Fork of Pleroma with site-specific changes and feature branches https://git.pleroma.social/pleroma/pleroma
Nevar pievienot vairāk kā 25 tēmas Tēmai ir jāsākas ar burtu vai ciparu, tā var saturēt domu zīmes ('-') un var būt līdz 35 simboliem gara.

1471 rinda
44KB

  1. # Pleroma: A lightweight social networking server
  2. # Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/>
  3. # SPDX-License-Identifier: AGPL-3.0-only
  4. defmodule Pleroma.UserTest do
  5. alias Pleroma.Activity
  6. alias Pleroma.Builders.UserBuilder
  7. alias Pleroma.Object
  8. alias Pleroma.Repo
  9. alias Pleroma.User
  10. alias Pleroma.Web.ActivityPub.ActivityPub
  11. alias Pleroma.Web.CommonAPI
  12. use Pleroma.DataCase
  13. import Pleroma.Factory
  14. import Mock
  15. setup_all do
  16. Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
  17. :ok
  18. end
  19. describe "when tags are nil" do
  20. test "tagging a user" do
  21. user = insert(:user, %{tags: nil})
  22. user = User.tag(user, ["cool", "dude"])
  23. assert "cool" in user.tags
  24. assert "dude" in user.tags
  25. end
  26. test "untagging a user" do
  27. user = insert(:user, %{tags: nil})
  28. user = User.untag(user, ["cool", "dude"])
  29. assert user.tags == []
  30. end
  31. end
  32. test "ap_id returns the activity pub id for the user" do
  33. user = UserBuilder.build()
  34. expected_ap_id = "#{Pleroma.Web.base_url()}/users/#{user.nickname}"
  35. assert expected_ap_id == User.ap_id(user)
  36. end
  37. test "ap_followers returns the followers collection for the user" do
  38. user = UserBuilder.build()
  39. expected_followers_collection = "#{User.ap_id(user)}/followers"
  40. assert expected_followers_collection == User.ap_followers(user)
  41. end
  42. test "ap_following returns the following collection for the user" do
  43. user = UserBuilder.build()
  44. expected_followers_collection = "#{User.ap_id(user)}/following"
  45. assert expected_followers_collection == User.ap_following(user)
  46. end
  47. test "returns all pending follow requests" do
  48. unlocked = insert(:user)
  49. locked = insert(:user, %{info: %{locked: true}})
  50. follower = insert(:user)
  51. Pleroma.Web.TwitterAPI.TwitterAPI.follow(follower, %{"user_id" => unlocked.id})
  52. Pleroma.Web.TwitterAPI.TwitterAPI.follow(follower, %{"user_id" => locked.id})
  53. assert {:ok, []} = User.get_follow_requests(unlocked)
  54. assert {:ok, [activity]} = User.get_follow_requests(locked)
  55. assert activity
  56. end
  57. test "doesn't return already accepted or duplicate follow requests" do
  58. locked = insert(:user, %{info: %{locked: true}})
  59. pending_follower = insert(:user)
  60. accepted_follower = insert(:user)
  61. Pleroma.Web.TwitterAPI.TwitterAPI.follow(pending_follower, %{"user_id" => locked.id})
  62. Pleroma.Web.TwitterAPI.TwitterAPI.follow(pending_follower, %{"user_id" => locked.id})
  63. Pleroma.Web.TwitterAPI.TwitterAPI.follow(accepted_follower, %{"user_id" => locked.id})
  64. User.follow(accepted_follower, locked)
  65. assert {:ok, [activity]} = User.get_follow_requests(locked)
  66. assert activity
  67. end
  68. test "follow_all follows mutliple users" do
  69. user = insert(:user)
  70. followed_zero = insert(:user)
  71. followed_one = insert(:user)
  72. followed_two = insert(:user)
  73. blocked = insert(:user)
  74. not_followed = insert(:user)
  75. reverse_blocked = insert(:user)
  76. {:ok, user} = User.block(user, blocked)
  77. {:ok, reverse_blocked} = User.block(reverse_blocked, user)
  78. {:ok, user} = User.follow(user, followed_zero)
  79. {:ok, user} = User.follow_all(user, [followed_one, followed_two, blocked, reverse_blocked])
  80. assert User.following?(user, followed_one)
  81. assert User.following?(user, followed_two)
  82. assert User.following?(user, followed_zero)
  83. refute User.following?(user, not_followed)
  84. refute User.following?(user, blocked)
  85. refute User.following?(user, reverse_blocked)
  86. end
  87. test "follow_all follows mutliple users without duplicating" do
  88. user = insert(:user)
  89. followed_zero = insert(:user)
  90. followed_one = insert(:user)
  91. followed_two = insert(:user)
  92. {:ok, user} = User.follow_all(user, [followed_zero, followed_one])
  93. assert length(user.following) == 3
  94. {:ok, user} = User.follow_all(user, [followed_one, followed_two])
  95. assert length(user.following) == 4
  96. end
  97. test "follow takes a user and another user" do
  98. user = insert(:user)
  99. followed = insert(:user)
  100. {:ok, user} = User.follow(user, followed)
  101. user = User.get_cached_by_id(user.id)
  102. followed = User.get_cached_by_ap_id(followed.ap_id)
  103. assert followed.info.follower_count == 1
  104. assert User.ap_followers(followed) in user.following
  105. end
  106. test "can't follow a deactivated users" do
  107. user = insert(:user)
  108. followed = insert(:user, info: %{deactivated: true})
  109. {:error, _} = User.follow(user, followed)
  110. end
  111. test "can't follow a user who blocked us" do
  112. blocker = insert(:user)
  113. blockee = insert(:user)
  114. {:ok, blocker} = User.block(blocker, blockee)
  115. {:error, _} = User.follow(blockee, blocker)
  116. end
  117. test "can't subscribe to a user who blocked us" do
  118. blocker = insert(:user)
  119. blocked = insert(:user)
  120. {:ok, blocker} = User.block(blocker, blocked)
  121. {:error, _} = User.subscribe(blocked, blocker)
  122. end
  123. test "local users do not automatically follow local locked accounts" do
  124. follower = insert(:user, info: %{locked: true})
  125. followed = insert(:user, info: %{locked: true})
  126. {:ok, follower} = User.maybe_direct_follow(follower, followed)
  127. refute User.following?(follower, followed)
  128. end
  129. # This is a somewhat useless test.
  130. # test "following a remote user will ensure a websub subscription is present" do
  131. # user = insert(:user)
  132. # {:ok, followed} = OStatus.make_user("shp@social.heldscal.la")
  133. # assert followed.local == false
  134. # {:ok, user} = User.follow(user, followed)
  135. # assert User.ap_followers(followed) in user.following
  136. # query = from w in WebsubClientSubscription,
  137. # where: w.topic == ^followed.info["topic"]
  138. # websub = Repo.one(query)
  139. # assert websub
  140. # end
  141. test "unfollow takes a user and another user" do
  142. followed = insert(:user)
  143. user = insert(:user, %{following: [User.ap_followers(followed)]})
  144. {:ok, user, _activity} = User.unfollow(user, followed)
  145. user = User.get_cached_by_id(user.id)
  146. assert user.following == []
  147. end
  148. test "unfollow doesn't unfollow yourself" do
  149. user = insert(:user)
  150. {:error, _} = User.unfollow(user, user)
  151. user = User.get_cached_by_id(user.id)
  152. assert user.following == [user.ap_id]
  153. end
  154. test "test if a user is following another user" do
  155. followed = insert(:user)
  156. user = insert(:user, %{following: [User.ap_followers(followed)]})
  157. assert User.following?(user, followed)
  158. refute User.following?(followed, user)
  159. end
  160. test "fetches correct profile for nickname beginning with number" do
  161. # Use old-style integer ID to try to reproduce the problem
  162. user = insert(:user, %{id: 1080})
  163. user_with_numbers = insert(:user, %{nickname: "#{user.id}garbage"})
  164. assert user_with_numbers == User.get_cached_by_nickname_or_id(user_with_numbers.nickname)
  165. end
  166. describe "user registration" do
  167. @full_user_data %{
  168. bio: "A guy",
  169. name: "my name",
  170. nickname: "nick",
  171. password: "test",
  172. password_confirmation: "test",
  173. email: "email@example.com"
  174. }
  175. test "it autofollows accounts that are set for it" do
  176. user = insert(:user)
  177. remote_user = insert(:user, %{local: false})
  178. Pleroma.Config.put([:instance, :autofollowed_nicknames], [
  179. user.nickname,
  180. remote_user.nickname
  181. ])
  182. cng = User.register_changeset(%User{}, @full_user_data)
  183. {:ok, registered_user} = User.register(cng)
  184. assert User.following?(registered_user, user)
  185. refute User.following?(registered_user, remote_user)
  186. Pleroma.Config.put([:instance, :autofollowed_nicknames], [])
  187. end
  188. test "it sends a welcome message if it is set" do
  189. welcome_user = insert(:user)
  190. Pleroma.Config.put([:instance, :welcome_user_nickname], welcome_user.nickname)
  191. Pleroma.Config.put([:instance, :welcome_message], "Hello, this is a cool site")
  192. cng = User.register_changeset(%User{}, @full_user_data)
  193. {:ok, registered_user} = User.register(cng)
  194. activity = Repo.one(Pleroma.Activity)
  195. assert registered_user.ap_id in activity.recipients
  196. assert Object.normalize(activity).data["content"] =~ "cool site"
  197. assert activity.actor == welcome_user.ap_id
  198. Pleroma.Config.put([:instance, :welcome_user_nickname], nil)
  199. Pleroma.Config.put([:instance, :welcome_message], nil)
  200. end
  201. test "it requires an email, name, nickname and password, bio is optional" do
  202. @full_user_data
  203. |> Map.keys()
  204. |> Enum.each(fn key ->
  205. params = Map.delete(@full_user_data, key)
  206. changeset = User.register_changeset(%User{}, params)
  207. assert if key == :bio, do: changeset.valid?, else: not changeset.valid?
  208. end)
  209. end
  210. test "it restricts certain nicknames" do
  211. [restricted_name | _] = Pleroma.Config.get([User, :restricted_nicknames])
  212. assert is_bitstring(restricted_name)
  213. params =
  214. @full_user_data
  215. |> Map.put(:nickname, restricted_name)
  216. changeset = User.register_changeset(%User{}, params)
  217. refute changeset.valid?
  218. end
  219. test "it sets the password_hash, ap_id and following fields" do
  220. changeset = User.register_changeset(%User{}, @full_user_data)
  221. assert changeset.valid?
  222. assert is_binary(changeset.changes[:password_hash])
  223. assert changeset.changes[:ap_id] == User.ap_id(%User{nickname: @full_user_data.nickname})
  224. assert changeset.changes[:following] == [
  225. User.ap_followers(%User{nickname: @full_user_data.nickname})
  226. ]
  227. assert changeset.changes.follower_address == "#{changeset.changes.ap_id}/followers"
  228. end
  229. test "it ensures info is not nil" do
  230. changeset = User.register_changeset(%User{}, @full_user_data)
  231. assert changeset.valid?
  232. {:ok, user} =
  233. changeset
  234. |> Repo.insert()
  235. refute is_nil(user.info)
  236. end
  237. end
  238. describe "user registration, with :account_activation_required" do
  239. @full_user_data %{
  240. bio: "A guy",
  241. name: "my name",
  242. nickname: "nick",
  243. password: "test",
  244. password_confirmation: "test",
  245. email: "email@example.com"
  246. }
  247. setup do
  248. setting = Pleroma.Config.get([:instance, :account_activation_required])
  249. unless setting do
  250. Pleroma.Config.put([:instance, :account_activation_required], true)
  251. on_exit(fn -> Pleroma.Config.put([:instance, :account_activation_required], setting) end)
  252. end
  253. :ok
  254. end
  255. test "it creates unconfirmed user" do
  256. changeset = User.register_changeset(%User{}, @full_user_data)
  257. assert changeset.valid?
  258. {:ok, user} = Repo.insert(changeset)
  259. assert user.info.confirmation_pending
  260. assert user.info.confirmation_token
  261. end
  262. test "it creates confirmed user if :confirmed option is given" do
  263. changeset = User.register_changeset(%User{}, @full_user_data, need_confirmation: false)
  264. assert changeset.valid?
  265. {:ok, user} = Repo.insert(changeset)
  266. refute user.info.confirmation_pending
  267. refute user.info.confirmation_token
  268. end
  269. end
  270. describe "get_or_fetch/1" do
  271. test "gets an existing user by nickname" do
  272. user = insert(:user)
  273. {:ok, fetched_user} = User.get_or_fetch(user.nickname)
  274. assert user == fetched_user
  275. end
  276. test "gets an existing user by ap_id" do
  277. ap_id = "http://mastodon.example.org/users/admin"
  278. user =
  279. insert(
  280. :user,
  281. local: false,
  282. nickname: "admin@mastodon.example.org",
  283. ap_id: ap_id,
  284. info: %{}
  285. )
  286. {:ok, fetched_user} = User.get_or_fetch(ap_id)
  287. freshed_user = refresh_record(user)
  288. assert freshed_user == fetched_user
  289. end
  290. end
  291. describe "fetching a user from nickname or trying to build one" do
  292. test "gets an existing user" do
  293. user = insert(:user)
  294. {:ok, fetched_user} = User.get_or_fetch_by_nickname(user.nickname)
  295. assert user == fetched_user
  296. end
  297. test "gets an existing user, case insensitive" do
  298. user = insert(:user, nickname: "nick")
  299. {:ok, fetched_user} = User.get_or_fetch_by_nickname("NICK")
  300. assert user == fetched_user
  301. end
  302. test "gets an existing user by fully qualified nickname" do
  303. user = insert(:user)
  304. {:ok, fetched_user} =
  305. User.get_or_fetch_by_nickname(user.nickname <> "@" <> Pleroma.Web.Endpoint.host())
  306. assert user == fetched_user
  307. end
  308. test "gets an existing user by fully qualified nickname, case insensitive" do
  309. user = insert(:user, nickname: "nick")
  310. casing_altered_fqn = String.upcase(user.nickname <> "@" <> Pleroma.Web.Endpoint.host())
  311. {:ok, fetched_user} = User.get_or_fetch_by_nickname(casing_altered_fqn)
  312. assert user == fetched_user
  313. end
  314. test "fetches an external user via ostatus if no user exists" do
  315. {:ok, fetched_user} = User.get_or_fetch_by_nickname("shp@social.heldscal.la")
  316. assert fetched_user.nickname == "shp@social.heldscal.la"
  317. end
  318. test "returns nil if no user could be fetched" do
  319. {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant@social.heldscal.la")
  320. assert fetched_user == "not found nonexistant@social.heldscal.la"
  321. end
  322. test "returns nil for nonexistant local user" do
  323. {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant")
  324. assert fetched_user == "not found nonexistant"
  325. end
  326. test "updates an existing user, if stale" do
  327. a_week_ago = NaiveDateTime.add(NaiveDateTime.utc_now(), -604_800)
  328. orig_user =
  329. insert(
  330. :user,
  331. local: false,
  332. nickname: "admin@mastodon.example.org",
  333. ap_id: "http://mastodon.example.org/users/admin",
  334. last_refreshed_at: a_week_ago,
  335. info: %{}
  336. )
  337. assert orig_user.last_refreshed_at == a_week_ago
  338. {:ok, user} = User.get_or_fetch_by_ap_id("http://mastodon.example.org/users/admin")
  339. assert user.info.source_data["endpoints"]
  340. refute user.last_refreshed_at == orig_user.last_refreshed_at
  341. end
  342. end
  343. test "returns an ap_id for a user" do
  344. user = insert(:user)
  345. assert User.ap_id(user) ==
  346. Pleroma.Web.Router.Helpers.o_status_url(
  347. Pleroma.Web.Endpoint,
  348. :feed_redirect,
  349. user.nickname
  350. )
  351. end
  352. test "returns an ap_followers link for a user" do
  353. user = insert(:user)
  354. assert User.ap_followers(user) ==
  355. Pleroma.Web.Router.Helpers.o_status_url(
  356. Pleroma.Web.Endpoint,
  357. :feed_redirect,
  358. user.nickname
  359. ) <> "/followers"
  360. end
  361. describe "remote user creation changeset" do
  362. @valid_remote %{
  363. bio: "hello",
  364. name: "Someone",
  365. nickname: "a@b.de",
  366. ap_id: "http...",
  367. info: %{some: "info"},
  368. avatar: %{some: "avatar"}
  369. }
  370. test "it confirms validity" do
  371. cs = User.remote_user_creation(@valid_remote)
  372. assert cs.valid?
  373. end
  374. test "it sets the follower_adress" do
  375. cs = User.remote_user_creation(@valid_remote)
  376. # remote users get a fake local follower address
  377. assert cs.changes.follower_address ==
  378. User.ap_followers(%User{nickname: @valid_remote[:nickname]})
  379. end
  380. test "it enforces the fqn format for nicknames" do
  381. cs = User.remote_user_creation(%{@valid_remote | nickname: "bla"})
  382. assert cs.changes.local == false
  383. assert cs.changes.avatar
  384. refute cs.valid?
  385. end
  386. test "it has required fields" do
  387. [:name, :ap_id]
  388. |> Enum.each(fn field ->
  389. cs = User.remote_user_creation(Map.delete(@valid_remote, field))
  390. refute cs.valid?
  391. end)
  392. end
  393. test "it restricts some sizes" do
  394. [bio: 5000, name: 100]
  395. |> Enum.each(fn {field, size} ->
  396. string = String.pad_leading(".", size)
  397. cs = User.remote_user_creation(Map.put(@valid_remote, field, string))
  398. assert cs.valid?
  399. string = String.pad_leading(".", size + 1)
  400. cs = User.remote_user_creation(Map.put(@valid_remote, field, string))
  401. refute cs.valid?
  402. end)
  403. end
  404. end
  405. describe "followers and friends" do
  406. test "gets all followers for a given user" do
  407. user = insert(:user)
  408. follower_one = insert(:user)
  409. follower_two = insert(:user)
  410. not_follower = insert(:user)
  411. {:ok, follower_one} = User.follow(follower_one, user)
  412. {:ok, follower_two} = User.follow(follower_two, user)
  413. {:ok, res} = User.get_followers(user)
  414. assert Enum.member?(res, follower_one)
  415. assert Enum.member?(res, follower_two)
  416. refute Enum.member?(res, not_follower)
  417. end
  418. test "gets all friends (followed users) for a given user" do
  419. user = insert(:user)
  420. followed_one = insert(:user)
  421. followed_two = insert(:user)
  422. not_followed = insert(:user)
  423. {:ok, user} = User.follow(user, followed_one)
  424. {:ok, user} = User.follow(user, followed_two)
  425. {:ok, res} = User.get_friends(user)
  426. followed_one = User.get_cached_by_ap_id(followed_one.ap_id)
  427. followed_two = User.get_cached_by_ap_id(followed_two.ap_id)
  428. assert Enum.member?(res, followed_one)
  429. assert Enum.member?(res, followed_two)
  430. refute Enum.member?(res, not_followed)
  431. end
  432. end
  433. describe "updating note and follower count" do
  434. test "it sets the info->note_count property" do
  435. note = insert(:note)
  436. user = User.get_cached_by_ap_id(note.data["actor"])
  437. assert user.info.note_count == 0
  438. {:ok, user} = User.update_note_count(user)
  439. assert user.info.note_count == 1
  440. end
  441. test "it increases the info->note_count property" do
  442. note = insert(:note)
  443. user = User.get_cached_by_ap_id(note.data["actor"])
  444. assert user.info.note_count == 0
  445. {:ok, user} = User.increase_note_count(user)
  446. assert user.info.note_count == 1
  447. {:ok, user} = User.increase_note_count(user)
  448. assert user.info.note_count == 2
  449. end
  450. test "it decreases the info->note_count property" do
  451. note = insert(:note)
  452. user = User.get_cached_by_ap_id(note.data["actor"])
  453. assert user.info.note_count == 0
  454. {:ok, user} = User.increase_note_count(user)
  455. assert user.info.note_count == 1
  456. {:ok, user} = User.decrease_note_count(user)
  457. assert user.info.note_count == 0
  458. {:ok, user} = User.decrease_note_count(user)
  459. assert user.info.note_count == 0
  460. end
  461. test "it sets the info->follower_count property" do
  462. user = insert(:user)
  463. follower = insert(:user)
  464. User.follow(follower, user)
  465. assert user.info.follower_count == 0
  466. {:ok, user} = User.update_follower_count(user)
  467. assert user.info.follower_count == 1
  468. end
  469. end
  470. describe "remove duplicates from following list" do
  471. test "it removes duplicates" do
  472. user = insert(:user)
  473. follower = insert(:user)
  474. {:ok, %User{following: following} = follower} = User.follow(follower, user)
  475. assert length(following) == 2
  476. {:ok, follower} =
  477. follower
  478. |> User.update_changeset(%{following: following ++ following})
  479. |> Repo.update()
  480. assert length(follower.following) == 4
  481. {:ok, follower} = User.remove_duplicated_following(follower)
  482. assert length(follower.following) == 2
  483. end
  484. test "it does nothing when following is uniq" do
  485. user = insert(:user)
  486. follower = insert(:user)
  487. {:ok, follower} = User.follow(follower, user)
  488. assert length(follower.following) == 2
  489. {:ok, follower} = User.remove_duplicated_following(follower)
  490. assert length(follower.following) == 2
  491. end
  492. end
  493. describe "follow_import" do
  494. test "it imports user followings from list" do
  495. [user1, user2, user3] = insert_list(3, :user)
  496. identifiers = [
  497. user2.ap_id,
  498. user3.nickname
  499. ]
  500. result = User.follow_import(user1, identifiers)
  501. assert is_list(result)
  502. assert result == [user2, user3]
  503. end
  504. end
  505. describe "mutes" do
  506. test "it mutes people" do
  507. user = insert(:user)
  508. muted_user = insert(:user)
  509. refute User.mutes?(user, muted_user)
  510. refute User.muted_notifications?(user, muted_user)
  511. {:ok, user} = User.mute(user, muted_user)
  512. assert User.mutes?(user, muted_user)
  513. assert User.muted_notifications?(user, muted_user)
  514. end
  515. test "it unmutes users" do
  516. user = insert(:user)
  517. muted_user = insert(:user)
  518. {:ok, user} = User.mute(user, muted_user)
  519. {:ok, user} = User.unmute(user, muted_user)
  520. refute User.mutes?(user, muted_user)
  521. refute User.muted_notifications?(user, muted_user)
  522. end
  523. test "it mutes user without notifications" do
  524. user = insert(:user)
  525. muted_user = insert(:user)
  526. refute User.mutes?(user, muted_user)
  527. refute User.muted_notifications?(user, muted_user)
  528. {:ok, user} = User.mute(user, muted_user, false)
  529. assert User.mutes?(user, muted_user)
  530. refute User.muted_notifications?(user, muted_user)
  531. end
  532. end
  533. describe "blocks" do
  534. test "it blocks people" do
  535. user = insert(:user)
  536. blocked_user = insert(:user)
  537. refute User.blocks?(user, blocked_user)
  538. {:ok, user} = User.block(user, blocked_user)
  539. assert User.blocks?(user, blocked_user)
  540. end
  541. test "it unblocks users" do
  542. user = insert(:user)
  543. blocked_user = insert(:user)
  544. {:ok, user} = User.block(user, blocked_user)
  545. {:ok, user} = User.unblock(user, blocked_user)
  546. refute User.blocks?(user, blocked_user)
  547. end
  548. test "blocks tear down cyclical follow relationships" do
  549. blocker = insert(:user)
  550. blocked = insert(:user)
  551. {:ok, blocker} = User.follow(blocker, blocked)
  552. {:ok, blocked} = User.follow(blocked, blocker)
  553. assert User.following?(blocker, blocked)
  554. assert User.following?(blocked, blocker)
  555. {:ok, blocker} = User.block(blocker, blocked)
  556. blocked = User.get_cached_by_id(blocked.id)
  557. assert User.blocks?(blocker, blocked)
  558. refute User.following?(blocker, blocked)
  559. refute User.following?(blocked, blocker)
  560. end
  561. test "blocks tear down blocker->blocked follow relationships" do
  562. blocker = insert(:user)
  563. blocked = insert(:user)
  564. {:ok, blocker} = User.follow(blocker, blocked)
  565. assert User.following?(blocker, blocked)
  566. refute User.following?(blocked, blocker)
  567. {:ok, blocker} = User.block(blocker, blocked)
  568. blocked = User.get_cached_by_id(blocked.id)
  569. assert User.blocks?(blocker, blocked)
  570. refute User.following?(blocker, blocked)
  571. refute User.following?(blocked, blocker)
  572. end
  573. test "blocks tear down blocked->blocker follow relationships" do
  574. blocker = insert(:user)
  575. blocked = insert(:user)
  576. {:ok, blocked} = User.follow(blocked, blocker)
  577. refute User.following?(blocker, blocked)
  578. assert User.following?(blocked, blocker)
  579. {:ok, blocker} = User.block(blocker, blocked)
  580. blocked = User.get_cached_by_id(blocked.id)
  581. assert User.blocks?(blocker, blocked)
  582. refute User.following?(blocker, blocked)
  583. refute User.following?(blocked, blocker)
  584. end
  585. test "blocks tear down blocked->blocker subscription relationships" do
  586. blocker = insert(:user)
  587. blocked = insert(:user)
  588. {:ok, blocker} = User.subscribe(blocked, blocker)
  589. assert User.subscribed_to?(blocked, blocker)
  590. refute User.subscribed_to?(blocker, blocked)
  591. {:ok, blocker} = User.block(blocker, blocked)
  592. assert User.blocks?(blocker, blocked)
  593. refute User.subscribed_to?(blocker, blocked)
  594. refute User.subscribed_to?(blocked, blocker)
  595. end
  596. end
  597. describe "domain blocking" do
  598. test "blocks domains" do
  599. user = insert(:user)
  600. collateral_user = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  601. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  602. assert User.blocks?(user, collateral_user)
  603. end
  604. test "does not block domain with same end" do
  605. user = insert(:user)
  606. collateral_user =
  607. insert(:user, %{ap_id: "https://another-awful-and-rude-instance.com/user/bully"})
  608. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  609. refute User.blocks?(user, collateral_user)
  610. end
  611. test "does not block domain with same end if wildcard added" do
  612. user = insert(:user)
  613. collateral_user =
  614. insert(:user, %{ap_id: "https://another-awful-and-rude-instance.com/user/bully"})
  615. {:ok, user} = User.block_domain(user, "*.awful-and-rude-instance.com")
  616. refute User.blocks?(user, collateral_user)
  617. end
  618. test "blocks domain with wildcard for subdomain" do
  619. user = insert(:user)
  620. user_from_subdomain =
  621. insert(:user, %{ap_id: "https://subdomain.awful-and-rude-instance.com/user/bully"})
  622. user_with_two_subdomains =
  623. insert(:user, %{
  624. ap_id: "https://subdomain.second_subdomain.awful-and-rude-instance.com/user/bully"
  625. })
  626. user_domain = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  627. {:ok, user} = User.block_domain(user, "*.awful-and-rude-instance.com")
  628. assert User.blocks?(user, user_from_subdomain)
  629. assert User.blocks?(user, user_with_two_subdomains)
  630. assert User.blocks?(user, user_domain)
  631. end
  632. test "unblocks domains" do
  633. user = insert(:user)
  634. collateral_user = insert(:user, %{ap_id: "https://awful-and-rude-instance.com/user/bully"})
  635. {:ok, user} = User.block_domain(user, "awful-and-rude-instance.com")
  636. {:ok, user} = User.unblock_domain(user, "awful-and-rude-instance.com")
  637. refute User.blocks?(user, collateral_user)
  638. end
  639. end
  640. describe "blocks_import" do
  641. test "it imports user blocks from list" do
  642. [user1, user2, user3] = insert_list(3, :user)
  643. identifiers = [
  644. user2.ap_id,
  645. user3.nickname
  646. ]
  647. result = User.blocks_import(user1, identifiers)
  648. assert is_list(result)
  649. assert result == [user2, user3]
  650. end
  651. end
  652. test "get recipients from activity" do
  653. actor = insert(:user)
  654. user = insert(:user, local: true)
  655. user_two = insert(:user, local: false)
  656. addressed = insert(:user, local: true)
  657. addressed_remote = insert(:user, local: false)
  658. {:ok, activity} =
  659. CommonAPI.post(actor, %{
  660. "status" => "hey @#{addressed.nickname} @#{addressed_remote.nickname}"
  661. })
  662. assert Enum.map([actor, addressed], & &1.ap_id) --
  663. Enum.map(User.get_recipients_from_activity(activity), & &1.ap_id) == []
  664. {:ok, user} = User.follow(user, actor)
  665. {:ok, _user_two} = User.follow(user_two, actor)
  666. recipients = User.get_recipients_from_activity(activity)
  667. assert length(recipients) == 3
  668. assert user in recipients
  669. assert addressed in recipients
  670. end
  671. describe ".deactivate" do
  672. test "can de-activate then re-activate a user" do
  673. user = insert(:user)
  674. assert false == user.info.deactivated
  675. {:ok, user} = User.deactivate(user)
  676. assert true == user.info.deactivated
  677. {:ok, user} = User.deactivate(user, false)
  678. assert false == user.info.deactivated
  679. end
  680. test "hide a user from followers " do
  681. user = insert(:user)
  682. user2 = insert(:user)
  683. {:ok, user} = User.follow(user, user2)
  684. {:ok, _user} = User.deactivate(user)
  685. info = User.get_cached_user_info(user2)
  686. assert info.follower_count == 0
  687. assert {:ok, []} = User.get_followers(user2)
  688. end
  689. test "hide a user from friends" do
  690. user = insert(:user)
  691. user2 = insert(:user)
  692. {:ok, user2} = User.follow(user2, user)
  693. assert User.following_count(user2) == 1
  694. {:ok, _user} = User.deactivate(user)
  695. info = User.get_cached_user_info(user2)
  696. assert info.following_count == 0
  697. assert User.following_count(user2) == 0
  698. assert {:ok, []} = User.get_friends(user2)
  699. end
  700. test "hide a user's statuses from timelines and notifications" do
  701. user = insert(:user)
  702. user2 = insert(:user)
  703. {:ok, user2} = User.follow(user2, user)
  704. {:ok, activity} = CommonAPI.post(user, %{"status" => "hey @#{user2.nickname}"})
  705. activity = Repo.preload(activity, :bookmark)
  706. [notification] = Pleroma.Notification.for_user(user2)
  707. assert notification.activity.id == activity.id
  708. assert [activity] == ActivityPub.fetch_public_activities(%{}) |> Repo.preload(:bookmark)
  709. assert [%{activity | thread_muted?: CommonAPI.thread_muted?(user2, activity)}] ==
  710. ActivityPub.fetch_activities([user2.ap_id | user2.following], %{"user" => user2})
  711. {:ok, _user} = User.deactivate(user)
  712. assert [] == ActivityPub.fetch_public_activities(%{})
  713. assert [] == Pleroma.Notification.for_user(user2)
  714. assert [] ==
  715. ActivityPub.fetch_activities([user2.ap_id | user2.following], %{"user" => user2})
  716. end
  717. end
  718. describe "delete" do
  719. setup do
  720. {:ok, user} = insert(:user) |> User.set_cache()
  721. [user: user]
  722. end
  723. test ".delete_user_activities deletes all create activities", %{user: user} do
  724. {:ok, activity} = CommonAPI.post(user, %{"status" => "2hu"})
  725. {:ok, _} = User.delete_user_activities(user)
  726. # TODO: Remove favorites, repeats, delete activities.
  727. refute Activity.get_by_id(activity.id)
  728. end
  729. test "it deletes a user, all follow relationships and all activities", %{user: user} do
  730. follower = insert(:user)
  731. {:ok, follower} = User.follow(follower, user)
  732. object = insert(:note, user: user)
  733. activity = insert(:note_activity, user: user, note: object)
  734. object_two = insert(:note, user: follower)
  735. activity_two = insert(:note_activity, user: follower, note: object_two)
  736. {:ok, like, _} = CommonAPI.favorite(activity_two.id, user)
  737. {:ok, like_two, _} = CommonAPI.favorite(activity.id, follower)
  738. {:ok, repeat, _} = CommonAPI.repeat(activity_two.id, user)
  739. {:ok, _} = User.delete(user)
  740. follower = User.get_cached_by_id(follower.id)
  741. refute User.following?(follower, user)
  742. refute User.get_by_id(user.id)
  743. assert {:ok, nil} == Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  744. user_activities =
  745. user.ap_id
  746. |> Activity.query_by_actor()
  747. |> Repo.all()
  748. |> Enum.map(fn act -> act.data["type"] end)
  749. assert Enum.all?(user_activities, fn act -> act in ~w(Delete Undo) end)
  750. refute Activity.get_by_id(activity.id)
  751. refute Activity.get_by_id(like.id)
  752. refute Activity.get_by_id(like_two.id)
  753. refute Activity.get_by_id(repeat.id)
  754. end
  755. test_with_mock "it sends out User Delete activity",
  756. %{user: user},
  757. Pleroma.Web.ActivityPub.Publisher,
  758. [:passthrough],
  759. [] do
  760. config_path = [:instance, :federating]
  761. initial_setting = Pleroma.Config.get(config_path)
  762. Pleroma.Config.put(config_path, true)
  763. {:ok, follower} = User.get_or_fetch_by_ap_id("http://mastodon.example.org/users/admin")
  764. {:ok, _} = User.follow(follower, user)
  765. {:ok, _user} = User.delete(user)
  766. assert called(
  767. Pleroma.Web.ActivityPub.Publisher.publish_one(%{
  768. inbox: "http://mastodon.example.org/inbox"
  769. })
  770. )
  771. Pleroma.Config.put(config_path, initial_setting)
  772. end
  773. end
  774. test "get_public_key_for_ap_id fetches a user that's not in the db" do
  775. assert {:ok, _key} = User.get_public_key_for_ap_id("http://mastodon.example.org/users/admin")
  776. end
  777. test "insert or update a user from given data" do
  778. user = insert(:user, %{nickname: "nick@name.de"})
  779. data = %{ap_id: user.ap_id <> "xxx", name: user.name, nickname: user.nickname}
  780. assert {:ok, %User{}} = User.insert_or_update_user(data)
  781. end
  782. describe "per-user rich-text filtering" do
  783. test "html_filter_policy returns default policies, when rich-text is enabled" do
  784. user = insert(:user)
  785. assert Pleroma.Config.get([:markup, :scrub_policy]) == User.html_filter_policy(user)
  786. end
  787. test "html_filter_policy returns TwitterText scrubber when rich-text is disabled" do
  788. user = insert(:user, %{info: %{no_rich_text: true}})
  789. assert Pleroma.HTML.Scrubber.TwitterText == User.html_filter_policy(user)
  790. end
  791. end
  792. describe "caching" do
  793. test "invalidate_cache works" do
  794. user = insert(:user)
  795. _user_info = User.get_cached_user_info(user)
  796. User.invalidate_cache(user)
  797. {:ok, nil} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  798. {:ok, nil} = Cachex.get(:user_cache, "nickname:#{user.nickname}")
  799. {:ok, nil} = Cachex.get(:user_cache, "user_info:#{user.id}")
  800. end
  801. test "User.delete() plugs any possible zombie objects" do
  802. user = insert(:user)
  803. {:ok, _} = User.delete(user)
  804. {:ok, cached_user} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  805. assert cached_user != user
  806. {:ok, cached_user} = Cachex.get(:user_cache, "nickname:#{user.ap_id}")
  807. assert cached_user != user
  808. end
  809. end
  810. test "auth_active?/1 works correctly" do
  811. Pleroma.Config.put([:instance, :account_activation_required], true)
  812. local_user = insert(:user, local: true, info: %{confirmation_pending: true})
  813. confirmed_user = insert(:user, local: true, info: %{confirmation_pending: false})
  814. remote_user = insert(:user, local: false)
  815. refute User.auth_active?(local_user)
  816. assert User.auth_active?(confirmed_user)
  817. assert User.auth_active?(remote_user)
  818. Pleroma.Config.put([:instance, :account_activation_required], false)
  819. end
  820. describe "superuser?/1" do
  821. test "returns false for unprivileged users" do
  822. user = insert(:user, local: true)
  823. refute User.superuser?(user)
  824. end
  825. test "returns false for remote users" do
  826. user = insert(:user, local: false)
  827. remote_admin_user = insert(:user, local: false, info: %{is_admin: true})
  828. refute User.superuser?(user)
  829. refute User.superuser?(remote_admin_user)
  830. end
  831. test "returns true for local moderators" do
  832. user = insert(:user, local: true, info: %{is_moderator: true})
  833. assert User.superuser?(user)
  834. end
  835. test "returns true for local admins" do
  836. user = insert(:user, local: true, info: %{is_admin: true})
  837. assert User.superuser?(user)
  838. end
  839. end
  840. describe "visible_for?/2" do
  841. test "returns true when the account is itself" do
  842. user = insert(:user, local: true)
  843. assert User.visible_for?(user, user)
  844. end
  845. test "returns false when the account is unauthenticated and auth is required" do
  846. Pleroma.Config.put([:instance, :account_activation_required], true)
  847. user = insert(:user, local: true, info: %{confirmation_pending: true})
  848. other_user = insert(:user, local: true)
  849. refute User.visible_for?(user, other_user)
  850. Pleroma.Config.put([:instance, :account_activation_required], false)
  851. end
  852. test "returns true when the account is unauthenticated and auth is not required" do
  853. user = insert(:user, local: true, info: %{confirmation_pending: true})
  854. other_user = insert(:user, local: true)
  855. assert User.visible_for?(user, other_user)
  856. end
  857. test "returns true when the account is unauthenticated and being viewed by a privileged account (auth required)" do
  858. Pleroma.Config.put([:instance, :account_activation_required], true)
  859. user = insert(:user, local: true, info: %{confirmation_pending: true})
  860. other_user = insert(:user, local: true, info: %{is_admin: true})
  861. assert User.visible_for?(user, other_user)
  862. Pleroma.Config.put([:instance, :account_activation_required], false)
  863. end
  864. end
  865. describe "parse_bio/2" do
  866. test "preserves hosts in user links text" do
  867. remote_user = insert(:user, local: false, nickname: "nick@domain.com")
  868. user = insert(:user)
  869. bio = "A.k.a. @nick@domain.com"
  870. expected_text =
  871. "A.k.a. <span class='h-card'><a data-user='#{remote_user.id}' class='u-url mention' href='#{
  872. remote_user.ap_id
  873. }'>@<span>nick@domain.com</span></a></span>"
  874. assert expected_text == User.parse_bio(bio, user)
  875. end
  876. test "Adds rel=me on linkbacked urls" do
  877. user = insert(:user, ap_id: "http://social.example.org/users/lain")
  878. bio = "http://example.org/rel_me/null"
  879. expected_text = "<a href=\"#{bio}\">#{bio}</a>"
  880. assert expected_text == User.parse_bio(bio, user)
  881. bio = "http://example.org/rel_me/link"
  882. expected_text = "<a href=\"#{bio}\">#{bio}</a>"
  883. assert expected_text == User.parse_bio(bio, user)
  884. bio = "http://example.org/rel_me/anchor"
  885. expected_text = "<a href=\"#{bio}\">#{bio}</a>"
  886. assert expected_text == User.parse_bio(bio, user)
  887. end
  888. end
  889. test "follower count is updated when a follower is blocked" do
  890. user = insert(:user)
  891. follower = insert(:user)
  892. follower2 = insert(:user)
  893. follower3 = insert(:user)
  894. {:ok, follower} = User.follow(follower, user)
  895. {:ok, _follower2} = User.follow(follower2, user)
  896. {:ok, _follower3} = User.follow(follower3, user)
  897. {:ok, _} = User.block(user, follower)
  898. user_show = Pleroma.Web.TwitterAPI.UserView.render("show.json", %{user: user})
  899. assert Map.get(user_show, "followers_count") == 2
  900. end
  901. describe "toggle_confirmation/1" do
  902. test "if user is confirmed" do
  903. user = insert(:user, info: %{confirmation_pending: false})
  904. {:ok, user} = User.toggle_confirmation(user)
  905. assert user.info.confirmation_pending
  906. assert user.info.confirmation_token
  907. end
  908. test "if user is unconfirmed" do
  909. user = insert(:user, info: %{confirmation_pending: true, confirmation_token: "some token"})
  910. {:ok, user} = User.toggle_confirmation(user)
  911. refute user.info.confirmation_pending
  912. refute user.info.confirmation_token
  913. end
  914. end
  915. describe "ensure_keys_present" do
  916. test "it creates keys for a user and stores them in info" do
  917. user = insert(:user)
  918. refute is_binary(user.info.keys)
  919. {:ok, user} = User.ensure_keys_present(user)
  920. assert is_binary(user.info.keys)
  921. end
  922. test "it doesn't create keys if there already are some" do
  923. user = insert(:user, %{info: %{keys: "xxx"}})
  924. {:ok, user} = User.ensure_keys_present(user)
  925. assert user.info.keys == "xxx"
  926. end
  927. end
  928. describe "get_ap_ids_by_nicknames" do
  929. test "it returns a list of AP ids for a given set of nicknames" do
  930. user = insert(:user)
  931. user_two = insert(:user)
  932. ap_ids = User.get_ap_ids_by_nicknames([user.nickname, user_two.nickname, "nonexistent"])
  933. assert length(ap_ids) == 2
  934. assert user.ap_id in ap_ids
  935. assert user_two.ap_id in ap_ids
  936. end
  937. end
  938. describe "sync followers count" do
  939. setup do
  940. user1 = insert(:user, local: false, ap_id: "http://localhost:4001/users/masto_closed")
  941. user2 = insert(:user, local: false, ap_id: "http://localhost:4001/users/fuser2")
  942. insert(:user, local: true)
  943. insert(:user, local: false, info: %{deactivated: true})
  944. {:ok, user1: user1, user2: user2}
  945. end
  946. test "external_users/1 external active users with limit", %{user1: user1, user2: user2} do
  947. [fdb_user1] = User.external_users(limit: 1)
  948. assert fdb_user1.ap_id
  949. assert fdb_user1.ap_id == user1.ap_id
  950. assert fdb_user1.id == user1.id
  951. [fdb_user2] = User.external_users(max_id: fdb_user1.id, limit: 1)
  952. assert fdb_user2.ap_id
  953. assert fdb_user2.ap_id == user2.ap_id
  954. assert fdb_user2.id == user2.id
  955. assert User.external_users(max_id: fdb_user2.id, limit: 1) == []
  956. end
  957. end
  958. describe "set_info_cache/2" do
  959. setup do
  960. user = insert(:user)
  961. {:ok, user: user}
  962. end
  963. test "update from args", %{user: user} do
  964. User.set_info_cache(user, %{following_count: 15, follower_count: 18})
  965. %{follower_count: followers, following_count: following} = User.get_cached_user_info(user)
  966. assert followers == 18
  967. assert following == 15
  968. end
  969. test "without args", %{user: user} do
  970. User.set_info_cache(user, %{})
  971. %{follower_count: followers, following_count: following} = User.get_cached_user_info(user)
  972. assert followers == 0
  973. assert following == 0
  974. end
  975. end
  976. describe "user_info/2" do
  977. setup do
  978. user = insert(:user)
  979. {:ok, user: user}
  980. end
  981. test "update from args", %{user: user} do
  982. %{follower_count: followers, following_count: following} =
  983. User.user_info(user, %{following_count: 15, follower_count: 18})
  984. assert followers == 18
  985. assert following == 15
  986. end
  987. test "without args", %{user: user} do
  988. %{follower_count: followers, following_count: following} = User.user_info(user)
  989. assert followers == 0
  990. assert following == 0
  991. end
  992. end
  993. describe "is_internal_user?/1" do
  994. test "non-internal user returns false" do
  995. user = insert(:user)
  996. refute User.is_internal_user?(user)
  997. end
  998. test "user with no nickname returns true" do
  999. user = insert(:user, %{nickname: nil})
  1000. assert User.is_internal_user?(user)
  1001. end
  1002. test "user with internal-prefixed nickname returns true" do
  1003. user = insert(:user, %{nickname: "internal.test"})
  1004. assert User.is_internal_user?(user)
  1005. end
  1006. end
  1007. describe "update_and_set_cache/1" do
  1008. test "returns error when user is stale instead Ecto.StaleEntryError" do
  1009. user = insert(:user)
  1010. changeset = Ecto.Changeset.change(user, bio: "test")
  1011. Repo.delete(user)
  1012. assert {:error, %Ecto.Changeset{errors: [id: {"is stale", [stale: true]}], valid?: false}} =
  1013. User.update_and_set_cache(changeset)
  1014. end
  1015. test "performs update cache if user updated" do
  1016. user = insert(:user)
  1017. assert {:ok, nil} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  1018. changeset = Ecto.Changeset.change(user, bio: "test-bio")
  1019. assert {:ok, %User{bio: "test-bio"} = user} = User.update_and_set_cache(changeset)
  1020. assert {:ok, user} = Cachex.get(:user_cache, "ap_id:#{user.ap_id}")
  1021. assert %User{bio: "test-bio"} = User.get_cached_by_ap_id(user.ap_id)
  1022. end
  1023. end
  1024. describe "following/followers synchronization" do
  1025. setup do
  1026. sync = Pleroma.Config.get([:instance, :external_user_synchronization])
  1027. on_exit(fn -> Pleroma.Config.put([:instance, :external_user_synchronization], sync) end)
  1028. end
  1029. test "updates the counters normally on following/getting a follow when disabled" do
  1030. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1031. user = insert(:user)
  1032. other_user =
  1033. insert(:user,
  1034. local: false,
  1035. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1036. following_address: "http://localhost:4001/users/masto_closed/following",
  1037. info: %{ap_enabled: true}
  1038. )
  1039. assert User.user_info(other_user).following_count == 0
  1040. assert User.user_info(other_user).follower_count == 0
  1041. {:ok, user} = Pleroma.User.follow(user, other_user)
  1042. other_user = Pleroma.User.get_by_id(other_user.id)
  1043. assert User.user_info(user).following_count == 1
  1044. assert User.user_info(other_user).follower_count == 1
  1045. end
  1046. test "syncronizes the counters with the remote instance for the followed when enabled" do
  1047. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1048. user = insert(:user)
  1049. other_user =
  1050. insert(:user,
  1051. local: false,
  1052. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1053. following_address: "http://localhost:4001/users/masto_closed/following",
  1054. info: %{ap_enabled: true}
  1055. )
  1056. assert User.user_info(other_user).following_count == 0
  1057. assert User.user_info(other_user).follower_count == 0
  1058. Pleroma.Config.put([:instance, :external_user_synchronization], true)
  1059. {:ok, _user} = User.follow(user, other_user)
  1060. other_user = User.get_by_id(other_user.id)
  1061. assert User.user_info(other_user).follower_count == 437
  1062. end
  1063. test "syncronizes the counters with the remote instance for the follower when enabled" do
  1064. Pleroma.Config.put([:instance, :external_user_synchronization], false)
  1065. user = insert(:user)
  1066. other_user =
  1067. insert(:user,
  1068. local: false,
  1069. follower_address: "http://localhost:4001/users/masto_closed/followers",
  1070. following_address: "http://localhost:4001/users/masto_closed/following",
  1071. info: %{ap_enabled: true}
  1072. )
  1073. assert User.user_info(other_user).following_count == 0
  1074. assert User.user_info(other_user).follower_count == 0
  1075. Pleroma.Config.put([:instance, :external_user_synchronization], true)
  1076. {:ok, other_user} = User.follow(other_user, user)
  1077. assert User.user_info(other_user).following_count == 152
  1078. end
  1079. end
  1080. end