2019-07-09 23:13:23 -06:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-01 22:08:45 -07:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2019-07-09 23:13:23 -06:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-12-01 16:03:03 -07:00
|
|
|
defmodule Pleroma.Object.FetcherTest do
|
|
|
|
use Pleroma.DataCase
|
|
|
|
|
2019-04-17 03:27:29 -06:00
|
|
|
alias Pleroma.Activity
|
|
|
|
alias Pleroma.Object
|
2018-12-01 16:03:03 -07:00
|
|
|
alias Pleroma.Object.Fetcher
|
2019-04-17 05:21:39 -06:00
|
|
|
import Tesla.Mock
|
2019-07-14 06:24:56 -06:00
|
|
|
import Mock
|
2019-04-17 05:21:39 -06:00
|
|
|
|
|
|
|
setup do
|
2019-06-13 03:34:03 -06:00
|
|
|
mock(fn
|
|
|
|
%{method: :get, url: "https://mastodon.example.org/users/userisgone"} ->
|
|
|
|
%Tesla.Env{status: 410}
|
|
|
|
|
2019-06-13 04:13:35 -06:00
|
|
|
%{method: :get, url: "https://mastodon.example.org/users/userisgone404"} ->
|
|
|
|
%Tesla.Env{status: 404}
|
|
|
|
|
2019-06-13 03:34:03 -06:00
|
|
|
env ->
|
|
|
|
apply(HttpRequestMock, :request, [env])
|
|
|
|
end)
|
|
|
|
|
2019-04-17 05:21:39 -06:00
|
|
|
:ok
|
|
|
|
end
|
2018-12-01 16:03:03 -07:00
|
|
|
|
2020-02-15 10:41:38 -07:00
|
|
|
describe "max thread distance restriction" do
|
|
|
|
@ap_id "http://mastodon.example.org/@admin/99541947525187367"
|
|
|
|
|
|
|
|
clear_config([:instance, :federation_incoming_replies_max_depth])
|
|
|
|
|
|
|
|
test "it returns thread depth exceeded error if thread depth is exceeded" do
|
|
|
|
Pleroma.Config.put([:instance, :federation_incoming_replies_max_depth], 0)
|
|
|
|
|
|
|
|
assert {:error, "Max thread distance exceeded."} =
|
|
|
|
Fetcher.fetch_object_from_id(@ap_id, depth: 1)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it fetches object if max thread depth is restricted to 0 and depth is not specified" do
|
|
|
|
Pleroma.Config.put([:instance, :federation_incoming_replies_max_depth], 0)
|
|
|
|
|
|
|
|
assert {:ok, _} = Fetcher.fetch_object_from_id(@ap_id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it fetches object if requested depth does not exceed max thread depth" do
|
|
|
|
Pleroma.Config.put([:instance, :federation_incoming_replies_max_depth], 10)
|
|
|
|
|
|
|
|
assert {:ok, _} = Fetcher.fetch_object_from_id(@ap_id, depth: 10)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-01 16:03:03 -07:00
|
|
|
describe "actor origin containment" do
|
2019-10-17 18:51:53 -06:00
|
|
|
test "it rejects objects with a bogus origin" do
|
2018-12-01 16:03:03 -07:00
|
|
|
{:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity.json")
|
|
|
|
end
|
|
|
|
|
2019-10-17 18:51:53 -06:00
|
|
|
test "it rejects objects when attributedTo is wrong (variant 1)" do
|
2018-12-01 16:03:03 -07:00
|
|
|
{:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity2.json")
|
|
|
|
end
|
|
|
|
|
2019-10-17 18:51:53 -06:00
|
|
|
test "it rejects objects when attributedTo is wrong (variant 2)" do
|
2018-12-01 16:03:03 -07:00
|
|
|
{:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity3.json")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "fetching an object" do
|
|
|
|
test "it fetches an object" do
|
|
|
|
{:ok, object} =
|
|
|
|
Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
|
|
|
|
|
2019-04-17 05:21:39 -06:00
|
|
|
assert activity = Activity.get_create_by_object_ap_id(object.data["id"])
|
2018-12-01 16:03:03 -07:00
|
|
|
assert activity.data["id"]
|
|
|
|
|
|
|
|
{:ok, object_again} =
|
|
|
|
Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
|
|
|
|
|
|
|
|
assert [attachment] = object.data["attachment"]
|
|
|
|
assert is_list(attachment["url"])
|
|
|
|
|
|
|
|
assert object == object_again
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "implementation quirks" do
|
|
|
|
test "it can fetch plume articles" do
|
|
|
|
{:ok, object} =
|
|
|
|
Fetcher.fetch_object_from_id(
|
|
|
|
"https://baptiste.gelez.xyz/~/PlumeDevelopment/this-month-in-plume-june-2018/"
|
|
|
|
)
|
|
|
|
|
|
|
|
assert object
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it can fetch peertube videos" do
|
|
|
|
{:ok, object} =
|
|
|
|
Fetcher.fetch_object_from_id(
|
|
|
|
"https://peertube.moe/videos/watch/df5f464b-be8d-46fb-ad81-2d4c2d1630e3"
|
|
|
|
)
|
|
|
|
|
|
|
|
assert object
|
|
|
|
end
|
|
|
|
|
2019-12-17 08:16:21 -07:00
|
|
|
test "it can fetch Mobilizon events" do
|
|
|
|
{:ok, object} =
|
|
|
|
Fetcher.fetch_object_from_id(
|
|
|
|
"https://mobilizon.org/events/252d5816-00a3-4a89-a66f-15bf65c33e39"
|
|
|
|
)
|
|
|
|
|
|
|
|
assert object
|
|
|
|
end
|
|
|
|
|
2019-07-24 13:28:21 -06:00
|
|
|
test "it can fetch wedistribute articles" do
|
|
|
|
{:ok, object} =
|
|
|
|
Fetcher.fetch_object_from_id("https://wedistribute.org/wp-json/pterotype/v1/object/85810")
|
|
|
|
|
|
|
|
assert object
|
|
|
|
end
|
|
|
|
|
2018-12-01 16:03:03 -07:00
|
|
|
test "all objects with fake directions are rejected by the object fetcher" do
|
2019-06-13 03:34:03 -06:00
|
|
|
assert {:error, _} =
|
|
|
|
Fetcher.fetch_and_contain_remote_object_from_id(
|
|
|
|
"https://info.pleroma.site/activity4.json"
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "handle HTTP 410 Gone response" do
|
|
|
|
assert {:error, "Object has been deleted"} ==
|
|
|
|
Fetcher.fetch_and_contain_remote_object_from_id(
|
|
|
|
"https://mastodon.example.org/users/userisgone"
|
|
|
|
)
|
2018-12-01 16:03:03 -07:00
|
|
|
end
|
2019-06-13 04:13:35 -06:00
|
|
|
|
|
|
|
test "handle HTTP 404 response" do
|
|
|
|
assert {:error, "Object has been deleted"} ==
|
|
|
|
Fetcher.fetch_and_contain_remote_object_from_id(
|
|
|
|
"https://mastodon.example.org/users/userisgone404"
|
|
|
|
)
|
|
|
|
end
|
2018-12-01 16:03:03 -07:00
|
|
|
end
|
2019-05-20 18:41:58 -06:00
|
|
|
|
|
|
|
describe "pruning" do
|
|
|
|
test "it can refetch pruned objects" do
|
|
|
|
object_id = "http://mastodon.example.org/@admin/99541947525187367"
|
|
|
|
|
|
|
|
{:ok, object} = Fetcher.fetch_object_from_id(object_id)
|
|
|
|
|
|
|
|
assert object
|
|
|
|
|
|
|
|
{:ok, _object} = Object.prune(object)
|
|
|
|
|
|
|
|
refute Object.get_by_ap_id(object_id)
|
|
|
|
|
|
|
|
{:ok, %Object{} = object_two} = Fetcher.fetch_object_from_id(object_id)
|
|
|
|
|
|
|
|
assert object.data["id"] == object_two.data["id"]
|
|
|
|
assert object.id != object_two.id
|
|
|
|
end
|
|
|
|
end
|
2019-07-17 16:58:52 -06:00
|
|
|
|
|
|
|
describe "signed fetches" do
|
2019-08-19 09:34:29 -06:00
|
|
|
clear_config([:activitypub, :sign_object_fetches])
|
|
|
|
|
2019-07-17 16:58:52 -06:00
|
|
|
test_with_mock "it signs fetches when configured to do so",
|
|
|
|
Pleroma.Signature,
|
|
|
|
[:passthrough],
|
|
|
|
[] do
|
|
|
|
Pleroma.Config.put([:activitypub, :sign_object_fetches], true)
|
|
|
|
|
|
|
|
Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
|
|
|
|
|
|
|
|
assert called(Pleroma.Signature.sign(:_, :_))
|
|
|
|
end
|
|
|
|
|
|
|
|
test_with_mock "it doesn't sign fetches when not configured to do so",
|
|
|
|
Pleroma.Signature,
|
|
|
|
[:passthrough],
|
|
|
|
[] do
|
|
|
|
Pleroma.Config.put([:activitypub, :sign_object_fetches], false)
|
|
|
|
|
|
|
|
Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
|
|
|
|
|
|
|
|
refute called(Pleroma.Signature.sign(:_, :_))
|
|
|
|
end
|
|
|
|
end
|
2018-12-01 16:03:03 -07:00
|
|
|
end
|