|
assert length(ActivityPub.fetch_public_activities()) == 2
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "replies filtering with public messages" do
|
|
|
|
setup :public_messages
|
|
|
|
|
|
|
|
test "public timeline", %{users: %{u1: user}} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 16
|
|
|
|
end
|
|
|
|
|
|
|
|
test "public timeline with reply_visibility `following`", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4,
|
|
|
|
activities: activities
|
|
|
|
} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 14
|
|
|
|
|
|
|
|
visible_ids =
|
|
|
|
Map.values(u1) ++ Map.values(u2) ++ Map.values(u4) ++ Map.values(activities) ++ [u3[:r1]]
|
|
|
|
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "public timeline with reply_visibility `self`", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4,
|
|
|
|
activities: activities
|
|
|
|
} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "self")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 10
|
|
|
|
visible_ids = Map.values(u1) ++ [u2[:r1], u3[:r1], u4[:r1]] ++ Map.values(activities)
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
activities: activities,
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4
|
|
|
|
} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 13
|
|
|
|
|
|
|
|
visible_ids =
|
|
|
|
Map.values(u1) ++
|
|
|
|
Map.values(u3) ++
|
|
|
|
[
|
|
|
|
activities[:a1],
|
|
|
|
activities[:a2],
|
|
|
|
activities[:a4],
|
|
|
|
u2[:r1],
|
|
|
|
u2[:r3],
|
|
|
|
u4[:r1],
|
|
|
|
u4[:r2]
|
|
|
|
]
|
|
|
|
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline with reply_visibility `following`", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
activities: activities,
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4
|
|
|
|
} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 11
|
|
|
|
|
|
|
|
visible_ids =
|
|
|
|
Map.values(u1) ++
|
|
|
|
[
|
|
|
|
activities[:a1],
|
|
|
|
activities[:a2],
|
|
|
|
activities[:a4],
|
|
|
|
u2[:r1],
|
|
|
|
u2[:r3],
|
|
|
|
u3[:r1],
|
|
|
|
u4[:r1],
|
|
|
|
u4[:r2]
|
|
|
|
]
|
|
|
|
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline with reply_visibility `self`", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
activities: activities,
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4
|
|
|
|
} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|> Map.put(:reply_visibility, "self")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 9
|
|
|
|
|
|
|
|
visible_ids =
|
|
|
|
Map.values(u1) ++
|
|
|
|
[
|
|
|
|
activities[:a1],
|
|
|
|
activities[:a2],
|
|
|
|
activities[:a4],
|
|
|
|
u2[:r1],
|
|
|
|
u3[:r1],
|
|
|
|
u4[:r1]
|
|
|
|
]
|
|
|
|
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
2020-06-10 04:10:09 -06:00
|
|
|
|
|
|
|
test "filtering out announces where the user is the actor of the announced message" do
|
|
|
|
user = insert(:user)
|
|
|
|
other_user = insert(:user)
|
|
|
|
third_user = insert(:user)
|
|
|
|
User.follow(user, other_user)
|
|
|
|
|
|
|
|
{:ok, post} = CommonAPI.post(user, %{status: "yo"})
|
|
|
|
{:ok, other_post} = CommonAPI.post(third_user, %{status: "yo"})
|
|
|
|
{:ok, _announce} = CommonAPI.repeat(post.id, other_user)
|
|
|
|
{:ok, _announce} = CommonAPI.repeat(post.id, third_user)
|
|
|
|
{:ok, announce} = CommonAPI.repeat(other_post.id, other_user)
|
|
|
|
|
2020-06-10 04:15:56 -06:00
|
|
|
params = %{
|
|
|
|
type: ["Announce"]
|
|
|
|
}
|
|
|
|
|
|
|
|
results =
|
|
|
|
[user.ap_id | User.following(user)]
|
|
|
|
|> ActivityPub.fetch_activities(params)
|
|
|
|
|
|
|
|
assert length(results) == 3
|
|
|
|
|
2020-06-10 04:10:09 -06:00
|
|
|
params = %{
|
|
|
|
type: ["Announce"],
|
|
|
|
announce_filtering_user: user
|
|
|
|
}
|
|
|
|
|
|
|
|
[result] =
|
|
|
|
[user.ap_id | User.following(user)]
|
|
|
|
|> ActivityPub.fetch_activities(params)
|
|
|
|
|
|
|
|
assert result.id == announce.id
|
|
|
|
end
|
2019-12-03 23:49:17 -07:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "replies filtering with private messages" do
|
|
|
|
setup :private_messages
|
|
|
|
|
|
|
|
test "public timeline", %{users: %{u1: user}} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert activities_ids == []
|
|
|
|
end
|
|
|
|
|
|
|
|
test "public timeline with default reply_visibility `following`", %{users: %{u1: user}} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
|
|
|
|> Map.put(:user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert activities_ids == []
|
|
|
|
end
|
|
|
|
|
|
|
|
test "public timeline with default reply_visibility `self`", %{users: %{u1: user}} do
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:local_only, false)
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "self")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
|
|
|
|> Map.put(:user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert activities_ids == []
|
2020-09-15 04:00:07 -06:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
%{}
|
|
|
|
|> Map.put(:reply_visibility, "self")
|
|
|
|
|> Map.put(:reply_filtering_user, nil)
|
|
|
|
|> ActivityPub.fetch_public_activities()
|
|
|
|
|
|
|
|
assert activities_ids == []
|
2019-12-03 23:49:17 -07:00
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline", %{users: %{u1: user}} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 12
|
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline with default reply_visibility `following`", %{users: %{u1: user}} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 12
|
|
|
|
end
|
|
|
|
|
|
|
|
test "home timeline with default reply_visibility `self`", %{
|
|
|
|
users: %{u1: user},
|
|
|
|
activities: activities,
|
|
|
|
u1: u1,
|
|
|
|
u2: u2,
|
|
|
|
u3: u3,
|
|
|
|
u4: u4
|
|
|
|
} do
|
|
|
|
params =
|
|
|
|
%{}
|
2020-06-04 11:33:16 -06:00
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|> Map.put(:reply_visibility, "self")
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
activities_ids =
|
|
|
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
|
|
|
|> Enum.map(& &1.id)
|
|
|
|
|
|
|
|
assert length(activities_ids) == 10
|
|
|
|
|
|
|
|
visible_ids =
|
|
|
|
Map.values(u1) ++ Map.values(u4) ++ [u2[:r1], u3[:r1]] ++ Map.values(activities)
|
|
|
|
|
|
|
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
defp public_messages(_) do
|
|
|
|
[u1, u2, u3, u4] = insert_list(4, :user)
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, u1, u2} = User.follow(u1, u2)
|
|
|
|
{:ok, u2, u1} = User.follow(u2, u1)
|
|
|
|
{:ok, u1, u4} = User.follow(u1, u4)
|
|
|
|
{:ok, u4, u1} = User.follow(u4, u1)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, u2, u3} = User.follow(u2, u3)
|
|
|
|
{:ok, u3, u2} = User.follow(u3, u2)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a1} = CommonAPI.post(u1, %{status: "Status"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r1_1} =
|
|
|
|
CommonAPI.post(u2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u2 to u1",
|
|
|
|
in_reply_to_status_id: a1.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r1_2} =
|
|
|
|
CommonAPI.post(u3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u3 to u1",
|
|
|
|
in_reply_to_status_id: a1.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r1_3} =
|
|
|
|
CommonAPI.post(u4, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u4 to u1",
|
|
|
|
in_reply_to_status_id: a1.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a2} = CommonAPI.post(u2, %{status: "Status"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r2_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u2.nickname} reply from u1 to u2",
|
|
|
|
in_reply_to_status_id: a2.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r2_2} =
|
|
|
|
CommonAPI.post(u3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u2.nickname} reply from u3 to u2",
|
|
|
|
in_reply_to_status_id: a2.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r2_3} =
|
|
|
|
CommonAPI.post(u4, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u2.nickname} reply from u4 to u2",
|
|
|
|
in_reply_to_status_id: a2.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a3} = CommonAPI.post(u3, %{status: "Status"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r3_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u3.nickname} reply from u1 to u3",
|
|
|
|
in_reply_to_status_id: a3.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r3_2} =
|
|
|
|
CommonAPI.post(u2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u3.nickname} reply from u2 to u3",
|
|
|
|
in_reply_to_status_id: a3.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r3_3} =
|
|
|
|
CommonAPI.post(u4, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u3.nickname} reply from u4 to u3",
|
|
|
|
in_reply_to_status_id: a3.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a4} = CommonAPI.post(u4, %{status: "Status"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r4_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u4.nickname} reply from u1 to u4",
|
|
|
|
in_reply_to_status_id: a4.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r4_2} =
|
|
|
|
CommonAPI.post(u2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u4.nickname} reply from u2 to u4",
|
|
|
|
in_reply_to_status_id: a4.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r4_3} =
|
|
|
|
CommonAPI.post(u3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u4.nickname} reply from u3 to u4",
|
|
|
|
in_reply_to_status_id: a4.id
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok,
|
|
|
|
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
|
|
|
|
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
|
|
|
|
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
|
|
|
|
u2: %{r1: r2_1.id, r2: r2_2.id, r3: r2_3.id},
|
|
|
|
u3: %{r1: r3_1.id, r2: r3_2.id, r3: r3_3.id},
|
|
|
|
u4: %{r1: r4_1.id, r2: r4_2.id, r3: r4_3.id}}
|
|
|
|
end
|
|
|
|
|
|
|
|
defp private_messages(_) do
|
|
|
|
[u1, u2, u3, u4] = insert_list(4, :user)
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, u1, u2} = User.follow(u1, u2)
|
|
|
|
{:ok, u2, u1} = User.follow(u2, u1)
|
|
|
|
{:ok, u1, u3} = User.follow(u1, u3)
|
|
|
|
{:ok, u3, u1} = User.follow(u3, u1)
|
|
|
|
{:ok, u1, u4} = User.follow(u1, u4)
|
|
|
|
{:ok, u4, u1} = User.follow(u4, u1)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-12-01 13:17:52 -07:00
|
|
|
{:ok, u2, u3} = User.follow(u2, u3)
|
|
|
|
{:ok, u3, u2} = User.follow(u3, u2)
|
2019-12-03 23:49:17 -07:00
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a1} = CommonAPI.post(u1, %{status: "Status", visibility: "private"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r1_1} =
|
|
|
|
CommonAPI.post(u2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u2 to u1",
|
|
|
|
in_reply_to_status_id: a1.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r1_2} =
|
|
|
|
CommonAPI.post(u3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u3 to u1",
|
|
|
|
in_reply_to_status_id: a1.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r1_3} =
|
|
|
|
CommonAPI.post(u4, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u1.nickname} reply from u4 to u1",
|
|
|
|
in_reply_to_status_id: a1.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a2} = CommonAPI.post(u2, %{status: "Status", visibility: "private"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r2_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u2.nickname} reply from u1 to u2",
|
|
|
|
in_reply_to_status_id: a2.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r2_2} =
|
|
|
|
CommonAPI.post(u3, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u2.nickname} reply from u3 to u2",
|
|
|
|
in_reply_to_status_id: a2.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a3} = CommonAPI.post(u3, %{status: "Status", visibility: "private"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r3_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u3.nickname} reply from u1 to u3",
|
|
|
|
in_reply_to_status_id: a3.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, r3_2} =
|
|
|
|
CommonAPI.post(u2, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u3.nickname} reply from u2 to u3",
|
|
|
|
in_reply_to_status_id: a3.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
2020-05-12 13:59:26 -06:00
|
|
|
{:ok, a4} = CommonAPI.post(u4, %{status: "Status", visibility: "private"})
|
2019-12-03 23:49:17 -07:00
|
|
|
|
|
|
|
{:ok, r4_1} =
|
|
|
|
CommonAPI.post(u1, %{
|
2020-05-12 13:59:26 -06:00
|
|
|
status: "@#{u4.nickname} reply from u1 to u4",
|
|
|
|
in_reply_to_status_id: a4.id,
|
|
|
|
visibility: "private"
|
2019-12-03 23:49:17 -07:00
|
|
|
})
|
|
|
|
|
|
|
|
{:ok,
|
|
|
|
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
|
|
|
|
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
|
|
|
|
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
|
|
|
|
u2: %{r1: r2_1.id, r2: r2_2.id},
|
|
|
|
u3: %{r1: r3_1.id, r2: r3_2.id},
|
|
|
|
u4: %{r1: r4_1.id}}
|
|
|
|
end
|
2020-04-28 04:13:53 -06:00
|
|
|
|
2020-05-04 06:22:54 -06:00
|
|
|
describe "maybe_update_follow_information/1" do
|
|
|
|
setup do
|
|
|
|
clear_config([:instance, :external_user_synchronization], true)
|
|
|
|
|
|
|
|
user = %{
|
|
|
|
local: false,
|
|
|
|
ap_id: "https://gensokyo.2hu/users/raymoo",
|
|
|
|
following_address: "https://gensokyo.2hu/users/following",
|
|
|
|
follower_address: "https://gensokyo.2hu/users/followers",
|
|
|
|
type: "Person"
|
|
|
|
}
|
|
|
|
|
|
|
|
%{user: user}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "logs an error when it can't fetch the info", %{user: user} do
|
|
|
|
assert capture_log(fn ->
|
|
|
|
ActivityPub.maybe_update_follow_information(user)
|
|
|
|
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "just returns the input if the user type is Application", %{
|
|
|
|
user: user
|
|
|
|
} do
|
|
|
|
user =
|
|
|
|
user
|
|
|
|
|> Map.put(:type, "Application")
|
|
|
|
|
|
|
|
refute capture_log(fn ->
|
|
|
|
assert ^user = ActivityPub.maybe_update_follow_information(user)
|
|
|
|
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it just returns the input if the user has no following/follower addresses", %{
|
|
|
|
user: user
|
|
|
|
} do
|
|
|
|
user =
|
|
|
|
user
|
|
|
|
|> Map.put(:following_address, nil)
|
|
|
|
|> Map.put(:follower_address, nil)
|
|
|
|
|
|
|
|
refute capture_log(fn ->
|
|
|
|
assert ^user = ActivityPub.maybe_update_follow_information(user)
|
|
|
|
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
|
|
|
|
end
|
|
|
|
end
|
2020-05-05 04:28:54 -06:00
|
|
|
|
2020-02-20 11:04:02 -07:00
|
|
|
describe "global activity expiration" do
|
|
|
|
test "creates an activity expiration for local Create activities" do
|
2020-08-22 11:46:01 -06:00
|
|
|
clear_config([:mrf, :policies], Pleroma.Web.ActivityPub.MRF.ActivityExpirationPolicy)
|
|
|
|
|
|
|
|
{:ok, activity} = ActivityBuilder.insert(%{"type" => "Create", "context" => "3hu"})
|
|
|
|
{:ok, follow} = ActivityBuilder.insert(%{"type" => "Follow", "context" => "3hu"})
|
|
|
|
|
|
|
|
assert_enqueued(
|
|
|
|
worker: Pleroma.Workers.PurgeExpiredActivity,
|
|
|
|
args: %{activity_id: activity.id},
|
|
|
|
scheduled_at:
|
|
|
|
activity.inserted_at
|
|
|
|
|> DateTime.from_naive!("Etc/UTC")
|
|
|
|
|> Timex.shift(days: 365)
|
2020-02-20 11:04:02 -07:00
|
|
|
)
|
|
|
|
|
2020-08-22 11:46:01 -06:00
|
|
|
refute_enqueued(
|
|
|
|
worker: Pleroma.Workers.PurgeExpiredActivity,
|
|
|
|
args: %{activity_id: follow.id}
|
|
|
|
)
|
2020-02-20 11:04:02 -07:00
|
|
|
end
|
|
|
|
end
|
2020-07-10 06:10:44 -06:00
|
|
|
|
|
|
|
describe "handling of clashing nicknames" do
|
|
|
|
test "renames an existing user with a clashing nickname and a different ap id" do
|
|
|
|
orig_user =
|
|
|
|
insert(
|
|
|
|
:user,
|
|
|
|
local: false,
|
|
|
|
nickname: "admin@mastodon.example.org",
|
|
|
|
ap_id: "http://mastodon.example.org/users/harinezumigari"
|
|
|
|
)
|
|
|
|
|
|
|
|
%{
|
|
|
|
nickname: orig_user.nickname,
|
|
|
|
ap_id: orig_user.ap_id <> "part_2"
|
|
|
|
}
|
|
|
|
|> ActivityPub.maybe_handle_clashing_nickname()
|
|
|
|
|
|
|
|
user = User.get_by_id(orig_user.id)
|
|
|
|
|
|
|
|
assert user.nickname == "#{orig_user.id}.admin@mastodon.example.org"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "does nothing with a clashing nickname and the same ap id" do
|
|
|
|
orig_user =
|
|
|
|
insert(
|
|
|
|
:user,
|
|
|
|
local: false,
|
|
|
|
nickname: "admin@mastodon.example.org",
|
|
|
|
ap_id: "http://mastodon.example.org/users/harinezumigari"
|
|
|
|
)
|
|
|
|
|
|
|
|
%{
|
|
|
|
nickname: orig_user.nickname,
|
|
|
|
ap_id: orig_user.ap_id
|
|
|
|
}
|
|
|
|
|> ActivityPub.maybe_handle_clashing_nickname()
|
|
|
|
|
|
|
|
user = User.get_by_id(orig_user.id)
|
|
|
|
|
|
|
|
assert user.nickname == orig_user.nickname
|
|
|
|
end
|
|
|
|
end
|
2020-09-22 06:20:19 -06:00
|
|
|
|
|
|
|
describe "reply filtering" do
|
|
|
|
test "`following` still contains announcements by friends" do
|
|
|
|
user = insert(:user)
|
|
|
|
followed = insert(:user)
|
|
|
|
not_followed = insert(:user)
|
|
|
|
|
|
|
|
User.follow(user, followed)
|
|
|
|
|
|
|
|
{:ok, followed_post} = CommonAPI.post(followed, %{status: "Hello"})
|
|
|
|
|
|
|
|
{:ok, not_followed_to_followed} =
|
|
|
|
CommonAPI.post(not_followed, %{
|
|
|
|
status: "Also hello",
|
|
|
|
in_reply_to_status_id: followed_post.id
|
|
|
|
})
|
|
|
|
|
|
|
|
{:ok, retoot} = CommonAPI.repeat(not_followed_to_followed.id, followed)
|
|
|
|
|
|
|
|
params =
|
|
|
|
%{}
|
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:announce_filtering_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|
|
|
|
activities =
|
|
|
|
[user.ap_id | User.following(user)]
|
|
|
|
|> ActivityPub.fetch_activities(params)
|
|
|
|
|
|
|
|
followed_post_id = followed_post.id
|
|
|
|
retoot_id = retoot.id
|
|
|
|
|
|
|
|
assert [%{id: ^followed_post_id}, %{id: ^retoot_id}] = activities
|
|
|
|
|
|
|
|
assert length(activities) == 2
|
|
|
|
end
|
|
|
|
|
|
|
|
# This test is skipped because, while this is the desired behavior,
|
|
|
|
# there seems to be no good way to achieve it with the method that
|
|
|
|
# we currently use for detecting to who a reply is directed.
|
|
|
|
# This is a TODO and should be fixed by a later rewrite of the code
|
|
|
|
# in question.
|
|
|
|
@tag skip: true
|
|
|
|
test "`following` still contains self-replies by friends" do
|
|
|
|
user = insert(:user)
|
|
|
|
followed = insert(:user)
|
|
|
|
not_followed = insert(:user)
|
|
|
|
|
|
|
|
User.follow(user, followed)
|
|
|
|
|
|
|
|
{:ok, followed_post} = CommonAPI.post(followed, %{status: "Hello"})
|
|
|
|
{:ok, not_followed_post} = CommonAPI.post(not_followed, %{status: "Also hello"})
|
|
|
|
|
|
|
|
{:ok, _followed_to_not_followed} =
|
|
|
|
CommonAPI.post(followed, %{status: "sup", in_reply_to_status_id: not_followed_post.id})
|
|
|
|
|
|
|
|
{:ok, _followed_self_reply} =
|
|
|
|
CommonAPI.post(followed, %{status: "Also cofe", in_reply_to_status_id: followed_post.id})
|
|
|
|
|
|
|
|
params =
|
|
|
|
%{}
|
|
|
|
|> Map.put(:type, ["Create", "Announce"])
|
|
|
|
|> Map.put(:blocking_user, user)
|
|
|
|
|> Map.put(:muting_user, user)
|
|
|
|
|> Map.put(:reply_filtering_user, user)
|
|
|
|
|> Map.put(:reply_visibility, "following")
|
|
|
|
|> Map.put(:announce_filtering_user, user)
|
|
|
|
|> Map.put(:user, user)
|
|
|
|
|
|
|
|
activities =
|
|
|
|
[user.ap_id | User.following(user)]
|
|
|
|
|> ActivityPub.fetch_activities(params)
|
|
|
|
|
|
|
|
assert length(activities) == 2
|
|
|
|
end
|
|
|
|
end
|
2020-10-23 05:53:01 -06:00
|
|
|
|
|
|
|
test "allow fetching of accounts with an empty string name field" do
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: "https://princess.cat/users/mewmew"} ->
|
|
|
|
file = File.read!("test/fixtures/mewmew_no_name.json")
|
2020-10-28 09:08:23 -06:00
|
|
|
%Tesla.Env{status: 200, body: file, headers: HttpRequestMock.activitypub_object_headers()}
|
2020-10-23 05:53:01 -06:00
|
|
|
end)
|
|
|
|
|
|
|
|
{:ok, user} = ActivityPub.make_user_from_ap_id("https://princess.cat/users/mewmew")
|
|
|
|
assert user.name == " "
|
|
|
|
end
|
2022-12-01 08:00:53 -07:00
|
|
|
|
2023-08-15 04:22:18 -06:00
|
|
|
test "pin_data_from_featured_collection will ignore unsupported values" do
|
|
|
|
assert %{} ==
|
|
|
|
ActivityPub.pin_data_from_featured_collection(%{
|
|
|
|
"type" => "CollectionThatIsNotRealAndCannotHurtMe",
|
|
|
|
"first" => "https://social.example/users/alice/collections/featured?page=true"
|
|
|
|
})
|
|
|
|
end
|
|
|
|
|
2022-12-01 08:00:53 -07:00
|
|
|
describe "persist/1" do
|
|
|
|
test "should not persist remote delete activities" do
|
|
|
|
poster = insert(:user, local: false)
|
|
|
|
{:ok, post} = CommonAPI.post(poster, %{status: "hhhhhh"})
|
|
|
|
|
|
|
|
{:ok, delete_data, meta} = Builder.delete(poster, post)
|
|
|
|
local_opts = Keyword.put(meta, :local, false)
|
|
|
|
{:ok, act, _meta} = ActivityPub.persist(delete_data, local_opts)
|
|
|
|
refute act.inserted_at
|
|
|
|
end
|
|
|
|
|
|
|
|
test "should not persist remote undo activities" do
|
|
|
|
poster = insert(:user, local: false)
|
|
|
|
liker = insert(:user, local: false)
|
|
|
|
{:ok, post} = CommonAPI.post(poster, %{status: "hhhhhh"})
|
|
|
|
{:ok, like} = CommonAPI.favorite(liker, post.id)
|
|
|
|
|
|
|
|
{:ok, undo_data, meta} = Builder.undo(liker, like)
|
|
|
|
local_opts = Keyword.put(meta, :local, false)
|
|
|
|
{:ok, act, _meta} = ActivityPub.persist(undo_data, local_opts)
|
|
|
|
refute act.inserted_at
|
|
|
|
end
|
|
|
|
end
|
2017-03-21 02:21:52 -06:00
|
|
|
end
|