2018-12-23 21:11:29 +01:00
|
|
|
# Pleroma: A lightweight social networking server
|
2020-03-03 23:44:49 +01:00
|
|
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
2018-12-23 21:11:29 +01:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2017-12-11 18:22:48 +01:00
|
|
|
defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
2019-08-09 19:08:01 +02:00
|
|
|
use Oban.Testing, repo: Pleroma.Repo
|
|
|
|
|
2017-12-11 18:22:48 +01:00
|
|
|
import Pleroma.Factory
|
2019-03-05 03:52:23 +01:00
|
|
|
alias Pleroma.Activity
|
2020-03-09 18:51:44 +01:00
|
|
|
alias Pleroma.Config
|
2019-09-12 20:37:36 +02:00
|
|
|
alias Pleroma.Delivery
|
2019-03-05 03:52:23 +01:00
|
|
|
alias Pleroma.Instances
|
2019-02-10 22:57:38 +01:00
|
|
|
alias Pleroma.Object
|
2019-08-13 19:20:26 +02:00
|
|
|
alias Pleroma.Tests.ObanHelpers
|
2019-02-10 22:57:38 +01:00
|
|
|
alias Pleroma.User
|
2019-03-05 03:52:23 +01:00
|
|
|
alias Pleroma.Web.ActivityPub.ObjectView
|
2019-08-22 20:32:40 +02:00
|
|
|
alias Pleroma.Web.ActivityPub.Relay
|
2019-03-05 03:52:23 +01:00
|
|
|
alias Pleroma.Web.ActivityPub.UserView
|
2019-06-01 05:26:45 +02:00
|
|
|
alias Pleroma.Web.ActivityPub.Utils
|
2019-07-12 19:54:20 +02:00
|
|
|
alias Pleroma.Web.CommonAPI
|
2019-08-31 18:08:56 +02:00
|
|
|
alias Pleroma.Workers.ReceiverWorker
|
2018-09-08 14:02:38 +02:00
|
|
|
|
2018-12-04 14:39:08 +01:00
|
|
|
setup_all do
|
|
|
|
Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
|
|
|
|
:ok
|
|
|
|
end
|
2018-12-04 15:48:55 +01:00
|
|
|
|
2020-03-20 16:33:00 +01:00
|
|
|
setup do: clear_config([:instance, :federating], true)
|
2019-08-19 17:34:29 +02:00
|
|
|
|
2018-09-08 14:02:38 +02:00
|
|
|
describe "/relay" do
|
2020-03-20 16:33:00 +01:00
|
|
|
setup do: clear_config([:instance, :allow_relay])
|
2019-08-19 17:34:29 +02:00
|
|
|
|
2018-09-08 14:02:38 +02:00
|
|
|
test "with the relay active, it returns the relay user", %{conn: conn} do
|
|
|
|
res =
|
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert res["id"] =~ "/relay"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "with the relay disabled, it returns 404", %{conn: conn} do
|
2020-03-09 18:51:44 +01:00
|
|
|
Config.put([:instance, :allow_relay], false)
|
2018-09-08 14:02:38 +02:00
|
|
|
|
2018-12-11 13:31:52 +01:00
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(404)
|
2020-03-09 18:51:44 +01:00
|
|
|
end
|
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_pub_path(conn, :relay))
|
|
|
|
|> json_response(404)
|
2018-09-08 14:02:38 +02:00
|
|
|
end
|
|
|
|
end
|
2017-12-11 18:22:48 +01:00
|
|
|
|
2019-07-17 19:48:08 +02:00
|
|
|
describe "/internal/fetch" do
|
|
|
|
test "it returns the internal fetch user", %{conn: conn} do
|
|
|
|
res =
|
|
|
|
conn
|
|
|
|
|> get(activity_pub_path(conn, :internal_fetch))
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert res["id"] =~ "/fetch"
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_pub_path(conn, :internal_fetch))
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-07-17 19:48:08 +02:00
|
|
|
end
|
|
|
|
|
2017-12-11 18:22:48 +01:00
|
|
|
describe "/users/:nickname" do
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the user with accept application/json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 21:45:09 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/#{user.nickname}")
|
|
|
|
|
2019-04-22 09:20:43 +02:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2019-02-20 21:45:09 +01:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
|
|
|
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the user with accept application/activity+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2017-12-11 18:22:48 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
2018-03-30 15:01:53 +02:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}")
|
2017-12-11 18:22:48 +01:00
|
|
|
|
2019-04-22 09:20:43 +02:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2017-12-11 18:22:48 +01:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
2019-02-20 21:45:09 +01:00
|
|
|
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the user with accept application/ld+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 21:45:09 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-20 21:49:10 +01:00
|
|
|
|> put_req_header(
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
2019-02-20 21:45:09 +01:00
|
|
|
|> get("/users/#{user.nickname}")
|
|
|
|
|
2019-04-22 09:20:43 +02:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2019-02-20 21:45:09 +01:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == UserView.render("user.json", %{user: user})
|
|
|
|
end
|
2019-11-25 15:19:33 +01:00
|
|
|
|
|
|
|
test "it returns 404 for remote users", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user, local: false, nickname: "remoteuser@example.com")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/#{user.nickname}.json")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "it returns error when user is not found", %{conn: conn} do
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/users/jimm")
|
|
|
|
|> json_response(404)
|
|
|
|
|
|
|
|
assert response == "Not found"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
put_req_header(
|
|
|
|
conn,
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/users/#{user.nickname}.json", user)
|
|
|
|
end
|
2017-12-11 18:22:48 +01:00
|
|
|
end
|
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
describe "/objects/:uuid" do
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the object with accept application/json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 21:45:09 +01:00
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
|
|
|
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the object with accept application/activity+json",
|
|
|
|
%{conn: conn} do
|
2017-12-11 18:22:48 +01:00
|
|
|
note = insert(:note)
|
2018-03-30 15:01:53 +02:00
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
2017-12-11 18:22:48 +01:00
|
|
|
|
2018-03-30 15:01:53 +02:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
2017-12-11 18:22:48 +01:00
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
2018-05-30 20:00:27 +02:00
|
|
|
|
2019-02-20 21:49:10 +01:00
|
|
|
test "it returns a json representation of the object with accept application/ld+json", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
2019-02-20 21:45:09 +01:00
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2019-02-20 21:49:10 +01:00
|
|
|
|> put_req_header(
|
|
|
|
"accept",
|
|
|
|
"application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
|
|
)
|
2019-02-20 21:45:09 +01:00
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: note})
|
|
|
|
end
|
|
|
|
|
2018-05-30 20:00:27 +02:00
|
|
|
test "it returns 404 for non-public messages", %{conn: conn} do
|
|
|
|
note = insert(:direct_note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-01-05 10:38:38 +01:00
|
|
|
|
|
|
|
test "it returns 404 for tombstone objects", %{conn: conn} do
|
|
|
|
tombstone = insert(:tombstone)
|
|
|
|
uuid = String.split(tombstone.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-09-09 20:53:08 +02:00
|
|
|
|
|
|
|
test "it caches a response", %{conn: conn} do
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok) == json_response(conn2, :ok)
|
|
|
|
assert Enum.any?(conn2.resp_headers, &(&1 == {"x-cache", "HIT from Pleroma"}))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "cached purged after object deletion", %{conn: conn} do
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
Object.delete(note)
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/objects/#{uuid}")
|
|
|
|
|
|
|
|
assert "Not found" == json_response(conn2, :not_found)
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
note = insert(:note)
|
|
|
|
uuid = String.split(note.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/objects/#{uuid}", user)
|
|
|
|
end
|
2017-12-11 18:22:48 +01:00
|
|
|
end
|
|
|
|
|
2019-01-08 23:22:15 +01:00
|
|
|
describe "/activities/:uuid" do
|
|
|
|
test "it returns a json representation of the activity", %{conn: conn} do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 200) == ObjectView.render("object.json", %{object: activity})
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 404 for non-public activities", %{conn: conn} do
|
|
|
|
activity = insert(:direct_note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn, 404)
|
|
|
|
end
|
2019-09-09 20:53:08 +02:00
|
|
|
|
|
|
|
test "it caches a response", %{conn: conn} do
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok) == json_response(conn2, :ok)
|
|
|
|
assert Enum.any?(conn2.resp_headers, &(&1 == {"x-cache", "HIT from Pleroma"}))
|
|
|
|
end
|
|
|
|
|
|
|
|
test "cached purged after activity deletion", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{"status" => "cofe"})
|
|
|
|
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn1 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert json_response(conn1, :ok)
|
|
|
|
assert Enum.any?(conn1.resp_headers, &(&1 == {"x-cache", "MISS from Pleroma"}))
|
|
|
|
|
2019-12-05 00:50:38 +01:00
|
|
|
Activity.delete_all_by_object_ap_id(activity.object.data["id"])
|
2019-09-09 20:53:08 +02:00
|
|
|
|
|
|
|
conn2 =
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/activities/#{uuid}")
|
|
|
|
|
|
|
|
assert "Not found" == json_response(conn2, :not_found)
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
uuid = String.split(activity.data["id"], "/") |> List.last()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/activities/#{uuid}", user)
|
|
|
|
end
|
2019-01-08 23:22:15 +01:00
|
|
|
end
|
|
|
|
|
2018-10-25 07:24:17 +02:00
|
|
|
describe "/inbox" do
|
2018-02-15 20:00:43 +01:00
|
|
|
test "it inserts an incoming activity into the database", %{conn: conn} do
|
2018-03-30 15:01:53 +02:00
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
2018-02-15 20:00:43 +01:00
|
|
|
|
2018-03-30 15:01:53 +02:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", data)
|
2018-02-15 20:00:43 +01:00
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 19:08:01 +02:00
|
|
|
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2018-02-25 16:40:37 +01:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
2017-12-11 18:22:48 +01:00
|
|
|
end
|
2019-01-25 18:38:54 +01:00
|
|
|
|
|
|
|
test "it clears `unreachable` federation status of the sender", %{conn: conn} do
|
2019-01-29 11:12:28 +01:00
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
|
|
|
|
|
|
|
sender_url = data["actor"]
|
2019-01-28 13:25:06 +01:00
|
|
|
Instances.set_consistently_unreachable(sender_url)
|
2019-01-25 18:38:54 +01:00
|
|
|
refute Instances.reachable?(sender_url)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
assert Instances.reachable?(sender_url)
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
2020-02-25 14:21:48 +01:00
|
|
|
test "accept follow activity", %{conn: conn} do
|
|
|
|
Pleroma.Config.put([:instance, :federating], true)
|
|
|
|
relay = Relay.get_actor()
|
|
|
|
|
|
|
|
assert {:ok, %Activity{} = activity} = Relay.follow("https://relay.mastodon.host/actor")
|
|
|
|
|
|
|
|
followed_relay = Pleroma.User.get_by_ap_id("https://relay.mastodon.host/actor")
|
|
|
|
relay = refresh_record(relay)
|
|
|
|
|
|
|
|
accept =
|
|
|
|
File.read!("test/fixtures/relay/accept-follow.json")
|
|
|
|
|> String.replace("{{ap_id}}", relay.ap_id)
|
|
|
|
|> String.replace("{{activity_id}}", activity.data["id"])
|
|
|
|
|
|
|
|
assert "ok" ==
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/inbox", accept)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
|
|
|
|
assert Pleroma.FollowingRelationship.following?(
|
|
|
|
relay,
|
|
|
|
followed_relay
|
|
|
|
)
|
|
|
|
|
|
|
|
Mix.shell(Mix.Shell.Process)
|
|
|
|
|
|
|
|
on_exit(fn ->
|
|
|
|
Mix.shell(Mix.Shell.IO)
|
|
|
|
end)
|
|
|
|
|
|
|
|
:ok = Mix.Tasks.Pleroma.Relay.run(["list"])
|
|
|
|
assert_receive {:mix_shell, :info, ["relay.mastodon.host"]}
|
|
|
|
end
|
2020-03-12 10:07:07 +01:00
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
test "without valid signature, " <>
|
|
|
|
"it only accepts Create activities and requires enabled federation",
|
|
|
|
%{conn: conn} do
|
|
|
|
data = File.read!("test/fixtures/mastodon-post-activity.json") |> Poison.decode!()
|
|
|
|
non_create_data = File.read!("test/fixtures/mastodon-announce.json") |> Poison.decode!()
|
|
|
|
|
|
|
|
conn = put_req_header(conn, "content-type", "application/activity+json")
|
|
|
|
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", data)
|
|
|
|
|> json_response(403)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", non_create_data)
|
|
|
|
|> json_response(403)
|
|
|
|
|
|
|
|
Config.put([:instance, :federating], true)
|
|
|
|
|
|
|
|
ret_conn = post(conn, "/inbox", data)
|
|
|
|
assert "ok" == json_response(ret_conn, 200)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> post("/inbox", non_create_data)
|
|
|
|
|> json_response(400)
|
|
|
|
end
|
2017-12-11 18:22:48 +01:00
|
|
|
end
|
2018-03-31 20:02:09 +02:00
|
|
|
|
2018-10-25 07:24:17 +02:00
|
|
|
describe "/users/:nickname/inbox" do
|
2019-06-01 05:26:45 +02:00
|
|
|
setup do
|
2018-10-25 07:24:17 +02:00
|
|
|
data =
|
|
|
|
File.read!("test/fixtures/mastodon-post-activity.json")
|
|
|
|
|> Poison.decode!()
|
2019-06-01 05:26:45 +02:00
|
|
|
|
|
|
|
[data: data]
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it inserts an incoming activity into the database", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
data = Map.put(data, "bcc", [user.ap_id])
|
2018-10-25 07:24:17 +02:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 19:08:01 +02:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2018-10-25 07:24:17 +02:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
2018-12-29 18:01:15 +01:00
|
|
|
|
2019-10-23 03:50:25 +02:00
|
|
|
test "it accepts messages with to as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "to", user.ap_id)
|
|
|
|
|> Map.delete("cc")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts messages with cc as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "cc", user.ap_id)
|
|
|
|
|> Map.delete("to")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
%Activity{} = activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
assert user.ap_id in activity.recipients
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts messages with bcc as string instead of array", %{conn: conn, data: data} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
Map.put(data, "bcc", user.ap_id)
|
|
|
|
|> Map.delete("to")
|
|
|
|
|> Map.delete("cc")
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it accepts announces with to as string instead of array", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
|
|
|
"actor" => "http://mastodon.example.org/users/admin",
|
|
|
|
"id" => "http://mastodon.example.org/users/admin/statuses/19512778738411822/activity",
|
|
|
|
"object" => "https://mastodon.social/users/emelie/statuses/101849165031453009",
|
|
|
|
"to" => "https://www.w3.org/ns/activitystreams#Public",
|
|
|
|
"cc" => [user.ap_id],
|
|
|
|
"type" => "Announce"
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
%Activity{} = activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
assert "https://www.w3.org/ns/activitystreams#Public" in activity.recipients
|
|
|
|
end
|
|
|
|
|
2019-06-01 05:26:45 +02:00
|
|
|
test "it accepts messages from actors that are followed by the user", %{
|
|
|
|
conn: conn,
|
|
|
|
data: data
|
|
|
|
} do
|
2019-04-16 20:10:15 +02:00
|
|
|
recipient = insert(:user)
|
|
|
|
actor = insert(:user, %{ap_id: "http://mastodon.example.org/users/actor"})
|
|
|
|
|
|
|
|
{:ok, recipient} = User.follow(recipient, actor)
|
|
|
|
|
|
|
|
object =
|
|
|
|
data["object"]
|
|
|
|
|> Map.put("attributedTo", actor.ap_id)
|
|
|
|
|
|
|
|
data =
|
|
|
|
data
|
|
|
|
|> Map.put("actor", actor.ap_id)
|
|
|
|
|> Map.put("object", object)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{recipient.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
2019-08-09 19:08:01 +02:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
2019-04-16 20:10:15 +02:00
|
|
|
assert Activity.get_by_ap_id(data["id"])
|
|
|
|
end
|
|
|
|
|
2018-12-29 18:01:15 +01:00
|
|
|
test "it rejects reads from other users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
2020-03-09 18:51:44 +01:00
|
|
|
other_user = insert(:user)
|
2019-09-09 20:11:57 +02:00
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, other_user)
|
2019-09-09 20:11:57 +02:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}/inbox")
|
|
|
|
|
|
|
|
assert json_response(conn, 403)
|
|
|
|
end
|
|
|
|
|
2018-12-29 18:15:28 +01:00
|
|
|
test "it returns a note activity in a collection", %{conn: conn} do
|
|
|
|
note_activity = insert(:direct_note_activity)
|
2019-07-08 18:53:02 +02:00
|
|
|
note_object = Object.normalize(note_activity)
|
2018-12-29 18:15:28 +01:00
|
|
|
user = User.get_cached_by_ap_id(hd(note_activity.data["to"]))
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 14:59:04 +02:00
|
|
|
|> get("/users/#{user.nickname}/inbox?page=true")
|
2018-12-29 18:15:28 +01:00
|
|
|
|
2019-07-08 18:53:02 +02:00
|
|
|
assert response(conn, 200) =~ note_object.data["content"]
|
2018-12-29 18:15:28 +01:00
|
|
|
end
|
2019-01-25 18:38:54 +01:00
|
|
|
|
2019-06-01 05:26:45 +02:00
|
|
|
test "it clears `unreachable` federation status of the sender", %{conn: conn, data: data} do
|
2019-01-25 18:38:54 +01:00
|
|
|
user = insert(:user)
|
2019-06-01 05:26:45 +02:00
|
|
|
data = Map.put(data, "bcc", [user.ap_id])
|
2019-01-25 18:38:54 +01:00
|
|
|
|
2019-01-29 11:12:28 +01:00
|
|
|
sender_host = URI.parse(data["actor"]).host
|
|
|
|
Instances.set_consistently_unreachable(sender_host)
|
|
|
|
refute Instances.reachable?(sender_host)
|
|
|
|
|
2019-01-25 18:38:54 +01:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/inbox", data)
|
|
|
|
|
|
|
|
assert "ok" == json_response(conn, 200)
|
|
|
|
assert Instances.reachable?(sender_host)
|
|
|
|
end
|
2019-06-01 05:26:45 +02:00
|
|
|
|
|
|
|
test "it removes all follower collections but actor's", %{conn: conn} do
|
|
|
|
[actor, recipient] = insert_pair(:user)
|
|
|
|
|
|
|
|
data =
|
|
|
|
File.read!("test/fixtures/activitypub-client-post-activity.json")
|
|
|
|
|> Poison.decode!()
|
|
|
|
|
|
|
|
object = Map.put(data["object"], "attributedTo", actor.ap_id)
|
|
|
|
|
|
|
|
data =
|
|
|
|
data
|
|
|
|
|> Map.put("id", Utils.generate_object_id())
|
|
|
|
|> Map.put("actor", actor.ap_id)
|
|
|
|
|> Map.put("object", object)
|
|
|
|
|> Map.put("cc", [
|
|
|
|
recipient.follower_address,
|
|
|
|
actor.follower_address
|
|
|
|
])
|
|
|
|
|> Map.put("to", [
|
|
|
|
recipient.ap_id,
|
|
|
|
recipient.follower_address,
|
|
|
|
"https://www.w3.org/ns/activitystreams#Public"
|
|
|
|
])
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:valid_signature, true)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{recipient.nickname}/inbox", data)
|
|
|
|
|> json_response(200)
|
|
|
|
|
2019-08-09 19:08:01 +02:00
|
|
|
ObanHelpers.perform(all_enqueued(worker: ReceiverWorker))
|
|
|
|
|
2019-06-01 05:26:45 +02:00
|
|
|
activity = Activity.get_by_ap_id(data["id"])
|
|
|
|
|
|
|
|
assert activity.id
|
|
|
|
assert actor.follower_address in activity.recipients
|
|
|
|
assert actor.follower_address in activity.data["cc"]
|
|
|
|
|
|
|
|
refute recipient.follower_address in activity.recipients
|
|
|
|
refute recipient.follower_address in activity.data["cc"]
|
|
|
|
refute recipient.follower_address in activity.data["to"]
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "it requires authentication", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ret_conn = get(conn, "/users/#{user.nickname}/inbox")
|
|
|
|
assert json_response(ret_conn, 403)
|
|
|
|
|
|
|
|
ret_conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/inbox")
|
|
|
|
|
|
|
|
assert json_response(ret_conn, 200)
|
|
|
|
end
|
2018-10-25 07:24:17 +02:00
|
|
|
end
|
|
|
|
|
2020-03-05 19:19:21 +01:00
|
|
|
describe "GET /users/:nickname/outbox" do
|
2020-03-09 18:51:44 +01:00
|
|
|
test "it returns 200 even if there're no activities", %{conn: conn} do
|
2019-02-22 05:37:48 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2019-02-22 05:37:48 +01:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> get("/users/#{user.nickname}/outbox")
|
|
|
|
|
|
|
|
result = json_response(conn, 200)
|
|
|
|
assert user.ap_id <> "/outbox" == result["id"]
|
|
|
|
end
|
|
|
|
|
2018-07-20 19:57:56 +02:00
|
|
|
test "it returns a note activity in a collection", %{conn: conn} do
|
2018-07-20 18:44:35 +02:00
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 18:53:02 +02:00
|
|
|
note_object = Object.normalize(note_activity)
|
2018-07-20 18:44:35 +02:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-07-20 19:19:20 +02:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 14:59:04 +02:00
|
|
|
|> get("/users/#{user.nickname}/outbox?page=true")
|
2018-07-20 18:44:35 +02:00
|
|
|
|
2019-07-08 18:53:02 +02:00
|
|
|
assert response(conn, 200) =~ note_object.data["content"]
|
2018-07-20 18:44:35 +02:00
|
|
|
end
|
2018-07-20 19:57:56 +02:00
|
|
|
|
|
|
|
test "it returns an announce activity in a collection", %{conn: conn} do
|
|
|
|
announce_activity = insert(:announce_activity)
|
|
|
|
user = User.get_cached_by_ap_id(announce_activity.data["actor"])
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-07-20 19:57:56 +02:00
|
|
|
|> put_req_header("accept", "application/activity+json")
|
2019-09-25 14:59:04 +02:00
|
|
|
|> get("/users/#{user.nickname}/outbox?page=true")
|
2018-07-20 19:57:56 +02:00
|
|
|
|
|
|
|
assert response(conn, 200) =~ announce_activity.data["object"]
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "it requires authentication if instance is NOT federating", %{
|
|
|
|
conn: conn
|
|
|
|
} do
|
|
|
|
user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "accept", "application/activity+json")
|
|
|
|
|
|
|
|
ensure_federating_or_authenticated(conn, "/users/#{user.nickname}/outbox", user)
|
|
|
|
end
|
2020-03-05 19:19:21 +01:00
|
|
|
end
|
2018-12-29 18:01:15 +01:00
|
|
|
|
2020-04-30 18:55:25 +02:00
|
|
|
describe "POST /users/:nickname/outbox (C2S)" do
|
|
|
|
setup do
|
|
|
|
[
|
|
|
|
activity: %{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
|
|
|
"type" => "Create",
|
|
|
|
"object" => %{"type" => "Note", "content" => "AP C2S test"},
|
|
|
|
"to" => "https://www.w3.org/ns/activitystreams#Public",
|
|
|
|
"cc" => []
|
|
|
|
}
|
|
|
|
]
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it rejects posts from other users / unauthenticated users", %{
|
|
|
|
conn: conn,
|
|
|
|
activity: activity
|
|
|
|
} do
|
2018-12-29 18:01:15 +01:00
|
|
|
user = insert(:user)
|
2020-03-09 18:51:44 +01:00
|
|
|
other_user = insert(:user)
|
|
|
|
conn = put_req_header(conn, "content-type", "application/activity+json")
|
2018-12-29 18:01:15 +01:00
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
conn
|
2020-04-30 18:55:25 +02:00
|
|
|
|> post("/users/#{user.nickname}/outbox", activity)
|
2020-03-09 18:51:44 +01:00
|
|
|
|> json_response(403)
|
2018-12-29 18:01:15 +01:00
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
conn
|
|
|
|
|> assign(:user, other_user)
|
2020-04-30 18:55:25 +02:00
|
|
|
|> post("/users/#{user.nickname}/outbox", activity)
|
2020-03-09 18:51:44 +01:00
|
|
|
|> json_response(403)
|
2018-12-29 18:01:15 +01:00
|
|
|
end
|
2018-12-29 18:21:45 +01:00
|
|
|
|
2020-04-30 18:55:25 +02:00
|
|
|
test "it inserts an incoming create activity into the database", %{
|
|
|
|
conn: conn,
|
|
|
|
activity: activity
|
|
|
|
} do
|
2018-12-29 18:21:45 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
2020-04-30 18:55:25 +02:00
|
|
|
result =
|
2018-12-29 18:21:45 +01:00
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
2020-04-30 18:55:25 +02:00
|
|
|
|> post("/users/#{user.nickname}/outbox", activity)
|
|
|
|
|> json_response(201)
|
2019-08-09 19:08:01 +02:00
|
|
|
|
2018-12-29 18:21:45 +01:00
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
2020-04-30 18:55:25 +02:00
|
|
|
assert result["object"]
|
|
|
|
assert %Object{data: object} = Object.normalize(result["object"])
|
|
|
|
assert object["content"] == activity["object"]["content"]
|
2018-12-29 18:21:45 +01:00
|
|
|
end
|
2019-01-01 22:16:46 +01:00
|
|
|
|
2020-04-30 18:55:25 +02:00
|
|
|
test "it inserts an incoming sensitive activity into the database", %{
|
|
|
|
conn: conn,
|
|
|
|
activity: activity
|
|
|
|
} do
|
2019-01-01 22:16:46 +01:00
|
|
|
user = insert(:user)
|
2020-04-30 18:55:25 +02:00
|
|
|
object = Map.put(activity["object"], "sensitive", true)
|
|
|
|
activity = Map.put(activity, "object", object)
|
2019-01-01 22:16:46 +01:00
|
|
|
|
2020-04-30 18:55:25 +02:00
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", activity)
|
|
|
|
|> json_response(201)
|
|
|
|
|
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
assert result["object"]
|
|
|
|
assert %Object{data: object} = Object.normalize(result["object"])
|
|
|
|
assert object["sensitive"] == activity["object"]["sensitive"]
|
|
|
|
assert object["content"] == activity["object"]["content"]
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it rejects an incoming activity with bogus type", %{conn: conn, activity: activity} do
|
|
|
|
user = insert(:user)
|
|
|
|
activity = Map.put(activity, "type", "BadType")
|
2019-01-01 22:16:46 +01:00
|
|
|
|
2019-01-01 23:19:40 +01:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
2020-04-30 18:55:25 +02:00
|
|
|
|> post("/users/#{user.nickname}/outbox", activity)
|
2019-01-01 23:19:40 +01:00
|
|
|
|
|
|
|
assert json_response(conn, 400)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it erects a tombstone when receiving a delete activity", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 18:53:02 +02:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-01 23:19:40 +01:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Delete",
|
|
|
|
object: %{
|
2019-07-08 18:53:02 +02:00
|
|
|
id: note_object.data["id"]
|
2019-01-01 23:19:40 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
result = json_response(conn, 201)
|
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
|
2019-07-08 18:53:02 +02:00
|
|
|
assert object = Object.get_by_ap_id(note_object.data["id"])
|
2019-01-01 23:19:40 +01:00
|
|
|
assert object.data["type"] == "Tombstone"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it rejects delete activity of object from other actor", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 18:53:02 +02:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-01 23:19:40 +01:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Delete",
|
|
|
|
object: %{
|
2019-07-08 18:53:02 +02:00
|
|
|
id: note_object.data["id"]
|
2019-01-01 23:19:40 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-01 22:16:46 +01:00
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
assert json_response(conn, 400)
|
|
|
|
end
|
2019-01-08 19:22:26 +01:00
|
|
|
|
|
|
|
test "it increases like count when receiving a like action", %{conn: conn} do
|
|
|
|
note_activity = insert(:note_activity)
|
2019-07-08 18:53:02 +02:00
|
|
|
note_object = Object.normalize(note_activity)
|
2019-01-08 19:22:26 +01:00
|
|
|
user = User.get_cached_by_ap_id(note_activity.data["actor"])
|
|
|
|
|
|
|
|
data = %{
|
|
|
|
type: "Like",
|
|
|
|
object: %{
|
2019-07-08 18:53:02 +02:00
|
|
|
id: note_object.data["id"]
|
2019-01-08 19:22:26 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> put_req_header("content-type", "application/activity+json")
|
|
|
|
|> post("/users/#{user.nickname}/outbox", data)
|
|
|
|
|
|
|
|
result = json_response(conn, 201)
|
|
|
|
assert Activity.get_by_ap_id(result["id"])
|
|
|
|
|
2019-07-08 18:53:02 +02:00
|
|
|
assert object = Object.get_by_ap_id(note_object.data["id"])
|
2019-01-08 19:22:26 +01:00
|
|
|
assert object.data["like_count"] == 1
|
|
|
|
end
|
2018-07-20 18:44:35 +02:00
|
|
|
end
|
|
|
|
|
2019-08-22 05:57:55 +02:00
|
|
|
describe "/relay/followers" do
|
|
|
|
test "it returns relay followers", %{conn: conn} do
|
|
|
|
relay_actor = Relay.get_actor()
|
|
|
|
user = insert(:user)
|
|
|
|
User.follow(user, relay_actor)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> get("/relay/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user.ap_id]
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/relay/followers")
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-08-22 05:57:55 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "/relay/following" do
|
|
|
|
test "it returns relay following", %{conn: conn} do
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> get("/relay/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == []
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "on non-federating instance, it returns 404", %{conn: conn} do
|
|
|
|
Config.put([:instance, :federating], false)
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/relay/following")
|
|
|
|
|> json_response(404)
|
|
|
|
end
|
2019-08-22 05:57:55 +02:00
|
|
|
end
|
|
|
|
|
2018-03-31 20:02:09 +02:00
|
|
|
describe "/users/:nickname/followers" do
|
|
|
|
test "it returns the followers in a collection", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user_two)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user_two.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user.ap_id]
|
|
|
|
end
|
|
|
|
|
2020-03-03 20:22:02 +01:00
|
|
|
test "it returns a uri if the user has 'hide_followers' set", %{conn: conn} do
|
2018-12-02 17:35:32 +01:00
|
|
|
user = insert(:user)
|
2019-10-16 20:59:21 +02:00
|
|
|
user_two = insert(:user, hide_followers: true)
|
2018-12-02 17:35:32 +01:00
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-12-02 17:35:32 +01:00
|
|
|
|> get("/users/#{user_two.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
2019-07-12 18:41:05 +02:00
|
|
|
assert is_binary(result["first"])
|
2018-12-02 17:35:32 +01:00
|
|
|
end
|
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
test "it returns a 403 error on pages, if the user has 'hide_followers' set and the request is from another user",
|
2019-07-12 19:54:20 +02:00
|
|
|
%{conn: conn} do
|
2020-03-09 18:51:44 +01:00
|
|
|
user = insert(:user)
|
|
|
|
other_user = insert(:user, hide_followers: true)
|
2019-07-12 19:54:20 +02:00
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{other_user.nickname}/followers?page=1")
|
2019-07-12 19:54:20 +02:00
|
|
|
|
|
|
|
assert result.status == 403
|
|
|
|
assert result.resp_body == ""
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it renders the page, if the user has 'hide_followers' set and the request is authenticated with the same user",
|
|
|
|
%{conn: conn} do
|
2019-10-16 20:59:21 +02:00
|
|
|
user = insert(:user, hide_followers: true)
|
2019-07-12 19:54:20 +02:00
|
|
|
other_user = insert(:user)
|
|
|
|
{:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/followers?page=1")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["totalItems"] == 1
|
|
|
|
assert result["orderedItems"] == [other_user.ap_id]
|
|
|
|
end
|
|
|
|
|
2018-03-31 20:02:09 +02:00
|
|
|
test "it works for more than 10 users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
Enum.each(1..15, fn _ ->
|
|
|
|
other_user = insert(:user)
|
|
|
|
User.follow(other_user, user)
|
|
|
|
end)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user.nickname}/followers")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["first"]["orderedItems"]) == 10
|
|
|
|
assert result["first"]["totalItems"] == 15
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user.nickname}/followers?page=2")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["orderedItems"]) == 5
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "returns 403 if requester is not logged in", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/users/#{user.nickname}/followers")
|
|
|
|
|> json_response(403)
|
|
|
|
end
|
2018-03-31 20:02:09 +02:00
|
|
|
end
|
|
|
|
|
|
|
|
describe "/users/:nickname/following" do
|
|
|
|
test "it returns the following in a collection", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user)
|
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["first"]["orderedItems"] == [user_two.ap_id]
|
|
|
|
end
|
|
|
|
|
2019-07-12 18:41:05 +02:00
|
|
|
test "it returns a uri if the user has 'hide_follows' set", %{conn: conn} do
|
2020-03-09 18:51:44 +01:00
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user, hide_follows: true)
|
2018-12-02 17:35:32 +01:00
|
|
|
User.follow(user, user_two)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user_two.nickname}/following")
|
2018-12-02 17:35:32 +01:00
|
|
|
|> json_response(200)
|
|
|
|
|
2019-07-12 18:41:05 +02:00
|
|
|
assert is_binary(result["first"])
|
2018-12-02 17:35:32 +01:00
|
|
|
end
|
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
test "it returns a 403 error on pages, if the user has 'hide_follows' set and the request is from another user",
|
2019-07-12 19:54:20 +02:00
|
|
|
%{conn: conn} do
|
2020-03-09 18:51:44 +01:00
|
|
|
user = insert(:user)
|
|
|
|
user_two = insert(:user, hide_follows: true)
|
2019-07-12 19:54:20 +02:00
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user_two.nickname}/following?page=1")
|
2019-07-12 19:54:20 +02:00
|
|
|
|
|
|
|
assert result.status == 403
|
|
|
|
assert result.resp_body == ""
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it renders the page, if the user has 'hide_follows' set and the request is authenticated with the same user",
|
|
|
|
%{conn: conn} do
|
2019-10-16 20:59:21 +02:00
|
|
|
user = insert(:user, hide_follows: true)
|
2019-07-12 19:54:20 +02:00
|
|
|
other_user = insert(:user)
|
|
|
|
{:ok, user, _other_user, _activity} = CommonAPI.follow(user, other_user)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/users/#{user.nickname}/following?page=1")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert result["totalItems"] == 1
|
|
|
|
assert result["orderedItems"] == [other_user.ap_id]
|
|
|
|
end
|
|
|
|
|
2018-03-31 20:02:09 +02:00
|
|
|
test "it works for more than 10 users", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
Enum.each(1..15, fn _ ->
|
2019-04-22 09:20:43 +02:00
|
|
|
user = User.get_cached_by_id(user.id)
|
2018-03-31 20:02:09 +02:00
|
|
|
other_user = insert(:user)
|
|
|
|
User.follow(user, other_user)
|
|
|
|
end)
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["first"]["orderedItems"]) == 10
|
|
|
|
assert result["first"]["totalItems"] == 15
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
|
|
|
|
result =
|
|
|
|
conn
|
2020-03-09 18:51:44 +01:00
|
|
|
|> assign(:user, user)
|
2018-03-31 20:02:09 +02:00
|
|
|
|> get("/users/#{user.nickname}/following?page=2")
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert length(result["orderedItems"]) == 5
|
|
|
|
assert result["totalItems"] == 15
|
|
|
|
end
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
test "returns 403 if requester is not logged in", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/users/#{user.nickname}/following")
|
|
|
|
|> json_response(403)
|
|
|
|
end
|
2018-03-31 20:02:09 +02:00
|
|
|
end
|
2019-09-12 20:37:36 +02:00
|
|
|
|
|
|
|
describe "delivery tracking" do
|
|
|
|
test "it tracks a signed object fetch", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed activity fetch", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
activity_path = String.trim_leading(activity.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed object fetch when the json is cached", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
other_user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
build_conn()
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, other_user)
|
|
|
|
|> get(object_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
assert Delivery.get(object.id, other_user.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it tracks a signed activity fetch when the json is cached", %{conn: conn} do
|
|
|
|
user = insert(:user, local: false)
|
|
|
|
other_user = insert(:user, local: false)
|
|
|
|
activity = insert(:note_activity)
|
|
|
|
object = Object.normalize(activity)
|
|
|
|
|
|
|
|
activity_path = String.trim_leading(activity.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
build_conn()
|
|
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|
|
|> assign(:user, other_user)
|
|
|
|
|> get(activity_path)
|
|
|
|
|> json_response(200)
|
|
|
|
|
|
|
|
assert Delivery.get(object.id, user.id)
|
|
|
|
assert Delivery.get(object.id, other_user.id)
|
|
|
|
end
|
|
|
|
end
|
2019-09-23 18:54:23 +02:00
|
|
|
|
2020-03-02 19:43:18 +01:00
|
|
|
describe "Additional ActivityPub C2S endpoints" do
|
2020-03-09 18:51:44 +01:00
|
|
|
test "GET /api/ap/whoami", %{conn: conn} do
|
2019-09-23 18:54:23 +02:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> get("/api/ap/whoami")
|
|
|
|
|
|
|
|
user = User.get_cached_by_id(user.id)
|
|
|
|
|
|
|
|
assert UserView.render("user.json", %{user: user}) == json_response(conn, 200)
|
2020-03-09 18:51:44 +01:00
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/api/ap/whoami")
|
|
|
|
|> json_response(403)
|
2019-09-23 18:54:23 +02:00
|
|
|
end
|
2019-09-23 19:16:36 +02:00
|
|
|
|
2020-03-20 16:33:00 +01:00
|
|
|
setup do: clear_config([:media_proxy])
|
|
|
|
setup do: clear_config([Pleroma.Upload])
|
2019-09-23 19:16:36 +02:00
|
|
|
|
2020-03-09 18:51:44 +01:00
|
|
|
test "POST /api/ap/upload_media", %{conn: conn} do
|
2019-09-23 19:16:36 +02:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
desc = "Description of the image"
|
|
|
|
|
|
|
|
image = %Plug.Upload{
|
|
|
|
content_type: "image/jpg",
|
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
|
|
|
|
2020-03-17 13:02:10 +01:00
|
|
|
object =
|
2019-09-23 19:16:36 +02:00
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-09-24 19:03:06 +02:00
|
|
|
|> post("/api/ap/upload_media", %{"file" => image, "description" => desc})
|
2020-03-17 13:02:10 +01:00
|
|
|
|> json_response(:created)
|
2019-09-23 19:16:36 +02:00
|
|
|
|
|
|
|
assert object["name"] == desc
|
|
|
|
assert object["type"] == "Document"
|
|
|
|
assert object["actor"] == user.ap_id
|
2020-03-19 15:08:49 +01:00
|
|
|
assert [%{"href" => object_href, "mediaType" => object_mediatype}] = object["url"]
|
|
|
|
assert is_binary(object_href)
|
|
|
|
assert object_mediatype == "image/jpeg"
|
2020-03-17 13:02:10 +01:00
|
|
|
|
|
|
|
activity_request = %{
|
|
|
|
"@context" => "https://www.w3.org/ns/activitystreams",
|
|
|
|
"type" => "Create",
|
|
|
|
"object" => %{
|
|
|
|
"type" => "Note",
|
|
|
|
"content" => "AP C2S test, attachment",
|
|
|
|
"attachment" => [object]
|
|
|
|
},
|
|
|
|
"to" => "https://www.w3.org/ns/activitystreams#Public",
|
|
|
|
"cc" => []
|
|
|
|
}
|
|
|
|
|
|
|
|
activity_response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> post("/users/#{user.nickname}/outbox", activity_request)
|
|
|
|
|> json_response(:created)
|
|
|
|
|
|
|
|
assert activity_response["id"]
|
|
|
|
assert activity_response["object"]
|
|
|
|
assert activity_response["actor"] == user.ap_id
|
|
|
|
|
2020-03-19 15:08:49 +01:00
|
|
|
assert %Object{data: %{"attachment" => [attachment]}} =
|
|
|
|
Object.normalize(activity_response["object"])
|
|
|
|
|
2020-03-17 13:02:10 +01:00
|
|
|
assert attachment["type"] == "Document"
|
|
|
|
assert attachment["name"] == desc
|
2020-03-19 15:08:49 +01:00
|
|
|
|
|
|
|
assert [
|
|
|
|
%{
|
|
|
|
"href" => ^object_href,
|
|
|
|
"type" => "Link",
|
|
|
|
"mediaType" => ^object_mediatype
|
|
|
|
}
|
|
|
|
] = attachment["url"]
|
2020-03-02 19:43:18 +01:00
|
|
|
|
2020-03-17 13:02:10 +01:00
|
|
|
# Fails if unauthenticated
|
2020-03-09 18:51:44 +01:00
|
|
|
conn
|
|
|
|
|> post("/api/ap/upload_media", %{"file" => image, "description" => desc})
|
|
|
|
|> json_response(403)
|
2020-03-02 19:43:18 +01:00
|
|
|
end
|
|
|
|
end
|
2017-12-11 18:22:48 +01:00
|
|
|
end
|