2018-12-23 21:11:29 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-02 06:08:45 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:11:29 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2018-09-03 16:40:14 +02:00
|
|
|
defmodule Pleroma.Web.NodeInfoTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
|
|
|
|
|
|
|
import Pleroma.Factory
|
2020-02-13 19:55:47 +01:00
|
|
|
|
2019-11-26 08:53:07 +01:00
|
|
|
clear_config([:mrf_simple])
|
2020-02-13 19:55:47 +01:00
|
|
|
clear_config(:instance)
|
2018-09-03 16:40:14 +02:00
|
|
|
|
2019-05-25 02:15:12 +02:00
|
|
|
test "GET /.well-known/nodeinfo", %{conn: conn} do
|
|
|
|
links =
|
|
|
|
conn
|
|
|
|
|> get("/.well-known/nodeinfo")
|
|
|
|
|> json_response(200)
|
|
|
|
|> Map.fetch!("links")
|
|
|
|
|
|
|
|
Enum.each(links, fn link ->
|
|
|
|
href = Map.fetch!(link, "href")
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get(href)
|
|
|
|
|> json_response(200)
|
|
|
|
end)
|
|
|
|
end
|
|
|
|
|
2018-09-03 16:40:14 +02:00
|
|
|
test "nodeinfo shows staff accounts", %{conn: conn} do
|
2019-10-16 20:59:21 +02:00
|
|
|
moderator = insert(:user, local: true, is_moderator: true)
|
|
|
|
admin = insert(:user, local: true, is_admin: true)
|
2018-09-03 16:40:14 +02:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-01 07:55:10 +01:00
|
|
|
|> get("/nodeinfo/2.1.json")
|
2018-09-03 16:40:14 +02:00
|
|
|
|
|
|
|
assert result = json_response(conn, 200)
|
|
|
|
|
2019-03-04 20:14:04 +01:00
|
|
|
assert moderator.ap_id in result["metadata"]["staffAccounts"]
|
|
|
|
assert admin.ap_id in result["metadata"]["staffAccounts"]
|
2018-09-03 16:40:14 +02:00
|
|
|
end
|
2018-11-06 14:44:00 +01:00
|
|
|
|
2018-12-26 12:46:16 +01:00
|
|
|
test "nodeinfo shows restricted nicknames", %{conn: conn} do
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-01 07:55:10 +01:00
|
|
|
|> get("/nodeinfo/2.1.json")
|
2018-12-26 12:46:16 +01:00
|
|
|
|
|
|
|
assert result = json_response(conn, 200)
|
|
|
|
|
|
|
|
assert Pleroma.Config.get([Pleroma.User, :restricted_nicknames]) ==
|
|
|
|
result["metadata"]["restrictedNicknames"]
|
|
|
|
end
|
|
|
|
|
2019-02-01 18:33:14 +01:00
|
|
|
test "returns software.repository field in nodeinfo 2.1", %{conn: conn} do
|
|
|
|
conn
|
|
|
|
|> get("/.well-known/nodeinfo")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|
|
|
|
assert result = json_response(conn, 200)
|
|
|
|
assert Pleroma.Application.repository() == result["software"]["repository"]
|
|
|
|
end
|
2019-03-22 11:57:20 +01:00
|
|
|
|
2019-11-15 15:55:28 +01:00
|
|
|
test "returns fieldsLimits field", %{conn: conn} do
|
|
|
|
Pleroma.Config.put([:instance, :max_account_fields], 10)
|
|
|
|
Pleroma.Config.put([:instance, :max_remote_account_fields], 15)
|
|
|
|
Pleroma.Config.put([:instance, :account_field_name_length], 255)
|
|
|
|
Pleroma.Config.put([:instance, :account_field_value_length], 2048)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
|
|
|
|
|
|
|
assert response["metadata"]["fieldsLimits"]["maxFields"] == 10
|
|
|
|
assert response["metadata"]["fieldsLimits"]["maxRemoteFields"] == 15
|
|
|
|
assert response["metadata"]["fieldsLimits"]["nameLength"] == 255
|
|
|
|
assert response["metadata"]["fieldsLimits"]["valueLength"] == 2048
|
|
|
|
end
|
|
|
|
|
2019-03-22 11:57:20 +01:00
|
|
|
test "it returns the safe_dm_mentions feature if enabled", %{conn: conn} do
|
|
|
|
option = Pleroma.Config.get([:instance, :safe_dm_mentions])
|
|
|
|
Pleroma.Config.put([:instance, :safe_dm_mentions], true)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
|
|
|
|
|
|
|
assert "safe_dm_mentions" in response["metadata"]["features"]
|
|
|
|
|
|
|
|
Pleroma.Config.put([:instance, :safe_dm_mentions], false)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
|
|
|
|
|
|
|
refute "safe_dm_mentions" in response["metadata"]["features"]
|
|
|
|
|
|
|
|
Pleroma.Config.put([:instance, :safe_dm_mentions], option)
|
|
|
|
end
|
2019-07-13 20:30:45 +02:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
describe "`metadata/federation/enabled`" do
|
|
|
|
clear_config([:instance, :federating])
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
test "it shows if federation is enabled/disabled", %{conn: conn} do
|
|
|
|
Pleroma.Config.put([:instance, :federating], true)
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
assert response["metadata"]["federation"]["enabled"] == true
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
Pleroma.Config.put([:instance, :federating], false)
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
2019-11-11 19:03:43 +01:00
|
|
|
|
2020-02-13 19:55:47 +01:00
|
|
|
assert response["metadata"]["federation"]["enabled"] == false
|
|
|
|
end
|
2019-11-11 19:03:43 +01:00
|
|
|
end
|
|
|
|
|
2019-07-13 20:30:45 +02:00
|
|
|
test "it shows MRF transparency data if enabled", %{conn: conn} do
|
2019-08-14 00:32:40 +02:00
|
|
|
config = Pleroma.Config.get([:instance, :rewrite_policy])
|
|
|
|
Pleroma.Config.put([:instance, :rewrite_policy], [Pleroma.Web.ActivityPub.MRF.SimplePolicy])
|
|
|
|
|
2019-07-13 20:30:45 +02:00
|
|
|
option = Pleroma.Config.get([:instance, :mrf_transparency])
|
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency], true)
|
|
|
|
|
|
|
|
simple_config = %{"reject" => ["example.com"]}
|
|
|
|
Pleroma.Config.put(:mrf_simple, simple_config)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
|
|
|
|
|
|
|
assert response["metadata"]["federation"]["mrf_simple"] == simple_config
|
|
|
|
|
2019-08-14 00:32:40 +02:00
|
|
|
Pleroma.Config.put([:instance, :rewrite_policy], config)
|
2019-07-13 20:30:45 +02:00
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency], option)
|
|
|
|
Pleroma.Config.put(:mrf_simple, %{})
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it performs exclusions from MRF transparency data if configured", %{conn: conn} do
|
2019-08-14 00:32:40 +02:00
|
|
|
config = Pleroma.Config.get([:instance, :rewrite_policy])
|
|
|
|
Pleroma.Config.put([:instance, :rewrite_policy], [Pleroma.Web.ActivityPub.MRF.SimplePolicy])
|
|
|
|
|
2019-07-13 20:30:45 +02:00
|
|
|
option = Pleroma.Config.get([:instance, :mrf_transparency])
|
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency], true)
|
|
|
|
|
|
|
|
exclusions = Pleroma.Config.get([:instance, :mrf_transparency_exclusions])
|
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency_exclusions], ["other.site"])
|
|
|
|
|
|
|
|
simple_config = %{"reject" => ["example.com", "other.site"]}
|
|
|
|
expected_config = %{"reject" => ["example.com"]}
|
|
|
|
|
|
|
|
Pleroma.Config.put(:mrf_simple, simple_config)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> get("/nodeinfo/2.1.json")
|
|
|
|
|> json_response(:ok)
|
|
|
|
|
|
|
|
assert response["metadata"]["federation"]["mrf_simple"] == expected_config
|
|
|
|
assert response["metadata"]["federation"]["exclusions"] == true
|
|
|
|
|
2019-08-14 00:32:40 +02:00
|
|
|
Pleroma.Config.put([:instance, :rewrite_policy], config)
|
2019-07-13 20:30:45 +02:00
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency], option)
|
|
|
|
Pleroma.Config.put([:instance, :mrf_transparency_exclusions], exclusions)
|
|
|
|
Pleroma.Config.put(:mrf_simple, %{})
|
|
|
|
end
|
2018-09-03 16:40:14 +02:00
|
|
|
end
|