pleroma/test/web/activity_pub/activity_pub_test.exs

2074 lines
65 KiB
Elixir
Raw Normal View History

2018-12-23 15:11:29 -05:00
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
2018-12-23 15:11:29 -05:00
# SPDX-License-Identifier: AGPL-3.0-only
2017-03-21 04:21:52 -04:00
defmodule Pleroma.Web.ActivityPub.ActivityPubTest do
use Pleroma.DataCase
2019-10-30 07:21:49 -04:00
use Oban.Testing, repo: Pleroma.Repo
2019-02-10 16:57:38 -05:00
alias Pleroma.Activity
alias Pleroma.Builders.ActivityBuilder
alias Pleroma.Config
2019-11-12 06:48:14 -05:00
alias Pleroma.Notification
2019-02-10 16:57:38 -05:00
alias Pleroma.Object
alias Pleroma.User
alias Pleroma.Web.ActivityPub.ActivityPub
alias Pleroma.Web.ActivityPub.Utils
2019-10-23 15:27:22 -04:00
alias Pleroma.Web.AdminAPI.AccountView
alias Pleroma.Web.CommonAPI
2017-03-21 04:21:52 -04:00
import ExUnit.CaptureLog
import Mock
2017-04-13 09:50:05 -04:00
import Pleroma.Factory
2018-12-03 10:53:22 -05:00
import Tesla.Mock
setup do
mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
:ok
end
2017-04-13 09:50:05 -04:00
setup do: clear_config([:instance, :federating])
describe "streaming out participations" do
test "it streams them out" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
{:ok, conversation} = Pleroma.Conversation.create_or_bump_for(activity)
participations =
conversation.participations
|> Repo.preload(:user)
with_mock Pleroma.Web.Streamer,
stream: fn _, _ -> nil end do
ActivityPub.stream_out_participations(conversation.participations)
assert called(Pleroma.Web.Streamer.stream("participation", participations))
end
end
test "streams them out on activity creation" do
user_one = insert(:user)
user_two = insert(:user)
with_mock Pleroma.Web.Streamer,
stream: fn _, _ -> nil end do
{:ok, activity} =
CommonAPI.post(user_one, %{
2020-05-12 15:59:26 -04:00
status: "@#{user_two.nickname}",
visibility: "direct"
})
conversation =
activity.data["context"]
|> Pleroma.Conversation.get_for_ap_id()
|> Repo.preload(participations: :user)
assert called(Pleroma.Web.Streamer.stream("participation", conversation.participations))
end
end
end
2019-01-09 10:45:09 -05:00
describe "fetching restricted by visibility" do
test "it restricts by the appropriate visibility" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, public_activity} = CommonAPI.post(user, %{status: ".", visibility: "public"})
2019-01-09 10:45:09 -05:00
2020-05-12 15:59:26 -04:00
{:ok, direct_activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
2019-01-09 10:45:09 -05:00
2020-05-12 15:59:26 -04:00
{:ok, unlisted_activity} = CommonAPI.post(user, %{status: ".", visibility: "unlisted"})
2019-01-09 10:45:09 -05:00
2020-05-12 15:59:26 -04:00
{:ok, private_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
2019-01-09 10:45:09 -05:00
activities =
ActivityPub.fetch_activities([], %{:visibility => "direct", "actor_id" => user.ap_id})
assert activities == [direct_activity]
activities =
ActivityPub.fetch_activities([], %{:visibility => "unlisted", "actor_id" => user.ap_id})
assert activities == [unlisted_activity]
activities =
ActivityPub.fetch_activities([], %{:visibility => "private", "actor_id" => user.ap_id})
assert activities == [private_activity]
activities =
ActivityPub.fetch_activities([], %{:visibility => "public", "actor_id" => user.ap_id})
assert activities == [public_activity]
activities =
ActivityPub.fetch_activities([], %{
:visibility => ~w[private public],
"actor_id" => user.ap_id
})
assert activities == [public_activity, private_activity]
2019-01-09 10:45:09 -05:00
end
end
describe "fetching excluded by visibility" do
test "it excludes by the appropriate visibility" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, public_activity} = CommonAPI.post(user, %{status: ".", visibility: "public"})
2020-05-12 15:59:26 -04:00
{:ok, direct_activity} = CommonAPI.post(user, %{status: ".", visibility: "direct"})
2020-05-12 15:59:26 -04:00
{:ok, unlisted_activity} = CommonAPI.post(user, %{status: ".", visibility: "unlisted"})
2020-05-12 15:59:26 -04:00
{:ok, private_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
activities =
ActivityPub.fetch_activities([], %{
"exclude_visibilities" => "direct",
"actor_id" => user.ap_id
})
assert public_activity in activities
assert unlisted_activity in activities
assert private_activity in activities
refute direct_activity in activities
activities =
ActivityPub.fetch_activities([], %{
"exclude_visibilities" => "unlisted",
"actor_id" => user.ap_id
})
assert public_activity in activities
refute unlisted_activity in activities
assert private_activity in activities
assert direct_activity in activities
activities =
ActivityPub.fetch_activities([], %{
"exclude_visibilities" => "private",
"actor_id" => user.ap_id
})
assert public_activity in activities
assert unlisted_activity in activities
refute private_activity in activities
assert direct_activity in activities
activities =
ActivityPub.fetch_activities([], %{
"exclude_visibilities" => "public",
"actor_id" => user.ap_id
})
refute public_activity in activities
assert unlisted_activity in activities
assert private_activity in activities
assert direct_activity in activities
end
end
2018-02-11 11:20:02 -05:00
describe "building a user from his ap id" do
test "it returns a user" do
user_id = "http://mastodon.example.org/users/admin"
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
assert user.ap_id == user_id
assert user.nickname == "admin@mastodon.example.org"
assert user.ap_enabled
2018-02-11 11:20:02 -05:00
assert user.follower_address == "http://mastodon.example.org/users/admin/followers"
end
test "it returns a user that is invisible" do
user_id = "http://mastodon.example.org/users/relay"
{:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
assert User.invisible?(user)
end
test "it fetches the appropriate tag-restricted posts" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, status_one} = CommonAPI.post(user, %{status: ". #test"})
{:ok, status_two} = CommonAPI.post(user, %{status: ". #essais"})
{:ok, status_three} = CommonAPI.post(user, %{status: ". #test #reject"})
fetch_one = ActivityPub.fetch_activities([], %{"type" => "Create", "tag" => "test"})
fetch_two =
ActivityPub.fetch_activities([], %{"type" => "Create", "tag" => ["test", "essais"]})
fetch_three =
ActivityPub.fetch_activities([], %{
"type" => "Create",
"tag" => ["test", "essais"],
"tag_reject" => ["reject"]
})
2019-01-10 10:44:28 -05:00
fetch_four =
ActivityPub.fetch_activities([], %{
"type" => "Create",
2019-01-10 10:44:28 -05:00
"tag" => ["test"],
"tag_all" => ["test", "reject"]
})
assert fetch_one == [status_one, status_three]
assert fetch_two == [status_one, status_two, status_three]
assert fetch_three == [status_one, status_two]
2019-01-10 10:44:28 -05:00
assert fetch_four == [status_three]
end
2018-02-11 11:20:02 -05:00
end
2017-03-21 04:21:52 -04:00
describe "insertion" do
test "drops activities beyond a certain limit" do
limit = Config.get([:instance, :remote_limit])
random_text =
:crypto.strong_rand_bytes(limit + 1)
|> Base.encode64()
|> binary_part(0, limit + 1)
data = %{
"ok" => true,
"object" => %{
"content" => random_text
}
}
assert {:error, {:remote_limit_error, _}} = ActivityPub.insert(data)
end
test "doesn't drop activities with content being null" do
2019-04-11 07:20:46 -04:00
user = insert(:user)
data = %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"object" => %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"type" => "Note",
"content" => nil
}
}
assert {:ok, _} = ActivityPub.insert(data)
end
2017-05-07 14:13:10 -04:00
test "returns the activity if one with the same id is already in" do
activity = insert(:note_activity)
2018-03-30 09:01:53 -04:00
{:ok, new_activity} = ActivityPub.insert(activity.data)
2017-05-07 14:13:10 -04:00
2019-03-22 23:16:50 -04:00
assert activity.id == new_activity.id
2017-05-07 14:13:10 -04:00
end
2017-03-23 12:56:49 -04:00
test "inserts a given map into the activity database, giving it an id if it has none." do
2019-04-11 07:20:46 -04:00
user = insert(:user)
2017-03-21 04:21:52 -04:00
data = %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"object" => %{
"actor" => user.ap_id,
"to" => [],
"type" => "Note",
"content" => "hey"
}
2017-03-21 04:21:52 -04:00
}
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
2017-03-23 12:56:49 -04:00
assert activity.data["ok"] == data["ok"]
assert is_binary(activity.data["id"])
given_id = "bla"
2018-03-30 09:01:53 -04:00
2017-03-23 12:56:49 -04:00
data = %{
"id" => given_id,
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"context" => "blabla",
"object" => %{
"actor" => user.ap_id,
"to" => [],
"type" => "Note",
"content" => "hey"
}
2017-03-23 12:56:49 -04:00
}
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
assert activity.data["ok"] == data["ok"]
assert activity.data["id"] == given_id
assert activity.data["context"] == "blabla"
assert activity.data["context_id"]
end
test "adds a context when none is there" do
2019-04-11 07:20:46 -04:00
user = insert(:user)
data = %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"object" => %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
"type" => "Note",
"content" => "hey"
2018-04-02 10:27:36 -04:00
}
}
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
2019-04-28 16:44:04 -04:00
object = Pleroma.Object.normalize(activity)
assert is_binary(activity.data["context"])
2019-04-28 16:44:04 -04:00
assert is_binary(object.data["context"])
assert activity.data["context_id"]
2019-04-28 16:44:04 -04:00
assert object.data["context_id"]
2017-03-21 04:21:52 -04:00
end
2017-03-23 16:22:49 -04:00
2018-02-25 15:02:44 -05:00
test "adds an id to a given object if it lacks one and is a note and inserts it to the object database" do
2019-04-11 07:20:46 -04:00
user = insert(:user)
2017-03-23 16:22:49 -04:00
data = %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
2017-03-23 16:22:49 -04:00
"object" => %{
2019-04-11 07:20:46 -04:00
"actor" => user.ap_id,
"to" => [],
2018-02-25 15:02:44 -05:00
"type" => "Note",
2019-04-11 07:20:46 -04:00
"content" => "hey"
2017-03-23 16:22:49 -04:00
}
}
{:ok, %Activity{} = activity} = ActivityPub.insert(data)
assert object = Object.normalize(activity)
2018-11-25 17:31:07 -05:00
assert is_binary(object.data["id"])
2017-03-23 16:22:49 -04:00
end
2017-03-21 04:21:52 -04:00
end
describe "listen activities" do
test "does not increase user note count" do
user = insert(:user)
{:ok, activity} =
ActivityPub.listen(%{
to: ["https://www.w3.org/ns/activitystreams#Public"],
actor: user,
context: "",
object: %{
"actor" => user.ap_id,
"to" => ["https://www.w3.org/ns/activitystreams#Public"],
"artist" => "lain",
"title" => "lain radio episode 1",
"length" => 180_000,
"type" => "Audio"
}
})
assert activity.actor == user.ap_id
user = User.get_cached_by_id(user.id)
assert user.note_count == 0
end
test "can be fetched into a timeline" do
_listen_activity_1 = insert(:listen)
_listen_activity_2 = insert(:listen)
_listen_activity_3 = insert(:listen)
timeline = ActivityPub.fetch_activities([], %{"type" => ["Listen"]})
assert length(timeline) == 3
end
end
2017-05-03 10:08:24 -04:00
describe "create activities" do
test "it reverts create" do
user = insert(:user)
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
assert {:error, :reverted} =
ActivityPub.create(%{
to: ["user1", "user2"],
actor: user,
context: "",
object: %{
"to" => ["user1", "user2"],
"type" => "Note",
"content" => "testing"
}
})
end
assert Repo.aggregate(Activity, :count, :id) == 0
assert Repo.aggregate(Object, :count, :id) == 0
end
2017-05-03 10:08:24 -04:00
test "removes doubled 'to' recipients" do
user = insert(:user)
2018-03-30 09:01:53 -04:00
{:ok, activity} =
ActivityPub.create(%{
to: ["user1", "user1", "user2"],
actor: user,
2018-03-30 09:01:53 -04:00
context: "",
object: %{
"to" => ["user1", "user1", "user2"],
"type" => "Note",
"content" => "testing"
}
2018-03-30 09:01:53 -04:00
})
2017-05-03 10:08:24 -04:00
assert activity.data["to"] == ["user1", "user2"]
assert activity.actor == user.ap_id
2019-01-18 20:25:15 -05:00
assert activity.recipients == ["user1", "user2", user.ap_id]
2017-05-03 10:08:24 -04:00
end
test "increases user note count only for public activities" do
user = insert(:user)
{:ok, _} =
2019-04-22 03:20:43 -04:00
CommonAPI.post(User.get_cached_by_id(user.id), %{
2020-05-12 15:59:26 -04:00
status: "1",
visibility: "public"
2019-04-22 03:20:43 -04:00
})
{:ok, _} =
2019-04-22 03:20:43 -04:00
CommonAPI.post(User.get_cached_by_id(user.id), %{
2020-05-12 15:59:26 -04:00
status: "2",
visibility: "unlisted"
2019-04-22 03:20:43 -04:00
})
{:ok, _} =
2019-04-22 03:20:43 -04:00
CommonAPI.post(User.get_cached_by_id(user.id), %{
2020-05-12 15:59:26 -04:00
status: "2",
visibility: "private"
2019-04-22 03:20:43 -04:00
})
{:ok, _} =
2019-04-22 03:20:43 -04:00
CommonAPI.post(User.get_cached_by_id(user.id), %{
2020-05-12 15:59:26 -04:00
status: "3",
visibility: "direct"
2019-04-22 03:20:43 -04:00
})
2019-04-22 03:20:43 -04:00
user = User.get_cached_by_id(user.id)
assert user.note_count == 2
end
test "increases replies count" do
user = insert(:user)
user2 = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(user, %{status: "1", visibility: "public"})
ap_id = activity.data["id"]
2020-05-12 15:59:26 -04:00
reply_data = %{status: "1", in_reply_to_status_id: activity.id}
# public
2020-05-12 15:59:26 -04:00
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "public"))
assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
assert object.data["repliesCount"] == 1
# unlisted
2020-05-12 15:59:26 -04:00
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "unlisted"))
assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
assert object.data["repliesCount"] == 2
# private
2020-05-12 15:59:26 -04:00
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "private"))
assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
assert object.data["repliesCount"] == 2
# direct
2020-05-12 15:59:26 -04:00
{:ok, _} = CommonAPI.post(user2, Map.put(reply_data, :visibility, "direct"))
assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
assert object.data["repliesCount"] == 2
end
2017-05-03 10:08:24 -04:00
end
2017-03-22 09:45:17 -04:00
describe "fetch activities for recipients" do
test "retrieve the activities for certain recipients" do
{:ok, activity_one} = ActivityBuilder.insert(%{"to" => ["someone"]})
{:ok, activity_two} = ActivityBuilder.insert(%{"to" => ["someone_else"]})
2017-03-22 11:51:20 -04:00
{:ok, _activity_three} = ActivityBuilder.insert(%{"to" => ["noone"]})
2017-03-22 09:45:17 -04:00
activities = ActivityPub.fetch_activities(["someone", "someone_else"])
assert length(activities) == 2
assert activities == [activity_one, activity_two]
end
end
2017-03-23 19:09:08 -04:00
describe "fetch activities in context" do
test "retrieves activities that have a given context" do
{:ok, activity} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
{:ok, activity_two} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
{:ok, _activity_three} = ActivityBuilder.insert(%{"type" => "Create", "context" => "3hu"})
{:ok, _activity_four} = ActivityBuilder.insert(%{"type" => "Announce", "context" => "2hu"})
activity_five = insert(:note_activity)
user = insert(:user)
2017-03-23 19:09:08 -04:00
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_five.data["actor"]})
2017-03-23 19:09:08 -04:00
activities = ActivityPub.fetch_activities_for_context("2hu", %{"blocking_user" => user})
assert activities == [activity_two, activity]
2017-03-23 19:09:08 -04:00
end
end
test "doesn't return blocked activities" do
activity_one = insert(:note_activity)
activity_two = insert(:note_activity)
activity_three = insert(:note_activity)
user = insert(:user)
booster = insert(:user)
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_one.data["actor"]})
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
refute Enum.member?(activities, activity_one)
{:ok, _user_block} = User.unblock(user, %{ap_id: activity_one.data["actor"]})
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
assert Enum.member?(activities, activity_one)
{:ok, _user_relationship} = User.block(user, %{ap_id: activity_three.data["actor"]})
{:ok, _announce, %{data: %{"id" => id}}} = CommonAPI.repeat(activity_three.id, booster)
%Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
activity_three = Activity.get_by_id(activity_three.id)
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
assert Enum.member?(activities, activity_two)
refute Enum.member?(activities, activity_three)
refute Enum.member?(activities, boost_activity)
assert Enum.member?(activities, activity_one)
2017-11-02 17:47:11 -04:00
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => nil, "skip_preload" => true})
2017-11-02 17:47:11 -04:00
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
assert Enum.member?(activities, boost_activity)
2017-11-02 17:47:11 -04:00
assert Enum.member?(activities, activity_one)
end
test "doesn't return transitive interactions concerning blocked users" do
blocker = insert(:user)
blockee = insert(:user)
friend = insert(:user)
{:ok, _user_relationship} = User.block(blocker, blockee)
2020-05-12 15:59:26 -04:00
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey!"})
2020-05-12 15:59:26 -04:00
{:ok, activity_two} = CommonAPI.post(friend, %{status: "hey! @#{blockee.nickname}"})
2020-05-12 15:59:26 -04:00
{:ok, activity_three} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
2020-05-12 15:59:26 -04:00
{:ok, activity_four} = CommonAPI.post(blockee, %{status: "hey! @#{blocker.nickname}"})
activities = ActivityPub.fetch_activities([], %{"blocking_user" => blocker})
assert Enum.member?(activities, activity_one)
refute Enum.member?(activities, activity_two)
refute Enum.member?(activities, activity_three)
refute Enum.member?(activities, activity_four)
end
test "doesn't return announce activities concerning blocked users" do
blocker = insert(:user)
blockee = insert(:user)
friend = insert(:user)
{:ok, _user_relationship} = User.block(blocker, blockee)
2020-05-12 15:59:26 -04:00
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey!"})
2020-05-12 15:59:26 -04:00
{:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
{:ok, activity_three, _} = CommonAPI.repeat(activity_two.id, friend)
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => blocker})
|> Enum.map(fn act -> act.id end)
assert Enum.member?(activities, activity_one.id)
refute Enum.member?(activities, activity_two.id)
refute Enum.member?(activities, activity_three.id)
end
2019-05-14 18:13:47 -04:00
test "doesn't return activities from blocked domains" do
domain = "dogwhistle.zone"
domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
note = insert(:note, %{data: %{"actor" => domain_user.ap_id}})
activity = insert(:note_activity, %{note: note})
user = insert(:user)
{:ok, user} = User.block_domain(user, domain)
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
refute activity in activities
followed_user = insert(:user)
ActivityPub.follow(user, followed_user)
{:ok, repeat_activity, _} = CommonAPI.repeat(activity.id, followed_user)
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
refute repeat_activity in activities
2019-05-14 18:13:47 -04:00
end
test "does return activities from followed users on blocked domains" do
domain = "meanies.social"
domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
blocker = insert(:user)
{:ok, blocker} = User.follow(blocker, domain_user)
{:ok, blocker} = User.block_domain(blocker, domain)
assert User.following?(blocker, domain_user)
assert User.blocks_domain?(blocker, domain_user)
refute User.blocks?(blocker, domain_user)
note = insert(:note, %{data: %{"actor" => domain_user.ap_id}})
activity = insert(:note_activity, %{note: note})
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => blocker, "skip_preload" => true})
assert activity in activities
2019-12-10 11:50:58 -05:00
# And check that if the guy we DO follow boosts someone else from their domain,
# that should be hidden
another_user = insert(:user, %{ap_id: "https://#{domain}/@meanie2"})
bad_note = insert(:note, %{data: %{"actor" => another_user.ap_id}})
bad_activity = insert(:note_activity, %{note: bad_note})
{:ok, repeat_activity, _} = CommonAPI.repeat(bad_activity.id, domain_user)
activities =
ActivityPub.fetch_activities([], %{"blocking_user" => blocker, "skip_preload" => true})
refute repeat_activity in activities
end
2019-02-20 07:47:44 -05:00
test "doesn't return muted activities" do
activity_one = insert(:note_activity)
activity_two = insert(:note_activity)
activity_three = insert(:note_activity)
user = insert(:user)
booster = insert(:user)
activity_one_actor = User.get_by_ap_id(activity_one.data["actor"])
{:ok, _user_relationships} = User.mute(user, activity_one_actor)
2019-02-20 07:47:44 -05:00
activities =
ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
2019-02-20 07:47:44 -05:00
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
refute Enum.member?(activities, activity_one)
2019-02-27 10:37:42 -05:00
# Calling with 'with_muted' will deliver muted activities, too.
activities =
ActivityPub.fetch_activities([], %{
"muting_user" => user,
"with_muted" => true,
"skip_preload" => true
})
2019-02-27 10:37:42 -05:00
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
assert Enum.member?(activities, activity_one)
{:ok, _user_mute} = User.unmute(user, activity_one_actor)
2019-02-20 07:47:44 -05:00
activities =
ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
2019-02-20 07:47:44 -05:00
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
assert Enum.member?(activities, activity_one)
activity_three_actor = User.get_by_ap_id(activity_three.data["actor"])
{:ok, _user_relationships} = User.mute(user, activity_three_actor)
2019-02-20 07:47:44 -05:00
{:ok, _announce, %{data: %{"id" => id}}} = CommonAPI.repeat(activity_three.id, booster)
%Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
activity_three = Activity.get_by_id(activity_three.id)
2019-02-20 07:47:44 -05:00
activities =
ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
2019-02-20 07:47:44 -05:00
assert Enum.member?(activities, activity_two)
refute Enum.member?(activities, activity_three)
refute Enum.member?(activities, boost_activity)
assert Enum.member?(activities, activity_one)
activities = ActivityPub.fetch_activities([], %{"muting_user" => nil, "skip_preload" => true})
2019-02-20 07:47:44 -05:00
assert Enum.member?(activities, activity_two)
assert Enum.member?(activities, activity_three)
assert Enum.member?(activities, boost_activity)
assert Enum.member?(activities, activity_one)
end
test "doesn't return thread muted activities" do
user = insert(:user)
2019-08-18 18:21:31 -04:00
_activity_one = insert(:note_activity)
note_two = insert(:note, data: %{"context" => "suya.."})
activity_two = insert(:note_activity, note: note_two)
{:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
2019-08-18 18:21:31 -04:00
assert [_activity_one] = ActivityPub.fetch_activities([], %{"muting_user" => user})
end
test "returns thread muted activities when with_muted is set" do
user = insert(:user)
2019-08-18 18:21:31 -04:00
_activity_one = insert(:note_activity)
note_two = insert(:note, data: %{"context" => "suya.."})
activity_two = insert(:note_activity, note: note_two)
2019-08-21 14:24:35 -04:00
{:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
2019-08-18 18:21:31 -04:00
assert [_activity_two, _activity_one] =
ActivityPub.fetch_activities([], %{"muting_user" => user, "with_muted" => true})
end
test "does include announces on request" do
activity_three = insert(:note_activity)
user = insert(:user)
booster = insert(:user)
{:ok, user} = User.follow(user, booster)
{:ok, announce, _object} = CommonAPI.repeat(activity_three.id, booster)
[announce_activity] = ActivityPub.fetch_activities([user.ap_id | User.following(user)])
assert announce_activity.id == announce.id
end
test "excludes reblogs on request" do
user = insert(:user)
{:ok, expected_activity} = ActivityBuilder.insert(%{"type" => "Create"}, %{:user => user})
{:ok, _} = ActivityBuilder.insert(%{"type" => "Announce"}, %{:user => user})
[activity] = ActivityPub.fetch_user_activities(user, nil, %{"exclude_reblogs" => "true"})
assert activity == expected_activity
end
2017-03-21 15:22:05 -04:00
describe "public fetch activities" do
2018-05-13 05:18:48 -04:00
test "doesn't retrieve unlisted activities" do
user = insert(:user)
2018-05-13 07:02:24 -04:00
2020-05-12 15:59:26 -04:00
{:ok, _unlisted_activity} = CommonAPI.post(user, %{status: "yeah", visibility: "unlisted"})
2018-05-13 07:02:24 -04:00
2020-05-12 15:59:26 -04:00
{:ok, listed_activity} = CommonAPI.post(user, %{status: "yeah"})
2018-05-13 05:18:48 -04:00
[activity] = ActivityPub.fetch_public_activities()
assert activity == listed_activity
end
2017-03-21 15:22:05 -04:00
test "retrieves public activities" do
2018-03-30 09:01:53 -04:00
_activities = ActivityPub.fetch_public_activities()
2017-11-05 06:05:25 -05:00
2018-03-30 09:01:53 -04:00
%{public: public} = ActivityBuilder.public_and_non_public()
2017-03-21 12:53:20 -04:00
2018-03-30 09:01:53 -04:00
activities = ActivityPub.fetch_public_activities()
2017-03-21 12:53:20 -04:00
assert length(activities) == 1
assert Enum.at(activities, 0) == public
end
2017-03-21 15:22:05 -04:00
test "retrieves a maximum of 20 activities" do
2019-11-08 01:23:24 -05:00
ActivityBuilder.insert_list(10)
expected_activities = ActivityBuilder.insert_list(20)
2017-03-21 15:22:05 -04:00
2018-03-30 09:01:53 -04:00
activities = ActivityPub.fetch_public_activities()
2017-03-21 15:22:05 -04:00
2019-11-08 01:23:24 -05:00
assert collect_ids(activities) == collect_ids(expected_activities)
2017-03-21 15:22:05 -04:00
assert length(activities) == 20
end
2017-03-21 15:31:48 -04:00
test "retrieves ids starting from a since_id" do
activities = ActivityBuilder.insert_list(30)
2019-11-08 01:23:24 -05:00
expected_activities = ActivityBuilder.insert_list(10)
2017-03-21 15:31:48 -04:00
since_id = List.last(activities).id
2017-03-21 16:09:20 -04:00
activities = ActivityPub.fetch_public_activities(%{"since_id" => since_id})
2017-03-21 15:31:48 -04:00
2019-11-08 01:23:24 -05:00
assert collect_ids(activities) == collect_ids(expected_activities)
2017-03-21 15:31:48 -04:00
assert length(activities) == 10
end
test "retrieves ids up to max_id" do
2019-11-08 01:23:24 -05:00
ActivityBuilder.insert_list(10)
expected_activities = ActivityBuilder.insert_list(20)
%{id: max_id} =
10
|> ActivityBuilder.insert_list()
|> List.first()
activities = ActivityPub.fetch_public_activities(%{"max_id" => max_id})
assert length(activities) == 20
2019-11-08 01:23:24 -05:00
assert collect_ids(activities) == collect_ids(expected_activities)
end
test "paginates via offset/limit" do
2019-11-08 01:23:24 -05:00
_first_part_activities = ActivityBuilder.insert_list(10)
second_part_activities = ActivityBuilder.insert_list(10)
later_activities = ActivityBuilder.insert_list(10)
activities =
ActivityPub.fetch_public_activities(%{"page" => "2", "page_size" => "20"}, :offset)
assert length(activities) == 20
2019-11-08 01:23:24 -05:00
assert collect_ids(activities) ==
collect_ids(second_part_activities) ++ collect_ids(later_activities)
end
test "doesn't return reblogs for users for whom reblogs have been muted" do
activity = insert(:note_activity)
user = insert(:user)
booster = insert(:user)
{:ok, _reblog_mute} = CommonAPI.hide_reblogs(user, booster)
{:ok, activity, _} = CommonAPI.repeat(activity.id, booster)
activities = ActivityPub.fetch_activities([], %{"muting_user" => user})
2019-03-27 06:43:43 -04:00
refute Enum.any?(activities, fn %{id: id} -> id == activity.id end)
end
test "returns reblogs for users for whom reblogs have not been muted" do
activity = insert(:note_activity)
user = insert(:user)
booster = insert(:user)
{:ok, _reblog_mute} = CommonAPI.hide_reblogs(user, booster)
{:ok, _reblog_mute} = CommonAPI.show_reblogs(user, booster)
2019-03-27 06:43:43 -04:00
{:ok, activity, _} = CommonAPI.repeat(activity.id, booster)
activities = ActivityPub.fetch_activities([], %{"muting_user" => user})
assert Enum.any?(activities, fn %{id: id} -> id == activity.id end)
end
2017-03-21 12:53:20 -04:00
end
2017-03-28 20:05:51 -04:00
2017-04-15 06:11:20 -04:00
describe "announcing an object" do
test "adds an announce activity to the db" do
note_activity = insert(:note_activity)
object = Object.normalize(note_activity)
2017-04-15 06:11:20 -04:00
user = insert(:user)
{:ok, announce_activity, object} = ActivityPub.announce(user, object)
assert object.data["announcement_count"] == 1
assert object.data["announcements"] == [user.ap_id]
2018-03-30 09:01:53 -04:00
assert announce_activity.data["to"] == [
User.ap_followers(user),
note_activity.data["actor"]
]
2017-04-15 06:11:20 -04:00
assert announce_activity.data["object"] == object.data["id"]
assert announce_activity.data["actor"] == user.ap_id
2017-05-02 09:54:14 -04:00
assert announce_activity.data["context"] == object.data["context"]
2017-04-15 06:11:20 -04:00
end
test "reverts annouce from object on error" do
note_activity = insert(:note_activity)
object = Object.normalize(note_activity)
user = insert(:user)
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
assert {:error, :reverted} = ActivityPub.announce(user, object)
end
reloaded_object = Object.get_by_ap_id(object.data["id"])
assert reloaded_object == object
refute reloaded_object.data["announcement_count"]
refute reloaded_object.data["announcements"]
end
2017-04-15 06:11:20 -04:00
end
2019-10-01 11:51:27 -04:00
describe "announcing a private object" do
test "adds an announce activity to the db if the audience is not widened" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, note_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
2019-10-01 11:51:27 -04:00
object = Object.normalize(note_activity)
{:ok, announce_activity, object} = ActivityPub.announce(user, object, nil, true, false)
assert announce_activity.data["to"] == [User.ap_followers(user)]
assert announce_activity.data["object"] == object.data["id"]
assert announce_activity.data["actor"] == user.ap_id
assert announce_activity.data["context"] == object.data["context"]
end
test "does not add an announce activity to the db if the audience is widened" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, note_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
2019-10-01 11:51:27 -04:00
object = Object.normalize(note_activity)
assert {:error, _} = ActivityPub.announce(user, object, nil, true, true)
end
test "does not add an announce activity to the db if the announcer is not the author" do
user = insert(:user)
announcer = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, note_activity} = CommonAPI.post(user, %{status: ".", visibility: "private"})
2019-10-01 11:51:27 -04:00
object = Object.normalize(note_activity)
assert {:error, _} = ActivityPub.announce(announcer, object, nil, true, false)
end
end
2017-03-28 20:05:51 -04:00
describe "uploading files" do
test "copies the file to the configured folder" do
2018-03-30 09:01:53 -04:00
file = %Plug.Upload{
content_type: "image/jpg",
path: Path.absname("test/fixtures/image.jpg"),
filename: "an_image.jpg"
}
2017-03-28 20:05:51 -04:00
{:ok, %Object{} = object} = ActivityPub.upload(file)
assert object.data["name"] == "an_image.jpg"
end
2017-04-16 08:23:30 -04:00
test "works with base64 encoded images" do
file = %{
2017-04-16 10:06:19 -04:00
"img" => data_uri()
2017-04-16 08:23:30 -04:00
}
2017-04-16 09:28:28 -04:00
{:ok, %Object{}} = ActivityPub.upload(file)
2017-04-16 08:23:30 -04:00
end
2017-03-28 20:05:51 -04:00
end
2017-04-16 10:06:19 -04:00
2017-04-21 12:54:21 -04:00
describe "fetch the latest Follow" do
test "fetches the latest Follow activity" do
%Activity{data: %{"type" => "Follow"}} = activity = insert(:follow_activity)
follower = Repo.get_by(User, ap_id: activity.data["actor"])
followed = Repo.get_by(User, ap_id: activity.data["object"])
2017-05-16 09:31:11 -04:00
assert activity == Utils.fetch_latest_follow(follower, followed)
end
end
describe "following / unfollowing" do
test "it reverts follow activity" do
follower = insert(:user)
followed = insert(:user)
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
assert {:error, :reverted} = ActivityPub.follow(follower, followed)
end
assert Repo.aggregate(Activity, :count, :id) == 0
assert Repo.aggregate(Object, :count, :id) == 0
end
test "it reverts unfollow activity" do
follower = insert(:user)
followed = insert(:user)
{:ok, follow_activity} = ActivityPub.follow(follower, followed)
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
assert {:error, :reverted} = ActivityPub.unfollow(follower, followed)
end
activity = Activity.get_by_id(follow_activity.id)
assert activity.data["type"] == "Follow"
assert activity.data["actor"] == follower.ap_id
assert activity.data["object"] == followed.ap_id
end
test "creates a follow activity" do
follower = insert(:user)
followed = insert(:user)
{:ok, activity} = ActivityPub.follow(follower, followed)
assert activity.data["type"] == "Follow"
assert activity.data["actor"] == follower.ap_id
assert activity.data["object"] == followed.ap_id
end
test "creates an undo activity for the last follow" do
follower = insert(:user)
followed = insert(:user)
{:ok, follow_activity} = ActivityPub.follow(follower, followed)
{:ok, activity} = ActivityPub.unfollow(follower, followed)
assert activity.data["type"] == "Undo"
assert activity.data["actor"] == follower.ap_id
embedded_object = activity.data["object"]
assert is_map(embedded_object)
assert embedded_object["type"] == "Follow"
assert embedded_object["object"] == followed.ap_id
assert embedded_object["id"] == follow_activity.data["id"]
end
test "creates an undo activity for a pending follow request" do
follower = insert(:user)
followed = insert(:user, %{locked: true})
{:ok, follow_activity} = ActivityPub.follow(follower, followed)
{:ok, activity} = ActivityPub.unfollow(follower, followed)
assert activity.data["type"] == "Undo"
assert activity.data["actor"] == follower.ap_id
embedded_object = activity.data["object"]
assert is_map(embedded_object)
assert embedded_object["type"] == "Follow"
assert embedded_object["object"] == followed.ap_id
assert embedded_object["id"] == follow_activity.data["id"]
end
end
describe "blocking" do
test "reverts block activity on error" do
[blocker, blocked] = insert_list(2, :user)
with_mock(Utils, [:passthrough], maybe_federate: fn _ -> {:error, :reverted} end) do
assert {:error, :reverted} = ActivityPub.block(blocker, blocked)
end
assert Repo.aggregate(Activity, :count, :id) == 0
assert Repo.aggregate(Object, :count, :id) == 0
end
test "creates a block activity" do
clear_config([:instance, :federating], true)
blocker = insert(:user)
blocked = insert(:user)
with_mock Pleroma.Web.Federator,
publish: fn _ -> nil end do
{:ok, activity} = ActivityPub.block(blocker, blocked)
assert activity.data["type"] == "Block"
assert activity.data["actor"] == blocker.ap_id
assert activity.data["object"] == blocked.ap_id
assert called(Pleroma.Web.Federator.publish(activity))
end
end
test "works with outgoing blocks disabled, but doesn't federate" do
clear_config([:instance, :federating], true)
clear_config([:activitypub, :outgoing_blocks], false)
blocker = insert(:user)
blocked = insert(:user)
with_mock Pleroma.Web.Federator,
publish: fn _ -> nil end do
{:ok, activity} = ActivityPub.block(blocker, blocked)
assert activity.data["type"] == "Block"
assert activity.data["actor"] == blocker.ap_id
assert activity.data["object"] == blocked.ap_id
refute called(Pleroma.Web.Federator.publish(:_))
end
end
end
describe "timeline post-processing" do
test "it filters broken threads" do
user1 = insert(:user)
user2 = insert(:user)
user3 = insert(:user)
{:ok, user1} = User.follow(user1, user3)
assert User.following?(user1, user3)
{:ok, user2} = User.follow(user2, user3)
assert User.following?(user2, user3)
{:ok, user3} = User.follow(user3, user2)
assert User.following?(user3, user2)
2020-05-12 15:59:26 -04:00
{:ok, public_activity} = CommonAPI.post(user3, %{status: "hi 1"})
2020-05-12 15:59:26 -04:00
{:ok, private_activity_1} = CommonAPI.post(user3, %{status: "hi 2", visibility: "private"})
2018-10-26 02:37:00 -04:00
{:ok, private_activity_2} =
CommonAPI.post(user2, %{
2020-05-12 15:59:26 -04:00
status: "hi 3",
visibility: "private",
in_reply_to_status_id: private_activity_1.id
2018-10-26 02:37:00 -04:00
})
{:ok, private_activity_3} =
CommonAPI.post(user3, %{
2020-05-12 15:59:26 -04:00
status: "hi 4",
visibility: "private",
in_reply_to_status_id: private_activity_2.id
2018-10-26 02:37:00 -04:00
})
2019-05-15 12:23:01 -04:00
activities =
ActivityPub.fetch_activities([user1.ap_id | User.following(user1)])
2019-05-15 12:23:01 -04:00
|> Enum.map(fn a -> a.id end)
private_activity_1 = Activity.get_by_ap_id_with_object(private_activity_1.data["id"])
2019-05-15 12:23:01 -04:00
assert [public_activity.id, private_activity_1.id, private_activity_3.id] == activities
assert length(activities) == 3
2019-03-24 21:23:15 -04:00
activities =
ActivityPub.fetch_activities([user1.ap_id | User.following(user1)], %{"user" => user1})
2019-05-15 12:23:01 -04:00
|> Enum.map(fn a -> a.id end)
2019-05-15 12:23:01 -04:00
assert [public_activity.id, private_activity_1.id] == activities
assert length(activities) == 2
end
end
2018-02-25 10:14:25 -05:00
describe "update" do
setup do: clear_config([:instance, :max_pinned_statuses])
2018-02-25 10:14:25 -05:00
test "it creates an update activity with the new user data" do
user = insert(:user)
{:ok, user} = User.ensure_keys_present(user)
2018-02-25 10:14:25 -05:00
user_data = Pleroma.Web.ActivityPub.UserView.render("user.json", %{user: user})
2018-03-30 09:01:53 -04:00
{:ok, update} =
ActivityPub.update(%{
actor: user_data["id"],
to: [user.follower_address],
cc: [],
object: user_data
})
2018-02-25 10:14:25 -05:00
assert update.data["actor"] == user.ap_id
assert update.data["to"] == [user.follower_address]
assert embedded_object = update.data["object"]
assert embedded_object["id"] == user_data["id"]
assert embedded_object["type"] == user_data["type"]
2018-02-25 10:14:25 -05:00
end
end
2019-01-08 03:25:50 -05:00
test "returned pinned statuses" do
Config.put([:instance, :max_pinned_statuses], 3)
2019-01-07 08:45:33 -05:00
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, activity_one} = CommonAPI.post(user, %{status: "HI!!!"})
{:ok, activity_two} = CommonAPI.post(user, %{status: "HI!!!"})
{:ok, activity_three} = CommonAPI.post(user, %{status: "HI!!!"})
2019-01-07 08:45:33 -05:00
CommonAPI.pin(activity_one.id, user)
2019-01-08 04:01:35 -05:00
user = refresh_record(user)
2019-01-07 08:45:33 -05:00
CommonAPI.pin(activity_two.id, user)
2019-01-08 04:01:35 -05:00
user = refresh_record(user)
2019-01-07 08:45:33 -05:00
CommonAPI.pin(activity_three.id, user)
2019-01-08 04:01:35 -05:00
user = refresh_record(user)
2019-01-07 08:45:33 -05:00
activities = ActivityPub.fetch_user_activities(user, nil, %{"pinned" => "true"})
assert 3 = length(activities)
end
describe "flag/1" do
setup do
reporter = insert(:user)
target_account = insert(:user)
content = "foobar"
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(target_account, %{status: content})
context = Utils.generate_context_id()
reporter_ap_id = reporter.ap_id
target_ap_id = target_account.ap_id
activity_ap_id = activity.data["id"]
activity_with_object = Activity.get_by_ap_id_with_object(activity_ap_id)
{:ok,
%{
reporter: reporter,
context: context,
target_account: target_account,
reported_activity: activity,
content: content,
activity_ap_id: activity_ap_id,
activity_with_object: activity_with_object,
reporter_ap_id: reporter_ap_id,
target_ap_id: target_ap_id
}}
end
test "it can create a Flag activity",
%{
reporter: reporter,
context: context,
target_account: target_account,
reported_activity: reported_activity,
content: content,
activity_ap_id: activity_ap_id,
activity_with_object: activity_with_object,
reporter_ap_id: reporter_ap_id,
target_ap_id: target_ap_id
} do
assert {:ok, activity} =
ActivityPub.flag(%{
actor: reporter,
context: context,
account: target_account,
statuses: [reported_activity],
content: content
})
note_obj = %{
"type" => "Note",
"id" => activity_ap_id,
"content" => content,
"published" => activity_with_object.object.data["published"],
"actor" => AccountView.render("show.json", %{user: target_account})
}
assert %Activity{
actor: ^reporter_ap_id,
data: %{
"type" => "Flag",
"content" => ^content,
"context" => ^context,
"object" => [^target_ap_id, ^note_obj]
}
} = activity
end
test_with_mock "strips status data from Flag, before federating it",
%{
reporter: reporter,
context: context,
target_account: target_account,
reported_activity: reported_activity,
content: content
},
Utils,
[:passthrough],
[] do
{:ok, activity} =
ActivityPub.flag(%{
actor: reporter,
context: context,
account: target_account,
statuses: [reported_activity],
content: content
})
new_data =
put_in(activity.data, ["object"], [target_account.ap_id, reported_activity.data["id"]])
assert_called(Utils.maybe_federate(%{activity | data: new_data}))
end
2019-02-20 11:51:25 -05:00
end
2019-05-14 09:12:47 -04:00
test "fetch_activities/2 returns activities addressed to a list " do
user = insert(:user)
member = insert(:user)
{:ok, list} = Pleroma.List.create("foo", user)
{:ok, list} = Pleroma.List.follow(list, member)
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(user, %{status: "foobar", visibility: "list:#{list.id}"})
2019-05-14 09:12:47 -04:00
activity = Repo.preload(activity, :bookmark)
2019-05-24 10:41:11 -04:00
activity = %Activity{activity | thread_muted?: !!activity.thread_muted?}
2019-05-14 09:12:47 -04:00
assert ActivityPub.fetch_activities([], %{"user" => user}) == [activity]
end
2017-04-16 10:06:19 -04:00
def data_uri do
2018-02-25 11:48:31 -05:00
File.read!("test/fixtures/avatar_data_uri")
2017-04-16 10:06:19 -04:00
end
describe "fetch_activities_bounded" do
test "fetches private posts for followed users" do
user = insert(:user)
{:ok, activity} =
CommonAPI.post(user, %{
2020-05-12 15:59:26 -04:00
status: "thought I looked cute might delete later :3",
visibility: "private"
})
[result] = ActivityPub.fetch_activities_bounded([user.follower_address], [])
assert result.id == activity.id
end
test "fetches only public posts for other users" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(user, %{status: "#cofe", visibility: "public"})
{:ok, _private_activity} =
CommonAPI.post(user, %{
2020-05-12 15:59:26 -04:00
status: "why is tenshi eating a corndog so cute?",
visibility: "private"
})
[result] = ActivityPub.fetch_activities_bounded([], [user.follower_address])
assert result.id == activity.id
end
end
describe "fetch_follow_information_for_user" do
test "syncronizes following/followers counters" do
user =
insert(:user,
local: false,
follower_address: "http://localhost:4001/users/fuser2/followers",
following_address: "http://localhost:4001/users/fuser2/following"
)
{:ok, info} = ActivityPub.fetch_follow_information_for_user(user)
assert info.follower_count == 527
assert info.following_count == 267
end
test "detects hidden followers" do
mock(fn env ->
case env.url do
"http://localhost:4001/users/masto_closed/followers?page=1" ->
%Tesla.Env{status: 403, body: ""}
_ ->
apply(HttpRequestMock, :request, [env])
end
end)
user =
insert(:user,
local: false,
follower_address: "http://localhost:4001/users/masto_closed/followers",
following_address: "http://localhost:4001/users/masto_closed/following"
)
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
assert follow_info.hide_followers == true
assert follow_info.hide_follows == false
end
test "detects hidden follows" do
mock(fn env ->
case env.url do
"http://localhost:4001/users/masto_closed/following?page=1" ->
%Tesla.Env{status: 403, body: ""}
_ ->
apply(HttpRequestMock, :request, [env])
end
end)
user =
insert(:user,
local: false,
follower_address: "http://localhost:4001/users/masto_closed/followers",
following_address: "http://localhost:4001/users/masto_closed/following"
)
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
assert follow_info.hide_followers == false
assert follow_info.hide_follows == true
end
2019-11-30 01:24:08 -05:00
test "detects hidden follows/followers for friendica" do
user =
insert(:user,
local: false,
follower_address: "http://localhost:8080/followers/fuser3",
following_address: "http://localhost:8080/following/fuser3"
)
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
assert follow_info.hide_followers == true
assert follow_info.follower_count == 296
assert follow_info.following_count == 32
assert follow_info.hide_follows == true
end
test "doesn't crash when follower and following counters are hidden" do
mock(fn env ->
case env.url do
"http://localhost:4001/users/masto_hidden_counters/following" ->
json(%{
"@context" => "https://www.w3.org/ns/activitystreams",
"id" => "http://localhost:4001/users/masto_hidden_counters/followers"
})
"http://localhost:4001/users/masto_hidden_counters/following?page=1" ->
%Tesla.Env{status: 403, body: ""}
"http://localhost:4001/users/masto_hidden_counters/followers" ->
json(%{
"@context" => "https://www.w3.org/ns/activitystreams",
"id" => "http://localhost:4001/users/masto_hidden_counters/following"
})
"http://localhost:4001/users/masto_hidden_counters/followers?page=1" ->
%Tesla.Env{status: 403, body: ""}
end
end)
user =
insert(:user,
local: false,
follower_address: "http://localhost:4001/users/masto_hidden_counters/followers",
following_address: "http://localhost:4001/users/masto_hidden_counters/following"
)
{:ok, follow_info} = ActivityPub.fetch_follow_information_for_user(user)
assert follow_info.hide_followers == true
assert follow_info.follower_count == 0
assert follow_info.hide_follows == true
assert follow_info.following_count == 0
end
end
2019-11-18 14:32:43 -05:00
describe "fetch_favourites/3" do
test "returns a favourite activities sorted by adds to favorite" do
user = insert(:user)
2019-11-19 12:19:41 -05:00
other_user = insert(:user)
2019-11-18 14:32:43 -05:00
user1 = insert(:user)
user2 = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, a1} = CommonAPI.post(user1, %{status: "bla"})
{:ok, _a2} = CommonAPI.post(user2, %{status: "traps are happy"})
{:ok, a3} = CommonAPI.post(user2, %{status: "Trees Are "})
{:ok, a4} = CommonAPI.post(user2, %{status: "Agent Smith "})
{:ok, a5} = CommonAPI.post(user1, %{status: "Red or Blue "})
2019-11-18 14:32:43 -05:00
{:ok, _} = CommonAPI.favorite(user, a4.id)
{:ok, _} = CommonAPI.favorite(other_user, a3.id)
{:ok, _} = CommonAPI.favorite(user, a3.id)
{:ok, _} = CommonAPI.favorite(other_user, a5.id)
{:ok, _} = CommonAPI.favorite(user, a5.id)
{:ok, _} = CommonAPI.favorite(other_user, a4.id)
{:ok, _} = CommonAPI.favorite(user, a1.id)
{:ok, _} = CommonAPI.favorite(other_user, a1.id)
2019-11-18 14:32:43 -05:00
result = ActivityPub.fetch_favourites(user)
assert Enum.map(result, & &1.id) == [a1.id, a5.id, a3.id, a4.id]
result = ActivityPub.fetch_favourites(user, %{"limit" => 2})
assert Enum.map(result, & &1.id) == [a1.id, a5.id]
end
end
2019-12-05 04:18:59 -05:00
2019-10-30 07:21:49 -04:00
describe "Move activity" do
test "create" do
%{ap_id: old_ap_id} = old_user = insert(:user)
%{ap_id: new_ap_id} = new_user = insert(:user, also_known_as: [old_ap_id])
follower = insert(:user)
follower_move_opted_out = insert(:user, allow_following_move: false)
2019-10-30 07:21:49 -04:00
User.follow(follower, old_user)
User.follow(follower_move_opted_out, old_user)
2019-10-30 07:21:49 -04:00
assert User.following?(follower, old_user)
assert User.following?(follower_move_opted_out, old_user)
2019-10-30 07:21:49 -04:00
assert {:ok, activity} = ActivityPub.move(old_user, new_user)
assert %Activity{
actor: ^old_ap_id,
data: %{
"actor" => ^old_ap_id,
"object" => ^old_ap_id,
"target" => ^new_ap_id,
"type" => "Move"
},
local: true
} = activity
params = %{
"op" => "move_following",
"origin_id" => old_user.id,
"target_id" => new_user.id
}
assert_enqueued(worker: Pleroma.Workers.BackgroundWorker, args: params)
Pleroma.Workers.BackgroundWorker.perform(params, nil)
refute User.following?(follower, old_user)
assert User.following?(follower, new_user)
assert User.following?(follower_move_opted_out, old_user)
refute User.following?(follower_move_opted_out, new_user)
2019-11-12 06:48:14 -05:00
activity = %Activity{activity | object: nil}
2020-03-16 13:05:21 -04:00
assert [%Notification{activity: ^activity}] = Notification.for_user(follower)
2019-11-12 06:48:14 -05:00
2020-03-16 13:05:21 -04:00
assert [%Notification{activity: ^activity}] = Notification.for_user(follower_move_opted_out)
2019-10-30 07:21:49 -04:00
end
test "old user must be in the new user's `also_known_as` list" do
old_user = insert(:user)
new_user = insert(:user)
assert {:error, "Target account must have the origin in `alsoKnownAs`"} =
ActivityPub.move(old_user, new_user)
end
end
2019-12-04 01:49:17 -05:00
test "doesn't retrieve replies activities with exclude_replies" do
user = insert(:user)
2020-05-12 15:59:26 -04:00
{:ok, activity} = CommonAPI.post(user, %{status: "yeah"})
2019-12-04 01:49:17 -05:00
2020-05-12 15:59:26 -04:00
{:ok, _reply} = CommonAPI.post(user, %{status: "yeah", in_reply_to_status_id: activity.id})
2019-12-04 01:49:17 -05:00
[result] = ActivityPub.fetch_public_activities(%{"exclude_replies" => "true"})
assert result.id == activity.id
assert length(ActivityPub.fetch_public_activities()) == 2
end
describe "replies filtering with public messages" do
setup :public_messages
test "public timeline", %{users: %{u1: user}} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert length(activities_ids) == 16
end
test "public timeline with reply_visibility `following`", %{
users: %{u1: user},
u1: u1,
u2: u2,
u3: u3,
u4: u4,
activities: activities
} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("reply_visibility", "following")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert length(activities_ids) == 14
visible_ids =
Map.values(u1) ++ Map.values(u2) ++ Map.values(u4) ++ Map.values(activities) ++ [u3[:r1]]
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
test "public timeline with reply_visibility `self`", %{
users: %{u1: user},
u1: u1,
u2: u2,
u3: u3,
u4: u4,
activities: activities
} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("reply_visibility", "self")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert length(activities_ids) == 10
visible_ids = Map.values(u1) ++ [u2[:r1], u3[:r1], u4[:r1]] ++ Map.values(activities)
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
test "home timeline", %{
users: %{u1: user},
activities: activities,
u1: u1,
u2: u2,
u3: u3,
u4: u4
} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 13
visible_ids =
Map.values(u1) ++
Map.values(u3) ++
[
activities[:a1],
activities[:a2],
activities[:a4],
u2[:r1],
u2[:r3],
u4[:r1],
u4[:r2]
]
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
test "home timeline with reply_visibility `following`", %{
users: %{u1: user},
activities: activities,
u1: u1,
u2: u2,
u3: u3,
u4: u4
} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
|> Map.put("reply_visibility", "following")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 11
visible_ids =
Map.values(u1) ++
[
activities[:a1],
activities[:a2],
activities[:a4],
u2[:r1],
u2[:r3],
u3[:r1],
u4[:r1],
u4[:r2]
]
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
test "home timeline with reply_visibility `self`", %{
users: %{u1: user},
activities: activities,
u1: u1,
u2: u2,
u3: u3,
u4: u4
} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
|> Map.put("reply_visibility", "self")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 9
visible_ids =
Map.values(u1) ++
[
activities[:a1],
activities[:a2],
activities[:a4],
u2[:r1],
u3[:r1],
u4[:r1]
]
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
end
describe "replies filtering with private messages" do
setup :private_messages
test "public timeline", %{users: %{u1: user}} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert activities_ids == []
end
test "public timeline with default reply_visibility `following`", %{users: %{u1: user}} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("reply_visibility", "following")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
|> Map.put("user", user)
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert activities_ids == []
end
test "public timeline with default reply_visibility `self`", %{users: %{u1: user}} do
activities_ids =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("local_only", false)
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("reply_visibility", "self")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
|> Map.put("user", user)
|> ActivityPub.fetch_public_activities()
|> Enum.map(& &1.id)
assert activities_ids == []
end
test "home timeline", %{users: %{u1: user}} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 12
end
test "home timeline with default reply_visibility `following`", %{users: %{u1: user}} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
|> Map.put("reply_visibility", "following")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 12
end
test "home timeline with default reply_visibility `self`", %{
users: %{u1: user},
activities: activities,
u1: u1,
u2: u2,
u3: u3,
u4: u4
} do
params =
%{}
|> Map.put("type", ["Create", "Announce"])
|> Map.put("blocking_user", user)
|> Map.put("muting_user", user)
|> Map.put("user", user)
|> Map.put("reply_visibility", "self")
2020-04-24 12:25:26 -04:00
|> Map.put("reply_filtering_user", user)
2019-12-04 01:49:17 -05:00
activities_ids =
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|> Enum.map(& &1.id)
assert length(activities_ids) == 10
visible_ids =
Map.values(u1) ++ Map.values(u4) ++ [u2[:r1], u3[:r1]] ++ Map.values(activities)
assert Enum.all?(visible_ids, &(&1 in activities_ids))
end
end
defp public_messages(_) do
[u1, u2, u3, u4] = insert_list(4, :user)
{:ok, u1} = User.follow(u1, u2)
{:ok, u2} = User.follow(u2, u1)
{:ok, u1} = User.follow(u1, u4)
{:ok, u4} = User.follow(u4, u1)
{:ok, u2} = User.follow(u2, u3)
{:ok, u3} = User.follow(u3, u2)
2020-05-12 15:59:26 -04:00
{:ok, a1} = CommonAPI.post(u1, %{status: "Status"})
2019-12-04 01:49:17 -05:00
{:ok, r1_1} =
CommonAPI.post(u2, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u2 to u1",
in_reply_to_status_id: a1.id
2019-12-04 01:49:17 -05:00
})
{:ok, r1_2} =
CommonAPI.post(u3, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u3 to u1",
in_reply_to_status_id: a1.id
2019-12-04 01:49:17 -05:00
})
{:ok, r1_3} =
CommonAPI.post(u4, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u4 to u1",
in_reply_to_status_id: a1.id
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a2} = CommonAPI.post(u2, %{status: "Status"})
2019-12-04 01:49:17 -05:00
{:ok, r2_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u2.nickname} reply from u1 to u2",
in_reply_to_status_id: a2.id
2019-12-04 01:49:17 -05:00
})
{:ok, r2_2} =
CommonAPI.post(u3, %{
2020-05-12 15:59:26 -04:00
status: "@#{u2.nickname} reply from u3 to u2",
in_reply_to_status_id: a2.id
2019-12-04 01:49:17 -05:00
})
{:ok, r2_3} =
CommonAPI.post(u4, %{
2020-05-12 15:59:26 -04:00
status: "@#{u2.nickname} reply from u4 to u2",
in_reply_to_status_id: a2.id
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a3} = CommonAPI.post(u3, %{status: "Status"})
2019-12-04 01:49:17 -05:00
{:ok, r3_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u3.nickname} reply from u1 to u3",
in_reply_to_status_id: a3.id
2019-12-04 01:49:17 -05:00
})
{:ok, r3_2} =
CommonAPI.post(u2, %{
2020-05-12 15:59:26 -04:00
status: "@#{u3.nickname} reply from u2 to u3",
in_reply_to_status_id: a3.id
2019-12-04 01:49:17 -05:00
})
{:ok, r3_3} =
CommonAPI.post(u4, %{
2020-05-12 15:59:26 -04:00
status: "@#{u3.nickname} reply from u4 to u3",
in_reply_to_status_id: a3.id
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a4} = CommonAPI.post(u4, %{status: "Status"})
2019-12-04 01:49:17 -05:00
{:ok, r4_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u4.nickname} reply from u1 to u4",
in_reply_to_status_id: a4.id
2019-12-04 01:49:17 -05:00
})
{:ok, r4_2} =
CommonAPI.post(u2, %{
2020-05-12 15:59:26 -04:00
status: "@#{u4.nickname} reply from u2 to u4",
in_reply_to_status_id: a4.id
2019-12-04 01:49:17 -05:00
})
{:ok, r4_3} =
CommonAPI.post(u3, %{
2020-05-12 15:59:26 -04:00
status: "@#{u4.nickname} reply from u3 to u4",
in_reply_to_status_id: a4.id
2019-12-04 01:49:17 -05:00
})
{:ok,
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
u2: %{r1: r2_1.id, r2: r2_2.id, r3: r2_3.id},
u3: %{r1: r3_1.id, r2: r3_2.id, r3: r3_3.id},
u4: %{r1: r4_1.id, r2: r4_2.id, r3: r4_3.id}}
end
defp private_messages(_) do
[u1, u2, u3, u4] = insert_list(4, :user)
{:ok, u1} = User.follow(u1, u2)
{:ok, u2} = User.follow(u2, u1)
{:ok, u1} = User.follow(u1, u3)
{:ok, u3} = User.follow(u3, u1)
{:ok, u1} = User.follow(u1, u4)
{:ok, u4} = User.follow(u4, u1)
{:ok, u2} = User.follow(u2, u3)
{:ok, u3} = User.follow(u3, u2)
2020-05-12 15:59:26 -04:00
{:ok, a1} = CommonAPI.post(u1, %{status: "Status", visibility: "private"})
2019-12-04 01:49:17 -05:00
{:ok, r1_1} =
CommonAPI.post(u2, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u2 to u1",
in_reply_to_status_id: a1.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
{:ok, r1_2} =
CommonAPI.post(u3, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u3 to u1",
in_reply_to_status_id: a1.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
{:ok, r1_3} =
CommonAPI.post(u4, %{
2020-05-12 15:59:26 -04:00
status: "@#{u1.nickname} reply from u4 to u1",
in_reply_to_status_id: a1.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a2} = CommonAPI.post(u2, %{status: "Status", visibility: "private"})
2019-12-04 01:49:17 -05:00
{:ok, r2_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u2.nickname} reply from u1 to u2",
in_reply_to_status_id: a2.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
{:ok, r2_2} =
CommonAPI.post(u3, %{
2020-05-12 15:59:26 -04:00
status: "@#{u2.nickname} reply from u3 to u2",
in_reply_to_status_id: a2.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a3} = CommonAPI.post(u3, %{status: "Status", visibility: "private"})
2019-12-04 01:49:17 -05:00
{:ok, r3_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u3.nickname} reply from u1 to u3",
in_reply_to_status_id: a3.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
{:ok, r3_2} =
CommonAPI.post(u2, %{
2020-05-12 15:59:26 -04:00
status: "@#{u3.nickname} reply from u2 to u3",
in_reply_to_status_id: a3.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
2020-05-12 15:59:26 -04:00
{:ok, a4} = CommonAPI.post(u4, %{status: "Status", visibility: "private"})
2019-12-04 01:49:17 -05:00
{:ok, r4_1} =
CommonAPI.post(u1, %{
2020-05-12 15:59:26 -04:00
status: "@#{u4.nickname} reply from u1 to u4",
in_reply_to_status_id: a4.id,
visibility: "private"
2019-12-04 01:49:17 -05:00
})
{:ok,
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
u2: %{r1: r2_1.id, r2: r2_2.id},
u3: %{r1: r3_1.id, r2: r3_2.id},
u4: %{r1: r4_1.id}}
end
describe "maybe_update_follow_information/1" do
setup do
clear_config([:instance, :external_user_synchronization], true)
user = %{
local: false,
ap_id: "https://gensokyo.2hu/users/raymoo",
following_address: "https://gensokyo.2hu/users/following",
follower_address: "https://gensokyo.2hu/users/followers",
type: "Person"
}
%{user: user}
end
test "logs an error when it can't fetch the info", %{user: user} do
assert capture_log(fn ->
ActivityPub.maybe_update_follow_information(user)
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
end
test "just returns the input if the user type is Application", %{
user: user
} do
user =
user
|> Map.put(:type, "Application")
refute capture_log(fn ->
assert ^user = ActivityPub.maybe_update_follow_information(user)
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
end
test "it just returns the input if the user has no following/follower addresses", %{
user: user
} do
user =
user
|> Map.put(:following_address, nil)
|> Map.put(:follower_address, nil)
refute capture_log(fn ->
assert ^user = ActivityPub.maybe_update_follow_information(user)
end) =~ "Follower/Following counter update for #{user.ap_id} failed"
end
end
2017-03-21 04:21:52 -04:00
end