Fork of Pleroma with site-specific changes and feature branches https://git.pleroma.social/pleroma/pleroma
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1816 lines
55KB

  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.UserTest do
  5. alias Pleroma.Activity
  6. alias Pleroma.Builders.UserBuilder
  7. alias Pleroma.Object
  8. alias Pleroma.Repo
  9. alias Pleroma.Tests.ObanHelpers
  10. alias Pleroma.User
  11. alias Pleroma.Web.ActivityPub.ActivityPub
  12. alias Pleroma.Web.CommonAPI
  13. use Pleroma.DataCase
  14. use Oban.Testing, repo: Pleroma.Repo
  15. import Mock
  16. import Pleroma.Factory
  17. import ExUnit.CaptureLog
  18. setup_all do
  19. Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
  20. :ok
  21. end
  22. clear_config([:instance, :account_activation_required])
  23. describe "service actors" do
  24. test "returns updated invisible actor" do
  25. uri = "#{Pleroma.Web.Endpoint.url()}/relay"
  26. followers_uri = "#{uri}/followers"
  27. insert(
  28. :user,
  29. %{
  30. nickname: "relay",
  31. invisible: false,
  32. local: true,
  33. ap_id: uri,
  34. follower_address: followers_uri
  35. }
  36. )
  37. actor = User.get_or_create_service_actor_by_ap_id(uri, "relay")
  38. assert actor.invisible
  39. end
  40. test "returns relay user" do
  41. uri = "#{Pleroma.Web.Endpoint.url()}/relay"
  42. followers_uri = "#{uri}/followers"
  43. assert %User{
  44. nickname: "relay",
  45. invisible: true,
  46. local: true,
  47. ap_id: ^uri,
  48. follower_address: ^followers_uri
  49. } = User.get_or_create_service_actor_by_ap_id(uri, "relay")
  50. assert capture_log(fn ->
  51. refute User.get_or_create_service_actor_by_ap_id("/relay", "relay")
  52. end) =~ "Cannot create service actor:"
  53. end
  54. test "returns invisible actor" do
  55. uri = "#{Pleroma.Web.Endpoint.url()}/internal/fetch-test"
  56. followers_uri = "#{uri}/followers"
  57. user = User.get_or_create_service_actor_by_ap_id(uri, "internal.fetch-test")
  58. assert %User{
  59. nickname: "internal.fetch-test",
  60. invisible: true,
  61. local: true,
  62. ap_id: ^uri,
  63. follower_address: ^followers_uri
  64. } = user
  65. user2 = User.get_or_create_service_actor_by_ap_id(uri, "internal.fetch-test")
  66. assert user.id == user2.id
  67. end
  68. end
  69. describe "AP ID user relationships" do
  70. setup do
  71. {:ok, user: insert(:user)}
  72. end
  73. test "outgoing_relations_ap_ids/1", %{user: user} do
  74. rel_types = [:block, :mute, :notification_mute, :reblog_mute, :inverse_subscription]
  75. ap_ids_by_rel =
  76. Enum.into(
  77. rel_types,
  78. %{},
  79. fn rel_type ->
  80. rel_records =
  81. insert_list(2, :user_relationship, %{source: user, relationship_type: rel_type})
  82. ap_ids = Enum.map(rel_records, fn rr -> Repo.preload(rr, :target).target.ap_id end)
  83. {rel_type, Enum.sort(ap_ids)}
  84. end
  85. )
  86. assert ap_ids_by_rel[:block] == Enum.sort(User.blocked_users_ap_ids(user))
  87. assert ap_ids_by_rel[:block] == Enum.sort(Enum.map(User.blocked_users(user), & &1.ap_id))
  88. assert ap_ids_by_rel[:mute] == Enum.sort(User.muted_users_ap_ids(user))
  89. assert ap_ids_by_rel[:mute] == Enum.sort(Enum.map(User.muted_users(user), & &1.ap_id))
  90. assert ap_ids_by_rel[:notification_mute] ==
  91. Enum.sort(User.notification_muted_users_ap_ids(user))
  92. assert ap_ids_by_rel[:notification_mute] ==
  93. Enum.sort(Enum.map(User.notification_muted_users(user), & &1.ap_id))
  94. assert ap_ids_by_rel[:reblog_mute] == Enum.sort(User.reblog_muted_users_ap_ids(user))
  95. assert ap_ids_by_rel[:reblog_mute] ==
  96. Enum.sort(Enum.map(User.reblog_muted_users(user), & &1.ap_id))
  97. assert ap_ids_by_rel[:inverse_subscription] == Enum.sort(User.subscriber_users_ap_ids(user))
  98. assert ap_ids_by_rel[:inverse_subscription] ==
  99. Enum.sort(Enum.map(User.subscriber_users(user), & &1.ap_id))
  100. outgoing_relations_ap_ids = User.outgoing_relations_ap_ids(user, rel_types)
  101. assert ap_ids_by_rel ==
  102. Enum.into(outgoing_relations_ap_ids, %{}, fn {k, v} -> {k, Enum.sort(v)} end)
  103. end
  104. end
  105. describe "when tags are nil" do
  106. test "tagging a user" do
  107. user = insert(:user, %{tags: nil})
  108. user = User.tag(user, ["cool", "dude"])
  109. assert "cool" in user.tags
  110. assert "dude" in user.tags
  111. end
  112. test "untagging a user" do
  113. user = insert(:user, %{tags: nil})
  114. user = User.untag(user, ["cool", "dude"])
  115. assert user.tags == []
  116. end
  117. end
  118. test "ap_id returns the activity pub id for the user" do
  119. user = UserBuilder.build()
  120. expected_ap_id = "#{Pleroma.Web.base_url()}/users/#{user.nickname}"
  121. assert expected_ap_id == User.ap_id(user)
  122. end
  123. test "ap_followers returns the followers collection for the user" do
  124. user = UserBuilder.build()
  125. expected_followers_collection = "#{User.ap_id(user)}/followers"
  126. assert expected_followers_collection == User.ap_followers(user)
  127. end
  128. test "ap_following returns the following collection for the user" do
  129. user = UserBuilder.build()
  130. expected_followers_collection = "#{User.ap_id(user)}/following"
  131. assert expected_followers_collection == User.ap_following(user)
  132. end
  133. test "returns all pending follow requests" do
  134. unlocked = insert(:user)
  135. locked = insert(:user, locked: true)
  136. follower = insert(:user)
  137. CommonAPI.follow(follower, unlocked)
  138. CommonAPI.follow(follower, locked)
  139. assert [] = User.get_follow_requests(unlocked)
  140. assert [activity] = User.get_follow_requests(locked)
  141. assert activity
  142. end
  143. test "doesn't return already accepted or duplicate follow requests" do
  144. locked = insert(:user, locked: true)
  145. pending_follower = insert(:user)
  146. accepted_follower = insert(:user)
  147. CommonAPI.follow(pending_follower, locked)
  148. CommonAPI.follow(pending_follower, locked)
  149. CommonAPI.follow(accepted_follower, locked)
  150. Pleroma.FollowingRelationship.update(accepted_follower, locked, "accept")
  151. assert [^pending_follower] = User.get_follow_requests(locked)
  152. end
  153. test "clears follow requests when requester is blocked" do
  154. followed = insert(:user, locked: true)
  155. follower = insert(:user)
  156. CommonAPI.follow(follower, followed)
  157. assert [_activity] = User.get_follow_requests(followed)
  158. {:ok, _user_relationship} = User.block(followed, follower)
  159. assert [] = User.get_follow_requests(followed)
  160. end
  161. test "follow_all follows mutliple users" do
  162. user = insert(:user)
  163. followed_zero = insert(:user)
  164. followed_one = insert(:user)
  165. followed_two = insert(:user)
  166. blocked = insert(:user)
  167. not_followed = insert(:user)
  168. reverse_blocked = insert(:user)
  169. {:ok, _user_relationship} = User.block(user, blocked)
  170. {:ok, _user_relationship} = User.block(reverse_blocked, user)
  171. {:ok, user} = User.follow(user, followed_zero)
  172. {:ok, user} = User.follow_all(user, [followed_one, followed_two, blocked, reverse_blocked])
  173. assert User.following?(user, followed_one)
  174. assert User.following?(user, followed_two)
  175. assert User.following?(user, followed_zero)
  176. refute User.following?(user, not_followed)
  177. refute User.following?(user, blocked)
  178. refute User.following?(user, reverse_blocked)
  179. end
  180. test "follow_all follows mutliple users without duplicating" do
  181. user = insert(:user)
  182. followed_zero = insert(:user)
  183. followed_one = insert(:user)
  184. followed_two = insert(:user)
  185. {:ok, user} = User.follow_all(user, [followed_zero, followed_one])
  186. assert length(User.following(user)) == 3
  187. {:ok, user} = User.follow_all(user, [followed_one, followed_two])
  188. assert length(User.following(user)) == 4
  189. end
  190. test "follow takes a user and another user" do
  191. user = insert(:user)
  192. followed = insert(:user)
  193. {:ok, user} = User.follow(user, followed)
  194. user = User.get_cached_by_id(user.id)
  195. followed = User.get_cached_by_ap_id(followed.ap_id)
  196. assert followed.follower_count == 1
  197. assert user.following_count == 1
  198. assert User.ap_followers(followed) in User.following(user)
  199. end
  200. test "can't follow a deactivated users" do
  201. user = insert(:user)
  202. followed = insert(:user, %{deactivated: true})
  203. {:error, _} = User.follow(user, followed)
  204. end
  205. test "can't follow a user who blocked us" do
  206. blocker = insert(:user)
  207. blockee = insert(:user)
  208. {:ok, _user_relationship} = User.block(blocker, blockee)
  209. {:error, _} = User.follow(blockee, blocker)
  210. end
  211. test "can't subscribe to a user who blocked us" do
  212. blocker = insert(:user)
  213. blocked = insert(:user)
  214. {:ok, _user_relationship} = User.block(blocker, blocked)
  215. {:error, _} = User.subscribe(blocked, blocker)
  216. end
  217. test "local users do not automatically follow local locked accounts" do
  218. follower = insert(:user, locked: true)
  219. followed = insert(:user, locked: true)
  220. {:ok, follower} = User.maybe_direct_follow(follower, followed)
  221. refute User.following?(follower, followed)
  222. end
  223. describe "unfollow/2" do
  224. clear_config([:instance, :external_user_synchronization])
  225. test "unfollow with syncronizes external user" do
  226. Pleroma.Config.put([:instance, :external_user_synchronization], true)
  227. followed =
  228. insert(:user,
  229. nickname: "fuser1",
  230. follower_address: "http://localhost:4001/users/fuser1/followers",
  231. following_address: "http://localhost:4001/users/fuser1/following",
  232. ap_id: "http://localhost:4001/users/fuser1"
  233. )
  234. user =
  235. insert(:user, %{
  236. local: false,
  237. nickname: "fuser2",
  238. ap_id: "http://localhost:4001/users/fuser2",
  239. follower_address: "http://localhost:4001/users/fuser2/followers",
  240. following_address: "http://localhost:4001/users/fuser2/following"
  241. })
  242. {:ok, user} = User.follow(user, followed, "accept")
  243. {:ok, user, _activity} = User.unfollow(user, followed)
  244. user = User.get_cached_by_id(user.id)
  245. assert User.following(user) == []
  246. end
  247. test "unfollow takes a user and another user" do
  248. followed = insert(:user)
  249. user = insert(:user)
  250. {:ok, user} = User.follow(user, followed, "accept")
  251. assert User.following(user) == [user.follower_address, followed.follower_address]
  252. {:ok, user, _activity} = User.unfollow(user, followed)
  253. assert User.following(user) == [user.follower_address]
  254. end
  255. test "unfollow doesn't unfollow yourself" do
  256. user = insert(:user)
  257. {:error, _} = User.unfollow(user, user)
  258. assert User.following(user) == [user.follower_address]
  259. end
  260. end
  261. test "test if a user is following another user" do
  262. followed = insert(:user)
  263. user = insert(:user)
  264. User.follow(user, followed, "accept")
  265. assert User.following?(user, followed)
  266. refute User.following?(followed, user)
  267. end
  268. test "fetches correct profile for nickname beginning with number" do
  269. # Use old-style integer ID to try to reproduce the problem
  270. user = insert(:user, %{id: 1080})
  271. user_with_numbers = insert(:user, %{nickname: "#{user.id}garbage"})
  272. assert user_with_numbers == User.get_cached_by_nickname_or_id(user_with_numbers.nickname)
  273. end
  274. describe "user registration" do
  275. @full_user_data %{
  276. bio: "A guy",
  277. name: "my name",
  278. nickname: "nick",
  279. password: "test",
  280. password_confirmation: "test",
  281. email: "email@example.com"
  282. }
  283. clear_config([:instance, :autofollowed_nicknames])
  284. clear_config([:instance, :welcome_message])
  285. clear_config([:instance, :welcome_user_nickname])
  286. test "it autofollows accounts that are set for it" do
  287. user = insert(:user)
  288. remote_user = insert(:user, %{local: false})
  289. Pleroma.Config.put([:instance, :autofollowed_nicknames], [
  290. user.nickname,
  291. remote_user.nickname
  292. ])
  293. cng = User.register_changeset(%User{}, @full_user_data)
  294. {:ok, registered_user} = User.register(cng)
  295. assert User.following?(registered_user, user)
  296. refute User.following?(registered_user, remote_user)
  297. end
  298. test "it sends a welcome message if it is set" do
  299. welcome_user = insert(:user)
  300. Pleroma.Config.put([:instance, :welcome_user_nickname], welcome_user.nickname)
  301. Pleroma.Config.put([:instance, :welcome_message], "Hello, this is a cool site")
  302. cng = User.register_changeset(%User{}, @full_user_data)
  303. {:ok, registered_user} = User.register(cng)
  304. activity = Repo.one(Pleroma.Activity)
  305. assert registered_user.ap_id in activity.recipients
  306. assert Object.normalize(activity).data["content"] =~ "cool site"
  307. assert activity.actor == welcome_user.ap_id
  308. end
  309. test "it requires an email, name, nickname and password, bio is optional" do
  310. @full_user_data
  311. |> Map.keys()
  312. |> Enum.each(fn key ->
  313. params = Map.delete(@full_user_data, key)
  314. changeset = User.register_changeset(%User{}, params)
  315. assert if key == :bio, do: changeset.valid?, else: not changeset.valid?
  316. end)
  317. end
  318. test "it restricts certain nicknames" do
  319. [restricted_name | _] = Pleroma.Config.get([User, :restricted_nicknames])
  320. assert is_bitstring(restricted_name)
  321. params =
  322. @full_user_data
  323. |> Map.put(:nickname, restricted_name)
  324. changeset = User.register_changeset(%User{}, params)
  325. refute changeset.valid?
  326. end
  327. test "it sets the password_hash and ap_id" do
  328. changeset = User.register_changeset(%User{}, @full_user_data)
  329. assert changeset.valid?
  330. assert is_binary(changeset.changes[:password_hash])
  331. assert changeset.changes[:ap_id] == User.ap_id(%User{nickname: @full_user_data.nickname})
  332. assert changeset.changes.follower_address == "#{changeset.changes.ap_id}/followers"
  333. end
  334. end
  335. describe "user registration, with :account_activation_required" do
  336. @full_user_data %{
  337. bio: "A guy",
  338. name: "my name",
  339. nickname: "nick",
  340. password: "test",
  341. password_confirmation: "test",
  342. email: "email@example.com"
  343. }
  344. clear_config([:instance, :account_activation_required]) do
  345. Pleroma.Config.put([:instance, :account_activation_required], true)
  346. end
  347. test "it creates unconfirmed user" do
  348. changeset = User.register_changeset(%User{}, @full_user_data)
  349. assert changeset.valid?
  350. {:ok, user} = Repo.insert(changeset)
  351. assert user.confirmation_pending
  352. assert user.confirmation_token
  353. end
  354. test "it creates confirmed user if :confirmed option is given" do
  355. changeset = User.register_changeset(%User{}, @full_user_data, need_confirmation: false)
  356. assert changeset.valid?
  357. {:ok, user} = Repo.insert(changeset)
  358. refute user.confirmation_pending
  359. refute user.confirmation_token
  360. end
  361. end
  362. describe "get_or_fetch/1" do
  363. test "gets an existing user by nickname" do
  364. user = insert(:user)
  365. {:ok, fetched_user} = User.get_or_fetch(user.nickname)
  366. assert user == fetched_user
  367. end
  368. test "gets an existing user by ap_id" do
  369. ap_id = "http://mastodon.example.org/users/admin"
  370. user =
  371. insert(
  372. :user,
  373. local: false,
  374. nickname: "admin@mastodon.example.org",
  375. ap_id: ap_id
  376. )
  377. {:ok, fetched_user} = User.get_or_fetch(ap_id)
  378. freshed_user = refresh_record(user)
  379. assert freshed_user == fetched_user
  380. end
  381. end
  382. describe "fetching a user from nickname or trying to build one" do
  383. test "gets an existing user" do
  384. user = insert(:user)
  385. {:ok, fetched_user} = User.get_or_fetch_by_nickname(user.nickname)
  386. assert user == fetched_user
  387. end
  388. test "gets an existing user, case insensitive" do
  389. user = insert(:user, nickname: "nick")
  390. {:ok, fetched_user} = User.get_or_fetch_by_nickname("NICK")
  391. assert user == fetched_user
  392. end
  393. test "gets an existing user by fully qualified nickname" do
  394. user = insert(:user)
  395. {:ok, fetched_user} =
  396. User.get_or_fetch_by_nickname(user.nickname <> "@" <> Pleroma.Web.Endpoint.host())
  397. assert user == fetched_user
  398. end
  399. test "gets an existing user by fully qualified nickname, case insensitive" do
  400. user = insert(:user, nickname: "nick")
  401. casing_altered_fqn = String.upcase(user.nickname <> "@" <> Pleroma.Web.Endpoint.host())
  402. {:ok, fetched_user} = User.get_or_fetch_by_nickname(casing_altered_fqn)
  403. assert user == fetched_user
  404. end
  405. test "returns nil if no user could be fetched" do
  406. {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant@social.heldscal.la")
  407. assert fetched_user == "not found nonexistant@social.heldscal.la"
  408. end
  409. test "returns nil for nonexistant local user" do
  410. {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant")
  411. assert fetched_user == "not found nonexistant"
  412. end
  413. test "updates an existing user, if stale" do
  414. a_week_ago = NaiveDateTime.add(NaiveDateTime.utc_now(), -604_800)
  415. orig_user =
  416. insert(
  417. :user,
  418. local: false,
  419. nickname: "admin@mastodon.example.org",
  420. ap_id: "http://mastodon.example.org/users/admin",
  421. last_refreshed_at: a_week_ago
  422. )
  423. assert orig_user.last_refreshed_at == a_week_ago
  424. {:ok, user} = User.get_or_fetch_by_ap_id("http://mastodon.example.org/users/admin")
  425. assert user.source_data["endpoints"]
  426. refute user.last_refreshed_at == orig_user.last_refreshed_at
  427. end
  428. end
  429. test "returns an ap_id for a user" do
  430. user = insert(:user)
  431. assert User.ap_id(user) ==
  432. Pleroma.Web.Router.Helpers.user_feed_url(
  433. Pleroma.Web.Endpoint,
  434. :feed_redirect,
  435. user.nickname
  436. )
  437. end
  438. test "returns an ap_followers link for a user" do
  439. user = insert(:user)
  440. assert User.ap_followers(user) ==
  441. Pleroma.Web.Router.Helpers.user_feed_url(
  442. Pleroma.Web.Endpoint,
  443. :feed_redirect,
  444. user.nickname
  445. ) <> "/followers"
  446. end
  447. describe "remote user creation changeset" do
  448. @valid_remote %{
  449. bio: "hello",
  450. name: "Someone",
  451. nickname: "a@b.de",
  452. ap_id: "http...",
  453. avatar: %{some: "avatar"}
  454. }
  455. clear_config([:instance, :user_bio_length])
  456. clear_config([:instance, :user_name_length])
  457. test "it confirms validity" do
  458. cs = User.remote_user_creation(@valid_remote)
  459. assert cs.valid?
  460. end
  461. test "it sets the follower_adress" do
  462. cs = User.remote_user_creation(@valid_remote)
  463. # remote users get a fake local follower address
  464. assert cs.changes.follower_address ==
  465. User.ap_followers(%User{nickname: @valid_remote[:nickname]})
  466. end
  467. test "it enforces the fqn format for nicknames" do
  468. cs = User.remote_user_creation(%{@valid_remote | nickname: "bla"})
  469. assert Ecto.Changeset.get_field(cs, :local) == false
  470. assert cs.changes.avatar
  471. refute cs.valid?
  472. end
  473. test "it has required fields" do
  474. [:name, :ap_id]
  475. |> Enum.each(fn field ->
  476. cs = User.remote_user_creation(Map.delete(@valid_remote, field))
  477. refute cs.valid?
  478. end)
  479. end
  480. end
  481. describe "followers and friends" do
  482. test "gets all followers for a given user" do
  483. user = insert(:user)
  484. follower_one = insert(:user)
  485. follower_two = insert(:user)
  486. not_follower = insert(:user)
  487. {:ok, follower_one} = User.follow(follower_one, user)
  488. {:ok, follower_two} = User.follow(follower_two, user)
  489. res = User.get_followers(user)
  490. assert Enum.member?(res, follower_one)
  491. assert Enum.member?(res, follower_two)
  492. refute Enum.member?(res, not_follower)
  493. end
  494. test "gets all friends (followed users) for a given user" do
  495. user = insert(:user)
  496. followed_one = insert(:user)
  497. followed_two = insert(:user)
  498. not_followed = insert(:user)
  499. {:ok, user} = User.follow(user, followed_one)
  500. {:ok, user} = User.follow(user, followed_two)
  501. res = User.get_friends(user)
  502. followed_one = User.get_cached_by_ap_id(followed_one.ap_id)
  503. followed_two = User.get_cached_by_ap_id(followed_two.ap_id)
  504. assert Enum.member?(res, followed_one)
  505. assert Enum.member?(res, followed_two)
  506. refute Enum.member?(res, not_followed)
  507. end
  508. end
  509. describe "updating note and follower count" do
  510. test "it sets the note_count property" do
  511. note = insert(:note)
  512. user = User.get_cached_by_ap_id(note.data["actor"])
  513. assert user.note_count == 0
  514. {:ok, user} = User.update_note_count(user)
  515. assert user.note_count == 1
  516. end
  517. test "it increases the note_count property" do
  518. note = insert(:note)
  519. user = User.get_cached_by_ap_id(note.data["actor"])
  520. assert user.note_count == 0
  521. {:ok, user} = User.increase_note_count(user)
  522. assert user.note_count == 1
  523. {:ok, user} = User.increase_note_count(user)
  524. assert user.note_count == 2
  525. end
  526. test "it decreases the note_count property" do
  527. note = insert(:note)
  528. user = User.get_cached_by_ap_id(note.data["actor"])
  529. assert user.note_count == 0
  530. {:ok, user} = User.increase_note_count(user)
  531. assert user.note_count == 1
  532. {:ok, user} = User.decrease_note_count(user)
  533. assert user.note_count == 0
  534. {:ok, user} = User.decrease_note_count(user)
  535. assert user.note_count == 0
  536. end
  537. test "it sets the follower_count property" do
  538. user = insert(:user)
  539. follower = insert(:user)
  540. User.follow(follower, user)
  541. assert user.follower_count == 0
  542. {:ok, user} = User.update_follower_count(user)
  543. assert user.follower_count == 1
  544. end
  545. end
  546. describe "follow_import" do
  547. test "it imports user followings from list" do
  548. [user1, user2, user3] = insert_list(3, :user)
  549. identifiers = [
  550. user2.ap_id,
  551. user3.nickname
  552. ]
  553. {:ok, job} = User.follow_import(user1, identifiers)
  554. result = ObanHelpers.perform(job)
  555. assert is_list(result)
  556. assert result == [user2, user3]
  557. end
  558. end
  559. describe "mutes" do
  560. test "it mutes people" do
  561. user = insert(:user)
  562. muted_user = insert(:user)
  563. refute User.mutes?(user, muted_user)
  564. refute User.muted_notifications?(user, muted_user)
  565. {:ok, _user_relationships} = User.mute(user, muted_user)
  566. assert User.mutes?(user, muted_user)
  567. assert User.muted_notifications?(user, muted_user)
  568. end
  569. test "it unmutes users" do
  570. user = insert(:user)
  571. muted_user = insert(:user)
  572. {:ok, _user_relationships} = User.mute(user, muted_user)
  573. {:ok, _user_mute} = User.unmute(user, muted_user)
  574. refute User.mutes?(user, muted_user)
  575. refute User.muted_notifications?(user, muted_user)
  576. end
  577. test "it mutes user without notifications" do
  578. user = insert(:user)
  579. muted_user = insert(:user)
  580. refute User.mutes?(user, muted_user)
  581. refute User.muted_notifications?(user, muted_user)
  582. {:ok, _user_relationships} = User.mute(user, muted_user, false)
  583. assert User.mutes?(user, muted_user)
  584. refute User.muted_notifications?(user, muted_user)
  585. end
  586. end
  587. describe "blocks" do
  588. test "it blocks people" do
  589. user = insert(:user)
  590. blocked_user = insert(:user)
  591. refute User.blocks?(user, blocked_user)
  592. {:ok, _user_relationship} = User.block(user, blocked_user)
  593. assert User.blocks?(user, blocked_user)
  594. end
  595. test "it unblocks users" do
  596. user = insert(:user)
  597. blocked_user = insert(:user)
  598. {:ok, _user_relationship} = User.block(user, blocked_user)
  599. {:ok, _user_block} = User.unblock(user, blocked_user)
  600. refute User.blocks?(user, blocked_user)
  601. end
  602. test "blocks tear down cyclical follow relationships" do
  603. blocker = insert(:user)
  604. blocked = insert(:user)
  605. {:ok, blocker} = User.follow(blocker, blocked)
  606. {:ok, blocked} = User.follow(blocked, blocker)
  607. assert User.following?(blocker, blocked)
  608. assert User.following?(blocked, blocker)
  609. {:ok, _user_relationship} = User.block(blocker, blocked)
  610. blocked = User.get_cached_by_id(blocked.id)
  611. assert User.blocks?(blocker, blocked)
  612. refute User.following?(blocker, blocked)
  613. refute User.following?(blocked, blocker)
  614. end
  615. test "blocks tear down blocker->blocked follow relationships" do
  616. blocker = insert(:user)
  617. blocked = insert(:user)
  618. {:ok, blocker} = User.follow(blocker, blocked)
  619. assert User.following?(blocker, blocked)
  620. refute User.following?(blocked, blocker)
  621. {:ok, _user_relationship} = User.block(blocker, blocked)
  622. blocked = User.get_cached_by_id(blocked.id)
  623. assert User.blocks?(blocker, blocked)
  624. refute User.following?(blocker, blocked)
  625. refute User.following?(blocked, blocker)
  626. end
  627. test "blocks tear down blocked->blocker follow relationships" do
  628. blocker = insert(:user)
  629. blocked = insert(:user)
  630. {:ok, blocked} = User.follow(blocked, blocker)
  631. refute User.following?(blocker, blocked)
  632. assert User.following?(blocked, blocker)
  633. {:ok, _user_relationship} = User.block(blocker, blocked)
  634. blocked = User.get_cached_by_id(blocked.id)
  635. assert User.blocks?(blocker, blocked)
  636. refute User.following?(blocker, blocked)
  637. refute User.following?(blocked, blocker)
  638. end
  639. test "blocks tear down blocked->blocker subscription relationships" do
  640. blocker = insert(:user)
  641. blocked = insert(:user)
  642. {:ok, _subscription} = User.subscribe(blocked, blocker)
  643. assert User.subscribed_to?(blocked, blocker)
  644. refute User.subscribed_to?(blocker, blocked)
  645. {:ok, _user_relationship} = User.block(blocker, blocked)
  646. assert User.blocks?(blocker, blocked)
  647. refute User.subscribed_to?(blocker, blocked)
  648. refute User.subscribed_to?(blocked, blocker)
  649. end
  650. end
  651. describe "domain blocking" do
  652. test "blocks domains" do
  653. user = insert(:user)
  654. collateral_user = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  655. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  656. assert User.blocks?(user, collateral_user)
  657. end
  658. test "does not block domain with same end" do
  659. user = insert(:user)
  660. collateral_user =
  661. insert(:user, %{ap_id: "https://another-awful-and-rude-instance.com/user/bully"})
  662. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  663. refute User.blocks?(user, collateral_user)
  664. end
  665. test "does not block domain with same end if wildcard added" do
  666. user = insert(:user)
  667. collateral_user =
  668. insert(:user, %{ap_id: "https://another-awful-and-rude-instance.com/user/bully"})
  669. {:ok, user} = User.block_domain(user, "*.awful-and-rude-instance.com")
  670. refute User.blocks?(user, collateral_user)
  671. end
  672. test "blocks domain with wildcard for subdomain" do
  673. user = insert(:user)
  674. user_from_subdomain =
  675. insert(:user, %{ap_id: "https://subdomain.awful-and-rude-instance.com/user/bully"})
  676. user_with_two_subdomains =
  677. insert(:user, %{
  678. ap_id: "https://subdomain.second_subdomain.awful-and-rude-instance.com/user/bully"
  679. })
  680. user_domain = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  681. {:ok, user} = User.block_domain(user, "*.awful-and-rude-instance.com")
  682. assert User.blocks?(user, user_from_subdomain)
  683. assert User.blocks?(user, user_with_two_subdomains)
  684. assert User.blocks?(user, user_domain)
  685. end
  686. test "unblocks domains" do
  687. user = insert(:user)
  688. collateral_user = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  689. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  690. {:ok, user} = User.unblock_domain(user, "awful-and-rude-instance.com")
  691. refute User.blocks?(user, collateral_user)
  692. end
  693. test "follows take precedence over domain blocks" do
  694. user = insert(:user)
  695. good_eggo = insert(:user, %{ap_id: "https://meanies.social/user/cuteposter"})
  696. {:ok, user} = User.block_domain(user, "meanies.social")
  697. {:ok, user} = User.follow(user, good_eggo)
  698. refute User.blocks?(user, good_eggo)
  699. end
  700. end
  701. describe "blocks_import" do
  702. test "it imports user blocks from list" do
  703. [user1, user2, user3] = insert_list(3, :user)
  704. identifiers = [
  705. user2.ap_id,
  706. user3.nickname
  707. ]
  708. {:ok, job} = User.blocks_import(user1, identifiers)
  709. result = ObanHelpers.perform(job)
  710. assert is_list(result)
  711. assert result == [user2, user3]
  712. end
  713. end
  714. describe "get_recipients_from_activity" do
  715. test "get recipients" do
  716. actor = insert(:user)
  717. user = insert(:user, local: true)
  718. user_two = insert(:user, local: false)
  719. addressed = insert(:user, local: true)
  720. addressed_remote = insert(:user, local: false)
  721. {:ok, activity} =
  722. CommonAPI.post(actor, %{
  723. "status" => "hey @#{addressed.nickname} @#{addressed_remote.nickname}"
  724. })
  725. assert Enum.map([actor, addressed], & &1.ap_id) --
  726. Enum.map(User.get_recipients_from_activity(activity), & &1.ap_id) == []
  727. {:ok, user} = User.follow(user, actor)
  728. {:ok, _user_two} = User.follow(user_two, actor)
  729. recipients = User.get_recipients_from_activity(activity)
  730. assert length(recipients) == 3
  731. assert user in recipients
  732. assert addressed in recipients
  733. end
  734. test "has following" do
  735. actor = insert(:user)
  736. user = insert(:user)
  737. user_two = insert(:user)
  738. addressed = insert(:user, local: true)
  739. {:ok, activity} =
  740. CommonAPI.post(actor, %{
  741. "status" => "hey @#{addressed.nickname}"
  742. })
  743. assert Enum.map([actor, addressed], & &1.ap_id) --
  744. Enum.map(User.get_recipients_from_activity(activity), & &1.ap_id) == []
  745. {:ok, _actor} = User.follow(actor, user)
  746. {:ok, _actor} = User.follow(actor, user_two)
  747. recipients = User.get_recipients_from_activity(activity)
  748. assert length(recipients) == 2
  749. assert addressed in recipients
  750. end
  751. end
  752. describe ".deactivate" do
  753. test "can de-activate then re-activate a user" do
  754. user = insert(:user)
  755. assert false == user.deactivated
  756. {:ok, user} = User.deactivate(user)
  757. assert true == user.deactivated
  758. {:ok, user} = User.deactivate(user, false)
  759. assert false == user.deactivated
  760. end
  761. test "hide a user from followers" do
  762. user = insert(:user)
  763. user2 = insert(:user)
  764. {:ok, user} = User.follow(user, user2)
  765. {:ok, _user} = User.deactivate(user)
  766. user2 = User.get_cached_by_id(user2.id)
  767. assert user2.follower_count == 0
  768. assert [] = User.get_followers(user2)
  769. end
  770. test "hide a user from friends" do
  771. user = insert(:user)
  772. user2 = insert(:user)
  773. {:ok, user2} = User.follow(user2, user)
  774. assert user2.following_count == 1
  775. assert User.following_count(user2) == 1
  776. {:ok, _user} = User.deactivate(user)
  777. user2 = User.get_cached_by_id(user2.id)
  778. assert refresh_record(user2).following_count == 0
  779. assert user2.following_count == 0
  780. assert User.following_count(user2) == 0
  781. assert [] = User.get_friends(user2)
  782. end
  783. test "hide a user's statuses from timelines and notifications" do
  784. user = insert(:user)
  785. user2 = insert(:user)
  786. {:ok, user2} = User.follow(user2, user)
  787. {:ok, activity} = CommonAPI.post(user, %{"status" => "hey @#{user2.nickname}"})
  788. activity = Repo.preload(activity, :bookmark)
  789. [notification] = Pleroma.Notification.for_user(user2)
  790. assert notification.activity.id == activity.id
  791. assert [activity] == ActivityPub.fetch_public_activities(%{}) |> Repo.preload(:bookmark)
  792. assert [%{activity | thread_muted?: CommonAPI.thread_muted?(user2, activity)}] ==
  793. ActivityPub.fetch_activities([user2.ap_id | User.following(user2)], %{
  794. "user" => user2
  795. })
  796. {:ok, _user} = User.deactivate(user)
  797. assert [] == ActivityPub.fetch_public_activities(%{})
  798. assert [] == Pleroma.Notification.for_user(user2)
  799. assert [] ==
  800. ActivityPub.fetch_activities([user2.ap_id | User.following(user2)], %{
  801. "user" => user2
  802. })
  803. end
  804. end
  805. describe "delete" do
  806. setup do
  807. {:ok, user} = insert(:user) |> User.set_cache()
  808. [user: user]
  809. end
  810. clear_config([:instance, :federating])
  811. test ".delete_user_activities deletes all create activities", %{user: user} do
  812. {:ok, activity} = CommonAPI.post(user, %{"status" => "2hu"})
  813. User.delete_user_activities(user)
  814. # TODO: Remove favorites, repeats, delete activities.
  815. refute Activity.get_by_id(activity.id)
  816. end
  817. test "it deletes deactivated user" do
  818. {:ok, user} = insert(:user, deactivated: true) |> User.set_cache()
  819. {:ok, job} = User.delete(user)
  820. {:ok, _user} = ObanHelpers.perform(job)
  821. refute User.get_by_id(user.id)
  822. end
  823. test "it deletes a user, all follow relationships and all activities", %{user: user} do
  824. follower = insert(:user)
  825. {:ok, follower} = User.follow(follower, user)
  826. object = insert(:note, user: user)
  827. activity = insert(:note_activity, user: user, note: object)
  828. object_two = insert(:note, user: follower)
  829. activity_two = insert(:note_activity, user: follower, note: object_two)
  830. {:ok, like, _} = CommonAPI.favorite(activity_two.id, user)
  831. {:ok, like_two, _} = CommonAPI.favorite(activity.id, follower)
  832. {:ok, repeat, _} = CommonAPI.repeat(activity_two.id, user)
  833. {:ok, job} = User.delete(user)
  834. {:ok, _user} = ObanHelpers.perform(job)
  835. follower = User.get_cached_by_id(follower.id)
  836. refute User.following?(follower, user)
  837. refute User.get_by_id(user.id)
  838. assert {:ok, nil} == Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  839. user_activities =
  840. user.ap_id
  841. |> Activity.Queries.by_actor()
  842. |> Repo.all()
  843. |> Enum.map(fn act -> act.data["type"] end)
  844. assert Enum.all?(user_activities, fn act -> act in ~w(Delete Undo) end)
  845. refute Activity.get_by_id(activity.id)
  846. refute Activity.get_by_id(like.id)
  847. refute Activity.get_by_id(like_two.id)
  848. refute Activity.get_by_id(repeat.id)
  849. end
  850. test_with_mock "it sends out User Delete activity",
  851. %{user: user},
  852. Pleroma.Web.ActivityPub.Publisher,
  853. [:passthrough],
  854. [] do
  855. Pleroma.Config.put([:instance, :federating], true)
  856. {:ok, follower} = User.get_or_fetch_by_ap_id("http://mastodon.example.org/users/admin")
  857. {:ok, _} = User.follow(follower, user)
  858. {:ok, job} = User.delete(user)
  859. {:ok, _user} = ObanHelpers.perform(job)
  860. assert ObanHelpers.member?(
  861. %{
  862. "op" => "publish_one",
  863. "params" => %{
  864. "inbox" => "http://mastodon.example.org/inbox",
  865. "id" => "pleroma:fakeid"
  866. }
  867. },
  868. all_enqueued(worker: Pleroma.Workers.PublisherWorker)
  869. )
  870. end
  871. end
  872. test "get_public_key_for_ap_id fetches a user that's not in the db" do
  873. assert {:ok, _key} = User.get_public_key_for_ap_id("http://mastodon.example.org/users/admin")
  874. end
  875. describe "insert or update a user from given data" do
  876. test "with normal data" do
  877. user = insert(:user, %{nickname: "nick@name.de"})
  878. data = %{ap_id: user.ap_id <> "xxx", name: user.name, nickname: user.nickname}
  879. assert {:ok, %User{}} = User.insert_or_update_user(data)
  880. end
  881. test "with overly long fields" do
  882. current_max_length = Pleroma.Config.get([:instance, :account_field_value_length], 255)
  883. user = insert(:user, nickname: "nickname@supergood.domain")
  884. data = %{
  885. ap_id: user.ap_id,
  886. name: user.name,
  887. nickname: user.nickname,
  888. fields: [
  889. %{"name" => "myfield", "value" => String.duplicate("h", current_max_length + 1)}
  890. ]
  891. }
  892. assert {:ok, %User{}} = User.insert_or_update_user(data)
  893. end
  894. test "with an overly long bio" do
  895. current_max_length = Pleroma.Config.get([:instance, :user_bio_length], 5000)
  896. user = insert(:user, nickname: "nickname@supergood.domain")
  897. data = %{
  898. ap_id: user.ap_id,
  899. name: user.name,
  900. nickname: user.nickname,
  901. bio: String.duplicate("h", current_max_length + 1)
  902. }
  903. assert {:ok, %User{}} = User.insert_or_update_user(data)
  904. end
  905. test "with an overly long display name" do
  906. current_max_length = Pleroma.Config.get([:instance, :user_name_length], 100)
  907. user = insert(:user, nickname: "nickname@supergood.domain")
  908. data = %{
  909. ap_id: user.ap_id,
  910. name: String.duplicate("h", current_max_length + 1),
  911. nickname: user.nickname
  912. }
  913. assert {:ok, %User{}} = User.insert_or_update_user(data)
  914. end
  915. end
  916. describe "per-user rich-text filtering" do
  917. test "html_filter_policy returns default policies, when rich-text is enabled" do
  918. user = insert(:user)
  919. assert Pleroma.Config.get([:markup, :scrub_policy]) == User.html_filter_policy(user)
  920. end
  921. test "html_filter_policy returns TwitterText scrubber when rich-text is disabled" do
  922. user = insert(:user, no_rich_text: true)
  923. assert Pleroma.HTML.Scrubber.TwitterText == User.html_filter_policy(user)
  924. end
  925. end
  926. describe "caching" do
  927. test "invalidate_cache works" do
  928. user = insert(:user)
  929. User.set_cache(user)
  930. User.invalidate_cache(user)
  931. {:ok, nil} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  932. {:ok, nil} = Cachex.get(:user_cache, "nickname:#{user.nickname}")
  933. end
  934. test "User.delete() plugs any possible zombie objects" do
  935. user = insert(:user)
  936. {:ok, job} = User.delete(user)
  937. {:ok, _} = ObanHelpers.perform(job)
  938. {:ok, cached_user} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  939. assert cached_user != user
  940. {:ok, cached_user} = Cachex.get(:user_cache, "nickname:#{user.ap_id}")
  941. assert cached_user != user
  942. end
  943. end
  944. describe "account_status/1" do
  945. clear_config([:instance, :account_activation_required])
  946. test "return confirmation_pending for unconfirm user" do
  947. Pleroma.Config.put([:instance, :account_activation_required], true)
  948. user = insert(:user, confirmation_pending: true)
  949. assert User.account_status(user) == :confirmation_pending
  950. end
  951. test "return active for confirmed user" do
  952. Pleroma.Config.put([:instance, :account_activation_required], true)
  953. user = insert(:user, confirmation_pending: false)
  954. assert User.account_status(user) == :active
  955. end
  956. test "return active for remote user" do
  957. user = insert(:user, local: false)
  958. assert User.account_status(user) == :active
  959. end
  960. test "returns :password_reset_pending for user with reset password" do
  961. user = insert(:user, password_reset_pending: true)
  962. assert User.account_status(user) == :password_reset_pending
  963. end
  964. test "returns :deactivated for deactivated user" do
  965. user = insert(:user, local: true, confirmation_pending: false, deactivated: true)
  966. assert User.account_status(user) == :deactivated
  967. end
  968. end
  969. describe "superuser?/1" do
  970. test "returns false for unprivileged users" do
  971. user = insert(:user, local: true)
  972. refute User.superuser?(user)
  973. end
  974. test "returns false for remote users" do
  975. user = insert(:user, local: false)
  976. remote_admin_user = insert(:user, local: false, is_admin: true)
  977. refute User.superuser?(user)
  978. refute User.superuser?(remote_admin_user)
  979. end
  980. test "returns true for local moderators" do
  981. user = insert(:user, local: true, is_moderator: true)
  982. assert User.superuser?(user)
  983. end
  984. test "returns true for local admins" do
  985. user = insert(:user, local: true, is_admin: true)
  986. assert User.superuser?(user)
  987. end
  988. end
  989. describe "invisible?/1" do
  990. test "returns true for an invisible user" do
  991. user = insert(:user, local: true, invisible: true)
  992. assert User.invisible?(user)
  993. end
  994. test "returns false for a non-invisible user" do
  995. user = insert(:user, local: true)
  996. refute User.invisible?(user)
  997. end
  998. end
  999. describe "visible_for?/2" do
  1000. test "returns true when the account is itself" do
  1001. user = insert(:user, local: true)
  1002. assert User.visible_for?(user, user)
  1003. end
  1004. test "returns false when the account is unauthenticated and auth is required" do
  1005. Pleroma.Config.put([:instance, :account_activation_required], true)
  1006. user = insert(:user, local: true, confirmation_pending: true)
  1007. other_user = insert(:user, local: true)
  1008. refute User.visible_for?(user, other_user)
  1009. end
  1010. test "returns true when the account is unauthenticated and auth is not required" do
  1011. user = insert(:user, local: true, confirmation_pending: true)
  1012. other_user = insert(:user, local: true)
  1013. assert User.visible_for?(user, other_user)
  1014. end
  1015. test "returns true when the account is unauthenticated and being viewed by a privileged account (auth required)" do
  1016. Pleroma.Config.put([:instance, :account_activation_required], true)
  1017. user = insert(:user, local: true, confirmation_pending: true)
  1018. other_user = insert(:user, local: true, is_admin: true)
  1019. assert User.visible_for?(user, other_user)
  1020. end
  1021. end
  1022. describe "parse_bio/2" do
  1023. test "preserves hosts in user links text" do
  1024. remote_user = insert(:user, local: false, nickname: "nick@domain.com")
  1025. user = insert(:user)
  1026. bio = "A.k.a. @nick@domain.com"
  1027. expected_text =
  1028. ~s(A.k.a. <span class="h-card"><a data-user="#{remote_user.id}" class="u-url mention" href="#{
  1029. remote_user.ap_id
  1030. }" rel="ugc">@<span>nick@domain.com</span></a></span>)
  1031. assert expected_text == User.parse_bio(bio, user)
  1032. end
  1033. test "Adds rel=me on linkbacked urls" do
  1034. user = insert(:user, ap_id: "https://social.example.org/users/lain")
  1035. bio = "http://example.com/rel_me/null"
  1036. expected_text = "<a href=\"#{bio}\">#{bio}</a>"
  1037. assert expected_text == User.parse_bio(bio, user)
  1038. bio = "http://example.com/rel_me/link"
  1039. expected_text = "<a href=\"#{bio}\" rel=\"me\">#{bio}</a>"
  1040. assert expected_text == User.parse_bio(bio, user)
  1041. bio = "http://example.com/rel_me/anchor"
  1042. expected_text = "<a href=\"#{bio}\" rel=\"me\">#{bio}</a>"
  1043. assert expected_text == User.parse_bio(bio, user)
  1044. end
  1045. end
  1046. test "follower count is updated when a follower is blocked" do
  1047. user = insert(:user)
  1048. follower = insert(:user)
  1049. follower2 = insert(:user)
  1050. follower3 = insert(:user)
  1051. {:ok, follower} = User.follow(follower, user)
  1052. {:ok, _follower2} = User.follow(follower2, user)
  1053. {:ok, _follower3} = User.follow(follower3, user)
  1054. {:ok, _user_relationship} = User.block(user, follower)
  1055. user = refresh_record(user)
  1056. assert user.follower_count == 2
  1057. end
  1058. describe "list_inactive_users_query/1" do
  1059. defp days_ago(days) do
  1060. NaiveDateTime.add(
  1061. NaiveDateTime.truncate(NaiveDateTime.utc_now(), :second),
  1062. -days * 60 * 60 * 24,
  1063. :second
  1064. )
  1065. end
  1066. test "Users are inactive by default" do
  1067. total = 10
  1068. users =
  1069. Enum.map(1..total, fn _ ->
  1070. insert(:user, last_digest_emailed_at: days_ago(20), deactivated: false)
  1071. end)
  1072. inactive_users_ids =
  1073. Pleroma.User.list_inactive_users_query()
  1074. |> Pleroma.Repo.all()
  1075. |> Enum.map(& &1.id)
  1076. Enum.each(users, fn user ->
  1077. assert user.id in inactive_users_ids
  1078. end)
  1079. end
  1080. test "Only includes users who has no recent activity" do
  1081. total = 10
  1082. users =
  1083. Enum.map(1..total, fn _ ->
  1084. insert(:user, last_digest_emailed_at: days_ago(20), deactivated: false)
  1085. end)
  1086. {inactive, active} = Enum.split(users, trunc(total / 2))
  1087. Enum.map(active, fn user ->
  1088. to = Enum.random(users -- [user])
  1089. {:ok, _} =
  1090. CommonAPI.post(user, %{
  1091. "status" => "hey @#{to.nickname}"
  1092. })
  1093. end)
  1094. inactive_users_ids =
  1095. Pleroma.User.list_inactive_users_query()
  1096. |> Pleroma.Repo.all()
  1097. |> Enum.map(& &1.id)
  1098. Enum.each(active, fn user ->
  1099. refute user.id in inactive_users_ids
  1100. end)
  1101. Enum.each(inactive, fn user ->
  1102. assert user.id in inactive_users_ids
  1103. end)
  1104. end
  1105. test "Only includes users with no read notifications" do
  1106. total = 10
  1107. users =
  1108. Enum.map(1..total, fn _ ->
  1109. insert(:user, last_digest_emailed_at: days_ago(20), deactivated: false)
  1110. end)
  1111. [sender | recipients] = users
  1112. {inactive, active} = Enum.split(recipients, trunc(total / 2))
  1113. Enum.each(recipients, fn to ->
  1114. {:ok, _} =
  1115. CommonAPI.post(sender, %{
  1116. "status" => "hey @#{to.nickname}"
  1117. })
  1118. {:ok, _} =
  1119. CommonAPI.post(sender, %{
  1120. "status" => "hey again @#{to.nickname}"
  1121. })
  1122. end)
  1123. Enum.each(active, fn user ->
  1124. [n1, _n2] = Pleroma.Notification.for_user(user)
  1125. {:ok, _} = Pleroma.Notification.read_one(user, n1.id)
  1126. end)
  1127. inactive_users_ids =
  1128. Pleroma.User.list_inactive_users_query()
  1129. |> Pleroma.Repo.all()
  1130. |> Enum.map(& &1.id)
  1131. Enum.each(active, fn user ->
  1132. refute user.id in inactive_users_ids
  1133. end)
  1134. Enum.each(inactive, fn user ->
  1135. assert user.id in inactive_users_ids
  1136. end)
  1137. end
  1138. end
  1139. describe "toggle_confirmation/1" do
  1140. test "if user is confirmed" do
  1141. user = insert(:user, confirmation_pending: false)
  1142. {:ok, user} = User.toggle_confirmation(user)
  1143. assert user.confirmation_pending
  1144. assert user.confirmation_token
  1145. end
  1146. test "if user is unconfirmed" do
  1147. user = insert(:user, confirmation_pending: true, confirmation_token: "some token")
  1148. {:ok, user} = User.toggle_confirmation(user)
  1149. refute user.confirmation_pending
  1150. refute user.confirmation_token
  1151. end
  1152. end
  1153. describe "ensure_keys_present" do
  1154. test "it creates keys for a user and stores them in info" do
  1155. user = insert(:user)
  1156. refute is_binary(user.keys)
  1157. {:ok, user} = User.ensure_keys_present(user)
  1158. assert is_binary(user.keys)
  1159. end
  1160. test "it doesn't create keys if there already are some" do
  1161. user = insert(:user, keys: "xxx")
  1162. {:ok, user} = User.ensure_keys_present(user)
  1163. assert user.keys == "xxx"
  1164. end
  1165. end
  1166. describe "get_ap_ids_by_nicknames" do
  1167. test "it returns a list of AP ids for a given set of nicknames" do
  1168. user = insert(:user)
  1169. user_two = insert(:user)
  1170. ap_ids = User.get_ap_ids_by_nicknames([user.nickname, user_two.nickname, "nonexistent"])
  1171. assert length(ap_ids) == 2
  1172. assert user.ap_id in ap_ids
  1173. assert user_two.ap_id in ap_ids
  1174. end
  1175. end
  1176. describe "sync followers count" do
  1177. setup do
  1178. user1 = insert(:user, local: false, ap_id: "http://localhost:4001/users/masto_closed")
  1179. user2 = insert(:user, local: false, ap_id: "http://localhost:4001/users/fuser2")
  1180. insert(:user, local: true)
  1181. insert(:user, local: false, deactivated: true)
  1182. {:ok, user1: user1, user2: user2}
  1183. end
  1184. test "external_users/1 external active users with limit", %{user1: user1, user2: user2} do
  1185. [fdb_user1] = User.external_users(limit: 1)
  1186. assert fdb_user1.ap_id
  1187. assert fdb_user1.ap_id == user1.ap_id
  1188. assert fdb_user1.id == user1.id
  1189. [fdb_user2] = User.external_users(max_id: fdb_user1.id, limit: 1)
  1190. assert fdb_user2.ap_id
  1191. assert fdb_user2.ap_id == user2.ap_id
  1192. assert fdb_user2.id == user2.id
  1193. assert User.external_users(max_id: fdb_user2.id, limit: 1) == []
  1194. end
  1195. end
  1196. describe "is_internal_user?/1" do
  1197. test "non-internal user returns false" do
  1198. user = insert(:user)
  1199. refute User.is_internal_user?(user)
  1200. end
  1201. test "user with no nickname returns true" do
  1202. user = insert(:user, %{nickname: nil})
  1203. assert User.is_internal_user?(user)
  1204. end
  1205. test "user with internal-prefixed nickname returns true" do
  1206. user = insert(:user, %{nickname: "internal.test"})
  1207. assert User.is_internal_user?(user)
  1208. end
  1209. end
  1210. describe "update_and_set_cache/1" do
  1211. test "returns error when user is stale instead Ecto.StaleEntryError" do
  1212. user = insert(:user)
  1213. changeset = Ecto.Changeset.change(user, bio: "test")
  1214. Repo.delete(user)
  1215. assert {:error, %Ecto.Changeset{errors: [id: {"is stale", [stale: true]}], valid?: false}} =
  1216. User.update_and_set_cache(changeset)
  1217. end
  1218. test "performs update cache if user updated" do
  1219. user = insert(:user)
  1220. assert {:ok, nil} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  1221. changeset = Ecto.Changeset.change(user, bio: "test-bio")
  1222. assert {:ok, %User{bio: "test-bio"} = user} = User.update_and_set_cache(changeset)
  1223. assert {:ok, user} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  1224. assert %User{bio: "test-bio"} = User.get_cached_by_ap_id(user.ap_id)
  1225. end
  1226. end
  1227. describe "following/followers synchronization" do
  1228. clear_config([:instance, :external_user_synchronization])
  1229. test "updates the counters normally on following/getting a follow when disabled" do
  1230. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1231. user = insert(:user)
  1232. other_user =
  1233. insert(:user,
  1234. local: false,
  1235. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1236. following_address: "http://localhost:4001/users/masto_closed/following",
  1237. ap_enabled: true
  1238. )
  1239. assert other_user.following_count == 0
  1240. assert other_user.follower_count == 0
  1241. {:ok, user} = Pleroma.User.follow(user, other_user)
  1242. other_user = Pleroma.User.get_by_id(other_user.id)
  1243. assert user.following_count == 1
  1244. assert other_user.follower_count == 1
  1245. end
  1246. test "syncronizes the counters with the remote instance for the followed when enabled" do
  1247. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1248. user = insert(:user)
  1249. other_user =
  1250. insert(:user,
  1251. local: false,
  1252. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1253. following_address: "http://localhost:4001/users/masto_closed/following",
  1254. ap_enabled: true
  1255. )
  1256. assert other_user.following_count == 0
  1257. assert other_user.follower_count == 0
  1258. Pleroma.Config.put([:instance, :external_user_synchronization], true)
  1259. {:ok, _user} = User.follow(user, other_user)
  1260. other_user = User.get_by_id(other_user.id)
  1261. assert other_user.follower_count == 437
  1262. end
  1263. test "syncronizes the counters with the remote instance for the follower when enabled" do
  1264. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1265. user = insert(:user)
  1266. other_user =
  1267. insert(:user,
  1268. local: false,
  1269. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1270. following_address: "http://localhost:4001/users/masto_closed/following",
  1271. ap_enabled: true
  1272. )
  1273. assert other_user.following_count == 0
  1274. assert other_user.follower_count == 0
  1275. Pleroma.Config.put([:instance, :external_user_synchronization], true)
  1276. {:ok, other_user} = User.follow(other_user, user)
  1277. assert other_user.following_count == 152
  1278. end
  1279. end
  1280. describe "change_email/2" do
  1281. setup do
  1282. [user: insert(:user)]
  1283. end
  1284. test "blank email returns error", %{user: user} do
  1285. assert {:error, %{errors: [email: {"can't be blank", _}]}} = User.change_email(user, "")
  1286. assert {:error, %{errors: [email: {"can't be blank", _}]}} = User.change_email(user, nil)
  1287. end
  1288. test "non unique email returns error", %{user: user} do
  1289. %{email: email} = insert(:user)
  1290. assert {:error, %{errors: [email: {"has already been taken", _}]}} =
  1291. User.change_email(user, email)
  1292. end
  1293. test "invalid email returns error", %{user: user} do
  1294. assert {:error, %{errors: [email: {"has invalid format", _}]}} =
  1295. User.change_email(user, "cofe")
  1296. end
  1297. test "changes email", %{user: user} do
  1298. assert {:ok, %User{email: "cofe@cofe.party"}} = User.change_email(user, "cofe@cofe.party")
  1299. end
  1300. end
  1301. describe "get_cached_by_nickname_or_id" do
  1302. setup do
  1303. local_user = insert(:user)
  1304. remote_user = insert(:user, nickname: "nickname@example.com", local: false)
  1305. [local_user: local_user, remote_user: remote_user]
  1306. end
  1307. clear_config([:instance, :limit_to_local_content])
  1308. test "allows getting remote users by id no matter what :limit_to_local_content is set to", %{
  1309. remote_user: remote_user
  1310. } do
  1311. Pleroma.Config.put([:instance, :limit_to_local_content], false)
  1312. assert %User{} = User.get_cached_by_nickname_or_id(remote_user.id)
  1313. Pleroma.Config.put([:instance, :limit_to_local_content], true)
  1314. assert %User{} = User.get_cached_by_nickname_or_id(remote_user.id)
  1315. Pleroma.Config.put([:instance, :limit_to_local_content], :unauthenticated)
  1316. assert %User{} = User.get_cached_by_nickname_or_id(remote_user.id)
  1317. end
  1318. test "disallows getting remote users by nickname without authentication when :limit_to_local_content is set to :unauthenticated",
  1319. %{remote_user: remote_user} do
  1320. Pleroma.Config.put([:instance, :limit_to_local_content], :unauthenticated)
  1321. assert nil == User.get_cached_by_nickname_or_id(remote_user.nickname)
  1322. end
  1323. test "allows getting remote users by nickname with authentication when :limit_to_local_content is set to :unauthenticated",
  1324. %{remote_user: remote_user, local_user: local_user} do
  1325. Pleroma.Config.put([:instance, :limit_to_local_content], :unauthenticated)
  1326. assert %User{} = User.get_cached_by_nickname_or_id(remote_user.nickname, for: local_user)
  1327. end
  1328. test "disallows getting remote users by nickname when :limit_to_local_content is set to true",
  1329. %{remote_user: remote_user} do
  1330. Pleroma.Config.put([:instance, :limit_to_local_content], true)
  1331. assert nil == User.get_cached_by_nickname_or_id(remote_user.nickname)
  1332. end
  1333. test "allows getting local users by nickname no matter what :limit_to_local_content is set to",
  1334. %{local_user: local_user} do
  1335. Pleroma.Config.put([:instance, :limit_to_local_content], false)
  1336. assert %User{} = User.get_cached_by_nickname_or_id(local_user.nickname)
  1337. Pleroma.Config.put([:instance, :limit_to_local_content], true)
  1338. assert %User{} = User.get_cached_by_nickname_or_id(local_user.nickname)
  1339. Pleroma.Config.put([:instance, :limit_to_local_content], :unauthenticated)
  1340. assert %User{} = User.get_cached_by_nickname_or_id(local_user.nickname)
  1341. end
  1342. end
  1343. describe "update_email_notifications/2" do
  1344. setup do
  1345. user = insert(:user, email_notifications: %{"digest" => true})
  1346. {:ok, user: user}
  1347. end
  1348. test "Notifications are updated", %{user: user} do
  1349. true = user.email_notifications["digest"]
  1350. assert {:ok, result} = User.update_email_notifications(user, %{"digest" => false})
  1351. assert result.email_notifications["digest"] == false
  1352. end
  1353. end
  1354. end