diff options
Diffstat (limited to 'test/web/mastodon_api')
35 files changed, 5494 insertions, 4372 deletions
diff --git a/test/web/mastodon_api/controllers/account_controller/update_credentials_test.exs b/test/web/mastodon_api/controllers/account_controller/update_credentials_test.exs new file mode 100644 index 000000000..09bdc46e0 --- /dev/null +++ b/test/web/mastodon_api/controllers/account_controller/update_credentials_test.exs @@ -0,0 +1,360 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.MastodonAPIController.UpdateCredentialsTest do +  alias Pleroma.Repo +  alias Pleroma.User + +  use Pleroma.Web.ConnCase + +  import Pleroma.Factory +  clear_config([:instance, :max_account_fields]) + +  describe "updating credentials" do +    setup do: oauth_access(["write:accounts"]) + +    test "sets user settings in a generic way", %{conn: conn} do +      res_conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{ +          "pleroma_settings_store" => %{ +            pleroma_fe: %{ +              theme: "bla" +            } +          } +        }) + +      assert user_data = json_response(res_conn, 200) +      assert user_data["pleroma"]["settings_store"] == %{"pleroma_fe" => %{"theme" => "bla"}} + +      user = Repo.get(User, user_data["id"]) + +      res_conn = +        conn +        |> assign(:user, user) +        |> patch("/api/v1/accounts/update_credentials", %{ +          "pleroma_settings_store" => %{ +            masto_fe: %{ +              theme: "bla" +            } +          } +        }) + +      assert user_data = json_response(res_conn, 200) + +      assert user_data["pleroma"]["settings_store"] == +               %{ +                 "pleroma_fe" => %{"theme" => "bla"}, +                 "masto_fe" => %{"theme" => "bla"} +               } + +      user = Repo.get(User, user_data["id"]) + +      res_conn = +        conn +        |> assign(:user, user) +        |> patch("/api/v1/accounts/update_credentials", %{ +          "pleroma_settings_store" => %{ +            masto_fe: %{ +              theme: "blub" +            } +          } +        }) + +      assert user_data = json_response(res_conn, 200) + +      assert user_data["pleroma"]["settings_store"] == +               %{ +                 "pleroma_fe" => %{"theme" => "bla"}, +                 "masto_fe" => %{"theme" => "blub"} +               } +    end + +    test "updates the user's bio", %{conn: conn} do +      user2 = insert(:user) + +      conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{ +          "note" => "I drink #cofe with @#{user2.nickname}" +        }) + +      assert user_data = json_response(conn, 200) + +      assert user_data["note"] == +               ~s(I drink <a class="hashtag" data-tag="cofe" href="http://localhost:4001/tag/cofe">#cofe</a> with <span class="h-card"><a data-user="#{ +                 user2.id +               }" class="u-url mention" href="#{user2.ap_id}" rel="ugc">@<span>#{user2.nickname}</span></a></span>) +    end + +    test "updates the user's locking status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{locked: "true"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["locked"] == true +    end + +    test "updates the user's allow_following_move", %{user: user, conn: conn} do +      assert user.allow_following_move == true + +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{allow_following_move: "false"}) + +      assert refresh_record(user).allow_following_move == false +      assert user_data = json_response(conn, 200) +      assert user_data["pleroma"]["allow_following_move"] == false +    end + +    test "updates the user's default scope", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{default_scope: "cofe"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["source"]["privacy"] == "cofe" +    end + +    test "updates the user's hide_followers status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{hide_followers: "true"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["pleroma"]["hide_followers"] == true +    end + +    test "updates the user's hide_followers_count and hide_follows_count", %{conn: conn} do +      conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{ +          hide_followers_count: "true", +          hide_follows_count: "true" +        }) + +      assert user_data = json_response(conn, 200) +      assert user_data["pleroma"]["hide_followers_count"] == true +      assert user_data["pleroma"]["hide_follows_count"] == true +    end + +    test "updates the user's skip_thread_containment option", %{user: user, conn: conn} do +      response = +        conn +        |> patch("/api/v1/accounts/update_credentials", %{skip_thread_containment: "true"}) +        |> json_response(200) + +      assert response["pleroma"]["skip_thread_containment"] == true +      assert refresh_record(user).skip_thread_containment +    end + +    test "updates the user's hide_follows status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{hide_follows: "true"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["pleroma"]["hide_follows"] == true +    end + +    test "updates the user's hide_favorites status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{hide_favorites: "true"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["pleroma"]["hide_favorites"] == true +    end + +    test "updates the user's show_role status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{show_role: "false"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["source"]["pleroma"]["show_role"] == false +    end + +    test "updates the user's no_rich_text status", %{conn: conn} do +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{no_rich_text: "true"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["source"]["pleroma"]["no_rich_text"] == true +    end + +    test "updates the user's name", %{conn: conn} do +      conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{"display_name" => "markorepairs"}) + +      assert user_data = json_response(conn, 200) +      assert user_data["display_name"] == "markorepairs" +    end + +    test "updates the user's avatar", %{user: user, conn: conn} do +      new_avatar = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{"avatar" => new_avatar}) + +      assert user_response = json_response(conn, 200) +      assert user_response["avatar"] != User.avatar_url(user) +    end + +    test "updates the user's banner", %{user: user, conn: conn} do +      new_header = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      conn = patch(conn, "/api/v1/accounts/update_credentials", %{"header" => new_header}) + +      assert user_response = json_response(conn, 200) +      assert user_response["header"] != User.banner_url(user) +    end + +    test "updates the user's background", %{conn: conn} do +      new_header = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{ +          "pleroma_background_image" => new_header +        }) + +      assert user_response = json_response(conn, 200) +      assert user_response["pleroma"]["background_image"] +    end + +    test "requires 'write:accounts' permission" do +      token1 = insert(:oauth_token, scopes: ["read"]) +      token2 = insert(:oauth_token, scopes: ["write", "follow"]) + +      for token <- [token1, token2] do +        conn = +          build_conn() +          |> put_req_header("authorization", "Bearer #{token.token}") +          |> patch("/api/v1/accounts/update_credentials", %{}) + +        if token == token1 do +          assert %{"error" => "Insufficient permissions: write:accounts."} == +                   json_response(conn, 403) +        else +          assert json_response(conn, 200) +        end +      end +    end + +    test "updates profile emojos", %{user: user, conn: conn} do +      note = "*sips :blank:*" +      name = "I am :firefox:" + +      ret_conn = +        patch(conn, "/api/v1/accounts/update_credentials", %{ +          "note" => note, +          "display_name" => name +        }) + +      assert json_response(ret_conn, 200) + +      conn = get(conn, "/api/v1/accounts/#{user.id}") + +      assert user_data = json_response(conn, 200) + +      assert user_data["note"] == note +      assert user_data["display_name"] == name +      assert [%{"shortcode" => "blank"}, %{"shortcode" => "firefox"}] = user_data["emojis"] +    end + +    test "update fields", %{conn: conn} do +      fields = [ +        %{"name" => "<a href=\"http://google.com\">foo</a>", "value" => "<script>bar</script>"}, +        %{"name" => "link", "value" => "cofe.io"} +      ] + +      account_data = +        conn +        |> patch("/api/v1/accounts/update_credentials", %{"fields_attributes" => fields}) +        |> json_response(200) + +      assert account_data["fields"] == [ +               %{"name" => "foo", "value" => "bar"}, +               %{"name" => "link", "value" => ~S(<a href="http://cofe.io" rel="ugc">cofe.io</a>)} +             ] + +      assert account_data["source"]["fields"] == [ +               %{ +                 "name" => "<a href=\"http://google.com\">foo</a>", +                 "value" => "<script>bar</script>" +               }, +               %{"name" => "link", "value" => "cofe.io"} +             ] + +      fields = +        [ +          "fields_attributes[1][name]=link", +          "fields_attributes[1][value]=cofe.io", +          "fields_attributes[0][name]=<a href=\"http://google.com\">foo</a>", +          "fields_attributes[0][value]=bar" +        ] +        |> Enum.join("&") + +      account = +        conn +        |> put_req_header("content-type", "application/x-www-form-urlencoded") +        |> patch("/api/v1/accounts/update_credentials", fields) +        |> json_response(200) + +      assert account["fields"] == [ +               %{"name" => "foo", "value" => "bar"}, +               %{"name" => "link", "value" => ~S(<a href="http://cofe.io" rel="ugc">cofe.io</a>)} +             ] + +      assert account["source"]["fields"] == [ +               %{ +                 "name" => "<a href=\"http://google.com\">foo</a>", +                 "value" => "bar" +               }, +               %{"name" => "link", "value" => "cofe.io"} +             ] + +      name_limit = Pleroma.Config.get([:instance, :account_field_name_length]) +      value_limit = Pleroma.Config.get([:instance, :account_field_value_length]) + +      long_value = Enum.map(0..value_limit, fn _ -> "x" end) |> Enum.join() + +      fields = [%{"name" => "<b>foo<b>", "value" => long_value}] + +      assert %{"error" => "Invalid request"} == +               conn +               |> patch("/api/v1/accounts/update_credentials", %{"fields_attributes" => fields}) +               |> json_response(403) + +      long_name = Enum.map(0..name_limit, fn _ -> "x" end) |> Enum.join() + +      fields = [%{"name" => long_name, "value" => "bar"}] + +      assert %{"error" => "Invalid request"} == +               conn +               |> patch("/api/v1/accounts/update_credentials", %{"fields_attributes" => fields}) +               |> json_response(403) + +      Pleroma.Config.put([:instance, :max_account_fields], 1) + +      fields = [ +        %{"name" => "<b>foo<b>", "value" => "<i>bar</i>"}, +        %{"name" => "link", "value" => "cofe.io"} +      ] + +      assert %{"error" => "Invalid request"} == +               conn +               |> patch("/api/v1/accounts/update_credentials", %{"fields_attributes" => fields}) +               |> json_response(403) + +      fields = [ +        %{"name" => "foo", "value" => ""}, +        %{"name" => "", "value" => "bar"} +      ] + +      account = +        conn +        |> patch("/api/v1/accounts/update_credentials", %{"fields_attributes" => fields}) +        |> json_response(200) + +      assert account["fields"] == [ +               %{"name" => "foo", "value" => ""} +             ] +    end +  end +end diff --git a/test/web/mastodon_api/controllers/account_controller_test.exs b/test/web/mastodon_api/controllers/account_controller_test.exs new file mode 100644 index 000000000..0d4860a42 --- /dev/null +++ b/test/web/mastodon_api/controllers/account_controller_test.exs @@ -0,0 +1,841 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Repo +  alias Pleroma.User +  alias Pleroma.Web.ActivityPub.ActivityPub +  alias Pleroma.Web.ActivityPub.InternalFetchActor +  alias Pleroma.Web.CommonAPI +  alias Pleroma.Web.OAuth.Token + +  import Pleroma.Factory + +  describe "account fetching" do +    test "works by id" do +      user = insert(:user) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/#{user.id}") + +      assert %{"id" => id} = json_response(conn, 200) +      assert id == to_string(user.id) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/-1") + +      assert %{"error" => "Can't find user"} = json_response(conn, 404) +    end + +    test "works by nickname" do +      user = insert(:user) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/#{user.nickname}") + +      assert %{"id" => id} = json_response(conn, 200) +      assert id == user.id +    end + +    test "works by nickname for remote users" do +      limit_to_local = Pleroma.Config.get([:instance, :limit_to_local_content]) +      Pleroma.Config.put([:instance, :limit_to_local_content], false) +      user = insert(:user, nickname: "user@example.com", local: false) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/#{user.nickname}") + +      Pleroma.Config.put([:instance, :limit_to_local_content], limit_to_local) +      assert %{"id" => id} = json_response(conn, 200) +      assert id == user.id +    end + +    test "respects limit_to_local_content == :all for remote user nicknames" do +      limit_to_local = Pleroma.Config.get([:instance, :limit_to_local_content]) +      Pleroma.Config.put([:instance, :limit_to_local_content], :all) + +      user = insert(:user, nickname: "user@example.com", local: false) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/#{user.nickname}") + +      Pleroma.Config.put([:instance, :limit_to_local_content], limit_to_local) +      assert json_response(conn, 404) +    end + +    test "respects limit_to_local_content == :unauthenticated for remote user nicknames" do +      limit_to_local = Pleroma.Config.get([:instance, :limit_to_local_content]) +      Pleroma.Config.put([:instance, :limit_to_local_content], :unauthenticated) + +      user = insert(:user, nickname: "user@example.com", local: false) +      reading_user = insert(:user) + +      conn = +        build_conn() +        |> get("/api/v1/accounts/#{user.nickname}") + +      assert json_response(conn, 404) + +      conn = +        build_conn() +        |> assign(:user, reading_user) +        |> assign(:token, insert(:oauth_token, user: reading_user, scopes: ["read:accounts"])) +        |> get("/api/v1/accounts/#{user.nickname}") + +      Pleroma.Config.put([:instance, :limit_to_local_content], limit_to_local) +      assert %{"id" => id} = json_response(conn, 200) +      assert id == user.id +    end + +    test "accounts fetches correct account for nicknames beginning with numbers", %{conn: conn} do +      # Need to set an old-style integer ID to reproduce the problem +      # (these are no longer assigned to new accounts but were preserved +      # for existing accounts during the migration to flakeIDs) +      user_one = insert(:user, %{id: 1212}) +      user_two = insert(:user, %{nickname: "#{user_one.id}garbage"}) + +      resp_one = +        conn +        |> get("/api/v1/accounts/#{user_one.id}") + +      resp_two = +        conn +        |> get("/api/v1/accounts/#{user_two.nickname}") + +      resp_three = +        conn +        |> get("/api/v1/accounts/#{user_two.id}") + +      acc_one = json_response(resp_one, 200) +      acc_two = json_response(resp_two, 200) +      acc_three = json_response(resp_three, 200) +      refute acc_one == acc_two +      assert acc_two == acc_three +    end + +    test "returns 404 when user is invisible", %{conn: conn} do +      user = insert(:user, %{invisible: true}) + +      resp = +        conn +        |> get("/api/v1/accounts/#{user.nickname}") +        |> json_response(404) + +      assert %{"error" => "Can't find user"} = resp +    end + +    test "returns 404 for internal.fetch actor", %{conn: conn} do +      %User{nickname: "internal.fetch"} = InternalFetchActor.get_actor() + +      resp = +        conn +        |> get("/api/v1/accounts/internal.fetch") +        |> json_response(404) + +      assert %{"error" => "Can't find user"} = resp +    end +  end + +  describe "user timelines" do +    setup do: oauth_access(["read:statuses"]) + +    test "respects blocks", %{user: user_one, conn: conn} do +      user_two = insert(:user) +      user_three = insert(:user) + +      User.block(user_one, user_two) + +      {:ok, activity} = CommonAPI.post(user_two, %{"status" => "User one sux0rz"}) +      {:ok, repeat, _} = CommonAPI.repeat(activity.id, user_three) + +      resp = get(conn, "/api/v1/accounts/#{user_two.id}/statuses") + +      assert [%{"id" => id}] = json_response(resp, 200) +      assert id == activity.id + +      # Even a blocked user will deliver the full user timeline, there would be +      #   no point in looking at a blocked users timeline otherwise +      resp = get(conn, "/api/v1/accounts/#{user_two.id}/statuses") + +      assert [%{"id" => id}] = json_response(resp, 200) +      assert id == activity.id + +      # Third user's timeline includes the repeat when viewed by unauthenticated user +      resp = get(build_conn(), "/api/v1/accounts/#{user_three.id}/statuses") +      assert [%{"id" => id}] = json_response(resp, 200) +      assert id == repeat.id + +      # When viewing a third user's timeline, the blocked users' statuses will NOT be shown +      resp = get(conn, "/api/v1/accounts/#{user_three.id}/statuses") + +      assert [] = json_response(resp, 200) +    end + +    test "gets users statuses", %{conn: conn} do +      user_one = insert(:user) +      user_two = insert(:user) +      user_three = insert(:user) + +      {:ok, _user_three} = User.follow(user_three, user_one) + +      {:ok, activity} = CommonAPI.post(user_one, %{"status" => "HI!!!"}) + +      {:ok, direct_activity} = +        CommonAPI.post(user_one, %{ +          "status" => "Hi, @#{user_two.nickname}.", +          "visibility" => "direct" +        }) + +      {:ok, private_activity} = +        CommonAPI.post(user_one, %{"status" => "private", "visibility" => "private"}) + +      resp = get(conn, "/api/v1/accounts/#{user_one.id}/statuses") + +      assert [%{"id" => id}] = json_response(resp, 200) +      assert id == to_string(activity.id) + +      resp = +        conn +        |> assign(:user, user_two) +        |> assign(:token, insert(:oauth_token, user: user_two, scopes: ["read:statuses"])) +        |> get("/api/v1/accounts/#{user_one.id}/statuses") + +      assert [%{"id" => id_one}, %{"id" => id_two}] = json_response(resp, 200) +      assert id_one == to_string(direct_activity.id) +      assert id_two == to_string(activity.id) + +      resp = +        conn +        |> assign(:user, user_three) +        |> assign(:token, insert(:oauth_token, user: user_three, scopes: ["read:statuses"])) +        |> get("/api/v1/accounts/#{user_one.id}/statuses") + +      assert [%{"id" => id_one}, %{"id" => id_two}] = json_response(resp, 200) +      assert id_one == to_string(private_activity.id) +      assert id_two == to_string(activity.id) +    end + +    test "unimplemented pinned statuses feature", %{conn: conn} do +      note = insert(:note_activity) +      user = User.get_cached_by_ap_id(note.data["actor"]) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/statuses?pinned=true") + +      assert json_response(conn, 200) == [] +    end + +    test "gets an users media", %{conn: conn} do +      note = insert(:note_activity) +      user = User.get_cached_by_ap_id(note.data["actor"]) + +      file = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      {:ok, %{id: media_id}} = ActivityPub.upload(file, actor: user.ap_id) + +      {:ok, image_post} = CommonAPI.post(user, %{"status" => "cofe", "media_ids" => [media_id]}) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/statuses", %{"only_media" => "true"}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(image_post.id) + +      conn = get(build_conn(), "/api/v1/accounts/#{user.id}/statuses", %{"only_media" => "1"}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(image_post.id) +    end + +    test "gets a user's statuses without reblogs", %{user: user, conn: conn} do +      {:ok, post} = CommonAPI.post(user, %{"status" => "HI!!!"}) +      {:ok, _, _} = CommonAPI.repeat(post.id, user) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/statuses", %{"exclude_reblogs" => "true"}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(post.id) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/statuses", %{"exclude_reblogs" => "1"}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(post.id) +    end + +    test "filters user's statuses by a hashtag", %{user: user, conn: conn} do +      {:ok, post} = CommonAPI.post(user, %{"status" => "#hashtag"}) +      {:ok, _post} = CommonAPI.post(user, %{"status" => "hashtag"}) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/statuses", %{"tagged" => "hashtag"}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(post.id) +    end + +    test "the user views their own timelines and excludes direct messages", %{ +      user: user, +      conn: conn +    } do +      {:ok, public_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "public"}) +      {:ok, _direct_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"}) + +      conn = +        get(conn, "/api/v1/accounts/#{user.id}/statuses", %{"exclude_visibilities" => ["direct"]}) + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(public_activity.id) +    end +  end + +  describe "followers" do +    setup do: oauth_access(["read:accounts"]) + +    test "getting followers", %{user: user, conn: conn} do +      other_user = insert(:user) +      {:ok, user} = User.follow(user, other_user) + +      conn = get(conn, "/api/v1/accounts/#{other_user.id}/followers") + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(user.id) +    end + +    test "getting followers, hide_followers", %{user: user, conn: conn} do +      other_user = insert(:user, hide_followers: true) +      {:ok, _user} = User.follow(user, other_user) + +      conn = get(conn, "/api/v1/accounts/#{other_user.id}/followers") + +      assert [] == json_response(conn, 200) +    end + +    test "getting followers, hide_followers, same user requesting" do +      user = insert(:user) +      other_user = insert(:user, hide_followers: true) +      {:ok, _user} = User.follow(user, other_user) + +      conn = +        build_conn() +        |> assign(:user, other_user) +        |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"])) +        |> get("/api/v1/accounts/#{other_user.id}/followers") + +      refute [] == json_response(conn, 200) +    end + +    test "getting followers, pagination", %{user: user, conn: conn} do +      follower1 = insert(:user) +      follower2 = insert(:user) +      follower3 = insert(:user) +      {:ok, _} = User.follow(follower1, user) +      {:ok, _} = User.follow(follower2, user) +      {:ok, _} = User.follow(follower3, user) + +      res_conn = get(conn, "/api/v1/accounts/#{user.id}/followers?since_id=#{follower1.id}") + +      assert [%{"id" => id3}, %{"id" => id2}] = json_response(res_conn, 200) +      assert id3 == follower3.id +      assert id2 == follower2.id + +      res_conn = get(conn, "/api/v1/accounts/#{user.id}/followers?max_id=#{follower3.id}") + +      assert [%{"id" => id2}, %{"id" => id1}] = json_response(res_conn, 200) +      assert id2 == follower2.id +      assert id1 == follower1.id + +      res_conn = get(conn, "/api/v1/accounts/#{user.id}/followers?limit=1&max_id=#{follower3.id}") + +      assert [%{"id" => id2}] = json_response(res_conn, 200) +      assert id2 == follower2.id + +      assert [link_header] = get_resp_header(res_conn, "link") +      assert link_header =~ ~r/min_id=#{follower2.id}/ +      assert link_header =~ ~r/max_id=#{follower2.id}/ +    end +  end + +  describe "following" do +    setup do: oauth_access(["read:accounts"]) + +    test "getting following", %{user: user, conn: conn} do +      other_user = insert(:user) +      {:ok, user} = User.follow(user, other_user) + +      conn = get(conn, "/api/v1/accounts/#{user.id}/following") + +      assert [%{"id" => id}] = json_response(conn, 200) +      assert id == to_string(other_user.id) +    end + +    test "getting following, hide_follows, other user requesting" do +      user = insert(:user, hide_follows: true) +      other_user = insert(:user) +      {:ok, user} = User.follow(user, other_user) + +      conn = +        build_conn() +        |> assign(:user, other_user) +        |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"])) +        |> get("/api/v1/accounts/#{user.id}/following") + +      assert [] == json_response(conn, 200) +    end + +    test "getting following, hide_follows, same user requesting" do +      user = insert(:user, hide_follows: true) +      other_user = insert(:user) +      {:ok, user} = User.follow(user, other_user) + +      conn = +        build_conn() +        |> assign(:user, user) +        |> assign(:token, insert(:oauth_token, user: user, scopes: ["read:accounts"])) +        |> get("/api/v1/accounts/#{user.id}/following") + +      refute [] == json_response(conn, 200) +    end + +    test "getting following, pagination", %{user: user, conn: conn} do +      following1 = insert(:user) +      following2 = insert(:user) +      following3 = insert(:user) +      {:ok, _} = User.follow(user, following1) +      {:ok, _} = User.follow(user, following2) +      {:ok, _} = User.follow(user, following3) + +      res_conn = get(conn, "/api/v1/accounts/#{user.id}/following?since_id=#{following1.id}") + +      assert [%{"id" => id3}, %{"id" => id2}] = json_response(res_conn, 200) +      assert id3 == following3.id +      assert id2 == following2.id + +      res_conn = get(conn, "/api/v1/accounts/#{user.id}/following?max_id=#{following3.id}") + +      assert [%{"id" => id2}, %{"id" => id1}] = json_response(res_conn, 200) +      assert id2 == following2.id +      assert id1 == following1.id + +      res_conn = +        get(conn, "/api/v1/accounts/#{user.id}/following?limit=1&max_id=#{following3.id}") + +      assert [%{"id" => id2}] = json_response(res_conn, 200) +      assert id2 == following2.id + +      assert [link_header] = get_resp_header(res_conn, "link") +      assert link_header =~ ~r/min_id=#{following2.id}/ +      assert link_header =~ ~r/max_id=#{following2.id}/ +    end +  end + +  describe "follow/unfollow" do +    setup do: oauth_access(["follow"]) + +    test "following / unfollowing a user", %{conn: conn} do +      other_user = insert(:user) + +      ret_conn = post(conn, "/api/v1/accounts/#{other_user.id}/follow") + +      assert %{"id" => _id, "following" => true} = json_response(ret_conn, 200) + +      ret_conn = post(conn, "/api/v1/accounts/#{other_user.id}/unfollow") + +      assert %{"id" => _id, "following" => false} = json_response(ret_conn, 200) + +      conn = post(conn, "/api/v1/follows", %{"uri" => other_user.nickname}) + +      assert %{"id" => id} = json_response(conn, 200) +      assert id == to_string(other_user.id) +    end + +    test "following without reblogs" do +      %{conn: conn} = oauth_access(["follow", "read:statuses"]) +      followed = insert(:user) +      other_user = insert(:user) + +      ret_conn = post(conn, "/api/v1/accounts/#{followed.id}/follow?reblogs=false") + +      assert %{"showing_reblogs" => false} = json_response(ret_conn, 200) + +      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hey"}) +      {:ok, reblog, _} = CommonAPI.repeat(activity.id, followed) + +      ret_conn = get(conn, "/api/v1/timelines/home") + +      assert [] == json_response(ret_conn, 200) + +      ret_conn = post(conn, "/api/v1/accounts/#{followed.id}/follow?reblogs=true") + +      assert %{"showing_reblogs" => true} = json_response(ret_conn, 200) + +      conn = get(conn, "/api/v1/timelines/home") + +      expected_activity_id = reblog.id +      assert [%{"id" => ^expected_activity_id}] = json_response(conn, 200) +    end + +    test "following / unfollowing errors", %{user: user, conn: conn} do +      # self follow +      conn_res = post(conn, "/api/v1/accounts/#{user.id}/follow") +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) + +      # self unfollow +      user = User.get_cached_by_id(user.id) +      conn_res = post(conn, "/api/v1/accounts/#{user.id}/unfollow") +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) + +      # self follow via uri +      user = User.get_cached_by_id(user.id) +      conn_res = post(conn, "/api/v1/follows", %{"uri" => user.nickname}) +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) + +      # follow non existing user +      conn_res = post(conn, "/api/v1/accounts/doesntexist/follow") +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) + +      # follow non existing user via uri +      conn_res = post(conn, "/api/v1/follows", %{"uri" => "doesntexist"}) +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) + +      # unfollow non existing user +      conn_res = post(conn, "/api/v1/accounts/doesntexist/unfollow") +      assert %{"error" => "Record not found"} = json_response(conn_res, 404) +    end +  end + +  describe "mute/unmute" do +    setup do: oauth_access(["write:mutes"]) + +    test "with notifications", %{conn: conn} do +      other_user = insert(:user) + +      ret_conn = post(conn, "/api/v1/accounts/#{other_user.id}/mute") + +      response = json_response(ret_conn, 200) + +      assert %{"id" => _id, "muting" => true, "muting_notifications" => true} = response + +      conn = post(conn, "/api/v1/accounts/#{other_user.id}/unmute") + +      response = json_response(conn, 200) +      assert %{"id" => _id, "muting" => false, "muting_notifications" => false} = response +    end + +    test "without notifications", %{conn: conn} do +      other_user = insert(:user) + +      ret_conn = +        post(conn, "/api/v1/accounts/#{other_user.id}/mute", %{"notifications" => "false"}) + +      response = json_response(ret_conn, 200) + +      assert %{"id" => _id, "muting" => true, "muting_notifications" => false} = response + +      conn = post(conn, "/api/v1/accounts/#{other_user.id}/unmute") + +      response = json_response(conn, 200) +      assert %{"id" => _id, "muting" => false, "muting_notifications" => false} = response +    end +  end + +  describe "pinned statuses" do +    setup do +      user = insert(:user) +      {:ok, activity} = CommonAPI.post(user, %{"status" => "HI!!!"}) +      %{conn: conn} = oauth_access(["read:statuses"], user: user) + +      [conn: conn, user: user, activity: activity] +    end + +    test "returns pinned statuses", %{conn: conn, user: user, activity: activity} do +      {:ok, _} = CommonAPI.pin(activity.id, user) + +      result = +        conn +        |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") +        |> json_response(200) + +      id_str = to_string(activity.id) + +      assert [%{"id" => ^id_str, "pinned" => true}] = result +    end +  end + +  test "blocking / unblocking a user" do +    %{conn: conn} = oauth_access(["follow"]) +    other_user = insert(:user) + +    ret_conn = post(conn, "/api/v1/accounts/#{other_user.id}/block") + +    assert %{"id" => _id, "blocking" => true} = json_response(ret_conn, 200) + +    conn = post(conn, "/api/v1/accounts/#{other_user.id}/unblock") + +    assert %{"id" => _id, "blocking" => false} = json_response(conn, 200) +  end + +  describe "create account by app" do +    setup do +      valid_params = %{ +        username: "lain", +        email: "lain@example.org", +        password: "PlzDontHackLain", +        agreement: true +      } + +      [valid_params: valid_params] +    end + +    test "Account registration via Application", %{conn: conn} do +      conn = +        post(conn, "/api/v1/apps", %{ +          client_name: "client_name", +          redirect_uris: "urn:ietf:wg:oauth:2.0:oob", +          scopes: "read, write, follow" +        }) + +      %{ +        "client_id" => client_id, +        "client_secret" => client_secret, +        "id" => _, +        "name" => "client_name", +        "redirect_uri" => "urn:ietf:wg:oauth:2.0:oob", +        "vapid_key" => _, +        "website" => nil +      } = json_response(conn, 200) + +      conn = +        post(conn, "/oauth/token", %{ +          grant_type: "client_credentials", +          client_id: client_id, +          client_secret: client_secret +        }) + +      assert %{"access_token" => token, "refresh_token" => refresh, "scope" => scope} = +               json_response(conn, 200) + +      assert token +      token_from_db = Repo.get_by(Token, token: token) +      assert token_from_db +      assert refresh +      assert scope == "read write follow" + +      conn = +        build_conn() +        |> put_req_header("authorization", "Bearer " <> token) +        |> post("/api/v1/accounts", %{ +          username: "lain", +          email: "lain@example.org", +          password: "PlzDontHackLain", +          bio: "Test Bio", +          agreement: true +        }) + +      %{ +        "access_token" => token, +        "created_at" => _created_at, +        "scope" => _scope, +        "token_type" => "Bearer" +      } = json_response(conn, 200) + +      token_from_db = Repo.get_by(Token, token: token) +      assert token_from_db +      token_from_db = Repo.preload(token_from_db, :user) +      assert token_from_db.user + +      assert token_from_db.user.confirmation_pending +    end + +    test "returns error when user already registred", %{conn: conn, valid_params: valid_params} do +      _user = insert(:user, email: "lain@example.org") +      app_token = insert(:oauth_token, user: nil) + +      conn = +        conn +        |> put_req_header("authorization", "Bearer " <> app_token.token) + +      res = post(conn, "/api/v1/accounts", valid_params) +      assert json_response(res, 400) == %{"error" => "{\"email\":[\"has already been taken\"]}"} +    end + +    test "rate limit", %{conn: conn} do +      app_token = insert(:oauth_token, user: nil) + +      conn = +        conn +        |> put_req_header("authorization", "Bearer " <> app_token.token) +        |> Map.put(:remote_ip, {15, 15, 15, 15}) + +      for i <- 1..5 do +        conn = +          post(conn, "/api/v1/accounts", %{ +            username: "#{i}lain", +            email: "#{i}lain@example.org", +            password: "PlzDontHackLain", +            agreement: true +          }) + +        %{ +          "access_token" => token, +          "created_at" => _created_at, +          "scope" => _scope, +          "token_type" => "Bearer" +        } = json_response(conn, 200) + +        token_from_db = Repo.get_by(Token, token: token) +        assert token_from_db +        token_from_db = Repo.preload(token_from_db, :user) +        assert token_from_db.user + +        assert token_from_db.user.confirmation_pending +      end + +      conn = +        post(conn, "/api/v1/accounts", %{ +          username: "6lain", +          email: "6lain@example.org", +          password: "PlzDontHackLain", +          agreement: true +        }) + +      assert json_response(conn, :too_many_requests) == %{"error" => "Throttled"} +    end + +    test "returns bad_request if missing required params", %{ +      conn: conn, +      valid_params: valid_params +    } do +      app_token = insert(:oauth_token, user: nil) + +      conn = put_req_header(conn, "authorization", "Bearer " <> app_token.token) + +      res = post(conn, "/api/v1/accounts", valid_params) +      assert json_response(res, 200) + +      [{127, 0, 0, 1}, {127, 0, 0, 2}, {127, 0, 0, 3}, {127, 0, 0, 4}] +      |> Stream.zip(valid_params) +      |> Enum.each(fn {ip, {attr, _}} -> +        res = +          conn +          |> Map.put(:remote_ip, ip) +          |> post("/api/v1/accounts", Map.delete(valid_params, attr)) +          |> json_response(400) + +        assert res == %{"error" => "Missing parameters"} +      end) +    end + +    test "returns forbidden if token is invalid", %{conn: conn, valid_params: valid_params} do +      conn = put_req_header(conn, "authorization", "Bearer " <> "invalid-token") + +      res = post(conn, "/api/v1/accounts", valid_params) +      assert json_response(res, 403) == %{"error" => "Invalid credentials"} +    end +  end + +  describe "GET /api/v1/accounts/:id/lists - account_lists" do +    test "returns lists to which the account belongs" do +      %{user: user, conn: conn} = oauth_access(["read:lists"]) +      other_user = insert(:user) +      assert {:ok, %Pleroma.List{} = list} = Pleroma.List.create("Test List", user) +      {:ok, %{following: _following}} = Pleroma.List.follow(list, other_user) + +      res = +        conn +        |> get("/api/v1/accounts/#{other_user.id}/lists") +        |> json_response(200) + +      assert res == [%{"id" => to_string(list.id), "title" => "Test List"}] +    end +  end + +  describe "verify_credentials" do +    test "verify_credentials" do +      %{user: user, conn: conn} = oauth_access(["read:accounts"]) +      conn = get(conn, "/api/v1/accounts/verify_credentials") + +      response = json_response(conn, 200) + +      assert %{"id" => id, "source" => %{"privacy" => "public"}} = response +      assert response["pleroma"]["chat_token"] +      assert id == to_string(user.id) +    end + +    test "verify_credentials default scope unlisted" do +      user = insert(:user, default_scope: "unlisted") +      %{conn: conn} = oauth_access(["read:accounts"], user: user) + +      conn = get(conn, "/api/v1/accounts/verify_credentials") + +      assert %{"id" => id, "source" => %{"privacy" => "unlisted"}} = json_response(conn, 200) +      assert id == to_string(user.id) +    end + +    test "locked accounts" do +      user = insert(:user, default_scope: "private") +      %{conn: conn} = oauth_access(["read:accounts"], user: user) + +      conn = get(conn, "/api/v1/accounts/verify_credentials") + +      assert %{"id" => id, "source" => %{"privacy" => "private"}} = json_response(conn, 200) +      assert id == to_string(user.id) +    end +  end + +  describe "user relationships" do +    setup do: oauth_access(["read:follows"]) + +    test "returns the relationships for the current user", %{user: user, conn: conn} do +      other_user = insert(:user) +      {:ok, _user} = User.follow(user, other_user) + +      conn = get(conn, "/api/v1/accounts/relationships", %{"id" => [other_user.id]}) + +      assert [relationship] = json_response(conn, 200) + +      assert to_string(other_user.id) == relationship["id"] +    end + +    test "returns an empty list on a bad request", %{conn: conn} do +      conn = get(conn, "/api/v1/accounts/relationships", %{}) + +      assert [] = json_response(conn, 200) +    end +  end + +  test "getting a list of mutes" do +    %{user: user, conn: conn} = oauth_access(["read:mutes"]) +    other_user = insert(:user) + +    {:ok, _user_relationships} = User.mute(user, other_user) + +    conn = get(conn, "/api/v1/mutes") + +    other_user_id = to_string(other_user.id) +    assert [%{"id" => ^other_user_id}] = json_response(conn, 200) +  end + +  test "getting a list of blocks" do +    %{user: user, conn: conn} = oauth_access(["read:blocks"]) +    other_user = insert(:user) + +    {:ok, _user_relationship} = User.block(user, other_user) + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/blocks") + +    other_user_id = to_string(other_user.id) +    assert [%{"id" => ^other_user_id}] = json_response(conn, 200) +  end +end diff --git a/test/web/mastodon_api/controllers/app_controller_test.exs b/test/web/mastodon_api/controllers/app_controller_test.exs new file mode 100644 index 000000000..51788155b --- /dev/null +++ b/test/web/mastodon_api/controllers/app_controller_test.exs @@ -0,0 +1,60 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.AppControllerTest do +  use Pleroma.Web.ConnCase, async: true + +  alias Pleroma.Repo +  alias Pleroma.Web.OAuth.App +  alias Pleroma.Web.Push + +  import Pleroma.Factory + +  test "apps/verify_credentials", %{conn: conn} do +    token = insert(:oauth_token) + +    conn = +      conn +      |> assign(:user, token.user) +      |> assign(:token, token) +      |> get("/api/v1/apps/verify_credentials") + +    app = Repo.preload(token, :app).app + +    expected = %{ +      "name" => app.client_name, +      "website" => app.website, +      "vapid_key" => Push.vapid_config() |> Keyword.get(:public_key) +    } + +    assert expected == json_response(conn, 200) +  end + +  test "creates an oauth app", %{conn: conn} do +    user = insert(:user) +    app_attrs = build(:oauth_app) + +    conn = +      conn +      |> assign(:user, user) +      |> post("/api/v1/apps", %{ +        client_name: app_attrs.client_name, +        redirect_uris: app_attrs.redirect_uris +      }) + +    [app] = Repo.all(App) + +    expected = %{ +      "name" => app.client_name, +      "website" => app.website, +      "client_id" => app.client_id, +      "client_secret" => app.client_secret, +      "id" => app.id |> to_string(), +      "redirect_uri" => app.redirect_uris, +      "vapid_key" => Push.vapid_config() |> Keyword.get(:public_key) +    } + +    assert expected == json_response(conn, 200) +  end +end diff --git a/test/web/mastodon_api/controllers/auth_controller_test.exs b/test/web/mastodon_api/controllers/auth_controller_test.exs new file mode 100644 index 000000000..98b2a82e7 --- /dev/null +++ b/test/web/mastodon_api/controllers/auth_controller_test.exs @@ -0,0 +1,121 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.AuthControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Config +  alias Pleroma.Repo +  alias Pleroma.Tests.ObanHelpers + +  import Pleroma.Factory +  import Swoosh.TestAssertions + +  describe "GET /web/login" do +    setup %{conn: conn} do +      session_opts = [ +        store: :cookie, +        key: "_test", +        signing_salt: "cooldude" +      ] + +      conn = +        conn +        |> Plug.Session.call(Plug.Session.init(session_opts)) +        |> fetch_session() + +      test_path = "/web/statuses/test" +      %{conn: conn, path: test_path} +    end + +    test "redirects to the saved path after log in", %{conn: conn, path: path} do +      app = insert(:oauth_app, client_name: "Mastodon-Local", redirect_uris: ".") +      auth = insert(:oauth_authorization, app: app) + +      conn = +        conn +        |> put_session(:return_to, path) +        |> get("/web/login", %{code: auth.token}) + +      assert conn.status == 302 +      assert redirected_to(conn) == path +    end + +    test "redirects to the getting-started page when referer is not present", %{conn: conn} do +      app = insert(:oauth_app, client_name: "Mastodon-Local", redirect_uris: ".") +      auth = insert(:oauth_authorization, app: app) + +      conn = get(conn, "/web/login", %{code: auth.token}) + +      assert conn.status == 302 +      assert redirected_to(conn) == "/web/getting-started" +    end +  end + +  describe "POST /auth/password, with valid parameters" do +    setup %{conn: conn} do +      user = insert(:user) +      conn = post(conn, "/auth/password?email=#{user.email}") +      %{conn: conn, user: user} +    end + +    test "it returns 204", %{conn: conn} do +      assert json_response(conn, :no_content) +    end + +    test "it creates a PasswordResetToken record for user", %{user: user} do +      token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id) +      assert token_record +    end + +    test "it sends an email to user", %{user: user} do +      ObanHelpers.perform_all() +      token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id) + +      email = Pleroma.Emails.UserEmail.password_reset_email(user, token_record.token) +      notify_email = Config.get([:instance, :notify_email]) +      instance_name = Config.get([:instance, :name]) + +      assert_email_sent( +        from: {instance_name, notify_email}, +        to: {user.name, user.email}, +        html_body: email.html_body +      ) +    end +  end + +  describe "POST /auth/password, with invalid parameters" do +    setup do +      user = insert(:user) +      {:ok, user: user} +    end + +    test "it returns 404 when user is not found", %{conn: conn, user: user} do +      conn = post(conn, "/auth/password?email=nonexisting_#{user.email}") +      assert conn.status == 404 +      assert conn.resp_body == "" +    end + +    test "it returns 400 when user is not local", %{conn: conn, user: user} do +      {:ok, user} = Repo.update(Ecto.Changeset.change(user, local: false)) +      conn = post(conn, "/auth/password?email=#{user.email}") +      assert conn.status == 400 +      assert conn.resp_body == "" +    end +  end + +  describe "DELETE /auth/sign_out" do +    test "redirect to root page", %{conn: conn} do +      user = insert(:user) + +      conn = +        conn +        |> assign(:user, user) +        |> delete("/auth/sign_out") + +      assert conn.status == 302 +      assert redirected_to(conn) == "/" +    end +  end +end diff --git a/test/web/mastodon_api/controllers/conversation_controller_test.exs b/test/web/mastodon_api/controllers/conversation_controller_test.exs new file mode 100644 index 000000000..4bb9781a6 --- /dev/null +++ b/test/web/mastodon_api/controllers/conversation_controller_test.exs @@ -0,0 +1,208 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ConversationControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.User +  alias Pleroma.Web.CommonAPI + +  import Pleroma.Factory + +  setup do: oauth_access(["read:statuses"]) + +  test "returns a list of conversations", %{user: user_one, conn: conn} do +    user_two = insert(:user) +    user_three = insert(:user) + +    {:ok, user_two} = User.follow(user_two, user_one) + +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 0 + +    {:ok, direct} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}, @#{user_three.nickname}!", +        "visibility" => "direct" +      }) + +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 1 + +    {:ok, _follower_only} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}!", +        "visibility" => "private" +      }) + +    res_conn = get(conn, "/api/v1/conversations") + +    assert response = json_response(res_conn, 200) + +    assert [ +             %{ +               "id" => res_id, +               "accounts" => res_accounts, +               "last_status" => res_last_status, +               "unread" => unread +             } +           ] = response + +    account_ids = Enum.map(res_accounts, & &1["id"]) +    assert length(res_accounts) == 2 +    assert user_two.id in account_ids +    assert user_three.id in account_ids +    assert is_binary(res_id) +    assert unread == false +    assert res_last_status["id"] == direct.id +    assert User.get_cached_by_id(user_one.id).unread_conversation_count == 0 +  end + +  test "filters conversations by recipients", %{user: user_one, conn: conn} do +    user_two = insert(:user) +    user_three = insert(:user) + +    {:ok, direct1} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}!", +        "visibility" => "direct" +      }) + +    {:ok, _direct2} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_three.nickname}!", +        "visibility" => "direct" +      }) + +    {:ok, direct3} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}, @#{user_three.nickname}!", +        "visibility" => "direct" +      }) + +    {:ok, _direct4} = +      CommonAPI.post(user_two, %{ +        "status" => "Hi @#{user_three.nickname}!", +        "visibility" => "direct" +      }) + +    {:ok, direct5} = +      CommonAPI.post(user_two, %{ +        "status" => "Hi @#{user_one.nickname}!", +        "visibility" => "direct" +      }) + +    [conversation1, conversation2] = +      conn +      |> get("/api/v1/conversations", %{"recipients" => [user_two.id]}) +      |> json_response(200) + +    assert conversation1["last_status"]["id"] == direct5.id +    assert conversation2["last_status"]["id"] == direct1.id + +    [conversation1] = +      conn +      |> get("/api/v1/conversations", %{"recipients" => [user_two.id, user_three.id]}) +      |> json_response(200) + +    assert conversation1["last_status"]["id"] == direct3.id +  end + +  test "updates the last_status on reply", %{user: user_one, conn: conn} do +    user_two = insert(:user) + +    {:ok, direct} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}", +        "visibility" => "direct" +      }) + +    {:ok, direct_reply} = +      CommonAPI.post(user_two, %{ +        "status" => "reply", +        "visibility" => "direct", +        "in_reply_to_status_id" => direct.id +      }) + +    [%{"last_status" => res_last_status}] = +      conn +      |> get("/api/v1/conversations") +      |> json_response(200) + +    assert res_last_status["id"] == direct_reply.id +  end + +  test "the user marks a conversation as read", %{user: user_one, conn: conn} do +    user_two = insert(:user) + +    {:ok, direct} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}", +        "visibility" => "direct" +      }) + +    assert User.get_cached_by_id(user_one.id).unread_conversation_count == 0 +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 1 + +    user_two_conn = +      build_conn() +      |> assign(:user, user_two) +      |> assign( +        :token, +        insert(:oauth_token, user: user_two, scopes: ["read:statuses", "write:conversations"]) +      ) + +    [%{"id" => direct_conversation_id, "unread" => true}] = +      user_two_conn +      |> get("/api/v1/conversations") +      |> json_response(200) + +    %{"unread" => false} = +      user_two_conn +      |> post("/api/v1/conversations/#{direct_conversation_id}/read") +      |> json_response(200) + +    assert User.get_cached_by_id(user_one.id).unread_conversation_count == 0 +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 0 + +    # The conversation is marked as unread on reply +    {:ok, _} = +      CommonAPI.post(user_two, %{ +        "status" => "reply", +        "visibility" => "direct", +        "in_reply_to_status_id" => direct.id +      }) + +    [%{"unread" => true}] = +      conn +      |> get("/api/v1/conversations") +      |> json_response(200) + +    assert User.get_cached_by_id(user_one.id).unread_conversation_count == 1 +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 0 + +    # A reply doesn't increment the user's unread_conversation_count if the conversation is unread +    {:ok, _} = +      CommonAPI.post(user_two, %{ +        "status" => "reply", +        "visibility" => "direct", +        "in_reply_to_status_id" => direct.id +      }) + +    assert User.get_cached_by_id(user_one.id).unread_conversation_count == 1 +    assert User.get_cached_by_id(user_two.id).unread_conversation_count == 0 +  end + +  test "(vanilla) Mastodon frontend behaviour", %{user: user_one, conn: conn} do +    user_two = insert(:user) + +    {:ok, direct} = +      CommonAPI.post(user_one, %{ +        "status" => "Hi @#{user_two.nickname}!", +        "visibility" => "direct" +      }) + +    res_conn = get(conn, "/api/v1/statuses/#{direct.id}/context") + +    assert %{"ancestors" => [], "descendants" => []} == json_response(res_conn, 200) +  end +end diff --git a/test/web/mastodon_api/controllers/custom_emoji_controller_test.exs b/test/web/mastodon_api/controllers/custom_emoji_controller_test.exs new file mode 100644 index 000000000..2d988b0b8 --- /dev/null +++ b/test/web/mastodon_api/controllers/custom_emoji_controller_test.exs @@ -0,0 +1,22 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.CustomEmojiControllerTest do +  use Pleroma.Web.ConnCase, async: true + +  test "with tags", %{conn: conn} do +    [emoji | _body] = +      conn +      |> get("/api/v1/custom_emojis") +      |> json_response(200) + +    assert Map.has_key?(emoji, "shortcode") +    assert Map.has_key?(emoji, "static_url") +    assert Map.has_key?(emoji, "tags") +    assert is_list(emoji["tags"]) +    assert Map.has_key?(emoji, "category") +    assert Map.has_key?(emoji, "url") +    assert Map.has_key?(emoji, "visible_in_picker") +  end +end diff --git a/test/web/mastodon_api/controllers/domain_block_controller_test.exs b/test/web/mastodon_api/controllers/domain_block_controller_test.exs new file mode 100644 index 000000000..55de625ba --- /dev/null +++ b/test/web/mastodon_api/controllers/domain_block_controller_test.exs @@ -0,0 +1,45 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.DomainBlockControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.User + +  import Pleroma.Factory + +  test "blocking / unblocking a domain" do +    %{user: user, conn: conn} = oauth_access(["write:blocks"]) +    other_user = insert(:user, %{ap_id: "https://dogwhistle.zone/@pundit"}) + +    ret_conn = post(conn, "/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"}) + +    assert %{} = json_response(ret_conn, 200) +    user = User.get_cached_by_ap_id(user.ap_id) +    assert User.blocks?(user, other_user) + +    ret_conn = delete(conn, "/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"}) + +    assert %{} = json_response(ret_conn, 200) +    user = User.get_cached_by_ap_id(user.ap_id) +    refute User.blocks?(user, other_user) +  end + +  test "getting a list of domain blocks" do +    %{user: user, conn: conn} = oauth_access(["read:blocks"]) + +    {:ok, user} = User.block_domain(user, "bad.site") +    {:ok, user} = User.block_domain(user, "even.worse.site") + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/domain_blocks") + +    domain_blocks = json_response(conn, 200) + +    assert "bad.site" in domain_blocks +    assert "even.worse.site" in domain_blocks +  end +end diff --git a/test/web/mastodon_api/controllers/filter_controller_test.exs b/test/web/mastodon_api/controllers/filter_controller_test.exs new file mode 100644 index 000000000..3aea17ec7 --- /dev/null +++ b/test/web/mastodon_api/controllers/filter_controller_test.exs @@ -0,0 +1,123 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.FilterControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Web.MastodonAPI.FilterView + +  test "creating a filter" do +    %{conn: conn} = oauth_access(["write:filters"]) + +    filter = %Pleroma.Filter{ +      phrase: "knights", +      context: ["home"] +    } + +    conn = post(conn, "/api/v1/filters", %{"phrase" => filter.phrase, context: filter.context}) + +    assert response = json_response(conn, 200) +    assert response["phrase"] == filter.phrase +    assert response["context"] == filter.context +    assert response["irreversible"] == false +    assert response["id"] != nil +    assert response["id"] != "" +  end + +  test "fetching a list of filters" do +    %{user: user, conn: conn} = oauth_access(["read:filters"]) + +    query_one = %Pleroma.Filter{ +      user_id: user.id, +      filter_id: 1, +      phrase: "knights", +      context: ["home"] +    } + +    query_two = %Pleroma.Filter{ +      user_id: user.id, +      filter_id: 2, +      phrase: "who", +      context: ["home"] +    } + +    {:ok, filter_one} = Pleroma.Filter.create(query_one) +    {:ok, filter_two} = Pleroma.Filter.create(query_two) + +    response = +      conn +      |> get("/api/v1/filters") +      |> json_response(200) + +    assert response == +             render_json( +               FilterView, +               "filters.json", +               filters: [filter_two, filter_one] +             ) +  end + +  test "get a filter" do +    %{user: user, conn: conn} = oauth_access(["read:filters"]) + +    query = %Pleroma.Filter{ +      user_id: user.id, +      filter_id: 2, +      phrase: "knight", +      context: ["home"] +    } + +    {:ok, filter} = Pleroma.Filter.create(query) + +    conn = get(conn, "/api/v1/filters/#{filter.filter_id}") + +    assert _response = json_response(conn, 200) +  end + +  test "update a filter" do +    %{user: user, conn: conn} = oauth_access(["write:filters"]) + +    query = %Pleroma.Filter{ +      user_id: user.id, +      filter_id: 2, +      phrase: "knight", +      context: ["home"] +    } + +    {:ok, _filter} = Pleroma.Filter.create(query) + +    new = %Pleroma.Filter{ +      phrase: "nii", +      context: ["home"] +    } + +    conn = +      put(conn, "/api/v1/filters/#{query.filter_id}", %{ +        phrase: new.phrase, +        context: new.context +      }) + +    assert response = json_response(conn, 200) +    assert response["phrase"] == new.phrase +    assert response["context"] == new.context +  end + +  test "delete a filter" do +    %{user: user, conn: conn} = oauth_access(["write:filters"]) + +    query = %Pleroma.Filter{ +      user_id: user.id, +      filter_id: 2, +      phrase: "knight", +      context: ["home"] +    } + +    {:ok, filter} = Pleroma.Filter.create(query) + +    conn = delete(conn, "/api/v1/filters/#{filter.filter_id}") + +    assert response = json_response(conn, 200) +    assert response == %{} +  end +end diff --git a/test/web/mastodon_api/controllers/follow_request_controller_test.exs b/test/web/mastodon_api/controllers/follow_request_controller_test.exs new file mode 100644 index 000000000..6e4a76501 --- /dev/null +++ b/test/web/mastodon_api/controllers/follow_request_controller_test.exs @@ -0,0 +1,74 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.FollowRequestControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.User +  alias Pleroma.Web.ActivityPub.ActivityPub + +  import Pleroma.Factory + +  describe "locked accounts" do +    setup do +      user = insert(:user, locked: true) +      %{conn: conn} = oauth_access(["follow"], user: user) +      %{user: user, conn: conn} +    end + +    test "/api/v1/follow_requests works", %{user: user, conn: conn} do +      other_user = insert(:user) + +      {:ok, _activity} = ActivityPub.follow(other_user, user) +      {:ok, other_user} = User.follow(other_user, user, "pending") + +      assert User.following?(other_user, user) == false + +      conn = get(conn, "/api/v1/follow_requests") + +      assert [relationship] = json_response(conn, 200) +      assert to_string(other_user.id) == relationship["id"] +    end + +    test "/api/v1/follow_requests/:id/authorize works", %{user: user, conn: conn} do +      other_user = insert(:user) + +      {:ok, _activity} = ActivityPub.follow(other_user, user) +      {:ok, other_user} = User.follow(other_user, user, "pending") + +      user = User.get_cached_by_id(user.id) +      other_user = User.get_cached_by_id(other_user.id) + +      assert User.following?(other_user, user) == false + +      conn = post(conn, "/api/v1/follow_requests/#{other_user.id}/authorize") + +      assert relationship = json_response(conn, 200) +      assert to_string(other_user.id) == relationship["id"] + +      user = User.get_cached_by_id(user.id) +      other_user = User.get_cached_by_id(other_user.id) + +      assert User.following?(other_user, user) == true +    end + +    test "/api/v1/follow_requests/:id/reject works", %{user: user, conn: conn} do +      other_user = insert(:user) + +      {:ok, _activity} = ActivityPub.follow(other_user, user) + +      user = User.get_cached_by_id(user.id) + +      conn = post(conn, "/api/v1/follow_requests/#{other_user.id}/reject") + +      assert relationship = json_response(conn, 200) +      assert to_string(other_user.id) == relationship["id"] + +      user = User.get_cached_by_id(user.id) +      other_user = User.get_cached_by_id(other_user.id) + +      assert User.following?(other_user, user) == false +    end +  end +end diff --git a/test/web/mastodon_api/controllers/instance_controller_test.exs b/test/web/mastodon_api/controllers/instance_controller_test.exs new file mode 100644 index 000000000..e00de6b18 --- /dev/null +++ b/test/web/mastodon_api/controllers/instance_controller_test.exs @@ -0,0 +1,77 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.InstanceControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.User +  import Pleroma.Factory + +  test "get instance information", %{conn: conn} do +    conn = get(conn, "/api/v1/instance") +    assert result = json_response(conn, 200) + +    email = Pleroma.Config.get([:instance, :email]) +    # Note: not checking for "max_toot_chars" since it's optional +    assert %{ +             "uri" => _, +             "title" => _, +             "description" => _, +             "version" => _, +             "email" => from_config_email, +             "urls" => %{ +               "streaming_api" => _ +             }, +             "stats" => _, +             "thumbnail" => _, +             "languages" => _, +             "registrations" => _, +             "poll_limits" => _, +             "upload_limit" => _, +             "avatar_upload_limit" => _, +             "background_upload_limit" => _, +             "banner_upload_limit" => _ +           } = result + +    assert email == from_config_email +  end + +  test "get instance stats", %{conn: conn} do +    user = insert(:user, %{local: true}) + +    user2 = insert(:user, %{local: true}) +    {:ok, _user2} = User.deactivate(user2, !user2.deactivated) + +    insert(:user, %{local: false, nickname: "u@peer1.com"}) +    insert(:user, %{local: false, nickname: "u@peer2.com"}) + +    {:ok, _} = Pleroma.Web.CommonAPI.post(user, %{"status" => "cofe"}) + +    Pleroma.Stats.force_update() + +    conn = get(conn, "/api/v1/instance") + +    assert result = json_response(conn, 200) + +    stats = result["stats"] + +    assert stats +    assert stats["user_count"] == 1 +    assert stats["status_count"] == 1 +    assert stats["domain_count"] == 2 +  end + +  test "get peers", %{conn: conn} do +    insert(:user, %{local: false, nickname: "u@peer1.com"}) +    insert(:user, %{local: false, nickname: "u@peer2.com"}) + +    Pleroma.Stats.force_update() + +    conn = get(conn, "/api/v1/instance/peers") + +    assert result = json_response(conn, 200) + +    assert ["peer1.com", "peer2.com"] == Enum.sort(result) +  end +end diff --git a/test/web/mastodon_api/controllers/list_controller_test.exs b/test/web/mastodon_api/controllers/list_controller_test.exs new file mode 100644 index 000000000..a6effbb69 --- /dev/null +++ b/test/web/mastodon_api/controllers/list_controller_test.exs @@ -0,0 +1,142 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ListControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Repo + +  import Pleroma.Factory + +  test "creating a list" do +    %{conn: conn} = oauth_access(["write:lists"]) + +    conn = post(conn, "/api/v1/lists", %{"title" => "cuties"}) + +    assert %{"title" => title} = json_response(conn, 200) +    assert title == "cuties" +  end + +  test "renders error for invalid params" do +    %{conn: conn} = oauth_access(["write:lists"]) + +    conn = post(conn, "/api/v1/lists", %{"title" => nil}) + +    assert %{"error" => "can't be blank"} == json_response(conn, :unprocessable_entity) +  end + +  test "listing a user's lists" do +    %{conn: conn} = oauth_access(["read:lists", "write:lists"]) + +    conn +    |> post("/api/v1/lists", %{"title" => "cuties"}) +    |> json_response(:ok) + +    conn +    |> post("/api/v1/lists", %{"title" => "cofe"}) +    |> json_response(:ok) + +    conn = get(conn, "/api/v1/lists") + +    assert [ +             %{"id" => _, "title" => "cofe"}, +             %{"id" => _, "title" => "cuties"} +           ] = json_response(conn, :ok) +  end + +  test "adding users to a list" do +    %{user: user, conn: conn} = oauth_access(["write:lists"]) +    other_user = insert(:user) +    {:ok, list} = Pleroma.List.create("name", user) + +    conn = post(conn, "/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) + +    assert %{} == json_response(conn, 200) +    %Pleroma.List{following: following} = Pleroma.List.get(list.id, user) +    assert following == [other_user.follower_address] +  end + +  test "removing users from a list" do +    %{user: user, conn: conn} = oauth_access(["write:lists"]) +    other_user = insert(:user) +    third_user = insert(:user) +    {:ok, list} = Pleroma.List.create("name", user) +    {:ok, list} = Pleroma.List.follow(list, other_user) +    {:ok, list} = Pleroma.List.follow(list, third_user) + +    conn = delete(conn, "/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) + +    assert %{} == json_response(conn, 200) +    %Pleroma.List{following: following} = Pleroma.List.get(list.id, user) +    assert following == [third_user.follower_address] +  end + +  test "listing users in a list" do +    %{user: user, conn: conn} = oauth_access(["read:lists"]) +    other_user = insert(:user) +    {:ok, list} = Pleroma.List.create("name", user) +    {:ok, list} = Pleroma.List.follow(list, other_user) + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) + +    assert [%{"id" => id}] = json_response(conn, 200) +    assert id == to_string(other_user.id) +  end + +  test "retrieving a list" do +    %{user: user, conn: conn} = oauth_access(["read:lists"]) +    {:ok, list} = Pleroma.List.create("name", user) + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/lists/#{list.id}") + +    assert %{"id" => id} = json_response(conn, 200) +    assert id == to_string(list.id) +  end + +  test "renders 404 if list is not found" do +    %{conn: conn} = oauth_access(["read:lists"]) + +    conn = get(conn, "/api/v1/lists/666") + +    assert %{"error" => "List not found"} = json_response(conn, :not_found) +  end + +  test "renaming a list" do +    %{user: user, conn: conn} = oauth_access(["write:lists"]) +    {:ok, list} = Pleroma.List.create("name", user) + +    conn = put(conn, "/api/v1/lists/#{list.id}", %{"title" => "newname"}) + +    assert %{"title" => name} = json_response(conn, 200) +    assert name == "newname" +  end + +  test "validates title when renaming a list" do +    %{user: user, conn: conn} = oauth_access(["write:lists"]) +    {:ok, list} = Pleroma.List.create("name", user) + +    conn = +      conn +      |> assign(:user, user) +      |> put("/api/v1/lists/#{list.id}", %{"title" => "  "}) + +    assert %{"error" => "can't be blank"} == json_response(conn, :unprocessable_entity) +  end + +  test "deleting a list" do +    %{user: user, conn: conn} = oauth_access(["write:lists"]) +    {:ok, list} = Pleroma.List.create("name", user) + +    conn = delete(conn, "/api/v1/lists/#{list.id}") + +    assert %{} = json_response(conn, 200) +    assert is_nil(Repo.get(Pleroma.List, list.id)) +  end +end diff --git a/test/web/mastodon_api/controllers/marker_controller_test.exs b/test/web/mastodon_api/controllers/marker_controller_test.exs new file mode 100644 index 000000000..1fcad873d --- /dev/null +++ b/test/web/mastodon_api/controllers/marker_controller_test.exs @@ -0,0 +1,124 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.MarkerControllerTest do +  use Pleroma.Web.ConnCase + +  import Pleroma.Factory + +  describe "GET /api/v1/markers" do +    test "gets markers with correct scopes", %{conn: conn} do +      user = insert(:user) +      token = insert(:oauth_token, user: user, scopes: ["read:statuses"]) + +      {:ok, %{"notifications" => marker}} = +        Pleroma.Marker.upsert( +          user, +          %{"notifications" => %{"last_read_id" => "69420"}} +        ) + +      response = +        conn +        |> assign(:user, user) +        |> assign(:token, token) +        |> get("/api/v1/markers", %{timeline: ["notifications"]}) +        |> json_response(200) + +      assert response == %{ +               "notifications" => %{ +                 "last_read_id" => "69420", +                 "updated_at" => NaiveDateTime.to_iso8601(marker.updated_at), +                 "version" => 0 +               } +             } +    end + +    test "gets markers with missed scopes", %{conn: conn} do +      user = insert(:user) +      token = insert(:oauth_token, user: user, scopes: []) + +      Pleroma.Marker.upsert(user, %{"notifications" => %{"last_read_id" => "69420"}}) + +      response = +        conn +        |> assign(:user, user) +        |> assign(:token, token) +        |> get("/api/v1/markers", %{timeline: ["notifications"]}) +        |> json_response(403) + +      assert response == %{"error" => "Insufficient permissions: read:statuses."} +    end +  end + +  describe "POST /api/v1/markers" do +    test "creates a marker with correct scopes", %{conn: conn} do +      user = insert(:user) +      token = insert(:oauth_token, user: user, scopes: ["write:statuses"]) + +      response = +        conn +        |> assign(:user, user) +        |> assign(:token, token) +        |> post("/api/v1/markers", %{ +          home: %{last_read_id: "777"}, +          notifications: %{"last_read_id" => "69420"} +        }) +        |> json_response(200) + +      assert %{ +               "notifications" => %{ +                 "last_read_id" => "69420", +                 "updated_at" => _, +                 "version" => 0 +               } +             } = response +    end + +    test "updates exist marker", %{conn: conn} do +      user = insert(:user) +      token = insert(:oauth_token, user: user, scopes: ["write:statuses"]) + +      {:ok, %{"notifications" => marker}} = +        Pleroma.Marker.upsert( +          user, +          %{"notifications" => %{"last_read_id" => "69477"}} +        ) + +      response = +        conn +        |> assign(:user, user) +        |> assign(:token, token) +        |> post("/api/v1/markers", %{ +          home: %{last_read_id: "777"}, +          notifications: %{"last_read_id" => "69888"} +        }) +        |> json_response(200) + +      assert response == %{ +               "notifications" => %{ +                 "last_read_id" => "69888", +                 "updated_at" => NaiveDateTime.to_iso8601(marker.updated_at), +                 "version" => 0 +               } +             } +    end + +    test "creates a marker with missed scopes", %{conn: conn} do +      user = insert(:user) +      token = insert(:oauth_token, user: user, scopes: []) + +      response = +        conn +        |> assign(:user, user) +        |> assign(:token, token) +        |> post("/api/v1/markers", %{ +          home: %{last_read_id: "777"}, +          notifications: %{"last_read_id" => "69420"} +        }) +        |> json_response(403) + +      assert response == %{"error" => "Insufficient permissions: write:statuses."} +    end +  end +end diff --git a/test/web/mastodon_api/controllers/media_controller_test.exs b/test/web/mastodon_api/controllers/media_controller_test.exs new file mode 100644 index 000000000..042511ca4 --- /dev/null +++ b/test/web/mastodon_api/controllers/media_controller_test.exs @@ -0,0 +1,82 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.MediaControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Object +  alias Pleroma.User +  alias Pleroma.Web.ActivityPub.ActivityPub + +  setup do: oauth_access(["write:media"]) + +  describe "media upload" do +    setup do +      image = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      [image: image] +    end + +    clear_config([:media_proxy]) +    clear_config([Pleroma.Upload]) + +    test "returns uploaded image", %{conn: conn, image: image} do +      desc = "Description of the image" + +      media = +        conn +        |> post("/api/v1/media", %{"file" => image, "description" => desc}) +        |> json_response(:ok) + +      assert media["type"] == "image" +      assert media["description"] == desc +      assert media["id"] + +      object = Object.get_by_id(media["id"]) +      assert object.data["actor"] == User.ap_id(conn.assigns[:user]) +    end +  end + +  describe "PUT /api/v1/media/:id" do +    setup %{user: actor} do +      file = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      {:ok, %Object{} = object} = +        ActivityPub.upload( +          file, +          actor: User.ap_id(actor), +          description: "test-m" +        ) + +      [object: object] +    end + +    test "updates name of media", %{conn: conn, object: object} do +      media = +        conn +        |> put("/api/v1/media/#{object.id}", %{"description" => "test-media"}) +        |> json_response(:ok) + +      assert media["description"] == "test-media" +      assert refresh_record(object).data["name"] == "test-media" +    end + +    test "returns error when request is bad", %{conn: conn, object: object} do +      media = +        conn +        |> put("/api/v1/media/#{object.id}", %{}) +        |> json_response(400) + +      assert media == %{"error" => "bad_request"} +    end +  end +end diff --git a/test/web/mastodon_api/controllers/notification_controller_test.exs b/test/web/mastodon_api/controllers/notification_controller_test.exs new file mode 100644 index 000000000..6f0606250 --- /dev/null +++ b/test/web/mastodon_api/controllers/notification_controller_test.exs @@ -0,0 +1,490 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.NotificationControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Notification +  alias Pleroma.Repo +  alias Pleroma.User +  alias Pleroma.Web.CommonAPI + +  import Pleroma.Factory + +  test "list of notifications" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    other_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) + +    {:ok, [_notification]} = Notification.create_notifications(activity) + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/notifications") + +    expected_response = +      "hi <span class=\"h-card\"><a data-user=\"#{user.id}\" class=\"u-url mention\" href=\"#{ +        user.ap_id +      }\" rel=\"ugc\">@<span>#{user.nickname}</span></a></span>" + +    assert [%{"status" => %{"content" => response}} | _rest] = json_response(conn, 200) +    assert response == expected_response +  end + +  test "getting a single notification" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    other_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) + +    {:ok, [notification]} = Notification.create_notifications(activity) + +    conn = get(conn, "/api/v1/notifications/#{notification.id}") + +    expected_response = +      "hi <span class=\"h-card\"><a data-user=\"#{user.id}\" class=\"u-url mention\" href=\"#{ +        user.ap_id +      }\" rel=\"ugc\">@<span>#{user.nickname}</span></a></span>" + +    assert %{"status" => %{"content" => response}} = json_response(conn, 200) +    assert response == expected_response +  end + +  test "dismissing a single notification" do +    %{user: user, conn: conn} = oauth_access(["write:notifications"]) +    other_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) + +    {:ok, [notification]} = Notification.create_notifications(activity) + +    conn = +      conn +      |> assign(:user, user) +      |> post("/api/v1/notifications/dismiss", %{"id" => notification.id}) + +    assert %{} = json_response(conn, 200) +  end + +  test "clearing all notifications" do +    %{user: user, conn: conn} = oauth_access(["write:notifications", "read:notifications"]) +    other_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) + +    {:ok, [_notification]} = Notification.create_notifications(activity) + +    ret_conn = post(conn, "/api/v1/notifications/clear") + +    assert %{} = json_response(ret_conn, 200) + +    ret_conn = get(conn, "/api/v1/notifications") + +    assert all = json_response(ret_conn, 200) +    assert all == [] +  end + +  test "paginates notifications using min_id, since_id, max_id, and limit" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    other_user = insert(:user) + +    {:ok, activity1} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) +    {:ok, activity2} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) +    {:ok, activity3} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) +    {:ok, activity4} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) + +    notification1_id = get_notification_id_by_activity(activity1) +    notification2_id = get_notification_id_by_activity(activity2) +    notification3_id = get_notification_id_by_activity(activity3) +    notification4_id = get_notification_id_by_activity(activity4) + +    conn = assign(conn, :user, user) + +    # min_id +    result = +      conn +      |> get("/api/v1/notifications?limit=2&min_id=#{notification1_id}") +      |> json_response(:ok) + +    assert [%{"id" => ^notification3_id}, %{"id" => ^notification2_id}] = result + +    # since_id +    result = +      conn +      |> get("/api/v1/notifications?limit=2&since_id=#{notification1_id}") +      |> json_response(:ok) + +    assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result + +    # max_id +    result = +      conn +      |> get("/api/v1/notifications?limit=2&max_id=#{notification4_id}") +      |> json_response(:ok) + +    assert [%{"id" => ^notification3_id}, %{"id" => ^notification2_id}] = result +  end + +  describe "exclude_visibilities" do +    test "filters notifications for mentions" do +      %{user: user, conn: conn} = oauth_access(["read:notifications"]) +      other_user = insert(:user) + +      {:ok, public_activity} = +        CommonAPI.post(other_user, %{"status" => "@#{user.nickname}", "visibility" => "public"}) + +      {:ok, direct_activity} = +        CommonAPI.post(other_user, %{"status" => "@#{user.nickname}", "visibility" => "direct"}) + +      {:ok, unlisted_activity} = +        CommonAPI.post(other_user, %{"status" => "@#{user.nickname}", "visibility" => "unlisted"}) + +      {:ok, private_activity} = +        CommonAPI.post(other_user, %{"status" => "@#{user.nickname}", "visibility" => "private"}) + +      conn_res = +        get(conn, "/api/v1/notifications", %{ +          exclude_visibilities: ["public", "unlisted", "private"] +        }) + +      assert [%{"status" => %{"id" => id}}] = json_response(conn_res, 200) +      assert id == direct_activity.id + +      conn_res = +        get(conn, "/api/v1/notifications", %{ +          exclude_visibilities: ["public", "unlisted", "direct"] +        }) + +      assert [%{"status" => %{"id" => id}}] = json_response(conn_res, 200) +      assert id == private_activity.id + +      conn_res = +        get(conn, "/api/v1/notifications", %{ +          exclude_visibilities: ["public", "private", "direct"] +        }) + +      assert [%{"status" => %{"id" => id}}] = json_response(conn_res, 200) +      assert id == unlisted_activity.id + +      conn_res = +        get(conn, "/api/v1/notifications", %{ +          exclude_visibilities: ["unlisted", "private", "direct"] +        }) + +      assert [%{"status" => %{"id" => id}}] = json_response(conn_res, 200) +      assert id == public_activity.id +    end + +    test "filters notifications for Like activities" do +      user = insert(:user) +      %{user: other_user, conn: conn} = oauth_access(["read:notifications"]) + +      {:ok, public_activity} = +        CommonAPI.post(other_user, %{"status" => ".", "visibility" => "public"}) + +      {:ok, direct_activity} = +        CommonAPI.post(other_user, %{"status" => "@#{user.nickname}", "visibility" => "direct"}) + +      {:ok, unlisted_activity} = +        CommonAPI.post(other_user, %{"status" => ".", "visibility" => "unlisted"}) + +      {:ok, private_activity} = +        CommonAPI.post(other_user, %{"status" => ".", "visibility" => "private"}) + +      {:ok, _, _} = CommonAPI.favorite(public_activity.id, user) +      {:ok, _, _} = CommonAPI.favorite(direct_activity.id, user) +      {:ok, _, _} = CommonAPI.favorite(unlisted_activity.id, user) +      {:ok, _, _} = CommonAPI.favorite(private_activity.id, user) + +      activity_ids = +        conn +        |> get("/api/v1/notifications", %{exclude_visibilities: ["direct"]}) +        |> json_response(200) +        |> Enum.map(& &1["status"]["id"]) + +      assert public_activity.id in activity_ids +      assert unlisted_activity.id in activity_ids +      assert private_activity.id in activity_ids +      refute direct_activity.id in activity_ids + +      activity_ids = +        conn +        |> get("/api/v1/notifications", %{exclude_visibilities: ["unlisted"]}) +        |> json_response(200) +        |> Enum.map(& &1["status"]["id"]) + +      assert public_activity.id in activity_ids +      refute unlisted_activity.id in activity_ids +      assert private_activity.id in activity_ids +      assert direct_activity.id in activity_ids + +      activity_ids = +        conn +        |> get("/api/v1/notifications", %{exclude_visibilities: ["private"]}) +        |> json_response(200) +        |> Enum.map(& &1["status"]["id"]) + +      assert public_activity.id in activity_ids +      assert unlisted_activity.id in activity_ids +      refute private_activity.id in activity_ids +      assert direct_activity.id in activity_ids + +      activity_ids = +        conn +        |> get("/api/v1/notifications", %{exclude_visibilities: ["public"]}) +        |> json_response(200) +        |> Enum.map(& &1["status"]["id"]) + +      refute public_activity.id in activity_ids +      assert unlisted_activity.id in activity_ids +      assert private_activity.id in activity_ids +      assert direct_activity.id in activity_ids +    end + +    test "filters notifications for Announce activities" do +      user = insert(:user) +      %{user: other_user, conn: conn} = oauth_access(["read:notifications"]) + +      {:ok, public_activity} = +        CommonAPI.post(other_user, %{"status" => ".", "visibility" => "public"}) + +      {:ok, unlisted_activity} = +        CommonAPI.post(other_user, %{"status" => ".", "visibility" => "unlisted"}) + +      {:ok, _, _} = CommonAPI.repeat(public_activity.id, user) +      {:ok, _, _} = CommonAPI.repeat(unlisted_activity.id, user) + +      activity_ids = +        conn +        |> get("/api/v1/notifications", %{exclude_visibilities: ["unlisted"]}) +        |> json_response(200) +        |> Enum.map(& &1["status"]["id"]) + +      assert public_activity.id in activity_ids +      refute unlisted_activity.id in activity_ids +    end +  end + +  test "filters notifications using exclude_types" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    other_user = insert(:user) + +    {:ok, mention_activity} = CommonAPI.post(other_user, %{"status" => "hey @#{user.nickname}"}) +    {:ok, create_activity} = CommonAPI.post(user, %{"status" => "hey"}) +    {:ok, favorite_activity, _} = CommonAPI.favorite(create_activity.id, other_user) +    {:ok, reblog_activity, _} = CommonAPI.repeat(create_activity.id, other_user) +    {:ok, _, _, follow_activity} = CommonAPI.follow(other_user, user) + +    mention_notification_id = get_notification_id_by_activity(mention_activity) +    favorite_notification_id = get_notification_id_by_activity(favorite_activity) +    reblog_notification_id = get_notification_id_by_activity(reblog_activity) +    follow_notification_id = get_notification_id_by_activity(follow_activity) + +    conn_res = +      get(conn, "/api/v1/notifications", %{exclude_types: ["mention", "favourite", "reblog"]}) + +    assert [%{"id" => ^follow_notification_id}] = json_response(conn_res, 200) + +    conn_res = +      get(conn, "/api/v1/notifications", %{exclude_types: ["favourite", "reblog", "follow"]}) + +    assert [%{"id" => ^mention_notification_id}] = json_response(conn_res, 200) + +    conn_res = +      get(conn, "/api/v1/notifications", %{exclude_types: ["reblog", "follow", "mention"]}) + +    assert [%{"id" => ^favorite_notification_id}] = json_response(conn_res, 200) + +    conn_res = +      get(conn, "/api/v1/notifications", %{exclude_types: ["follow", "mention", "favourite"]}) + +    assert [%{"id" => ^reblog_notification_id}] = json_response(conn_res, 200) +  end + +  test "destroy multiple" do +    %{user: user, conn: conn} = oauth_access(["read:notifications", "write:notifications"]) +    other_user = insert(:user) + +    {:ok, activity1} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) +    {:ok, activity2} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) +    {:ok, activity3} = CommonAPI.post(user, %{"status" => "hi @#{other_user.nickname}"}) +    {:ok, activity4} = CommonAPI.post(user, %{"status" => "hi @#{other_user.nickname}"}) + +    notification1_id = get_notification_id_by_activity(activity1) +    notification2_id = get_notification_id_by_activity(activity2) +    notification3_id = get_notification_id_by_activity(activity3) +    notification4_id = get_notification_id_by_activity(activity4) + +    result = +      conn +      |> get("/api/v1/notifications") +      |> json_response(:ok) + +    assert [%{"id" => ^notification2_id}, %{"id" => ^notification1_id}] = result + +    conn2 = +      conn +      |> assign(:user, other_user) +      |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:notifications"])) + +    result = +      conn2 +      |> get("/api/v1/notifications") +      |> json_response(:ok) + +    assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result + +    conn_destroy = +      conn +      |> delete("/api/v1/notifications/destroy_multiple", %{ +        "ids" => [notification1_id, notification2_id] +      }) + +    assert json_response(conn_destroy, 200) == %{} + +    result = +      conn2 +      |> get("/api/v1/notifications") +      |> json_response(:ok) + +    assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result +  end + +  test "doesn't see notifications after muting user with notifications" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    user2 = insert(:user) + +    {:ok, _, _, _} = CommonAPI.follow(user, user2) +    {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) + +    ret_conn = get(conn, "/api/v1/notifications") + +    assert length(json_response(ret_conn, 200)) == 1 + +    {:ok, _user_relationships} = User.mute(user, user2) + +    conn = get(conn, "/api/v1/notifications") + +    assert json_response(conn, 200) == [] +  end + +  test "see notifications after muting user without notifications" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    user2 = insert(:user) + +    {:ok, _, _, _} = CommonAPI.follow(user, user2) +    {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) + +    ret_conn = get(conn, "/api/v1/notifications") + +    assert length(json_response(ret_conn, 200)) == 1 + +    {:ok, _user_relationships} = User.mute(user, user2, false) + +    conn = get(conn, "/api/v1/notifications") + +    assert length(json_response(conn, 200)) == 1 +  end + +  test "see notifications after muting user with notifications and with_muted parameter" do +    %{user: user, conn: conn} = oauth_access(["read:notifications"]) +    user2 = insert(:user) + +    {:ok, _, _, _} = CommonAPI.follow(user, user2) +    {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) + +    ret_conn = get(conn, "/api/v1/notifications") + +    assert length(json_response(ret_conn, 200)) == 1 + +    {:ok, _user_relationships} = User.mute(user, user2) + +    conn = get(conn, "/api/v1/notifications", %{"with_muted" => "true"}) + +    assert length(json_response(conn, 200)) == 1 +  end + +  test "see move notifications with `with_move` parameter" do +    old_user = insert(:user) +    new_user = insert(:user, also_known_as: [old_user.ap_id]) +    %{user: follower, conn: conn} = oauth_access(["read:notifications"]) + +    User.follow(follower, old_user) +    Pleroma.Web.ActivityPub.ActivityPub.move(old_user, new_user) +    Pleroma.Tests.ObanHelpers.perform_all() + +    ret_conn = get(conn, "/api/v1/notifications") + +    assert json_response(ret_conn, 200) == [] + +    conn = get(conn, "/api/v1/notifications", %{"with_move" => "true"}) + +    assert length(json_response(conn, 200)) == 1 +  end + +  describe "link headers" do +    test "preserves parameters in link headers" do +      %{user: user, conn: conn} = oauth_access(["read:notifications"]) +      other_user = insert(:user) + +      {:ok, activity1} = +        CommonAPI.post(other_user, %{ +          "status" => "hi @#{user.nickname}", +          "visibility" => "public" +        }) + +      {:ok, activity2} = +        CommonAPI.post(other_user, %{ +          "status" => "hi @#{user.nickname}", +          "visibility" => "public" +        }) + +      notification1 = Repo.get_by(Notification, activity_id: activity1.id) +      notification2 = Repo.get_by(Notification, activity_id: activity2.id) + +      conn = +        conn +        |> assign(:user, user) +        |> get("/api/v1/notifications", %{media_only: true}) + +      assert [link_header] = get_resp_header(conn, "link") +      assert link_header =~ ~r/media_only=true/ +      assert link_header =~ ~r/min_id=#{notification2.id}/ +      assert link_header =~ ~r/max_id=#{notification1.id}/ +    end +  end + +  describe "from specified user" do +    test "account_id" do +      %{user: user, conn: conn} = oauth_access(["read:notifications"]) + +      %{id: account_id} = other_user1 = insert(:user) +      other_user2 = insert(:user) + +      {:ok, _activity} = CommonAPI.post(other_user1, %{"status" => "hi @#{user.nickname}"}) +      {:ok, _activity} = CommonAPI.post(other_user2, %{"status" => "bye @#{user.nickname}"}) + +      assert [%{"account" => %{"id" => ^account_id}}] = +               conn +               |> assign(:user, user) +               |> get("/api/v1/notifications", %{account_id: account_id}) +               |> json_response(200) + +      assert %{"error" => "Account is not found"} = +               conn +               |> assign(:user, user) +               |> get("/api/v1/notifications", %{account_id: "cofe"}) +               |> json_response(404) +    end +  end + +  defp get_notification_id_by_activity(%{id: id}) do +    Notification +    |> Repo.get_by(activity_id: id) +    |> Map.get(:id) +    |> to_string() +  end +end diff --git a/test/web/mastodon_api/controllers/poll_controller_test.exs b/test/web/mastodon_api/controllers/poll_controller_test.exs new file mode 100644 index 000000000..5a1cea11b --- /dev/null +++ b/test/web/mastodon_api/controllers/poll_controller_test.exs @@ -0,0 +1,157 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.PollControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Object +  alias Pleroma.Web.CommonAPI + +  import Pleroma.Factory + +  describe "GET /api/v1/polls/:id" do +    setup do: oauth_access(["read:statuses"]) + +    test "returns poll entity for object id", %{user: user, conn: conn} do +      {:ok, activity} = +        CommonAPI.post(user, %{ +          "status" => "Pleroma does", +          "poll" => %{"options" => ["what Mastodon't", "n't what Mastodoes"], "expires_in" => 20} +        }) + +      object = Object.normalize(activity) + +      conn = get(conn, "/api/v1/polls/#{object.id}") + +      response = json_response(conn, 200) +      id = to_string(object.id) +      assert %{"id" => ^id, "expired" => false, "multiple" => false} = response +    end + +    test "does not expose polls for private statuses", %{conn: conn} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(other_user, %{ +          "status" => "Pleroma does", +          "poll" => %{"options" => ["what Mastodon't", "n't what Mastodoes"], "expires_in" => 20}, +          "visibility" => "private" +        }) + +      object = Object.normalize(activity) + +      conn = get(conn, "/api/v1/polls/#{object.id}") + +      assert json_response(conn, 404) +    end +  end + +  describe "POST /api/v1/polls/:id/votes" do +    setup do: oauth_access(["write:statuses"]) + +    test "votes are added to the poll", %{conn: conn} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(other_user, %{ +          "status" => "A very delicious sandwich", +          "poll" => %{ +            "options" => ["Lettuce", "Grilled Bacon", "Tomato"], +            "expires_in" => 20, +            "multiple" => true +          } +        }) + +      object = Object.normalize(activity) + +      conn = post(conn, "/api/v1/polls/#{object.id}/votes", %{"choices" => [0, 1, 2]}) + +      assert json_response(conn, 200) +      object = Object.get_by_id(object.id) + +      assert Enum.all?(object.data["anyOf"], fn %{"replies" => %{"totalItems" => total_items}} -> +               total_items == 1 +             end) +    end + +    test "author can't vote", %{user: user, conn: conn} do +      {:ok, activity} = +        CommonAPI.post(user, %{ +          "status" => "Am I cute?", +          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20} +        }) + +      object = Object.normalize(activity) + +      assert conn +             |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [1]}) +             |> json_response(422) == %{"error" => "Poll's author can't vote"} + +      object = Object.get_by_id(object.id) + +      refute Enum.at(object.data["oneOf"], 1)["replies"]["totalItems"] == 1 +    end + +    test "does not allow multiple choices on a single-choice question", %{conn: conn} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(other_user, %{ +          "status" => "The glass is", +          "poll" => %{"options" => ["half empty", "half full"], "expires_in" => 20} +        }) + +      object = Object.normalize(activity) + +      assert conn +             |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [0, 1]}) +             |> json_response(422) == %{"error" => "Too many choices"} + +      object = Object.get_by_id(object.id) + +      refute Enum.any?(object.data["oneOf"], fn %{"replies" => %{"totalItems" => total_items}} -> +               total_items == 1 +             end) +    end + +    test "does not allow choice index to be greater than options count", %{conn: conn} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(other_user, %{ +          "status" => "Am I cute?", +          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20} +        }) + +      object = Object.normalize(activity) + +      conn = post(conn, "/api/v1/polls/#{object.id}/votes", %{"choices" => [2]}) + +      assert json_response(conn, 422) == %{"error" => "Invalid indices"} +    end + +    test "returns 404 error when object is not exist", %{conn: conn} do +      conn = post(conn, "/api/v1/polls/1/votes", %{"choices" => [0]}) + +      assert json_response(conn, 404) == %{"error" => "Record not found"} +    end + +    test "returns 404 when poll is private and not available for user", %{conn: conn} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(other_user, %{ +          "status" => "Am I cute?", +          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20}, +          "visibility" => "private" +        }) + +      object = Object.normalize(activity) + +      conn = post(conn, "/api/v1/polls/#{object.id}/votes", %{"choices" => [0]}) + +      assert json_response(conn, 404) == %{"error" => "Record not found"} +    end +  end +end diff --git a/test/web/mastodon_api/controllers/report_controller_test.exs b/test/web/mastodon_api/controllers/report_controller_test.exs new file mode 100644 index 000000000..53c132ff4 --- /dev/null +++ b/test/web/mastodon_api/controllers/report_controller_test.exs @@ -0,0 +1,78 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ReportControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Web.CommonAPI + +  import Pleroma.Factory + +  setup do: oauth_access(["write:reports"]) + +  setup do +    target_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(target_user, %{"status" => "foobar"}) + +    [target_user: target_user, activity: activity] +  end + +  test "submit a basic report", %{conn: conn, target_user: target_user} do +    assert %{"action_taken" => false, "id" => _} = +             conn +             |> post("/api/v1/reports", %{"account_id" => target_user.id}) +             |> json_response(200) +  end + +  test "submit a report with statuses and comment", %{ +    conn: conn, +    target_user: target_user, +    activity: activity +  } do +    assert %{"action_taken" => false, "id" => _} = +             conn +             |> post("/api/v1/reports", %{ +               "account_id" => target_user.id, +               "status_ids" => [activity.id], +               "comment" => "bad status!", +               "forward" => "false" +             }) +             |> json_response(200) +  end + +  test "account_id is required", %{ +    conn: conn, +    activity: activity +  } do +    assert %{"error" => "Valid `account_id` required"} = +             conn +             |> post("/api/v1/reports", %{"status_ids" => [activity.id]}) +             |> json_response(400) +  end + +  test "comment must be up to the size specified in the config", %{ +    conn: conn, +    target_user: target_user +  } do +    max_size = Pleroma.Config.get([:instance, :max_report_comment_size], 1000) +    comment = String.pad_trailing("a", max_size + 1, "a") + +    error = %{"error" => "Comment must be up to #{max_size} characters"} + +    assert ^error = +             conn +             |> post("/api/v1/reports", %{"account_id" => target_user.id, "comment" => comment}) +             |> json_response(400) +  end + +  test "returns error when account is not exist", %{ +    conn: conn, +    activity: activity +  } do +    conn = post(conn, "/api/v1/reports", %{"status_ids" => [activity.id], "account_id" => "foo"}) + +    assert json_response(conn, 400) == %{"error" => "Account not found"} +  end +end diff --git a/test/web/mastodon_api/controllers/scheduled_activity_controller_test.exs b/test/web/mastodon_api/controllers/scheduled_activity_controller_test.exs new file mode 100644 index 000000000..9666a7f2e --- /dev/null +++ b/test/web/mastodon_api/controllers/scheduled_activity_controller_test.exs @@ -0,0 +1,93 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ScheduledActivityControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Repo +  alias Pleroma.ScheduledActivity + +  import Pleroma.Factory + +  test "shows scheduled activities" do +    %{user: user, conn: conn} = oauth_access(["read:statuses"]) + +    scheduled_activity_id1 = insert(:scheduled_activity, user: user).id |> to_string() +    scheduled_activity_id2 = insert(:scheduled_activity, user: user).id |> to_string() +    scheduled_activity_id3 = insert(:scheduled_activity, user: user).id |> to_string() +    scheduled_activity_id4 = insert(:scheduled_activity, user: user).id |> to_string() + +    # min_id +    conn_res = get(conn, "/api/v1/scheduled_statuses?limit=2&min_id=#{scheduled_activity_id1}") + +    result = json_response(conn_res, 200) +    assert [%{"id" => ^scheduled_activity_id3}, %{"id" => ^scheduled_activity_id2}] = result + +    # since_id +    conn_res = get(conn, "/api/v1/scheduled_statuses?limit=2&since_id=#{scheduled_activity_id1}") + +    result = json_response(conn_res, 200) +    assert [%{"id" => ^scheduled_activity_id4}, %{"id" => ^scheduled_activity_id3}] = result + +    # max_id +    conn_res = get(conn, "/api/v1/scheduled_statuses?limit=2&max_id=#{scheduled_activity_id4}") + +    result = json_response(conn_res, 200) +    assert [%{"id" => ^scheduled_activity_id3}, %{"id" => ^scheduled_activity_id2}] = result +  end + +  test "shows a scheduled activity" do +    %{user: user, conn: conn} = oauth_access(["read:statuses"]) +    scheduled_activity = insert(:scheduled_activity, user: user) + +    res_conn = get(conn, "/api/v1/scheduled_statuses/#{scheduled_activity.id}") + +    assert %{"id" => scheduled_activity_id} = json_response(res_conn, 200) +    assert scheduled_activity_id == scheduled_activity.id |> to_string() + +    res_conn = get(conn, "/api/v1/scheduled_statuses/404") + +    assert %{"error" => "Record not found"} = json_response(res_conn, 404) +  end + +  test "updates a scheduled activity" do +    %{user: user, conn: conn} = oauth_access(["write:statuses"]) +    scheduled_activity = insert(:scheduled_activity, user: user) + +    new_scheduled_at = +      NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) + +    res_conn = +      put(conn, "/api/v1/scheduled_statuses/#{scheduled_activity.id}", %{ +        scheduled_at: new_scheduled_at +      }) + +    assert %{"scheduled_at" => expected_scheduled_at} = json_response(res_conn, 200) +    assert expected_scheduled_at == Pleroma.Web.CommonAPI.Utils.to_masto_date(new_scheduled_at) + +    res_conn = put(conn, "/api/v1/scheduled_statuses/404", %{scheduled_at: new_scheduled_at}) + +    assert %{"error" => "Record not found"} = json_response(res_conn, 404) +  end + +  test "deletes a scheduled activity" do +    %{user: user, conn: conn} = oauth_access(["write:statuses"]) +    scheduled_activity = insert(:scheduled_activity, user: user) + +    res_conn = +      conn +      |> assign(:user, user) +      |> delete("/api/v1/scheduled_statuses/#{scheduled_activity.id}") + +    assert %{} = json_response(res_conn, 200) +    assert nil == Repo.get(ScheduledActivity, scheduled_activity.id) + +    res_conn = +      conn +      |> assign(:user, user) +      |> delete("/api/v1/scheduled_statuses/#{scheduled_activity.id}") + +    assert %{"error" => "Record not found"} = json_response(res_conn, 404) +  end +end diff --git a/test/web/mastodon_api/search_controller_test.exs b/test/web/mastodon_api/controllers/search_controller_test.exs index 043b96c14..effae130c 100644 --- a/test/web/mastodon_api/search_controller_test.exs +++ b/test/web/mastodon_api/controllers/search_controller_test.exs @@ -42,7 +42,7 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        user_two = insert(:user, %{nickname: "shp@shitposter.club"})        user_three = insert(:user, %{nickname: "shp@heldscal.la", name: "I love 2hu"}) -      {:ok, activity} = CommonAPI.post(user, %{"status" => "This is about 2hu private"}) +      {:ok, activity} = CommonAPI.post(user, %{"status" => "This is about 2hu private 天子"})        {:ok, _activity} =          CommonAPI.post(user, %{ @@ -52,9 +52,10 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        {:ok, _} = CommonAPI.post(user_two, %{"status" => "This isn't"}) -      conn = get(conn, "/api/v2/search", %{"q" => "2hu #private"}) - -      assert results = json_response(conn, 200) +      results = +        conn +        |> get("/api/v2/search", %{"q" => "2hu #private"}) +        |> json_response(200)        [account | _] = results["accounts"]        assert account["id"] == to_string(user_three.id) @@ -65,18 +66,47 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        [status] = results["statuses"]        assert status["id"] == to_string(activity.id) + +      results = +        get(conn, "/api/v2/search", %{"q" => "天子"}) +        |> json_response(200) + +      [status] = results["statuses"] +      assert status["id"] == to_string(activity.id) +    end + +    test "excludes a blocked users from search results", %{conn: conn} do +      user = insert(:user) +      user_smith = insert(:user, %{nickname: "Agent", name: "I love 2hu"}) +      user_neo = insert(:user, %{nickname: "Agent Neo", name: "Agent"}) + +      {:ok, act1} = CommonAPI.post(user, %{"status" => "This is about 2hu private 天子"}) +      {:ok, act2} = CommonAPI.post(user_smith, %{"status" => "Agent Smith"}) +      {:ok, act3} = CommonAPI.post(user_neo, %{"status" => "Agent Smith"}) +      Pleroma.User.block(user, user_smith) + +      results = +        conn +        |> assign(:user, user) +        |> assign(:token, insert(:oauth_token, user: user, scopes: ["read"])) +        |> get("/api/v2/search", %{"q" => "Agent"}) +        |> json_response(200) + +      status_ids = Enum.map(results["statuses"], fn g -> g["id"] end) + +      assert act3.id in status_ids +      refute act2.id in status_ids +      refute act1.id in status_ids      end    end    describe ".account_search" do      test "account search", %{conn: conn} do -      user = insert(:user)        user_two = insert(:user, %{nickname: "shp@shitposter.club"})        user_three = insert(:user, %{nickname: "shp@heldscal.la", name: "I love 2hu"})        results =          conn -        |> assign(:user, user)          |> get("/api/v1/accounts/search", %{"q" => "shp"})          |> json_response(200) @@ -87,7 +117,6 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        results =          conn -        |> assign(:user, user)          |> get("/api/v1/accounts/search", %{"q" => "2hu"})          |> json_response(200) @@ -95,6 +124,17 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        assert user_three.nickname in result_ids      end + +    test "returns account if query contains a space", %{conn: conn} do +      insert(:user, %{nickname: "shp@shitposter.club"}) + +      results = +        conn +        |> get("/api/v1/accounts/search", %{"q" => "shp@shitposter.club xxx "}) +        |> json_response(200) + +      assert length(results) == 1 +    end    end    describe ".search" do @@ -131,11 +171,10 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        {:ok, _} = CommonAPI.post(user_two, %{"status" => "This isn't"}) -      conn = +      results =          conn          |> get("/api/v1/search", %{"q" => "2hu"}) - -      assert results = json_response(conn, 200) +        |> json_response(200)        [account | _] = results["accounts"]        assert account["id"] == to_string(user_three.id) @@ -146,15 +185,19 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        assert status["id"] == to_string(activity.id)      end -    test "search fetches remote statuses", %{conn: conn} do +    test "search fetches remote statuses and prefers them over other results", %{conn: conn} do        capture_log(fn -> -        conn = +        {:ok, %{id: activity_id}} = +          CommonAPI.post(insert(:user), %{ +            "status" => "check out https://shitposter.club/notice/2827873" +          }) + +        results =            conn            |> get("/api/v1/search", %{"q" => "https://shitposter.club/notice/2827873"}) +          |> json_response(200) -        assert results = json_response(conn, 200) - -        [status] = results["statuses"] +        [status, %{"id" => ^activity_id}] = results["statuses"]          assert status["uri"] ==                   "tag:shitposter.club,2017-05-05:noticeId=2827873:objectType=comment" @@ -169,11 +212,10 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do          })        capture_log(fn -> -        conn = +        results =            conn            |> get("/api/v1/search", %{"q" => Object.normalize(activity).data["id"]}) - -        assert results = json_response(conn, 200) +          |> json_response(200)          [] = results["statuses"]        end) @@ -182,22 +224,23 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do      test "search fetches remote accounts", %{conn: conn} do        user = insert(:user) -      conn = +      results =          conn          |> assign(:user, user) -        |> get("/api/v1/search", %{"q" => "shp@social.heldscal.la", "resolve" => "true"}) +        |> assign(:token, insert(:oauth_token, user: user, scopes: ["read"])) +        |> get("/api/v1/search", %{"q" => "mike@osada.macgirvin.com", "resolve" => "true"}) +        |> json_response(200) -      assert results = json_response(conn, 200)        [account] = results["accounts"] -      assert account["acct"] == "shp@social.heldscal.la" +      assert account["acct"] == "mike@osada.macgirvin.com"      end      test "search doesn't fetch remote accounts if resolve is false", %{conn: conn} do -      conn = +      results =          conn -        |> get("/api/v1/search", %{"q" => "shp@social.heldscal.la", "resolve" => "false"}) +        |> get("/api/v1/search", %{"q" => "mike@osada.macgirvin.com", "resolve" => "false"}) +        |> json_response(200) -      assert results = json_response(conn, 200)        assert [] == results["accounts"]      end diff --git a/test/web/mastodon_api/controllers/status_controller_test.exs b/test/web/mastodon_api/controllers/status_controller_test.exs new file mode 100644 index 000000000..b03b4b344 --- /dev/null +++ b/test/web/mastodon_api/controllers/status_controller_test.exs @@ -0,0 +1,1226 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.StatusControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Activity +  alias Pleroma.ActivityExpiration +  alias Pleroma.Config +  alias Pleroma.Conversation.Participation +  alias Pleroma.Object +  alias Pleroma.Repo +  alias Pleroma.ScheduledActivity +  alias Pleroma.Tests.ObanHelpers +  alias Pleroma.User +  alias Pleroma.Web.ActivityPub.ActivityPub +  alias Pleroma.Web.CommonAPI + +  import Pleroma.Factory + +  clear_config([:instance, :federating]) +  clear_config([:instance, :allow_relay]) + +  describe "posting statuses" do +    setup do: oauth_access(["write:statuses"]) + +    test "posting a status does not increment reblog_count when relaying", %{conn: conn} do +      Pleroma.Config.put([:instance, :federating], true) +      Pleroma.Config.get([:instance, :allow_relay], true) + +      response = +        conn +        |> post("api/v1/statuses", %{ +          "content_type" => "text/plain", +          "source" => "Pleroma FE", +          "status" => "Hello world", +          "visibility" => "public" +        }) +        |> json_response(200) + +      assert response["reblogs_count"] == 0 +      ObanHelpers.perform_all() + +      response = +        conn +        |> get("api/v1/statuses/#{response["id"]}", %{}) +        |> json_response(200) + +      assert response["reblogs_count"] == 0 +    end + +    test "posting a status", %{conn: conn} do +      idempotency_key = "Pikachu rocks!" + +      conn_one = +        conn +        |> put_req_header("idempotency-key", idempotency_key) +        |> post("/api/v1/statuses", %{ +          "status" => "cofe", +          "spoiler_text" => "2hu", +          "sensitive" => "false" +        }) + +      {:ok, ttl} = Cachex.ttl(:idempotency_cache, idempotency_key) +      # Six hours +      assert ttl > :timer.seconds(6 * 60 * 60 - 1) + +      assert %{"content" => "cofe", "id" => id, "spoiler_text" => "2hu", "sensitive" => false} = +               json_response(conn_one, 200) + +      assert Activity.get_by_id(id) + +      conn_two = +        conn +        |> put_req_header("idempotency-key", idempotency_key) +        |> post("/api/v1/statuses", %{ +          "status" => "cofe", +          "spoiler_text" => "2hu", +          "sensitive" => "false" +        }) + +      assert %{"id" => second_id} = json_response(conn_two, 200) +      assert id == second_id + +      conn_three = +        conn +        |> post("/api/v1/statuses", %{ +          "status" => "cofe", +          "spoiler_text" => "2hu", +          "sensitive" => "false" +        }) + +      assert %{"id" => third_id} = json_response(conn_three, 200) +      refute id == third_id + +      # An activity that will expire: +      # 2 hours +      expires_in = 120 * 60 + +      conn_four = +        conn +        |> post("api/v1/statuses", %{ +          "status" => "oolong", +          "expires_in" => expires_in +        }) + +      assert fourth_response = %{"id" => fourth_id} = json_response(conn_four, 200) +      assert activity = Activity.get_by_id(fourth_id) +      assert expiration = ActivityExpiration.get_by_activity_id(fourth_id) + +      estimated_expires_at = +        NaiveDateTime.utc_now() +        |> NaiveDateTime.add(expires_in) +        |> NaiveDateTime.truncate(:second) + +      # This assert will fail if the test takes longer than a minute. I sure hope it never does: +      assert abs(NaiveDateTime.diff(expiration.scheduled_at, estimated_expires_at, :second)) < 60 + +      assert fourth_response["pleroma"]["expires_at"] == +               NaiveDateTime.to_iso8601(expiration.scheduled_at) +    end + +    test "posting an undefined status with an attachment", %{user: user, conn: conn} do +      file = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      {:ok, upload} = ActivityPub.upload(file, actor: user.ap_id) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "media_ids" => [to_string(upload.id)] +        }) + +      assert json_response(conn, 200) +    end + +    test "replying to a status", %{user: user, conn: conn} do +      {:ok, replied_to} = CommonAPI.post(user, %{"status" => "cofe"}) + +      conn = +        conn +        |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id}) + +      assert %{"content" => "xD", "id" => id} = json_response(conn, 200) + +      activity = Activity.get_by_id(id) + +      assert activity.data["context"] == replied_to.data["context"] +      assert Activity.get_in_reply_to_activity(activity).id == replied_to.id +    end + +    test "replying to a direct message with visibility other than direct", %{ +      user: user, +      conn: conn +    } do +      {:ok, replied_to} = CommonAPI.post(user, %{"status" => "suya..", "visibility" => "direct"}) + +      Enum.each(["public", "private", "unlisted"], fn visibility -> +        conn = +          conn +          |> post("/api/v1/statuses", %{ +            "status" => "@#{user.nickname} hey", +            "in_reply_to_id" => replied_to.id, +            "visibility" => visibility +          }) + +        assert json_response(conn, 422) == %{"error" => "The message visibility must be direct"} +      end) +    end + +    test "posting a status with an invalid in_reply_to_id", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => ""}) + +      assert %{"content" => "xD", "id" => id} = json_response(conn, 200) +      assert Activity.get_by_id(id) +    end + +    test "posting a sensitive status", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses", %{"status" => "cofe", "sensitive" => true}) + +      assert %{"content" => "cofe", "id" => id, "sensitive" => true} = json_response(conn, 200) +      assert Activity.get_by_id(id) +    end + +    test "posting a fake status", %{conn: conn} do +      real_conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => +            "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it" +        }) + +      real_status = json_response(real_conn, 200) + +      assert real_status +      assert Object.get_by_ap_id(real_status["uri"]) + +      real_status = +        real_status +        |> Map.put("id", nil) +        |> Map.put("url", nil) +        |> Map.put("uri", nil) +        |> Map.put("created_at", nil) +        |> Kernel.put_in(["pleroma", "conversation_id"], nil) + +      fake_conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => +            "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it", +          "preview" => true +        }) + +      fake_status = json_response(fake_conn, 200) + +      assert fake_status +      refute Object.get_by_ap_id(fake_status["uri"]) + +      fake_status = +        fake_status +        |> Map.put("id", nil) +        |> Map.put("url", nil) +        |> Map.put("uri", nil) +        |> Map.put("created_at", nil) +        |> Kernel.put_in(["pleroma", "conversation_id"], nil) + +      assert real_status == fake_status +    end + +    test "posting a status with OGP link preview", %{conn: conn} do +      Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end) +      Config.put([:rich_media, :enabled], true) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "https://example.com/ogp" +        }) + +      assert %{"id" => id, "card" => %{"title" => "The Rock"}} = json_response(conn, 200) +      assert Activity.get_by_id(id) +    end + +    test "posting a direct status", %{conn: conn} do +      user2 = insert(:user) +      content = "direct cofe @#{user2.nickname}" + +      conn = post(conn, "api/v1/statuses", %{"status" => content, "visibility" => "direct"}) + +      assert %{"id" => id} = response = json_response(conn, 200) +      assert response["visibility"] == "direct" +      assert response["pleroma"]["direct_conversation_id"] +      assert activity = Activity.get_by_id(id) +      assert activity.recipients == [user2.ap_id, conn.assigns[:user].ap_id] +      assert activity.data["to"] == [user2.ap_id] +      assert activity.data["cc"] == [] +    end +  end + +  describe "posting scheduled statuses" do +    setup do: oauth_access(["write:statuses"]) + +    test "creates a scheduled activity", %{conn: conn} do +      scheduled_at = NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "scheduled", +          "scheduled_at" => scheduled_at +        }) + +      assert %{"scheduled_at" => expected_scheduled_at} = json_response(conn, 200) +      assert expected_scheduled_at == CommonAPI.Utils.to_masto_date(scheduled_at) +      assert [] == Repo.all(Activity) +    end + +    test "creates a scheduled activity with a media attachment", %{user: user, conn: conn} do +      scheduled_at = NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) + +      file = %Plug.Upload{ +        content_type: "image/jpg", +        path: Path.absname("test/fixtures/image.jpg"), +        filename: "an_image.jpg" +      } + +      {:ok, upload} = ActivityPub.upload(file, actor: user.ap_id) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "media_ids" => [to_string(upload.id)], +          "status" => "scheduled", +          "scheduled_at" => scheduled_at +        }) + +      assert %{"media_attachments" => [media_attachment]} = json_response(conn, 200) +      assert %{"type" => "image"} = media_attachment +    end + +    test "skips the scheduling and creates the activity if scheduled_at is earlier than 5 minutes from now", +         %{conn: conn} do +      scheduled_at = +        NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(5) - 1, :millisecond) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "not scheduled", +          "scheduled_at" => scheduled_at +        }) + +      assert %{"content" => "not scheduled"} = json_response(conn, 200) +      assert [] == Repo.all(ScheduledActivity) +    end + +    test "returns error when daily user limit is exceeded", %{user: user, conn: conn} do +      today = +        NaiveDateTime.utc_now() +        |> NaiveDateTime.add(:timer.minutes(6), :millisecond) +        |> NaiveDateTime.to_iso8601() + +      attrs = %{params: %{}, scheduled_at: today} +      {:ok, _} = ScheduledActivity.create(user, attrs) +      {:ok, _} = ScheduledActivity.create(user, attrs) + +      conn = post(conn, "/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => today}) + +      assert %{"error" => "daily limit exceeded"} == json_response(conn, 422) +    end + +    test "returns error when total user limit is exceeded", %{user: user, conn: conn} do +      today = +        NaiveDateTime.utc_now() +        |> NaiveDateTime.add(:timer.minutes(6), :millisecond) +        |> NaiveDateTime.to_iso8601() + +      tomorrow = +        NaiveDateTime.utc_now() +        |> NaiveDateTime.add(:timer.hours(36), :millisecond) +        |> NaiveDateTime.to_iso8601() + +      attrs = %{params: %{}, scheduled_at: today} +      {:ok, _} = ScheduledActivity.create(user, attrs) +      {:ok, _} = ScheduledActivity.create(user, attrs) +      {:ok, _} = ScheduledActivity.create(user, %{params: %{}, scheduled_at: tomorrow}) + +      conn = +        post(conn, "/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => tomorrow}) + +      assert %{"error" => "total limit exceeded"} == json_response(conn, 422) +    end +  end + +  describe "posting polls" do +    setup do: oauth_access(["write:statuses"]) + +    test "posting a poll", %{conn: conn} do +      time = NaiveDateTime.utc_now() + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "Who is the #bestgrill?", +          "poll" => %{"options" => ["Rei", "Asuka", "Misato"], "expires_in" => 420} +        }) + +      response = json_response(conn, 200) + +      assert Enum.all?(response["poll"]["options"], fn %{"title" => title} -> +               title in ["Rei", "Asuka", "Misato"] +             end) + +      assert NaiveDateTime.diff(NaiveDateTime.from_iso8601!(response["poll"]["expires_at"]), time) in 420..430 +      refute response["poll"]["expred"] +    end + +    test "option limit is enforced", %{conn: conn} do +      limit = Config.get([:instance, :poll_limits, :max_options]) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "desu~", +          "poll" => %{"options" => Enum.map(0..limit, fn _ -> "desu" end), "expires_in" => 1} +        }) + +      %{"error" => error} = json_response(conn, 422) +      assert error == "Poll can't contain more than #{limit} options" +    end + +    test "option character limit is enforced", %{conn: conn} do +      limit = Config.get([:instance, :poll_limits, :max_option_chars]) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "...", +          "poll" => %{ +            "options" => [Enum.reduce(0..limit, "", fn _, acc -> acc <> "." end)], +            "expires_in" => 1 +          } +        }) + +      %{"error" => error} = json_response(conn, 422) +      assert error == "Poll options cannot be longer than #{limit} characters each" +    end + +    test "minimal date limit is enforced", %{conn: conn} do +      limit = Config.get([:instance, :poll_limits, :min_expiration]) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "imagine arbitrary limits", +          "poll" => %{ +            "options" => ["this post was made by pleroma gang"], +            "expires_in" => limit - 1 +          } +        }) + +      %{"error" => error} = json_response(conn, 422) +      assert error == "Expiration date is too soon" +    end + +    test "maximum date limit is enforced", %{conn: conn} do +      limit = Config.get([:instance, :poll_limits, :max_expiration]) + +      conn = +        post(conn, "/api/v1/statuses", %{ +          "status" => "imagine arbitrary limits", +          "poll" => %{ +            "options" => ["this post was made by pleroma gang"], +            "expires_in" => limit + 1 +          } +        }) + +      %{"error" => error} = json_response(conn, 422) +      assert error == "Expiration date is too far in the future" +    end +  end + +  test "get a status" do +    %{conn: conn} = oauth_access(["read:statuses"]) +    activity = insert(:note_activity) + +    conn = get(conn, "/api/v1/statuses/#{activity.id}") + +    assert %{"id" => id} = json_response(conn, 200) +    assert id == to_string(activity.id) +  end + +  test "get a direct status" do +    %{user: user, conn: conn} = oauth_access(["read:statuses"]) +    other_user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{"status" => "@#{other_user.nickname}", "visibility" => "direct"}) + +    conn = +      conn +      |> assign(:user, user) +      |> get("/api/v1/statuses/#{activity.id}") + +    [participation] = Participation.for_user(user) + +    res = json_response(conn, 200) +    assert res["pleroma"]["direct_conversation_id"] == participation.id +  end + +  test "get statuses by IDs" do +    %{conn: conn} = oauth_access(["read:statuses"]) +    %{id: id1} = insert(:note_activity) +    %{id: id2} = insert(:note_activity) + +    query_string = "ids[]=#{id1}&ids[]=#{id2}" +    conn = get(conn, "/api/v1/statuses/?#{query_string}") + +    assert [%{"id" => ^id1}, %{"id" => ^id2}] = Enum.sort_by(json_response(conn, :ok), & &1["id"]) +  end + +  describe "deleting a status" do +    test "when you created it" do +      %{user: author, conn: conn} = oauth_access(["write:statuses"]) +      activity = insert(:note_activity, user: author) + +      conn = +        conn +        |> assign(:user, author) +        |> delete("/api/v1/statuses/#{activity.id}") + +      assert %{} = json_response(conn, 200) + +      refute Activity.get_by_id(activity.id) +    end + +    test "when you didn't create it" do +      %{conn: conn} = oauth_access(["write:statuses"]) +      activity = insert(:note_activity) + +      conn = delete(conn, "/api/v1/statuses/#{activity.id}") + +      assert %{"error" => _} = json_response(conn, 403) + +      assert Activity.get_by_id(activity.id) == activity +    end + +    test "when you're an admin or moderator", %{conn: conn} do +      activity1 = insert(:note_activity) +      activity2 = insert(:note_activity) +      admin = insert(:user, is_admin: true) +      moderator = insert(:user, is_moderator: true) + +      res_conn = +        conn +        |> assign(:user, admin) +        |> assign(:token, insert(:oauth_token, user: admin, scopes: ["write:statuses"])) +        |> delete("/api/v1/statuses/#{activity1.id}") + +      assert %{} = json_response(res_conn, 200) + +      res_conn = +        conn +        |> assign(:user, moderator) +        |> assign(:token, insert(:oauth_token, user: moderator, scopes: ["write:statuses"])) +        |> delete("/api/v1/statuses/#{activity2.id}") + +      assert %{} = json_response(res_conn, 200) + +      refute Activity.get_by_id(activity1.id) +      refute Activity.get_by_id(activity2.id) +    end +  end + +  describe "reblogging" do +    setup do: oauth_access(["write:statuses"]) + +    test "reblogs and returns the reblogged status", %{conn: conn} do +      activity = insert(:note_activity) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/reblog") + +      assert %{ +               "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}, +               "reblogged" => true +             } = json_response(conn, 200) + +      assert to_string(activity.id) == id +    end + +    test "reblogs privately and returns the reblogged status", %{conn: conn} do +      activity = insert(:note_activity) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/reblog", %{"visibility" => "private"}) + +      assert %{ +               "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}, +               "reblogged" => true, +               "visibility" => "private" +             } = json_response(conn, 200) + +      assert to_string(activity.id) == id +    end + +    test "reblogged status for another user" do +      activity = insert(:note_activity) +      user1 = insert(:user) +      user2 = insert(:user) +      user3 = insert(:user) +      CommonAPI.favorite(activity.id, user2) +      {:ok, _bookmark} = Pleroma.Bookmark.create(user2.id, activity.id) +      {:ok, reblog_activity1, _object} = CommonAPI.repeat(activity.id, user1) +      {:ok, _, _object} = CommonAPI.repeat(activity.id, user2) + +      conn_res = +        build_conn() +        |> assign(:user, user3) +        |> assign(:token, insert(:oauth_token, user: user3, scopes: ["read:statuses"])) +        |> get("/api/v1/statuses/#{reblog_activity1.id}") + +      assert %{ +               "reblog" => %{"id" => id, "reblogged" => false, "reblogs_count" => 2}, +               "reblogged" => false, +               "favourited" => false, +               "bookmarked" => false +             } = json_response(conn_res, 200) + +      conn_res = +        build_conn() +        |> assign(:user, user2) +        |> assign(:token, insert(:oauth_token, user: user2, scopes: ["read:statuses"])) +        |> get("/api/v1/statuses/#{reblog_activity1.id}") + +      assert %{ +               "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 2}, +               "reblogged" => true, +               "favourited" => true, +               "bookmarked" => true +             } = json_response(conn_res, 200) + +      assert to_string(activity.id) == id +    end + +    test "returns 400 error when activity is not exist", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses/foo/reblog") + +      assert json_response(conn, 400) == %{"error" => "Could not repeat"} +    end +  end + +  describe "unreblogging" do +    setup do: oauth_access(["write:statuses"]) + +    test "unreblogs and returns the unreblogged status", %{user: user, conn: conn} do +      activity = insert(:note_activity) + +      {:ok, _, _} = CommonAPI.repeat(activity.id, user) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/unreblog") + +      assert %{"id" => id, "reblogged" => false, "reblogs_count" => 0} = json_response(conn, 200) + +      assert to_string(activity.id) == id +    end + +    test "returns 400 error when activity is not exist", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses/foo/unreblog") + +      assert json_response(conn, 400) == %{"error" => "Could not unrepeat"} +    end +  end + +  describe "favoriting" do +    setup do: oauth_access(["write:favourites"]) + +    test "favs a status and returns it", %{conn: conn} do +      activity = insert(:note_activity) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/favourite") + +      assert %{"id" => id, "favourites_count" => 1, "favourited" => true} = +               json_response(conn, 200) + +      assert to_string(activity.id) == id +    end + +    test "favoriting twice will just return 200", %{conn: conn} do +      activity = insert(:note_activity) + +      post(conn, "/api/v1/statuses/#{activity.id}/favourite") +      assert post(conn, "/api/v1/statuses/#{activity.id}/favourite") |> json_response(200) +    end + +    test "returns 400 error for a wrong id", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses/1/favourite") + +      assert json_response(conn, 400) == %{"error" => "Could not favorite"} +    end +  end + +  describe "unfavoriting" do +    setup do: oauth_access(["write:favourites"]) + +    test "unfavorites a status and returns it", %{user: user, conn: conn} do +      activity = insert(:note_activity) + +      {:ok, _, _} = CommonAPI.favorite(activity.id, user) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/unfavourite") + +      assert %{"id" => id, "favourites_count" => 0, "favourited" => false} = +               json_response(conn, 200) + +      assert to_string(activity.id) == id +    end + +    test "returns 400 error for a wrong id", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses/1/unfavourite") + +      assert json_response(conn, 400) == %{"error" => "Could not unfavorite"} +    end +  end + +  describe "pinned statuses" do +    setup do: oauth_access(["write:accounts"]) + +    setup %{user: user} do +      {:ok, activity} = CommonAPI.post(user, %{"status" => "HI!!!"}) + +      %{activity: activity} +    end + +    clear_config([:instance, :max_pinned_statuses]) do +      Config.put([:instance, :max_pinned_statuses], 1) +    end + +    test "pin status", %{conn: conn, user: user, activity: activity} do +      id_str = to_string(activity.id) + +      assert %{"id" => ^id_str, "pinned" => true} = +               conn +               |> post("/api/v1/statuses/#{activity.id}/pin") +               |> json_response(200) + +      assert [%{"id" => ^id_str, "pinned" => true}] = +               conn +               |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") +               |> json_response(200) +    end + +    test "/pin: returns 400 error when activity is not public", %{conn: conn, user: user} do +      {:ok, dm} = CommonAPI.post(user, %{"status" => "test", "visibility" => "direct"}) + +      conn = post(conn, "/api/v1/statuses/#{dm.id}/pin") + +      assert json_response(conn, 400) == %{"error" => "Could not pin"} +    end + +    test "unpin status", %{conn: conn, user: user, activity: activity} do +      {:ok, _} = CommonAPI.pin(activity.id, user) +      user = refresh_record(user) + +      id_str = to_string(activity.id) + +      assert %{"id" => ^id_str, "pinned" => false} = +               conn +               |> assign(:user, user) +               |> post("/api/v1/statuses/#{activity.id}/unpin") +               |> json_response(200) + +      assert [] = +               conn +               |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") +               |> json_response(200) +    end + +    test "/unpin: returns 400 error when activity is not exist", %{conn: conn} do +      conn = post(conn, "/api/v1/statuses/1/unpin") + +      assert json_response(conn, 400) == %{"error" => "Could not unpin"} +    end + +    test "max pinned statuses", %{conn: conn, user: user, activity: activity_one} do +      {:ok, activity_two} = CommonAPI.post(user, %{"status" => "HI!!!"}) + +      id_str_one = to_string(activity_one.id) + +      assert %{"id" => ^id_str_one, "pinned" => true} = +               conn +               |> post("/api/v1/statuses/#{id_str_one}/pin") +               |> json_response(200) + +      user = refresh_record(user) + +      assert %{"error" => "You have already pinned the maximum number of statuses"} = +               conn +               |> assign(:user, user) +               |> post("/api/v1/statuses/#{activity_two.id}/pin") +               |> json_response(400) +    end +  end + +  describe "cards" do +    setup do +      Config.put([:rich_media, :enabled], true) + +      oauth_access(["read:statuses"]) +    end + +    test "returns rich-media card", %{conn: conn, user: user} do +      Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end) + +      {:ok, activity} = CommonAPI.post(user, %{"status" => "https://example.com/ogp"}) + +      card_data = %{ +        "image" => "http://ia.media-imdb.com/images/rock.jpg", +        "provider_name" => "example.com", +        "provider_url" => "https://example.com", +        "title" => "The Rock", +        "type" => "link", +        "url" => "https://example.com/ogp", +        "description" => +          "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer.", +        "pleroma" => %{ +          "opengraph" => %{ +            "image" => "http://ia.media-imdb.com/images/rock.jpg", +            "title" => "The Rock", +            "type" => "video.movie", +            "url" => "https://example.com/ogp", +            "description" => +              "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer." +          } +        } +      } + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/card") +        |> json_response(200) + +      assert response == card_data + +      # works with private posts +      {:ok, activity} = +        CommonAPI.post(user, %{"status" => "https://example.com/ogp", "visibility" => "direct"}) + +      response_two = +        conn +        |> get("/api/v1/statuses/#{activity.id}/card") +        |> json_response(200) + +      assert response_two == card_data +    end + +    test "replaces missing description with an empty string", %{conn: conn, user: user} do +      Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end) + +      {:ok, activity} = +        CommonAPI.post(user, %{"status" => "https://example.com/ogp-missing-data"}) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/card") +        |> json_response(:ok) + +      assert response == %{ +               "type" => "link", +               "title" => "Pleroma", +               "description" => "", +               "image" => nil, +               "provider_name" => "example.com", +               "provider_url" => "https://example.com", +               "url" => "https://example.com/ogp-missing-data", +               "pleroma" => %{ +                 "opengraph" => %{ +                   "title" => "Pleroma", +                   "type" => "website", +                   "url" => "https://example.com/ogp-missing-data" +                 } +               } +             } +    end +  end + +  test "bookmarks" do +    %{conn: conn} = oauth_access(["write:bookmarks", "read:bookmarks"]) +    author = insert(:user) + +    {:ok, activity1} = +      CommonAPI.post(author, %{ +        "status" => "heweoo?" +      }) + +    {:ok, activity2} = +      CommonAPI.post(author, %{ +        "status" => "heweoo!" +      }) + +    response1 = post(conn, "/api/v1/statuses/#{activity1.id}/bookmark") + +    assert json_response(response1, 200)["bookmarked"] == true + +    response2 = post(conn, "/api/v1/statuses/#{activity2.id}/bookmark") + +    assert json_response(response2, 200)["bookmarked"] == true + +    bookmarks = get(conn, "/api/v1/bookmarks") + +    assert [json_response(response2, 200), json_response(response1, 200)] == +             json_response(bookmarks, 200) + +    response1 = post(conn, "/api/v1/statuses/#{activity1.id}/unbookmark") + +    assert json_response(response1, 200)["bookmarked"] == false + +    bookmarks = get(conn, "/api/v1/bookmarks") + +    assert [json_response(response2, 200)] == json_response(bookmarks, 200) +  end + +  describe "conversation muting" do +    setup do: oauth_access(["write:mutes"]) + +    setup do +      post_user = insert(:user) +      {:ok, activity} = CommonAPI.post(post_user, %{"status" => "HIE"}) +      %{activity: activity} +    end + +    test "mute conversation", %{conn: conn, activity: activity} do +      id_str = to_string(activity.id) + +      assert %{"id" => ^id_str, "muted" => true} = +               conn +               |> post("/api/v1/statuses/#{activity.id}/mute") +               |> json_response(200) +    end + +    test "cannot mute already muted conversation", %{conn: conn, user: user, activity: activity} do +      {:ok, _} = CommonAPI.add_mute(user, activity) + +      conn = post(conn, "/api/v1/statuses/#{activity.id}/mute") + +      assert json_response(conn, 400) == %{"error" => "conversation is already muted"} +    end + +    test "unmute conversation", %{conn: conn, user: user, activity: activity} do +      {:ok, _} = CommonAPI.add_mute(user, activity) + +      id_str = to_string(activity.id) + +      assert %{"id" => ^id_str, "muted" => false} = +               conn +               # |> assign(:user, user) +               |> post("/api/v1/statuses/#{activity.id}/unmute") +               |> json_response(200) +    end +  end + +  test "Repeated posts that are replies incorrectly have in_reply_to_id null", %{conn: conn} do +    user1 = insert(:user) +    user2 = insert(:user) +    user3 = insert(:user) + +    {:ok, replied_to} = CommonAPI.post(user1, %{"status" => "cofe"}) + +    # Reply to status from another user +    conn1 = +      conn +      |> assign(:user, user2) +      |> assign(:token, insert(:oauth_token, user: user2, scopes: ["write:statuses"])) +      |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id}) + +    assert %{"content" => "xD", "id" => id} = json_response(conn1, 200) + +    activity = Activity.get_by_id_with_object(id) + +    assert Object.normalize(activity).data["inReplyTo"] == Object.normalize(replied_to).data["id"] +    assert Activity.get_in_reply_to_activity(activity).id == replied_to.id + +    # Reblog from the third user +    conn2 = +      conn +      |> assign(:user, user3) +      |> assign(:token, insert(:oauth_token, user: user3, scopes: ["write:statuses"])) +      |> post("/api/v1/statuses/#{activity.id}/reblog") + +    assert %{"reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}} = +             json_response(conn2, 200) + +    assert to_string(activity.id) == id + +    # Getting third user status +    conn3 = +      conn +      |> assign(:user, user3) +      |> assign(:token, insert(:oauth_token, user: user3, scopes: ["read:statuses"])) +      |> get("api/v1/timelines/home") + +    [reblogged_activity] = json_response(conn3, 200) + +    assert reblogged_activity["reblog"]["in_reply_to_id"] == replied_to.id + +    replied_to_user = User.get_by_ap_id(replied_to.data["actor"]) +    assert reblogged_activity["reblog"]["in_reply_to_account_id"] == replied_to_user.id +  end + +  describe "GET /api/v1/statuses/:id/favourited_by" do +    setup do: oauth_access(["read:accounts"]) + +    setup %{user: user} do +      {:ok, activity} = CommonAPI.post(user, %{"status" => "test"}) + +      %{activity: activity} +    end + +    test "returns users who have favorited the status", %{conn: conn, activity: activity} do +      other_user = insert(:user) +      {:ok, _, _} = CommonAPI.favorite(activity.id, other_user) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/favourited_by") +        |> json_response(:ok) + +      [%{"id" => id}] = response + +      assert id == other_user.id +    end + +    test "returns empty array when status has not been favorited yet", %{ +      conn: conn, +      activity: activity +    } do +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/favourited_by") +        |> json_response(:ok) + +      assert Enum.empty?(response) +    end + +    test "does not return users who have favorited the status but are blocked", %{ +      conn: %{assigns: %{user: user}} = conn, +      activity: activity +    } do +      other_user = insert(:user) +      {:ok, _user_relationship} = User.block(user, other_user) + +      {:ok, _, _} = CommonAPI.favorite(activity.id, other_user) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/favourited_by") +        |> json_response(:ok) + +      assert Enum.empty?(response) +    end + +    test "does not fail on an unauthenticated request", %{activity: activity} do +      other_user = insert(:user) +      {:ok, _, _} = CommonAPI.favorite(activity.id, other_user) + +      response = +        build_conn() +        |> get("/api/v1/statuses/#{activity.id}/favourited_by") +        |> json_response(:ok) + +      [%{"id" => id}] = response +      assert id == other_user.id +    end + +    test "requires authentication for private posts", %{user: user} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(user, %{ +          "status" => "@#{other_user.nickname} wanna get some #cofe together?", +          "visibility" => "direct" +        }) + +      {:ok, _, _} = CommonAPI.favorite(activity.id, other_user) + +      favourited_by_url = "/api/v1/statuses/#{activity.id}/favourited_by" + +      build_conn() +      |> get(favourited_by_url) +      |> json_response(404) + +      conn = +        build_conn() +        |> assign(:user, other_user) +        |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"])) + +      conn +      |> assign(:token, nil) +      |> get(favourited_by_url) +      |> json_response(404) + +      response = +        conn +        |> get(favourited_by_url) +        |> json_response(200) + +      [%{"id" => id}] = response +      assert id == other_user.id +    end +  end + +  describe "GET /api/v1/statuses/:id/reblogged_by" do +    setup do: oauth_access(["read:accounts"]) + +    setup %{user: user} do +      {:ok, activity} = CommonAPI.post(user, %{"status" => "test"}) + +      %{activity: activity} +    end + +    test "returns users who have reblogged the status", %{conn: conn, activity: activity} do +      other_user = insert(:user) +      {:ok, _, _} = CommonAPI.repeat(activity.id, other_user) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(:ok) + +      [%{"id" => id}] = response + +      assert id == other_user.id +    end + +    test "returns empty array when status has not been reblogged yet", %{ +      conn: conn, +      activity: activity +    } do +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(:ok) + +      assert Enum.empty?(response) +    end + +    test "does not return users who have reblogged the status but are blocked", %{ +      conn: %{assigns: %{user: user}} = conn, +      activity: activity +    } do +      other_user = insert(:user) +      {:ok, _user_relationship} = User.block(user, other_user) + +      {:ok, _, _} = CommonAPI.repeat(activity.id, other_user) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(:ok) + +      assert Enum.empty?(response) +    end + +    test "does not return users who have reblogged the status privately", %{ +      conn: conn, +      activity: activity +    } do +      other_user = insert(:user) + +      {:ok, _, _} = CommonAPI.repeat(activity.id, other_user, %{"visibility" => "private"}) + +      response = +        conn +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(:ok) + +      assert Enum.empty?(response) +    end + +    test "does not fail on an unauthenticated request", %{activity: activity} do +      other_user = insert(:user) +      {:ok, _, _} = CommonAPI.repeat(activity.id, other_user) + +      response = +        build_conn() +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(:ok) + +      [%{"id" => id}] = response +      assert id == other_user.id +    end + +    test "requires authentication for private posts", %{user: user} do +      other_user = insert(:user) + +      {:ok, activity} = +        CommonAPI.post(user, %{ +          "status" => "@#{other_user.nickname} wanna get some #cofe together?", +          "visibility" => "direct" +        }) + +      build_conn() +      |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +      |> json_response(404) + +      response = +        build_conn() +        |> assign(:user, other_user) +        |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"])) +        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") +        |> json_response(200) + +      assert [] == response +    end +  end + +  test "context" do +    user = insert(:user) + +    {:ok, %{id: id1}} = CommonAPI.post(user, %{"status" => "1"}) +    {:ok, %{id: id2}} = CommonAPI.post(user, %{"status" => "2", "in_reply_to_status_id" => id1}) +    {:ok, %{id: id3}} = CommonAPI.post(user, %{"status" => "3", "in_reply_to_status_id" => id2}) +    {:ok, %{id: id4}} = CommonAPI.post(user, %{"status" => "4", "in_reply_to_status_id" => id3}) +    {:ok, %{id: id5}} = CommonAPI.post(user, %{"status" => "5", "in_reply_to_status_id" => id4}) + +    response = +      build_conn() +      |> get("/api/v1/statuses/#{id3}/context") +      |> json_response(:ok) + +    assert %{ +             "ancestors" => [%{"id" => ^id1}, %{"id" => ^id2}], +             "descendants" => [%{"id" => ^id4}, %{"id" => ^id5}] +           } = response +  end + +  test "returns the favorites of a user" do +    %{user: user, conn: conn} = oauth_access(["read:favourites"]) +    other_user = insert(:user) + +    {:ok, _} = CommonAPI.post(other_user, %{"status" => "bla"}) +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "traps are happy"}) + +    {:ok, _, _} = CommonAPI.favorite(activity.id, user) + +    first_conn = get(conn, "/api/v1/favourites") + +    assert [status] = json_response(first_conn, 200) +    assert status["id"] == to_string(activity.id) + +    assert [{"link", _link_header}] = +             Enum.filter(first_conn.resp_headers, fn element -> match?({"link", _}, element) end) + +    # Honours query params +    {:ok, second_activity} = +      CommonAPI.post(other_user, %{ +        "status" => +          "Trees Are Never Sad Look At Them Every Once In Awhile They're Quite Beautiful." +      }) + +    {:ok, _, _} = CommonAPI.favorite(second_activity.id, user) + +    last_like = status["id"] + +    second_conn = get(conn, "/api/v1/favourites?since_id=#{last_like}") + +    assert [second_status] = json_response(second_conn, 200) +    assert second_status["id"] == to_string(second_activity.id) + +    third_conn = get(conn, "/api/v1/favourites?limit=0") + +    assert [] = json_response(third_conn, 200) +  end +end diff --git a/test/web/mastodon_api/subscription_controller_test.exs b/test/web/mastodon_api/controllers/subscription_controller_test.exs index 7dfb02f63..7dfb02f63 100644 --- a/test/web/mastodon_api/subscription_controller_test.exs +++ b/test/web/mastodon_api/controllers/subscription_controller_test.exs diff --git a/test/web/mastodon_api/controllers/suggestion_controller_test.exs b/test/web/mastodon_api/controllers/suggestion_controller_test.exs new file mode 100644 index 000000000..0319d3475 --- /dev/null +++ b/test/web/mastodon_api/controllers/suggestion_controller_test.exs @@ -0,0 +1,46 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.SuggestionControllerTest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Config + +  import Pleroma.Factory +  import Tesla.Mock + +  setup do: oauth_access(["read"]) + +  setup %{user: user} do +    other_user = insert(:user) +    host = Config.get([Pleroma.Web.Endpoint, :url, :host]) +    url500 = "http://test500?#{host}&#{user.nickname}" +    url200 = "http://test200?#{host}&#{user.nickname}" + +    mock(fn +      %{method: :get, url: ^url500} -> +        %Tesla.Env{status: 500, body: "bad request"} + +      %{method: :get, url: ^url200} -> +        %Tesla.Env{ +          status: 200, +          body: +            ~s([{"acct":"yj455","avatar":"https://social.heldscal.la/avatar/201.jpeg","avatar_static":"https://social.heldscal.la/avatar/s/201.jpeg"}, {"acct":"#{ +              other_user.ap_id +            }","avatar":"https://social.heldscal.la/avatar/202.jpeg","avatar_static":"https://social.heldscal.la/avatar/s/202.jpeg"}]) +        } +    end) + +    [other_user: other_user] +  end + +  test "returns empty result", %{conn: conn} do +    res = +      conn +      |> get("/api/v1/suggestions") +      |> json_response(200) + +    assert res == [] +  end +end diff --git a/test/web/mastodon_api/controllers/timeline_controller_test.exs b/test/web/mastodon_api/controllers/timeline_controller_test.exs new file mode 100644 index 000000000..bb94d8e5a --- /dev/null +++ b/test/web/mastodon_api/controllers/timeline_controller_test.exs @@ -0,0 +1,289 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.TimelineControllerTest do +  use Pleroma.Web.ConnCase + +  import Pleroma.Factory +  import Tesla.Mock + +  alias Pleroma.Config +  alias Pleroma.User +  alias Pleroma.Web.CommonAPI + +  clear_config([:instance, :public]) + +  setup do +    mock(fn env -> apply(HttpRequestMock, :request, [env]) end) +    :ok +  end + +  describe "home" do +    setup do: oauth_access(["read:statuses"]) + +    test "the home timeline", %{user: user, conn: conn} do +      following = insert(:user) + +      {:ok, _activity} = CommonAPI.post(following, %{"status" => "test"}) + +      ret_conn = get(conn, "/api/v1/timelines/home") + +      assert Enum.empty?(json_response(ret_conn, :ok)) + +      {:ok, _user} = User.follow(user, following) + +      conn = get(conn, "/api/v1/timelines/home") + +      assert [%{"content" => "test"}] = json_response(conn, :ok) +    end + +    test "the home timeline when the direct messages are excluded", %{user: user, conn: conn} do +      {:ok, public_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "public"}) +      {:ok, direct_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"}) + +      {:ok, unlisted_activity} = +        CommonAPI.post(user, %{"status" => ".", "visibility" => "unlisted"}) + +      {:ok, private_activity} = +        CommonAPI.post(user, %{"status" => ".", "visibility" => "private"}) + +      conn = get(conn, "/api/v1/timelines/home", %{"exclude_visibilities" => ["direct"]}) + +      assert status_ids = json_response(conn, :ok) |> Enum.map(& &1["id"]) +      assert public_activity.id in status_ids +      assert unlisted_activity.id in status_ids +      assert private_activity.id in status_ids +      refute direct_activity.id in status_ids +    end +  end + +  describe "public" do +    @tag capture_log: true +    test "the public timeline", %{conn: conn} do +      following = insert(:user) + +      {:ok, _activity} = CommonAPI.post(following, %{"status" => "test"}) + +      _activity = insert(:note_activity, local: false) + +      conn = get(conn, "/api/v1/timelines/public", %{"local" => "False"}) + +      assert length(json_response(conn, :ok)) == 2 + +      conn = get(build_conn(), "/api/v1/timelines/public", %{"local" => "True"}) + +      assert [%{"content" => "test"}] = json_response(conn, :ok) + +      conn = get(build_conn(), "/api/v1/timelines/public", %{"local" => "1"}) + +      assert [%{"content" => "test"}] = json_response(conn, :ok) +    end + +    test "the public timeline when public is set to false", %{conn: conn} do +      Config.put([:instance, :public], false) + +      assert %{"error" => "This resource requires authentication."} == +               conn +               |> get("/api/v1/timelines/public", %{"local" => "False"}) +               |> json_response(:forbidden) +    end + +    test "the public timeline includes only public statuses for an authenticated user" do +      %{user: user, conn: conn} = oauth_access(["read:statuses"]) + +      {:ok, _activity} = CommonAPI.post(user, %{"status" => "test"}) +      {:ok, _activity} = CommonAPI.post(user, %{"status" => "test", "visibility" => "private"}) +      {:ok, _activity} = CommonAPI.post(user, %{"status" => "test", "visibility" => "unlisted"}) +      {:ok, _activity} = CommonAPI.post(user, %{"status" => "test", "visibility" => "direct"}) + +      res_conn = get(conn, "/api/v1/timelines/public") +      assert length(json_response(res_conn, 200)) == 1 +    end +  end + +  describe "direct" do +    test "direct timeline", %{conn: conn} do +      user_one = insert(:user) +      user_two = insert(:user) + +      {:ok, user_two} = User.follow(user_two, user_one) + +      {:ok, direct} = +        CommonAPI.post(user_one, %{ +          "status" => "Hi @#{user_two.nickname}!", +          "visibility" => "direct" +        }) + +      {:ok, _follower_only} = +        CommonAPI.post(user_one, %{ +          "status" => "Hi @#{user_two.nickname}!", +          "visibility" => "private" +        }) + +      conn_user_two = +        conn +        |> assign(:user, user_two) +        |> assign(:token, insert(:oauth_token, user: user_two, scopes: ["read:statuses"])) + +      # Only direct should be visible here +      res_conn = get(conn_user_two, "api/v1/timelines/direct") + +      [status] = json_response(res_conn, :ok) + +      assert %{"visibility" => "direct"} = status +      assert status["url"] != direct.data["id"] + +      # User should be able to see their own direct message +      res_conn = +        build_conn() +        |> assign(:user, user_one) +        |> assign(:token, insert(:oauth_token, user: user_one, scopes: ["read:statuses"])) +        |> get("api/v1/timelines/direct") + +      [status] = json_response(res_conn, :ok) + +      assert %{"visibility" => "direct"} = status + +      # Both should be visible here +      res_conn = get(conn_user_two, "api/v1/timelines/home") + +      [_s1, _s2] = json_response(res_conn, :ok) + +      # Test pagination +      Enum.each(1..20, fn _ -> +        {:ok, _} = +          CommonAPI.post(user_one, %{ +            "status" => "Hi @#{user_two.nickname}!", +            "visibility" => "direct" +          }) +      end) + +      res_conn = get(conn_user_two, "api/v1/timelines/direct") + +      statuses = json_response(res_conn, :ok) +      assert length(statuses) == 20 + +      res_conn = +        get(conn_user_two, "api/v1/timelines/direct", %{max_id: List.last(statuses)["id"]}) + +      [status] = json_response(res_conn, :ok) + +      assert status["url"] != direct.data["id"] +    end + +    test "doesn't include DMs from blocked users" do +      %{user: blocker, conn: conn} = oauth_access(["read:statuses"]) +      blocked = insert(:user) +      other_user = insert(:user) +      {:ok, _user_relationship} = User.block(blocker, blocked) + +      {:ok, _blocked_direct} = +        CommonAPI.post(blocked, %{ +          "status" => "Hi @#{blocker.nickname}!", +          "visibility" => "direct" +        }) + +      {:ok, direct} = +        CommonAPI.post(other_user, %{ +          "status" => "Hi @#{blocker.nickname}!", +          "visibility" => "direct" +        }) + +      res_conn = get(conn, "api/v1/timelines/direct") + +      [status] = json_response(res_conn, :ok) +      assert status["id"] == direct.id +    end +  end + +  describe "list" do +    setup do: oauth_access(["read:lists"]) + +    test "list timeline", %{user: user, conn: conn} do +      other_user = insert(:user) +      {:ok, _activity_one} = CommonAPI.post(user, %{"status" => "Marisa is cute."}) +      {:ok, activity_two} = CommonAPI.post(other_user, %{"status" => "Marisa is cute."}) +      {:ok, list} = Pleroma.List.create("name", user) +      {:ok, list} = Pleroma.List.follow(list, other_user) + +      conn = get(conn, "/api/v1/timelines/list/#{list.id}") + +      assert [%{"id" => id}] = json_response(conn, :ok) + +      assert id == to_string(activity_two.id) +    end + +    test "list timeline does not leak non-public statuses for unfollowed users", %{ +      user: user, +      conn: conn +    } do +      other_user = insert(:user) +      {:ok, activity_one} = CommonAPI.post(other_user, %{"status" => "Marisa is cute."}) + +      {:ok, _activity_two} = +        CommonAPI.post(other_user, %{ +          "status" => "Marisa is cute.", +          "visibility" => "private" +        }) + +      {:ok, list} = Pleroma.List.create("name", user) +      {:ok, list} = Pleroma.List.follow(list, other_user) + +      conn = get(conn, "/api/v1/timelines/list/#{list.id}") + +      assert [%{"id" => id}] = json_response(conn, :ok) + +      assert id == to_string(activity_one.id) +    end +  end + +  describe "hashtag" do +    setup do: oauth_access(["n/a"]) + +    @tag capture_log: true +    test "hashtag timeline", %{conn: conn} do +      following = insert(:user) + +      {:ok, activity} = CommonAPI.post(following, %{"status" => "test #2hu"}) + +      nconn = get(conn, "/api/v1/timelines/tag/2hu") + +      assert [%{"id" => id}] = json_response(nconn, :ok) + +      assert id == to_string(activity.id) + +      # works for different capitalization too +      nconn = get(conn, "/api/v1/timelines/tag/2HU") + +      assert [%{"id" => id}] = json_response(nconn, :ok) + +      assert id == to_string(activity.id) +    end + +    test "multi-hashtag timeline", %{conn: conn} do +      user = insert(:user) + +      {:ok, activity_test} = CommonAPI.post(user, %{"status" => "#test"}) +      {:ok, activity_test1} = CommonAPI.post(user, %{"status" => "#test #test1"}) +      {:ok, activity_none} = CommonAPI.post(user, %{"status" => "#test #none"}) + +      any_test = get(conn, "/api/v1/timelines/tag/test", %{"any" => ["test1"]}) + +      [status_none, status_test1, status_test] = json_response(any_test, :ok) + +      assert to_string(activity_test.id) == status_test["id"] +      assert to_string(activity_test1.id) == status_test1["id"] +      assert to_string(activity_none.id) == status_none["id"] + +      restricted_test = +        get(conn, "/api/v1/timelines/tag/test", %{"all" => ["test1"], "none" => ["none"]}) + +      assert [status_test1] == json_response(restricted_test, :ok) + +      all_test = get(conn, "/api/v1/timelines/tag/test", %{"all" => ["none"]}) + +      assert [status_none] == json_response(all_test, :ok) +    end +  end +end diff --git a/test/web/mastodon_api/list_view_test.exs b/test/web/mastodon_api/list_view_test.exs deleted file mode 100644 index 73143467f..000000000 --- a/test/web/mastodon_api/list_view_test.exs +++ /dev/null @@ -1,22 +0,0 @@ -# Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> -# SPDX-License-Identifier: AGPL-3.0-only - -defmodule Pleroma.Web.MastodonAPI.ListViewTest do -  use Pleroma.DataCase -  import Pleroma.Factory -  alias Pleroma.Web.MastodonAPI.ListView - -  test "Represent a list" do -    user = insert(:user) -    title = "mortal enemies" -    {:ok, list} = Pleroma.List.create(title, user) - -    expected = %{ -      id: to_string(list.id), -      title: title -    } - -    assert expected == ListView.render("list.json", %{list: list}) -  end -end diff --git a/test/web/mastodon_api/mastodon_api_controller/update_credentials_test.exs b/test/web/mastodon_api/mastodon_api_controller/update_credentials_test.exs deleted file mode 100644 index 71d0c8af8..000000000 --- a/test/web/mastodon_api/mastodon_api_controller/update_credentials_test.exs +++ /dev/null @@ -1,304 +0,0 @@ -# Pleroma: A lightweight social networking server -# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> -# SPDX-License-Identifier: AGPL-3.0-only - -defmodule Pleroma.Web.MastodonAPI.MastodonAPIController.UpdateCredentialsTest do -  alias Pleroma.Repo -  alias Pleroma.User - -  use Pleroma.Web.ConnCase - -  import Pleroma.Factory - -  describe "updating credentials" do -    test "sets user settings in a generic way", %{conn: conn} do -      user = insert(:user) - -      res_conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "pleroma_settings_store" => %{ -            pleroma_fe: %{ -              theme: "bla" -            } -          } -        }) - -      assert user = json_response(res_conn, 200) -      assert user["pleroma"]["settings_store"] == %{"pleroma_fe" => %{"theme" => "bla"}} - -      user = Repo.get(User, user["id"]) - -      res_conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "pleroma_settings_store" => %{ -            masto_fe: %{ -              theme: "bla" -            } -          } -        }) - -      assert user = json_response(res_conn, 200) - -      assert user["pleroma"]["settings_store"] == -               %{ -                 "pleroma_fe" => %{"theme" => "bla"}, -                 "masto_fe" => %{"theme" => "bla"} -               } - -      user = Repo.get(User, user["id"]) - -      res_conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "pleroma_settings_store" => %{ -            masto_fe: %{ -              theme: "blub" -            } -          } -        }) - -      assert user = json_response(res_conn, 200) - -      assert user["pleroma"]["settings_store"] == -               %{ -                 "pleroma_fe" => %{"theme" => "bla"}, -                 "masto_fe" => %{"theme" => "blub"} -               } -    end - -    test "updates the user's bio", %{conn: conn} do -      user = insert(:user) -      user2 = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "note" => "I drink #cofe with @#{user2.nickname}" -        }) - -      assert user = json_response(conn, 200) - -      assert user["note"] == -               ~s(I drink <a class="hashtag" data-tag="cofe" href="http://localhost:4001/tag/cofe" rel="tag">#cofe</a> with <span class="h-card"><a data-user=") <> -                 user2.id <> -                 ~s(" class="u-url mention" href=") <> -                 user2.ap_id <> ~s(">@<span>) <> user2.nickname <> ~s(</span></a></span>) -    end - -    test "updates the user's locking status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{locked: "true"}) - -      assert user = json_response(conn, 200) -      assert user["locked"] == true -    end - -    test "updates the user's default scope", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{default_scope: "cofe"}) - -      assert user = json_response(conn, 200) -      assert user["source"]["privacy"] == "cofe" -    end - -    test "updates the user's hide_followers status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{hide_followers: "true"}) - -      assert user = json_response(conn, 200) -      assert user["pleroma"]["hide_followers"] == true -    end - -    test "updates the user's skip_thread_containment option", %{conn: conn} do -      user = insert(:user) - -      response = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{skip_thread_containment: "true"}) -        |> json_response(200) - -      assert response["pleroma"]["skip_thread_containment"] == true -      assert refresh_record(user).info.skip_thread_containment -    end - -    test "updates the user's hide_follows status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{hide_follows: "true"}) - -      assert user = json_response(conn, 200) -      assert user["pleroma"]["hide_follows"] == true -    end - -    test "updates the user's hide_favorites status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{hide_favorites: "true"}) - -      assert user = json_response(conn, 200) -      assert user["pleroma"]["hide_favorites"] == true -    end - -    test "updates the user's show_role status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{show_role: "false"}) - -      assert user = json_response(conn, 200) -      assert user["source"]["pleroma"]["show_role"] == false -    end - -    test "updates the user's no_rich_text status", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{no_rich_text: "true"}) - -      assert user = json_response(conn, 200) -      assert user["source"]["pleroma"]["no_rich_text"] == true -    end - -    test "updates the user's name", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{"display_name" => "markorepairs"}) - -      assert user = json_response(conn, 200) -      assert user["display_name"] == "markorepairs" -    end - -    test "updates the user's avatar", %{conn: conn} do -      user = insert(:user) - -      new_avatar = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{"avatar" => new_avatar}) - -      assert user_response = json_response(conn, 200) -      assert user_response["avatar"] != User.avatar_url(user) -    end - -    test "updates the user's banner", %{conn: conn} do -      user = insert(:user) - -      new_header = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{"header" => new_header}) - -      assert user_response = json_response(conn, 200) -      assert user_response["header"] != User.banner_url(user) -    end - -    test "updates the user's background", %{conn: conn} do -      user = insert(:user) - -      new_header = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "pleroma_background_image" => new_header -        }) - -      assert user_response = json_response(conn, 200) -      assert user_response["pleroma"]["background_image"] -    end - -    test "requires 'write' permission", %{conn: conn} do -      token1 = insert(:oauth_token, scopes: ["read"]) -      token2 = insert(:oauth_token, scopes: ["write", "follow"]) - -      for token <- [token1, token2] do -        conn = -          conn -          |> put_req_header("authorization", "Bearer #{token.token}") -          |> patch("/api/v1/accounts/update_credentials", %{}) - -        if token == token1 do -          assert %{"error" => "Insufficient permissions: write."} == json_response(conn, 403) -        else -          assert json_response(conn, 200) -        end -      end -    end - -    test "updates profile emojos", %{conn: conn} do -      user = insert(:user) - -      note = "*sips :blank:*" -      name = "I am :firefox:" - -      conn = -        conn -        |> assign(:user, user) -        |> patch("/api/v1/accounts/update_credentials", %{ -          "note" => note, -          "display_name" => name -        }) - -      assert json_response(conn, 200) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}") - -      assert user = json_response(conn, 200) - -      assert user["note"] == note -      assert user["display_name"] == name -      assert [%{"shortcode" => "blank"}, %{"shortcode" => "firefox"}] = user["emojis"] -    end -  end -end diff --git a/test/web/mastodon_api/mastodon_api_controller_test.exs b/test/web/mastodon_api/mastodon_api_controller_test.exs index b4b1dd785..c1f70f9fe 100644 --- a/test/web/mastodon_api/mastodon_api_controller_test.exs +++ b/test/web/mastodon_api/mastodon_api_controller_test.exs @@ -5,3858 +5,37 @@  defmodule Pleroma.Web.MastodonAPI.MastodonAPIControllerTest do    use Pleroma.Web.ConnCase -  alias Ecto.Changeset -  alias Pleroma.Activity -  alias Pleroma.Notification -  alias Pleroma.Object -  alias Pleroma.Repo -  alias Pleroma.ScheduledActivity -  alias Pleroma.User -  alias Pleroma.Web.ActivityPub.ActivityPub -  alias Pleroma.Web.CommonAPI -  alias Pleroma.Web.MastodonAPI.FilterView -  alias Pleroma.Web.OAuth.App -  alias Pleroma.Web.OAuth.Token -  alias Pleroma.Web.OStatus -  alias Pleroma.Web.Push -  alias Pleroma.Web.TwitterAPI.TwitterAPI -  import Pleroma.Factory -  import ExUnit.CaptureLog -  import Tesla.Mock -  import Swoosh.TestAssertions +  describe "empty_array/2 (stubs)" do +    test "GET /api/v1/accounts/:id/identity_proofs" do +      %{user: user, conn: conn} = oauth_access(["n/a"]) -  @image "data:image/gif;base64,R0lGODlhEAAQAMQAAORHHOVSKudfOulrSOp3WOyDZu6QdvCchPGolfO0o/XBs/fNwfjZ0frl3/zy7////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH5BAkAABAALAAAAAAQABAAAAVVICSOZGlCQAosJ6mu7fiyZeKqNKToQGDsM8hBADgUXoGAiqhSvp5QAnQKGIgUhwFUYLCVDFCrKUE1lBavAViFIDlTImbKC5Gm2hB0SlBCBMQiB0UjIQA7" - -  setup do -    mock(fn env -> apply(HttpRequestMock, :request, [env]) end) -    :ok -  end - -  test "the home timeline", %{conn: conn} do -    user = insert(:user) -    following = insert(:user) - -    {:ok, _activity} = CommonAPI.post(following, %{"status" => "test"}) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/timelines/home") - -    assert Enum.empty?(json_response(conn, 200)) - -    {:ok, user} = User.follow(user, following) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> get("/api/v1/timelines/home") - -    assert [%{"content" => "test"}] = json_response(conn, 200) -  end - -  test "the public timeline", %{conn: conn} do -    following = insert(:user) - -    capture_log(fn -> -      {:ok, _activity} = CommonAPI.post(following, %{"status" => "test"}) - -      {:ok, [_activity]} = -        OStatus.fetch_activity_from_url("https://shitposter.club/notice/2827873") - -      conn = -        conn -        |> get("/api/v1/timelines/public", %{"local" => "False"}) - -      assert length(json_response(conn, 200)) == 2 - -      conn = -        build_conn() -        |> get("/api/v1/timelines/public", %{"local" => "True"}) - -      assert [%{"content" => "test"}] = json_response(conn, 200) - -      conn = -        build_conn() -        |> get("/api/v1/timelines/public", %{"local" => "1"}) - -      assert [%{"content" => "test"}] = json_response(conn, 200) -    end) -  end - -  test "the public timeline when public is set to false", %{conn: conn} do -    public = Pleroma.Config.get([:instance, :public]) -    Pleroma.Config.put([:instance, :public], false) - -    on_exit(fn -> -      Pleroma.Config.put([:instance, :public], public) -    end) - -    assert conn -           |> get("/api/v1/timelines/public", %{"local" => "False"}) -           |> json_response(403) == %{"error" => "This resource requires authentication."} -  end - -  describe "posting statuses" do -    setup do -      user = insert(:user) - -      conn = -        build_conn() -        |> assign(:user, user) - -      [conn: conn] -    end - -    test "posting a status", %{conn: conn} do -      idempotency_key = "Pikachu rocks!" - -      conn_one = -        conn -        |> put_req_header("idempotency-key", idempotency_key) -        |> post("/api/v1/statuses", %{ -          "status" => "cofe", -          "spoiler_text" => "2hu", -          "sensitive" => "false" -        }) - -      {:ok, ttl} = Cachex.ttl(:idempotency_cache, idempotency_key) -      # Six hours -      assert ttl > :timer.seconds(6 * 60 * 60 - 1) - -      assert %{"content" => "cofe", "id" => id, "spoiler_text" => "2hu", "sensitive" => false} = -               json_response(conn_one, 200) - -      assert Activity.get_by_id(id) - -      conn_two = -        conn -        |> put_req_header("idempotency-key", idempotency_key) -        |> post("/api/v1/statuses", %{ -          "status" => "cofe", -          "spoiler_text" => "2hu", -          "sensitive" => "false" -        }) - -      assert %{"id" => second_id} = json_response(conn_two, 200) -      assert id == second_id - -      conn_three = -        conn -        |> post("/api/v1/statuses", %{ -          "status" => "cofe", -          "spoiler_text" => "2hu", -          "sensitive" => "false" -        }) - -      assert %{"id" => third_id} = json_response(conn_three, 200) -      refute id == third_id -    end - -    test "replying to a status", %{conn: conn} do -      user = insert(:user) -      {:ok, replied_to} = CommonAPI.post(user, %{"status" => "cofe"}) - -      conn = -        conn -        |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id}) - -      assert %{"content" => "xD", "id" => id} = json_response(conn, 200) - -      activity = Activity.get_by_id(id) - -      assert activity.data["context"] == replied_to.data["context"] -      assert Activity.get_in_reply_to_activity(activity).id == replied_to.id -    end - -    test "replying to a direct message with visibility other than direct", %{conn: conn} do -      user = insert(:user) -      {:ok, replied_to} = CommonAPI.post(user, %{"status" => "suya..", "visibility" => "direct"}) - -      Enum.each(["public", "private", "unlisted"], fn visibility -> -        conn = -          conn -          |> post("/api/v1/statuses", %{ -            "status" => "@#{user.nickname} hey", -            "in_reply_to_id" => replied_to.id, -            "visibility" => visibility -          }) - -        assert json_response(conn, 422) == %{"error" => "The message visibility must be direct"} -      end) -    end - -    test "posting a status with an invalid in_reply_to_id", %{conn: conn} do -      conn = -        conn -        |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => ""}) - -      assert %{"content" => "xD", "id" => id} = json_response(conn, 200) -      assert Activity.get_by_id(id) -    end - -    test "posting a sensitive status", %{conn: conn} do -      conn = -        conn -        |> post("/api/v1/statuses", %{"status" => "cofe", "sensitive" => true}) - -      assert %{"content" => "cofe", "id" => id, "sensitive" => true} = json_response(conn, 200) -      assert Activity.get_by_id(id) -    end - -    test "posting a fake status", %{conn: conn} do -      real_conn = -        conn -        |> post("/api/v1/statuses", %{ -          "status" => -            "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it" -        }) - -      real_status = json_response(real_conn, 200) - -      assert real_status -      assert Object.get_by_ap_id(real_status["uri"]) - -      real_status = -        real_status -        |> Map.put("id", nil) -        |> Map.put("url", nil) -        |> Map.put("uri", nil) -        |> Map.put("created_at", nil) -        |> Kernel.put_in(["pleroma", "conversation_id"], nil) - -      fake_conn = -        conn -        |> post("/api/v1/statuses", %{ -          "status" => -            "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it", -          "preview" => true -        }) - -      fake_status = json_response(fake_conn, 200) - -      assert fake_status -      refute Object.get_by_ap_id(fake_status["uri"]) - -      fake_status = -        fake_status -        |> Map.put("id", nil) -        |> Map.put("url", nil) -        |> Map.put("uri", nil) -        |> Map.put("created_at", nil) -        |> Kernel.put_in(["pleroma", "conversation_id"], nil) - -      assert real_status == fake_status -    end - -    test "posting a status with OGP link preview", %{conn: conn} do -      Pleroma.Config.put([:rich_media, :enabled], true) - -      conn = -        conn -        |> post("/api/v1/statuses", %{ -          "status" => "https://example.com/ogp" -        }) - -      assert %{"id" => id, "card" => %{"title" => "The Rock"}} = json_response(conn, 200) -      assert Activity.get_by_id(id) -      Pleroma.Config.put([:rich_media, :enabled], false) -    end - -    test "posting a direct status", %{conn: conn} do -      user2 = insert(:user) -      content = "direct cofe @#{user2.nickname}" - -      conn = -        conn -        |> post("api/v1/statuses", %{"status" => content, "visibility" => "direct"}) - -      assert %{"id" => id, "visibility" => "direct"} = json_response(conn, 200) -      assert activity = Activity.get_by_id(id) -      assert activity.recipients == [user2.ap_id, conn.assigns[:user].ap_id] -      assert activity.data["to"] == [user2.ap_id] -      assert activity.data["cc"] == [] -    end -  end - -  describe "posting polls" do -    test "posting a poll", %{conn: conn} do -      user = insert(:user) -      time = NaiveDateTime.utc_now() - -      conn = +      res =          conn          |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "Who is the #bestgrill?", -          "poll" => %{"options" => ["Rei", "Asuka", "Misato"], "expires_in" => 420} -        }) - -      response = json_response(conn, 200) - -      assert Enum.all?(response["poll"]["options"], fn %{"title" => title} -> -               title in ["Rei", "Asuka", "Misato"] -             end) - -      assert NaiveDateTime.diff(NaiveDateTime.from_iso8601!(response["poll"]["expires_at"]), time) in 420..430 -      refute response["poll"]["expred"] -    end - -    test "option limit is enforced", %{conn: conn} do -      user = insert(:user) -      limit = Pleroma.Config.get([:instance, :poll_limits, :max_options]) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "desu~", -          "poll" => %{"options" => Enum.map(0..limit, fn _ -> "desu" end), "expires_in" => 1} -        }) - -      %{"error" => error} = json_response(conn, 422) -      assert error == "Poll can't contain more than #{limit} options" -    end - -    test "option character limit is enforced", %{conn: conn} do -      user = insert(:user) -      limit = Pleroma.Config.get([:instance, :poll_limits, :max_option_chars]) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "...", -          "poll" => %{ -            "options" => [Enum.reduce(0..limit, "", fn _, acc -> acc <> "." end)], -            "expires_in" => 1 -          } -        }) - -      %{"error" => error} = json_response(conn, 422) -      assert error == "Poll options cannot be longer than #{limit} characters each" -    end - -    test "minimal date limit is enforced", %{conn: conn} do -      user = insert(:user) -      limit = Pleroma.Config.get([:instance, :poll_limits, :min_expiration]) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "imagine arbitrary limits", -          "poll" => %{ -            "options" => ["this post was made by pleroma gang"], -            "expires_in" => limit - 1 -          } -        }) - -      %{"error" => error} = json_response(conn, 422) -      assert error == "Expiration date is too soon" -    end - -    test "maximum date limit is enforced", %{conn: conn} do -      user = insert(:user) -      limit = Pleroma.Config.get([:instance, :poll_limits, :max_expiration]) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "imagine arbitrary limits", -          "poll" => %{ -            "options" => ["this post was made by pleroma gang"], -            "expires_in" => limit + 1 -          } -        }) - -      %{"error" => error} = json_response(conn, 422) -      assert error == "Expiration date is too far in the future" -    end -  end - -  test "direct timeline", %{conn: conn} do -    user_one = insert(:user) -    user_two = insert(:user) - -    {:ok, user_two} = User.follow(user_two, user_one) - -    {:ok, direct} = -      CommonAPI.post(user_one, %{ -        "status" => "Hi @#{user_two.nickname}!", -        "visibility" => "direct" -      }) - -    {:ok, _follower_only} = -      CommonAPI.post(user_one, %{ -        "status" => "Hi @#{user_two.nickname}!", -        "visibility" => "private" -      }) - -    # Only direct should be visible here -    res_conn = -      conn -      |> assign(:user, user_two) -      |> get("api/v1/timelines/direct") - -    [status] = json_response(res_conn, 200) - -    assert %{"visibility" => "direct"} = status -    assert status["url"] != direct.data["id"] - -    # User should be able to see his own direct message -    res_conn = -      build_conn() -      |> assign(:user, user_one) -      |> get("api/v1/timelines/direct") - -    [status] = json_response(res_conn, 200) - -    assert %{"visibility" => "direct"} = status - -    # Both should be visible here -    res_conn = -      conn -      |> assign(:user, user_two) -      |> get("api/v1/timelines/home") - -    [_s1, _s2] = json_response(res_conn, 200) - -    # Test pagination -    Enum.each(1..20, fn _ -> -      {:ok, _} = -        CommonAPI.post(user_one, %{ -          "status" => "Hi @#{user_two.nickname}!", -          "visibility" => "direct" -        }) -    end) - -    res_conn = -      conn -      |> assign(:user, user_two) -      |> get("api/v1/timelines/direct") - -    statuses = json_response(res_conn, 200) -    assert length(statuses) == 20 - -    res_conn = -      conn -      |> assign(:user, user_two) -      |> get("api/v1/timelines/direct", %{max_id: List.last(statuses)["id"]}) - -    [status] = json_response(res_conn, 200) - -    assert status["url"] != direct.data["id"] -  end - -  test "Conversations", %{conn: conn} do -    user_one = insert(:user) -    user_two = insert(:user) -    user_three = insert(:user) - -    {:ok, user_two} = User.follow(user_two, user_one) - -    {:ok, direct} = -      CommonAPI.post(user_one, %{ -        "status" => "Hi @#{user_two.nickname}, @#{user_three.nickname}!", -        "visibility" => "direct" -      }) - -    {:ok, _follower_only} = -      CommonAPI.post(user_one, %{ -        "status" => "Hi @#{user_two.nickname}!", -        "visibility" => "private" -      }) - -    res_conn = -      conn -      |> assign(:user, user_one) -      |> get("/api/v1/conversations") - -    assert response = json_response(res_conn, 200) - -    assert [ -             %{ -               "id" => res_id, -               "accounts" => res_accounts, -               "last_status" => res_last_status, -               "unread" => unread -             } -           ] = response - -    account_ids = Enum.map(res_accounts, & &1["id"]) -    assert length(res_accounts) == 2 -    assert user_two.id in account_ids -    assert user_three.id in account_ids -    assert is_binary(res_id) -    assert unread == true -    assert res_last_status["id"] == direct.id - -    # Apparently undocumented API endpoint -    res_conn = -      conn -      |> assign(:user, user_one) -      |> post("/api/v1/conversations/#{res_id}/read") - -    assert response = json_response(res_conn, 200) -    assert length(response["accounts"]) == 2 -    assert response["last_status"]["id"] == direct.id -    assert response["unread"] == false - -    # (vanilla) Mastodon frontend behaviour -    res_conn = -      conn -      |> assign(:user, user_one) -      |> get("/api/v1/statuses/#{res_last_status["id"]}/context") - -    assert %{"ancestors" => [], "descendants" => []} == json_response(res_conn, 200) -  end - -  test "doesn't include DMs from blocked users", %{conn: conn} do -    blocker = insert(:user) -    blocked = insert(:user) -    user = insert(:user) -    {:ok, blocker} = User.block(blocker, blocked) - -    {:ok, _blocked_direct} = -      CommonAPI.post(blocked, %{ -        "status" => "Hi @#{blocker.nickname}!", -        "visibility" => "direct" -      }) - -    {:ok, direct} = -      CommonAPI.post(user, %{ -        "status" => "Hi @#{blocker.nickname}!", -        "visibility" => "direct" -      }) - -    res_conn = -      conn -      |> assign(:user, user) -      |> get("api/v1/timelines/direct") - -    [status] = json_response(res_conn, 200) -    assert status["id"] == direct.id -  end - -  test "verify_credentials", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/accounts/verify_credentials") - -    response = json_response(conn, 200) - -    assert %{"id" => id, "source" => %{"privacy" => "public"}} = response -    assert response["pleroma"]["chat_token"] -    assert id == to_string(user.id) -  end - -  test "verify_credentials default scope unlisted", %{conn: conn} do -    user = insert(:user, %{info: %User.Info{default_scope: "unlisted"}}) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/accounts/verify_credentials") - -    assert %{"id" => id, "source" => %{"privacy" => "unlisted"}} = json_response(conn, 200) -    assert id == to_string(user.id) -  end - -  test "apps/verify_credentials", %{conn: conn} do -    token = insert(:oauth_token) - -    conn = -      conn -      |> assign(:user, token.user) -      |> assign(:token, token) -      |> get("/api/v1/apps/verify_credentials") - -    app = Repo.preload(token, :app).app - -    expected = %{ -      "name" => app.client_name, -      "website" => app.website, -      "vapid_key" => Push.vapid_config() |> Keyword.get(:public_key) -    } - -    assert expected == json_response(conn, 200) -  end - -  test "user avatar can be set", %{conn: conn} do -    user = insert(:user) -    avatar_image = File.read!("test/fixtures/avatar_data_uri") - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_avatar", %{img: avatar_image}) - -    user = refresh_record(user) - -    assert %{ -             "name" => _, -             "type" => _, -             "url" => [ -               %{ -                 "href" => _, -                 "mediaType" => _, -                 "type" => _ -               } -             ] -           } = user.avatar - -    assert %{"url" => _} = json_response(conn, 200) -  end - -  test "user avatar can be reset", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_avatar", %{img: ""}) - -    user = User.get_cached_by_id(user.id) - -    assert user.avatar == nil - -    assert %{"url" => nil} = json_response(conn, 200) -  end - -  test "can set profile banner", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_banner", %{"banner" => @image}) - -    user = refresh_record(user) -    assert user.info.banner["type"] == "Image" - -    assert %{"url" => _} = json_response(conn, 200) -  end - -  test "can reset profile banner", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_banner", %{"banner" => ""}) - -    user = refresh_record(user) -    assert user.info.banner == %{} - -    assert %{"url" => nil} = json_response(conn, 200) -  end - -  test "background image can be set", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_background", %{"img" => @image}) - -    user = refresh_record(user) -    assert user.info.background["type"] == "Image" -    assert %{"url" => _} = json_response(conn, 200) -  end - -  test "background image can be reset", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> patch("/api/v1/pleroma/accounts/update_background", %{"img" => ""}) - -    user = refresh_record(user) -    assert user.info.background == %{} -    assert %{"url" => nil} = json_response(conn, 200) -  end - -  test "creates an oauth app", %{conn: conn} do -    user = insert(:user) -    app_attrs = build(:oauth_app) - -    conn = -      conn -      |> assign(:user, user) -      |> post("/api/v1/apps", %{ -        client_name: app_attrs.client_name, -        redirect_uris: app_attrs.redirect_uris -      }) - -    [app] = Repo.all(App) - -    expected = %{ -      "name" => app.client_name, -      "website" => app.website, -      "client_id" => app.client_id, -      "client_secret" => app.client_secret, -      "id" => app.id |> to_string(), -      "redirect_uri" => app.redirect_uris, -      "vapid_key" => Push.vapid_config() |> Keyword.get(:public_key) -    } - -    assert expected == json_response(conn, 200) -  end - -  test "get a status", %{conn: conn} do -    activity = insert(:note_activity) - -    conn = -      conn -      |> get("/api/v1/statuses/#{activity.id}") - -    assert %{"id" => id} = json_response(conn, 200) -    assert id == to_string(activity.id) -  end - -  describe "deleting a status" do -    test "when you created it", %{conn: conn} do -      activity = insert(:note_activity) -      author = User.get_cached_by_ap_id(activity.data["actor"]) - -      conn = -        conn -        |> assign(:user, author) -        |> delete("/api/v1/statuses/#{activity.id}") - -      assert %{} = json_response(conn, 200) - -      refute Activity.get_by_id(activity.id) -    end - -    test "when you didn't create it", %{conn: conn} do -      activity = insert(:note_activity) -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/statuses/#{activity.id}") - -      assert %{"error" => _} = json_response(conn, 403) - -      assert Activity.get_by_id(activity.id) == activity -    end - -    test "when you're an admin or moderator", %{conn: conn} do -      activity1 = insert(:note_activity) -      activity2 = insert(:note_activity) -      admin = insert(:user, info: %{is_admin: true}) -      moderator = insert(:user, info: %{is_moderator: true}) - -      res_conn = -        conn -        |> assign(:user, admin) -        |> delete("/api/v1/statuses/#{activity1.id}") - -      assert %{} = json_response(res_conn, 200) - -      res_conn = -        conn -        |> assign(:user, moderator) -        |> delete("/api/v1/statuses/#{activity2.id}") - -      assert %{} = json_response(res_conn, 200) - -      refute Activity.get_by_id(activity1.id) -      refute Activity.get_by_id(activity2.id) -    end -  end - -  describe "filters" do -    test "creating a filter", %{conn: conn} do -      user = insert(:user) - -      filter = %Pleroma.Filter{ -        phrase: "knights", -        context: ["home"] -      } - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/filters", %{"phrase" => filter.phrase, context: filter.context}) - -      assert response = json_response(conn, 200) -      assert response["phrase"] == filter.phrase -      assert response["context"] == filter.context -      assert response["irreversible"] == false -      assert response["id"] != nil -      assert response["id"] != "" -    end - -    test "fetching a list of filters", %{conn: conn} do -      user = insert(:user) - -      query_one = %Pleroma.Filter{ -        user_id: user.id, -        filter_id: 1, -        phrase: "knights", -        context: ["home"] -      } - -      query_two = %Pleroma.Filter{ -        user_id: user.id, -        filter_id: 2, -        phrase: "who", -        context: ["home"] -      } - -      {:ok, filter_one} = Pleroma.Filter.create(query_one) -      {:ok, filter_two} = Pleroma.Filter.create(query_two) - -      response = -        conn -        |> assign(:user, user) -        |> get("/api/v1/filters") +        |> get("/api/v1/accounts/#{user.id}/identity_proofs")          |> json_response(200) -      assert response == -               render_json( -                 FilterView, -                 "filters.json", -                 filters: [filter_two, filter_one] -               ) -    end - -    test "get a filter", %{conn: conn} do -      user = insert(:user) - -      query = %Pleroma.Filter{ -        user_id: user.id, -        filter_id: 2, -        phrase: "knight", -        context: ["home"] -      } - -      {:ok, filter} = Pleroma.Filter.create(query) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/filters/#{filter.filter_id}") - -      assert _response = json_response(conn, 200) -    end - -    test "update a filter", %{conn: conn} do -      user = insert(:user) - -      query = %Pleroma.Filter{ -        user_id: user.id, -        filter_id: 2, -        phrase: "knight", -        context: ["home"] -      } - -      {:ok, _filter} = Pleroma.Filter.create(query) - -      new = %Pleroma.Filter{ -        phrase: "nii", -        context: ["home"] -      } - -      conn = -        conn -        |> assign(:user, user) -        |> put("/api/v1/filters/#{query.filter_id}", %{ -          phrase: new.phrase, -          context: new.context -        }) - -      assert response = json_response(conn, 200) -      assert response["phrase"] == new.phrase -      assert response["context"] == new.context -    end - -    test "delete a filter", %{conn: conn} do -      user = insert(:user) - -      query = %Pleroma.Filter{ -        user_id: user.id, -        filter_id: 2, -        phrase: "knight", -        context: ["home"] -      } - -      {:ok, filter} = Pleroma.Filter.create(query) - -      conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/filters/#{filter.filter_id}") - -      assert response = json_response(conn, 200) -      assert response == %{} -    end -  end - -  describe "lists" do -    test "creating a list", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/lists", %{"title" => "cuties"}) - -      assert %{"title" => title} = json_response(conn, 200) -      assert title == "cuties" -    end - -    test "adding users to a list", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) - -      assert %{} == json_response(conn, 200) -      %Pleroma.List{following: following} = Pleroma.List.get(list.id, user) -      assert following == [other_user.follower_address] -    end - -    test "removing users from a list", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      third_user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) -      {:ok, list} = Pleroma.List.follow(list, other_user) -      {:ok, list} = Pleroma.List.follow(list, third_user) - -      conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) - -      assert %{} == json_response(conn, 200) -      %Pleroma.List{following: following} = Pleroma.List.get(list.id, user) -      assert following == [third_user.follower_address] -    end - -    test "listing users in a list", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) -      {:ok, list} = Pleroma.List.follow(list, other_user) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/lists/#{list.id}/accounts", %{"account_ids" => [other_user.id]}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(other_user.id) -    end - -    test "retrieving a list", %{conn: conn} do -      user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/lists/#{list.id}") - -      assert %{"id" => id} = json_response(conn, 200) -      assert id == to_string(list.id) -    end - -    test "renaming a list", %{conn: conn} do -      user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) - -      conn = -        conn -        |> assign(:user, user) -        |> put("/api/v1/lists/#{list.id}", %{"title" => "newname"}) - -      assert %{"title" => name} = json_response(conn, 200) -      assert name == "newname" -    end - -    test "deleting a list", %{conn: conn} do -      user = insert(:user) -      {:ok, list} = Pleroma.List.create("name", user) - -      conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/lists/#{list.id}") - -      assert %{} = json_response(conn, 200) -      assert is_nil(Repo.get(Pleroma.List, list.id)) -    end - -    test "list timeline", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      {:ok, _activity_one} = CommonAPI.post(user, %{"status" => "Marisa is cute."}) -      {:ok, activity_two} = CommonAPI.post(other_user, %{"status" => "Marisa is cute."}) -      {:ok, list} = Pleroma.List.create("name", user) -      {:ok, list} = Pleroma.List.follow(list, other_user) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/timelines/list/#{list.id}") - -      assert [%{"id" => id}] = json_response(conn, 200) - -      assert id == to_string(activity_two.id) -    end - -    test "list timeline does not leak non-public statuses for unfollowed users", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      {:ok, activity_one} = CommonAPI.post(other_user, %{"status" => "Marisa is cute."}) - -      {:ok, _activity_two} = -        CommonAPI.post(other_user, %{ -          "status" => "Marisa is cute.", -          "visibility" => "private" -        }) - -      {:ok, list} = Pleroma.List.create("name", user) -      {:ok, list} = Pleroma.List.follow(list, other_user) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/timelines/list/#{list.id}") - -      assert [%{"id" => id}] = json_response(conn, 200) - -      assert id == to_string(activity_one.id) -    end -  end - -  describe "notifications" do -    test "list of notifications", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) - -      {:ok, [_notification]} = Notification.create_notifications(activity) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/notifications") - -      expected_response = -        "hi <span class=\"h-card\"><a data-user=\"#{user.id}\" class=\"u-url mention\" href=\"#{ -          user.ap_id -        }\">@<span>#{user.nickname}</span></a></span>" - -      assert [%{"status" => %{"content" => response}} | _rest] = json_response(conn, 200) -      assert response == expected_response -    end - -    test "getting a single notification", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) - -      {:ok, [notification]} = Notification.create_notifications(activity) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/notifications/#{notification.id}") - -      expected_response = -        "hi <span class=\"h-card\"><a data-user=\"#{user.id}\" class=\"u-url mention\" href=\"#{ -          user.ap_id -        }\">@<span>#{user.nickname}</span></a></span>" - -      assert %{"status" => %{"content" => response}} = json_response(conn, 200) -      assert response == expected_response -    end - -    test "dismissing a single notification", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) - -      {:ok, [notification]} = Notification.create_notifications(activity) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/notifications/dismiss", %{"id" => notification.id}) - -      assert %{} = json_response(conn, 200) -    end - -    test "clearing all notifications", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) - -      {:ok, [_notification]} = Notification.create_notifications(activity) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/notifications/clear") - -      assert %{} = json_response(conn, 200) - -      conn = -        build_conn() -        |> assign(:user, user) -        |> get("/api/v1/notifications") - -      assert all = json_response(conn, 200) -      assert all == [] -    end - -    test "paginates notifications using min_id, since_id, max_id, and limit", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity1} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) -      {:ok, activity2} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) -      {:ok, activity3} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) -      {:ok, activity4} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) - -      notification1_id = Repo.get_by(Notification, activity_id: activity1.id).id |> to_string() -      notification2_id = Repo.get_by(Notification, activity_id: activity2.id).id |> to_string() -      notification3_id = Repo.get_by(Notification, activity_id: activity3.id).id |> to_string() -      notification4_id = Repo.get_by(Notification, activity_id: activity4.id).id |> to_string() - -      conn = -        conn -        |> assign(:user, user) - -      # min_id -      conn_res = -        conn -        |> get("/api/v1/notifications?limit=2&min_id=#{notification1_id}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification3_id}, %{"id" => ^notification2_id}] = result - -      # since_id -      conn_res = -        conn -        |> get("/api/v1/notifications?limit=2&since_id=#{notification1_id}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result - -      # max_id -      conn_res = -        conn -        |> get("/api/v1/notifications?limit=2&max_id=#{notification4_id}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification3_id}, %{"id" => ^notification2_id}] = result -    end - -    test "filters notifications using exclude_types", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, mention_activity} = CommonAPI.post(other_user, %{"status" => "hey @#{user.nickname}"}) -      {:ok, create_activity} = CommonAPI.post(user, %{"status" => "hey"}) -      {:ok, favorite_activity, _} = CommonAPI.favorite(create_activity.id, other_user) -      {:ok, reblog_activity, _} = CommonAPI.repeat(create_activity.id, other_user) -      {:ok, _, _, follow_activity} = CommonAPI.follow(other_user, user) - -      mention_notification_id = -        Repo.get_by(Notification, activity_id: mention_activity.id).id |> to_string() - -      favorite_notification_id = -        Repo.get_by(Notification, activity_id: favorite_activity.id).id |> to_string() - -      reblog_notification_id = -        Repo.get_by(Notification, activity_id: reblog_activity.id).id |> to_string() - -      follow_notification_id = -        Repo.get_by(Notification, activity_id: follow_activity.id).id |> to_string() - -      conn = -        conn -        |> assign(:user, user) - -      conn_res = -        get(conn, "/api/v1/notifications", %{exclude_types: ["mention", "favourite", "reblog"]}) - -      assert [%{"id" => ^follow_notification_id}] = json_response(conn_res, 200) - -      conn_res = -        get(conn, "/api/v1/notifications", %{exclude_types: ["favourite", "reblog", "follow"]}) - -      assert [%{"id" => ^mention_notification_id}] = json_response(conn_res, 200) - -      conn_res = -        get(conn, "/api/v1/notifications", %{exclude_types: ["reblog", "follow", "mention"]}) - -      assert [%{"id" => ^favorite_notification_id}] = json_response(conn_res, 200) - -      conn_res = -        get(conn, "/api/v1/notifications", %{exclude_types: ["follow", "mention", "favourite"]}) - -      assert [%{"id" => ^reblog_notification_id}] = json_response(conn_res, 200) -    end - -    test "destroy multiple", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity1} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) -      {:ok, activity2} = CommonAPI.post(other_user, %{"status" => "hi @#{user.nickname}"}) -      {:ok, activity3} = CommonAPI.post(user, %{"status" => "hi @#{other_user.nickname}"}) -      {:ok, activity4} = CommonAPI.post(user, %{"status" => "hi @#{other_user.nickname}"}) - -      notification1_id = Repo.get_by(Notification, activity_id: activity1.id).id |> to_string() -      notification2_id = Repo.get_by(Notification, activity_id: activity2.id).id |> to_string() -      notification3_id = Repo.get_by(Notification, activity_id: activity3.id).id |> to_string() -      notification4_id = Repo.get_by(Notification, activity_id: activity4.id).id |> to_string() - -      conn = -        conn -        |> assign(:user, user) - -      conn_res = -        conn -        |> get("/api/v1/notifications") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification2_id}, %{"id" => ^notification1_id}] = result - -      conn2 = -        conn -        |> assign(:user, other_user) - -      conn_res = -        conn2 -        |> get("/api/v1/notifications") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result - -      conn_destroy = -        conn -        |> delete("/api/v1/notifications/destroy_multiple", %{ -          "ids" => [notification1_id, notification2_id] -        }) - -      assert json_response(conn_destroy, 200) == %{} - -      conn_res = -        conn2 -        |> get("/api/v1/notifications") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^notification4_id}, %{"id" => ^notification3_id}] = result +      assert res == []      end -    test "doesn't see notifications after muting user with notifications", %{conn: conn} do -      user = insert(:user) -      user2 = insert(:user) - -      {:ok, _, _, _} = CommonAPI.follow(user, user2) -      {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) - -      conn = assign(conn, :user, user) - -      conn = get(conn, "/api/v1/notifications") - -      assert length(json_response(conn, 200)) == 1 - -      {:ok, user} = User.mute(user, user2) - -      conn = assign(build_conn(), :user, user) -      conn = get(conn, "/api/v1/notifications") - -      assert json_response(conn, 200) == [] -    end - -    test "see notifications after muting user without notifications", %{conn: conn} do -      user = insert(:user) -      user2 = insert(:user) - -      {:ok, _, _, _} = CommonAPI.follow(user, user2) -      {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) - -      conn = assign(conn, :user, user) - -      conn = get(conn, "/api/v1/notifications") - -      assert length(json_response(conn, 200)) == 1 - -      {:ok, user} = User.mute(user, user2, false) - -      conn = assign(build_conn(), :user, user) -      conn = get(conn, "/api/v1/notifications") - -      assert length(json_response(conn, 200)) == 1 -    end - -    test "see notifications after muting user with notifications and with_muted parameter", %{ -      conn: conn -    } do -      user = insert(:user) -      user2 = insert(:user) - -      {:ok, _, _, _} = CommonAPI.follow(user, user2) -      {:ok, _} = CommonAPI.post(user2, %{"status" => "hey @#{user.nickname}"}) - -      conn = assign(conn, :user, user) - -      conn = get(conn, "/api/v1/notifications") - -      assert length(json_response(conn, 200)) == 1 - -      {:ok, user} = User.mute(user, user2) - -      conn = assign(build_conn(), :user, user) -      conn = get(conn, "/api/v1/notifications", %{"with_muted" => "true"}) +    test "GET /api/v1/endorsements" do +      %{conn: conn} = oauth_access(["read:accounts"]) -      assert length(json_response(conn, 200)) == 1 -    end -  end - -  describe "reblogging" do -    test "reblogs and returns the reblogged status", %{conn: conn} do -      activity = insert(:note_activity) -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{activity.id}/reblog") - -      assert %{ -               "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}, -               "reblogged" => true -             } = json_response(conn, 200) - -      assert to_string(activity.id) == id -    end - -    test "reblogged status for another user", %{conn: conn} do -      activity = insert(:note_activity) -      user1 = insert(:user) -      user2 = insert(:user) -      user3 = insert(:user) -      CommonAPI.favorite(activity.id, user2) -      {:ok, _bookmark} = Pleroma.Bookmark.create(user2.id, activity.id) -      {:ok, reblog_activity1, _object} = CommonAPI.repeat(activity.id, user1) -      {:ok, _, _object} = CommonAPI.repeat(activity.id, user2) - -      conn_res = -        conn -        |> assign(:user, user3) -        |> get("/api/v1/statuses/#{reblog_activity1.id}") - -      assert %{ -               "reblog" => %{"id" => id, "reblogged" => false, "reblogs_count" => 2}, -               "reblogged" => false, -               "favourited" => false, -               "bookmarked" => false -             } = json_response(conn_res, 200) - -      conn_res = -        conn -        |> assign(:user, user2) -        |> get("/api/v1/statuses/#{reblog_activity1.id}") - -      assert %{ -               "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 2}, -               "reblogged" => true, -               "favourited" => true, -               "bookmarked" => true -             } = json_response(conn_res, 200) - -      assert to_string(activity.id) == id -    end - -    test "returns 400 error when activity is not exist", %{conn: conn} do -      user = insert(:user) - -      conn = +      res =          conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/foo/reblog") - -      assert json_response(conn, 400) == %{"error" => "Could not repeat"} -    end -  end - -  describe "unreblogging" do -    test "unreblogs and returns the unreblogged status", %{conn: conn} do -      activity = insert(:note_activity) -      user = insert(:user) - -      {:ok, _, _} = CommonAPI.repeat(activity.id, user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{activity.id}/unreblog") - -      assert %{"id" => id, "reblogged" => false, "reblogs_count" => 0} = json_response(conn, 200) - -      assert to_string(activity.id) == id -    end - -    test "returns 400 error when activity is not exist", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/foo/unreblog") - -      assert json_response(conn, 400) == %{"error" => "Could not unrepeat"} -    end -  end - -  describe "favoriting" do -    test "favs a status and returns it", %{conn: conn} do -      activity = insert(:note_activity) -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{activity.id}/favourite") - -      assert %{"id" => id, "favourites_count" => 1, "favourited" => true} = -               json_response(conn, 200) - -      assert to_string(activity.id) == id -    end - -    test "returns 400 error for a wrong id", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/1/favourite") - -      assert json_response(conn, 400) == %{"error" => "Could not favorite"} -    end -  end - -  describe "unfavoriting" do -    test "unfavorites a status and returns it", %{conn: conn} do -      activity = insert(:note_activity) -      user = insert(:user) - -      {:ok, _, _} = CommonAPI.favorite(activity.id, user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{activity.id}/unfavourite") - -      assert %{"id" => id, "favourites_count" => 0, "favourited" => false} = -               json_response(conn, 200) - -      assert to_string(activity.id) == id -    end - -    test "returns 400 error for a wrong id", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/1/unfavourite") - -      assert json_response(conn, 400) == %{"error" => "Could not unfavorite"} -    end -  end - -  describe "user timelines" do -    test "gets a users statuses", %{conn: conn} do -      user_one = insert(:user) -      user_two = insert(:user) -      user_three = insert(:user) - -      {:ok, user_three} = User.follow(user_three, user_one) - -      {:ok, activity} = CommonAPI.post(user_one, %{"status" => "HI!!!"}) - -      {:ok, direct_activity} = -        CommonAPI.post(user_one, %{ -          "status" => "Hi, @#{user_two.nickname}.", -          "visibility" => "direct" -        }) - -      {:ok, private_activity} = -        CommonAPI.post(user_one, %{"status" => "private", "visibility" => "private"}) - -      resp = -        conn -        |> get("/api/v1/accounts/#{user_one.id}/statuses") - -      assert [%{"id" => id}] = json_response(resp, 200) -      assert id == to_string(activity.id) - -      resp = -        conn -        |> assign(:user, user_two) -        |> get("/api/v1/accounts/#{user_one.id}/statuses") - -      assert [%{"id" => id_one}, %{"id" => id_two}] = json_response(resp, 200) -      assert id_one == to_string(direct_activity.id) -      assert id_two == to_string(activity.id) - -      resp = -        conn -        |> assign(:user, user_three) -        |> get("/api/v1/accounts/#{user_one.id}/statuses") - -      assert [%{"id" => id_one}, %{"id" => id_two}] = json_response(resp, 200) -      assert id_one == to_string(private_activity.id) -      assert id_two == to_string(activity.id) -    end - -    test "unimplemented pinned statuses feature", %{conn: conn} do -      note = insert(:note_activity) -      user = User.get_cached_by_ap_id(note.data["actor"]) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") - -      assert json_response(conn, 200) == [] -    end - -    test "gets an users media", %{conn: conn} do -      note = insert(:note_activity) -      user = User.get_cached_by_ap_id(note.data["actor"]) - -      file = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      media = -        TwitterAPI.upload(file, user, "json") -        |> Jason.decode!() - -      {:ok, image_post} = -        CommonAPI.post(user, %{"status" => "cofe", "media_ids" => [media["media_id"]]}) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}/statuses", %{"only_media" => "true"}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(image_post.id) - -      conn = -        build_conn() -        |> get("/api/v1/accounts/#{user.id}/statuses", %{"only_media" => "1"}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(image_post.id) -    end - -    test "gets a user's statuses without reblogs", %{conn: conn} do -      user = insert(:user) -      {:ok, post} = CommonAPI.post(user, %{"status" => "HI!!!"}) -      {:ok, _, _} = CommonAPI.repeat(post.id, user) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}/statuses", %{"exclude_reblogs" => "true"}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(post.id) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}/statuses", %{"exclude_reblogs" => "1"}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(post.id) -    end - -    test "filters user's statuses by a hashtag", %{conn: conn} do -      user = insert(:user) -      {:ok, post} = CommonAPI.post(user, %{"status" => "#hashtag"}) -      {:ok, _post} = CommonAPI.post(user, %{"status" => "hashtag"}) - -      conn = -        conn -        |> get("/api/v1/accounts/#{user.id}/statuses", %{"tagged" => "hashtag"}) - -      assert [%{"id" => id}] = json_response(conn, 200) -      assert id == to_string(post.id) -    end -  end - -  describe "user relationships" do -    test "returns the relationships for the current user", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) -      {:ok, user} = User.follow(user, other_user) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/accounts/relationships", %{"id" => [other_user.id]}) - -      assert [relationship] = json_response(conn, 200) - -      assert to_string(other_user.id) == relationship["id"] -    end -  end - -  describe "media upload" do -    setup do -      upload_config = Pleroma.Config.get([Pleroma.Upload]) -      proxy_config = Pleroma.Config.get([:media_proxy]) - -      on_exit(fn -> -        Pleroma.Config.put([Pleroma.Upload], upload_config) -        Pleroma.Config.put([:media_proxy], proxy_config) -      end) - -      user = insert(:user) - -      conn = -        build_conn() -        |> assign(:user, user) - -      image = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      [conn: conn, image: image] -    end - -    test "returns uploaded image", %{conn: conn, image: image} do -      desc = "Description of the image" - -      media = -        conn -        |> post("/api/v1/media", %{"file" => image, "description" => desc}) -        |> json_response(:ok) - -      assert media["type"] == "image" -      assert media["description"] == desc -      assert media["id"] - -      object = Repo.get(Object, media["id"]) -      assert object.data["actor"] == User.ap_id(conn.assigns[:user]) -    end - -    test "returns proxied url when media proxy is enabled", %{conn: conn, image: image} do -      Pleroma.Config.put([Pleroma.Upload, :base_url], "https://media.pleroma.social") - -      proxy_url = "https://cache.pleroma.social" -      Pleroma.Config.put([:media_proxy, :enabled], true) -      Pleroma.Config.put([:media_proxy, :base_url], proxy_url) - -      media = -        conn -        |> post("/api/v1/media", %{"file" => image}) -        |> json_response(:ok) - -      assert String.starts_with?(media["url"], proxy_url) -    end - -    test "returns media url when proxy is enabled but media url is whitelisted", %{ -      conn: conn, -      image: image -    } do -      media_url = "https://media.pleroma.social" -      Pleroma.Config.put([Pleroma.Upload, :base_url], media_url) - -      Pleroma.Config.put([:media_proxy, :enabled], true) -      Pleroma.Config.put([:media_proxy, :base_url], "https://cache.pleroma.social") -      Pleroma.Config.put([:media_proxy, :whitelist], ["media.pleroma.social"]) - -      media = -        conn -        |> post("/api/v1/media", %{"file" => image}) -        |> json_response(:ok) - -      assert String.starts_with?(media["url"], media_url) -    end -  end - -  describe "locked accounts" do -    test "/api/v1/follow_requests works" do -      user = insert(:user, %{info: %User.Info{locked: true}}) -      other_user = insert(:user) - -      {:ok, _activity} = ActivityPub.follow(other_user, user) - -      user = User.get_cached_by_id(user.id) -      other_user = User.get_cached_by_id(other_user.id) - -      assert User.following?(other_user, user) == false - -      conn = -        build_conn() -        |> assign(:user, user) -        |> get("/api/v1/follow_requests") - -      assert [relationship] = json_response(conn, 200) -      assert to_string(other_user.id) == relationship["id"] -    end - -    test "/api/v1/follow_requests/:id/authorize works" do -      user = insert(:user, %{info: %User.Info{locked: true}}) -      other_user = insert(:user) - -      {:ok, _activity} = ActivityPub.follow(other_user, user) - -      user = User.get_cached_by_id(user.id) -      other_user = User.get_cached_by_id(other_user.id) - -      assert User.following?(other_user, user) == false - -      conn = -        build_conn() -        |> assign(:user, user) -        |> post("/api/v1/follow_requests/#{other_user.id}/authorize") - -      assert relationship = json_response(conn, 200) -      assert to_string(other_user.id) == relationship["id"] - -      user = User.get_cached_by_id(user.id) -      other_user = User.get_cached_by_id(other_user.id) - -      assert User.following?(other_user, user) == true -    end - -    test "verify_credentials", %{conn: conn} do -      user = insert(:user, %{info: %User.Info{default_scope: "private"}}) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/accounts/verify_credentials") - -      assert %{"id" => id, "source" => %{"privacy" => "private"}} = json_response(conn, 200) -      assert id == to_string(user.id) -    end - -    test "/api/v1/follow_requests/:id/reject works" do -      user = insert(:user, %{info: %User.Info{locked: true}}) -      other_user = insert(:user) - -      {:ok, _activity} = ActivityPub.follow(other_user, user) - -      user = User.get_cached_by_id(user.id) - -      conn = -        build_conn() -        |> assign(:user, user) -        |> post("/api/v1/follow_requests/#{other_user.id}/reject") - -      assert relationship = json_response(conn, 200) -      assert to_string(other_user.id) == relationship["id"] - -      user = User.get_cached_by_id(user.id) -      other_user = User.get_cached_by_id(other_user.id) - -      assert User.following?(other_user, user) == false -    end -  end - -  test "account fetching", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{user.id}") - -    assert %{"id" => id} = json_response(conn, 200) -    assert id == to_string(user.id) - -    conn = -      build_conn() -      |> get("/api/v1/accounts/-1") - -    assert %{"error" => "Can't find user"} = json_response(conn, 404) -  end - -  test "account fetching also works nickname", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{user.nickname}") - -    assert %{"id" => id} = json_response(conn, 200) -    assert id == user.id -  end - -  test "mascot upload", %{conn: conn} do -    user = insert(:user) - -    non_image_file = %Plug.Upload{ -      content_type: "audio/mpeg", -      path: Path.absname("test/fixtures/sound.mp3"), -      filename: "sound.mp3" -    } - -    conn = -      conn -      |> assign(:user, user) -      |> put("/api/v1/pleroma/mascot", %{"file" => non_image_file}) - -    assert json_response(conn, 415) - -    file = %Plug.Upload{ -      content_type: "image/jpg", -      path: Path.absname("test/fixtures/image.jpg"), -      filename: "an_image.jpg" -    } - -    conn = -      build_conn() -      |> assign(:user, user) -      |> put("/api/v1/pleroma/mascot", %{"file" => file}) - -    assert %{"id" => _, "type" => image} = json_response(conn, 200) -  end - -  test "mascot retrieving", %{conn: conn} do -    user = insert(:user) -    # When user hasn't set a mascot, we should just get pleroma tan back -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/pleroma/mascot") - -    assert %{"url" => url} = json_response(conn, 200) -    assert url =~ "pleroma-fox-tan-smol" - -    # When a user sets their mascot, we should get that back -    file = %Plug.Upload{ -      content_type: "image/jpg", -      path: Path.absname("test/fixtures/image.jpg"), -      filename: "an_image.jpg" -    } - -    conn = -      build_conn() -      |> assign(:user, user) -      |> put("/api/v1/pleroma/mascot", %{"file" => file}) - -    assert json_response(conn, 200) - -    user = User.get_cached_by_id(user.id) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> get("/api/v1/pleroma/mascot") - -    assert %{"url" => url, "type" => "image"} = json_response(conn, 200) -    assert url =~ "an_image" -  end - -  test "hashtag timeline", %{conn: conn} do -    following = insert(:user) - -    capture_log(fn -> -      {:ok, activity} = CommonAPI.post(following, %{"status" => "test #2hu"}) - -      {:ok, [_activity]} = -        OStatus.fetch_activity_from_url("https://shitposter.club/notice/2827873") - -      nconn = -        conn -        |> get("/api/v1/timelines/tag/2hu") - -      assert [%{"id" => id}] = json_response(nconn, 200) - -      assert id == to_string(activity.id) - -      # works for different capitalization too -      nconn = -        conn -        |> get("/api/v1/timelines/tag/2HU") - -      assert [%{"id" => id}] = json_response(nconn, 200) - -      assert id == to_string(activity.id) -    end) -  end - -  test "multi-hashtag timeline", %{conn: conn} do -    user = insert(:user) - -    {:ok, activity_test} = CommonAPI.post(user, %{"status" => "#test"}) -    {:ok, activity_test1} = CommonAPI.post(user, %{"status" => "#test #test1"}) -    {:ok, activity_none} = CommonAPI.post(user, %{"status" => "#test #none"}) - -    any_test = -      conn -      |> get("/api/v1/timelines/tag/test", %{"any" => ["test1"]}) - -    [status_none, status_test1, status_test] = json_response(any_test, 200) - -    assert to_string(activity_test.id) == status_test["id"] -    assert to_string(activity_test1.id) == status_test1["id"] -    assert to_string(activity_none.id) == status_none["id"] - -    restricted_test = -      conn -      |> get("/api/v1/timelines/tag/test", %{"all" => ["test1"], "none" => ["none"]}) - -    assert [status_test1] == json_response(restricted_test, 200) - -    all_test = conn |> get("/api/v1/timelines/tag/test", %{"all" => ["none"]}) - -    assert [status_none] == json_response(all_test, 200) -  end - -  test "getting followers", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) -    {:ok, user} = User.follow(user, other_user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{other_user.id}/followers") - -    assert [%{"id" => id}] = json_response(conn, 200) -    assert id == to_string(user.id) -  end - -  test "getting followers, hide_followers", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user, %{info: %{hide_followers: true}}) -    {:ok, _user} = User.follow(user, other_user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{other_user.id}/followers") - -    assert [] == json_response(conn, 200) -  end - -  test "getting followers, hide_followers, same user requesting", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user, %{info: %{hide_followers: true}}) -    {:ok, _user} = User.follow(user, other_user) - -    conn = -      conn -      |> assign(:user, other_user) -      |> get("/api/v1/accounts/#{other_user.id}/followers") - -    refute [] == json_response(conn, 200) -  end - -  test "getting followers, pagination", %{conn: conn} do -    user = insert(:user) -    follower1 = insert(:user) -    follower2 = insert(:user) -    follower3 = insert(:user) -    {:ok, _} = User.follow(follower1, user) -    {:ok, _} = User.follow(follower2, user) -    {:ok, _} = User.follow(follower3, user) - -    conn = -      conn -      |> assign(:user, user) - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/followers?since_id=#{follower1.id}") - -    assert [%{"id" => id3}, %{"id" => id2}] = json_response(res_conn, 200) -    assert id3 == follower3.id -    assert id2 == follower2.id - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/followers?max_id=#{follower3.id}") - -    assert [%{"id" => id2}, %{"id" => id1}] = json_response(res_conn, 200) -    assert id2 == follower2.id -    assert id1 == follower1.id - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/followers?limit=1&max_id=#{follower3.id}") - -    assert [%{"id" => id2}] = json_response(res_conn, 200) -    assert id2 == follower2.id - -    assert [link_header] = get_resp_header(res_conn, "link") -    assert link_header =~ ~r/min_id=#{follower2.id}/ -    assert link_header =~ ~r/max_id=#{follower2.id}/ -  end - -  test "getting following", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) -    {:ok, user} = User.follow(user, other_user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/following") - -    assert [%{"id" => id}] = json_response(conn, 200) -    assert id == to_string(other_user.id) -  end - -  test "getting following, hide_follows", %{conn: conn} do -    user = insert(:user, %{info: %{hide_follows: true}}) -    other_user = insert(:user) -    {:ok, user} = User.follow(user, other_user) - -    conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/following") - -    assert [] == json_response(conn, 200) -  end - -  test "getting following, hide_follows, same user requesting", %{conn: conn} do -    user = insert(:user, %{info: %{hide_follows: true}}) -    other_user = insert(:user) -    {:ok, user} = User.follow(user, other_user) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/accounts/#{user.id}/following") - -    refute [] == json_response(conn, 200) -  end - -  test "getting following, pagination", %{conn: conn} do -    user = insert(:user) -    following1 = insert(:user) -    following2 = insert(:user) -    following3 = insert(:user) -    {:ok, _} = User.follow(user, following1) -    {:ok, _} = User.follow(user, following2) -    {:ok, _} = User.follow(user, following3) - -    conn = -      conn -      |> assign(:user, user) - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/following?since_id=#{following1.id}") - -    assert [%{"id" => id3}, %{"id" => id2}] = json_response(res_conn, 200) -    assert id3 == following3.id -    assert id2 == following2.id - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/following?max_id=#{following3.id}") - -    assert [%{"id" => id2}, %{"id" => id1}] = json_response(res_conn, 200) -    assert id2 == following2.id -    assert id1 == following1.id - -    res_conn = -      conn -      |> get("/api/v1/accounts/#{user.id}/following?limit=1&max_id=#{following3.id}") - -    assert [%{"id" => id2}] = json_response(res_conn, 200) -    assert id2 == following2.id - -    assert [link_header] = get_resp_header(res_conn, "link") -    assert link_header =~ ~r/min_id=#{following2.id}/ -    assert link_header =~ ~r/max_id=#{following2.id}/ -  end - -  test "following / unfollowing a user", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> post("/api/v1/accounts/#{other_user.id}/follow") - -    assert %{"id" => _id, "following" => true} = json_response(conn, 200) - -    user = User.get_cached_by_id(user.id) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> post("/api/v1/accounts/#{other_user.id}/unfollow") - -    assert %{"id" => _id, "following" => false} = json_response(conn, 200) - -    user = User.get_cached_by_id(user.id) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> post("/api/v1/follows", %{"uri" => other_user.nickname}) - -    assert %{"id" => id} = json_response(conn, 200) -    assert id == to_string(other_user.id) -  end - -  test "following without reblogs" do -    follower = insert(:user) -    followed = insert(:user) -    other_user = insert(:user) - -    conn = -      build_conn() -      |> assign(:user, follower) -      |> post("/api/v1/accounts/#{followed.id}/follow?reblogs=false") - -    assert %{"showing_reblogs" => false} = json_response(conn, 200) - -    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "hey"}) -    {:ok, reblog, _} = CommonAPI.repeat(activity.id, followed) - -    conn = -      build_conn() -      |> assign(:user, User.get_cached_by_id(follower.id)) -      |> get("/api/v1/timelines/home") - -    assert [] == json_response(conn, 200) - -    conn = -      build_conn() -      |> assign(:user, follower) -      |> post("/api/v1/accounts/#{followed.id}/follow?reblogs=true") - -    assert %{"showing_reblogs" => true} = json_response(conn, 200) - -    conn = -      build_conn() -      |> assign(:user, User.get_cached_by_id(follower.id)) -      |> get("/api/v1/timelines/home") - -    expected_activity_id = reblog.id -    assert [%{"id" => ^expected_activity_id}] = json_response(conn, 200) -  end - -  test "following / unfollowing errors" do -    user = insert(:user) - -    conn = -      build_conn() -      |> assign(:user, user) - -    # self follow -    conn_res = post(conn, "/api/v1/accounts/#{user.id}/follow") -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) - -    # self unfollow -    user = User.get_cached_by_id(user.id) -    conn_res = post(conn, "/api/v1/accounts/#{user.id}/unfollow") -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) - -    # self follow via uri -    user = User.get_cached_by_id(user.id) -    conn_res = post(conn, "/api/v1/follows", %{"uri" => user.nickname}) -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) - -    # follow non existing user -    conn_res = post(conn, "/api/v1/accounts/doesntexist/follow") -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) - -    # follow non existing user via uri -    conn_res = post(conn, "/api/v1/follows", %{"uri" => "doesntexist"}) -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) - -    # unfollow non existing user -    conn_res = post(conn, "/api/v1/accounts/doesntexist/unfollow") -    assert %{"error" => "Record not found"} = json_response(conn_res, 404) -  end - -  describe "mute/unmute" do -    test "with notifications", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/accounts/#{other_user.id}/mute") - -      response = json_response(conn, 200) - -      assert %{"id" => _id, "muting" => true, "muting_notifications" => true} = response -      user = User.get_cached_by_id(user.id) - -      conn = -        build_conn() -        |> assign(:user, user) -        |> post("/api/v1/accounts/#{other_user.id}/unmute") - -      response = json_response(conn, 200) -      assert %{"id" => _id, "muting" => false, "muting_notifications" => false} = response -    end - -    test "without notifications", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/accounts/#{other_user.id}/mute", %{"notifications" => "false"}) - -      response = json_response(conn, 200) - -      assert %{"id" => _id, "muting" => true, "muting_notifications" => false} = response -      user = User.get_cached_by_id(user.id) - -      conn = -        build_conn() -        |> assign(:user, user) -        |> post("/api/v1/accounts/#{other_user.id}/unmute") - -      response = json_response(conn, 200) -      assert %{"id" => _id, "muting" => false, "muting_notifications" => false} = response -    end -  end - -  test "subscribing / unsubscribing to a user", %{conn: conn} do -    user = insert(:user) -    subscription_target = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> post("/api/v1/pleroma/accounts/#{subscription_target.id}/subscribe") - -    assert %{"id" => _id, "subscribing" => true} = json_response(conn, 200) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> post("/api/v1/pleroma/accounts/#{subscription_target.id}/unsubscribe") - -    assert %{"id" => _id, "subscribing" => false} = json_response(conn, 200) -  end - -  test "getting a list of mutes", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) - -    {:ok, user} = User.mute(user, other_user) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/mutes") - -    other_user_id = to_string(other_user.id) -    assert [%{"id" => ^other_user_id}] = json_response(conn, 200) -  end - -  test "blocking / unblocking a user", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> post("/api/v1/accounts/#{other_user.id}/block") - -    assert %{"id" => _id, "blocking" => true} = json_response(conn, 200) - -    user = User.get_cached_by_id(user.id) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> post("/api/v1/accounts/#{other_user.id}/unblock") - -    assert %{"id" => _id, "blocking" => false} = json_response(conn, 200) -  end - -  test "getting a list of blocks", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) - -    {:ok, user} = User.block(user, other_user) - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/blocks") - -    other_user_id = to_string(other_user.id) -    assert [%{"id" => ^other_user_id}] = json_response(conn, 200) -  end - -  test "blocking / unblocking a domain", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user, %{ap_id: "https://dogwhistle.zone/@pundit"}) - -    conn = -      conn -      |> assign(:user, user) -      |> post("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"}) - -    assert %{} = json_response(conn, 200) -    user = User.get_cached_by_ap_id(user.ap_id) -    assert User.blocks?(user, other_user) - -    conn = -      build_conn() -      |> assign(:user, user) -      |> delete("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"}) - -    assert %{} = json_response(conn, 200) -    user = User.get_cached_by_ap_id(user.ap_id) -    refute User.blocks?(user, other_user) -  end - -  test "getting a list of domain blocks", %{conn: conn} do -    user = insert(:user) - -    {:ok, user} = User.block_domain(user, "bad.site") -    {:ok, user} = User.block_domain(user, "even.worse.site") - -    conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/domain_blocks") - -    domain_blocks = json_response(conn, 200) - -    assert "bad.site" in domain_blocks -    assert "even.worse.site" in domain_blocks -  end - -  test "unimplemented follow_requests, blocks, domain blocks" do -    user = insert(:user) - -    ["blocks", "domain_blocks", "follow_requests"] -    |> Enum.each(fn endpoint -> -      conn = -        build_conn() -        |> assign(:user, user) -        |> get("/api/v1/#{endpoint}") - -      assert [] = json_response(conn, 200) -    end) -  end - -  test "returns the favorites of a user", %{conn: conn} do -    user = insert(:user) -    other_user = insert(:user) - -    {:ok, _} = CommonAPI.post(other_user, %{"status" => "bla"}) -    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "traps are happy"}) - -    {:ok, _, _} = CommonAPI.favorite(activity.id, user) - -    first_conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/favourites") - -    assert [status] = json_response(first_conn, 200) -    assert status["id"] == to_string(activity.id) - -    assert [{"link", _link_header}] = -             Enum.filter(first_conn.resp_headers, fn element -> match?({"link", _}, element) end) - -    # Honours query params -    {:ok, second_activity} = -      CommonAPI.post(other_user, %{ -        "status" => -          "Trees Are Never Sad Look At Them Every Once In Awhile They're Quite Beautiful." -      }) - -    {:ok, _, _} = CommonAPI.favorite(second_activity.id, user) - -    last_like = status["id"] - -    second_conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/favourites?since_id=#{last_like}") - -    assert [second_status] = json_response(second_conn, 200) -    assert second_status["id"] == to_string(second_activity.id) - -    third_conn = -      conn -      |> assign(:user, user) -      |> get("/api/v1/favourites?limit=0") - -    assert [] = json_response(third_conn, 200) -  end - -  describe "getting favorites timeline of specified user" do -    setup do -      [current_user, user] = insert_pair(:user, %{info: %{hide_favorites: false}}) -      [current_user: current_user, user: user] -    end - -    test "returns list of statuses favorited by specified user", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      [activity | _] = insert_pair(:note_activity) -      CommonAPI.favorite(activity.id, user) - -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      [like] = response - -      assert length(response) == 1 -      assert like["id"] == activity.id -    end - -    test "returns favorites for specified user_id when user is not logged in", %{ -      conn: conn, -      user: user -    } do -      activity = insert(:note_activity) -      CommonAPI.favorite(activity.id, user) - -      response = -        conn -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      assert length(response) == 1 -    end - -    test "returns favorited DM only when user is logged in and he is one of recipients", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      {:ok, direct} = -        CommonAPI.post(current_user, %{ -          "status" => "Hi @#{user.nickname}!", -          "visibility" => "direct" -        }) - -      CommonAPI.favorite(direct.id, user) - -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      assert length(response) == 1 - -      anonymous_response = -        conn -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      assert Enum.empty?(anonymous_response) -    end - -    test "does not return others' favorited DM when user is not one of recipients", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      user_two = insert(:user) - -      {:ok, direct} = -        CommonAPI.post(user_two, %{ -          "status" => "Hi @#{user.nickname}!", -          "visibility" => "direct" -        }) - -      CommonAPI.favorite(direct.id, user) - -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      assert Enum.empty?(response) -    end - -    test "paginates favorites using since_id and max_id", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      activities = insert_list(10, :note_activity) - -      Enum.each(activities, fn activity -> -        CommonAPI.favorite(activity.id, user) -      end) - -      third_activity = Enum.at(activities, 2) -      seventh_activity = Enum.at(activities, 6) - -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites", %{ -          since_id: third_activity.id, -          max_id: seventh_activity.id -        }) -        |> json_response(:ok) - -      assert length(response) == 3 -      refute third_activity in response -      refute seventh_activity in response -    end - -    test "limits favorites using limit parameter", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      7 -      |> insert_list(:note_activity) -      |> Enum.each(fn activity -> -        CommonAPI.favorite(activity.id, user) -      end) - -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites", %{limit: "3"}) -        |> json_response(:ok) - -      assert length(response) == 3 -    end - -    test "returns empty response when user does not have any favorited statuses", %{ -      conn: conn, -      current_user: current_user, -      user: user -    } do -      response = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") -        |> json_response(:ok) - -      assert Enum.empty?(response) -    end - -    test "returns 404 error when specified user is not exist", %{conn: conn} do -      conn = get(conn, "/api/v1/pleroma/accounts/test/favourites") - -      assert json_response(conn, 404) == %{"error" => "Record not found"} -    end - -    test "returns 403 error when user has hidden own favorites", %{ -      conn: conn, -      current_user: current_user -    } do -      user = insert(:user, %{info: %{hide_favorites: true}}) -      activity = insert(:note_activity) -      CommonAPI.favorite(activity.id, user) - -      conn = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") - -      assert json_response(conn, 403) == %{"error" => "Can't get favorites"} -    end - -    test "hides favorites for new users by default", %{conn: conn, current_user: current_user} do -      user = insert(:user) -      activity = insert(:note_activity) -      CommonAPI.favorite(activity.id, user) - -      conn = -        conn -        |> assign(:user, current_user) -        |> get("/api/v1/pleroma/accounts/#{user.id}/favourites") - -      assert user.info.hide_favorites -      assert json_response(conn, 403) == %{"error" => "Can't get favorites"} -    end -  end - -  test "get instance information", %{conn: conn} do -    conn = get(conn, "/api/v1/instance") -    assert result = json_response(conn, 200) - -    email = Pleroma.Config.get([:instance, :email]) -    # Note: not checking for "max_toot_chars" since it's optional -    assert %{ -             "uri" => _, -             "title" => _, -             "description" => _, -             "version" => _, -             "email" => from_config_email, -             "urls" => %{ -               "streaming_api" => _ -             }, -             "stats" => _, -             "thumbnail" => _, -             "languages" => _, -             "registrations" => _, -             "poll_limits" => _ -           } = result - -    assert email == from_config_email -  end - -  test "get instance stats", %{conn: conn} do -    user = insert(:user, %{local: true}) - -    user2 = insert(:user, %{local: true}) -    {:ok, _user2} = User.deactivate(user2, !user2.info.deactivated) - -    insert(:user, %{local: false, nickname: "u@peer1.com"}) -    insert(:user, %{local: false, nickname: "u@peer2.com"}) - -    {:ok, _} = CommonAPI.post(user, %{"status" => "cofe"}) - -    # Stats should count users with missing or nil `info.deactivated` value -    user = User.get_cached_by_id(user.id) -    info_change = Changeset.change(user.info, %{deactivated: nil}) - -    {:ok, _user} = -      user -      |> Changeset.change() -      |> Changeset.put_embed(:info, info_change) -      |> User.update_and_set_cache() - -    Pleroma.Stats.update_stats() - -    conn = get(conn, "/api/v1/instance") - -    assert result = json_response(conn, 200) - -    stats = result["stats"] - -    assert stats -    assert stats["user_count"] == 1 -    assert stats["status_count"] == 1 -    assert stats["domain_count"] == 2 -  end - -  test "get peers", %{conn: conn} do -    insert(:user, %{local: false, nickname: "u@peer1.com"}) -    insert(:user, %{local: false, nickname: "u@peer2.com"}) - -    Pleroma.Stats.update_stats() - -    conn = get(conn, "/api/v1/instance/peers") - -    assert result = json_response(conn, 200) - -    assert ["peer1.com", "peer2.com"] == Enum.sort(result) -  end - -  test "put settings", %{conn: conn} do -    user = insert(:user) - -    conn = -      conn -      |> assign(:user, user) -      |> put("/api/web/settings", %{"data" => %{"programming" => "socks"}}) - -    assert _result = json_response(conn, 200) - -    user = User.get_cached_by_ap_id(user.ap_id) -    assert user.info.settings == %{"programming" => "socks"} -  end - -  describe "pinned statuses" do -    setup do -      Pleroma.Config.put([:instance, :max_pinned_statuses], 1) - -      user = insert(:user) -      {:ok, activity} = CommonAPI.post(user, %{"status" => "HI!!!"}) - -      [user: user, activity: activity] -    end - -    test "returns pinned statuses", %{conn: conn, user: user, activity: activity} do -      {:ok, _} = CommonAPI.pin(activity.id, user) - -      result = -        conn -        |> assign(:user, user) -        |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") +        |> get("/api/v1/endorsements")          |> json_response(200) -      id_str = to_string(activity.id) - -      assert [%{"id" => ^id_str, "pinned" => true}] = result -    end - -    test "pin status", %{conn: conn, user: user, activity: activity} do -      id_str = to_string(activity.id) - -      assert %{"id" => ^id_str, "pinned" => true} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{activity.id}/pin") -               |> json_response(200) - -      assert [%{"id" => ^id_str, "pinned" => true}] = -               conn -               |> assign(:user, user) -               |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") -               |> json_response(200) -    end - -    test "/pin: returns 400 error when activity is not public", %{conn: conn, user: user} do -      {:ok, dm} = CommonAPI.post(user, %{"status" => "test", "visibility" => "direct"}) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{dm.id}/pin") - -      assert json_response(conn, 400) == %{"error" => "Could not pin"} +      assert res == []      end -    test "unpin status", %{conn: conn, user: user, activity: activity} do -      {:ok, _} = CommonAPI.pin(activity.id, user) - -      id_str = to_string(activity.id) -      user = refresh_record(user) - -      assert %{"id" => ^id_str, "pinned" => false} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{activity.id}/unpin") -               |> json_response(200) - -      assert [] = -               conn -               |> assign(:user, user) -               |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true") -               |> json_response(200) -    end - -    test "/unpin: returns 400 error when activity is not exist", %{conn: conn, user: user} do -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/1/unpin") - -      assert json_response(conn, 400) == %{"error" => "Could not unpin"} -    end - -    test "max pinned statuses", %{conn: conn, user: user, activity: activity_one} do -      {:ok, activity_two} = CommonAPI.post(user, %{"status" => "HI!!!"}) - -      id_str_one = to_string(activity_one.id) - -      assert %{"id" => ^id_str_one, "pinned" => true} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{id_str_one}/pin") -               |> json_response(200) - -      user = refresh_record(user) - -      assert %{"error" => "You have already pinned the maximum number of statuses"} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{activity_two.id}/pin") -               |> json_response(400) -    end -  end - -  describe "cards" do -    setup do -      Pleroma.Config.put([:rich_media, :enabled], true) - -      on_exit(fn -> -        Pleroma.Config.put([:rich_media, :enabled], false) -      end) - -      user = insert(:user) -      %{user: user} -    end - -    test "returns rich-media card", %{conn: conn, user: user} do -      {:ok, activity} = CommonAPI.post(user, %{"status" => "https://example.com/ogp"}) - -      card_data = %{ -        "image" => "http://ia.media-imdb.com/images/rock.jpg", -        "provider_name" => "www.imdb.com", -        "provider_url" => "http://www.imdb.com", -        "title" => "The Rock", -        "type" => "link", -        "url" => "http://www.imdb.com/title/tt0117500/", -        "description" => -          "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer.", -        "pleroma" => %{ -          "opengraph" => %{ -            "image" => "http://ia.media-imdb.com/images/rock.jpg", -            "title" => "The Rock", -            "type" => "video.movie", -            "url" => "http://www.imdb.com/title/tt0117500/", -            "description" => -              "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer." -          } -        } -      } - -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/card") -        |> json_response(200) - -      assert response == card_data - -      # works with private posts -      {:ok, activity} = -        CommonAPI.post(user, %{"status" => "https://example.com/ogp", "visibility" => "direct"}) - -      response_two = +    test "GET /api/v1/trends", %{conn: conn} do +      res =          conn -        |> assign(:user, user) -        |> get("/api/v1/statuses/#{activity.id}/card") +        |> get("/api/v1/trends")          |> json_response(200) -      assert response_two == card_data -    end - -    test "replaces missing description with an empty string", %{conn: conn, user: user} do -      {:ok, activity} = -        CommonAPI.post(user, %{"status" => "https://example.com/ogp-missing-data"}) - -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/card") -        |> json_response(:ok) - -      assert response == %{ -               "type" => "link", -               "title" => "Pleroma", -               "description" => "", -               "image" => nil, -               "provider_name" => "pleroma.social", -               "provider_url" => "https://pleroma.social", -               "url" => "https://pleroma.social/", -               "pleroma" => %{ -                 "opengraph" => %{ -                   "title" => "Pleroma", -                   "type" => "website", -                   "url" => "https://pleroma.social/" -                 } -               } -             } -    end -  end - -  test "bookmarks" do -    user = insert(:user) -    for_user = insert(:user) - -    {:ok, activity1} = -      CommonAPI.post(user, %{ -        "status" => "heweoo?" -      }) - -    {:ok, activity2} = -      CommonAPI.post(user, %{ -        "status" => "heweoo!" -      }) - -    response1 = -      build_conn() -      |> assign(:user, for_user) -      |> post("/api/v1/statuses/#{activity1.id}/bookmark") - -    assert json_response(response1, 200)["bookmarked"] == true - -    response2 = -      build_conn() -      |> assign(:user, for_user) -      |> post("/api/v1/statuses/#{activity2.id}/bookmark") - -    assert json_response(response2, 200)["bookmarked"] == true - -    bookmarks = -      build_conn() -      |> assign(:user, for_user) -      |> get("/api/v1/bookmarks") - -    assert [json_response(response2, 200), json_response(response1, 200)] == -             json_response(bookmarks, 200) - -    response1 = -      build_conn() -      |> assign(:user, for_user) -      |> post("/api/v1/statuses/#{activity1.id}/unbookmark") - -    assert json_response(response1, 200)["bookmarked"] == false - -    bookmarks = -      build_conn() -      |> assign(:user, for_user) -      |> get("/api/v1/bookmarks") - -    assert [json_response(response2, 200)] == json_response(bookmarks, 200) -  end - -  describe "conversation muting" do -    setup do -      user = insert(:user) -      {:ok, activity} = CommonAPI.post(user, %{"status" => "HIE"}) - -      [user: user, activity: activity] -    end - -    test "mute conversation", %{conn: conn, user: user, activity: activity} do -      id_str = to_string(activity.id) - -      assert %{"id" => ^id_str, "muted" => true} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{activity.id}/mute") -               |> json_response(200) -    end - -    test "cannot mute already muted conversation", %{conn: conn, user: user, activity: activity} do -      {:ok, _} = CommonAPI.add_mute(user, activity) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses/#{activity.id}/mute") - -      assert json_response(conn, 400) == %{"error" => "conversation is already muted"} -    end - -    test "unmute conversation", %{conn: conn, user: user, activity: activity} do -      {:ok, _} = CommonAPI.add_mute(user, activity) - -      id_str = to_string(activity.id) -      user = refresh_record(user) - -      assert %{"id" => ^id_str, "muted" => false} = -               conn -               |> assign(:user, user) -               |> post("/api/v1/statuses/#{activity.id}/unmute") -               |> json_response(200) -    end -  end - -  describe "reports" do -    setup do -      reporter = insert(:user) -      target_user = insert(:user) - -      {:ok, activity} = CommonAPI.post(target_user, %{"status" => "foobar"}) - -      [reporter: reporter, target_user: target_user, activity: activity] -    end - -    test "submit a basic report", %{conn: conn, reporter: reporter, target_user: target_user} do -      assert %{"action_taken" => false, "id" => _} = -               conn -               |> assign(:user, reporter) -               |> post("/api/v1/reports", %{"account_id" => target_user.id}) -               |> json_response(200) -    end - -    test "submit a report with statuses and comment", %{ -      conn: conn, -      reporter: reporter, -      target_user: target_user, -      activity: activity -    } do -      assert %{"action_taken" => false, "id" => _} = -               conn -               |> assign(:user, reporter) -               |> post("/api/v1/reports", %{ -                 "account_id" => target_user.id, -                 "status_ids" => [activity.id], -                 "comment" => "bad status!", -                 "forward" => "false" -               }) -               |> json_response(200) -    end - -    test "account_id is required", %{ -      conn: conn, -      reporter: reporter, -      activity: activity -    } do -      assert %{"error" => "Valid `account_id` required"} = -               conn -               |> assign(:user, reporter) -               |> post("/api/v1/reports", %{"status_ids" => [activity.id]}) -               |> json_response(400) -    end - -    test "comment must be up to the size specified in the config", %{ -      conn: conn, -      reporter: reporter, -      target_user: target_user -    } do -      max_size = Pleroma.Config.get([:instance, :max_report_comment_size], 1000) -      comment = String.pad_trailing("a", max_size + 1, "a") - -      error = %{"error" => "Comment must be up to #{max_size} characters"} - -      assert ^error = -               conn -               |> assign(:user, reporter) -               |> post("/api/v1/reports", %{"account_id" => target_user.id, "comment" => comment}) -               |> json_response(400) -    end - -    test "returns error when account is not exist", %{ -      conn: conn, -      reporter: reporter, -      activity: activity -    } do -      conn = -        conn -        |> assign(:user, reporter) -        |> post("/api/v1/reports", %{"status_ids" => [activity.id], "account_id" => "foo"}) - -      assert json_response(conn, 400) == %{"error" => "Account not found"} -    end -  end - -  describe "link headers" do -    test "preserves parameters in link headers", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity1} = -        CommonAPI.post(other_user, %{ -          "status" => "hi @#{user.nickname}", -          "visibility" => "public" -        }) - -      {:ok, activity2} = -        CommonAPI.post(other_user, %{ -          "status" => "hi @#{user.nickname}", -          "visibility" => "public" -        }) - -      notification1 = Repo.get_by(Notification, activity_id: activity1.id) -      notification2 = Repo.get_by(Notification, activity_id: activity2.id) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/notifications", %{media_only: true}) - -      assert [link_header] = get_resp_header(conn, "link") -      assert link_header =~ ~r/media_only=true/ -      assert link_header =~ ~r/min_id=#{notification2.id}/ -      assert link_header =~ ~r/max_id=#{notification1.id}/ -    end -  end - -  test "accounts fetches correct account for nicknames beginning with numbers", %{conn: conn} do -    # Need to set an old-style integer ID to reproduce the problem -    # (these are no longer assigned to new accounts but were preserved -    # for existing accounts during the migration to flakeIDs) -    user_one = insert(:user, %{id: 1212}) -    user_two = insert(:user, %{nickname: "#{user_one.id}garbage"}) - -    resp_one = -      conn -      |> get("/api/v1/accounts/#{user_one.id}") - -    resp_two = -      conn -      |> get("/api/v1/accounts/#{user_two.nickname}") - -    resp_three = -      conn -      |> get("/api/v1/accounts/#{user_two.id}") - -    acc_one = json_response(resp_one, 200) -    acc_two = json_response(resp_two, 200) -    acc_three = json_response(resp_three, 200) -    refute acc_one == acc_two -    assert acc_two == acc_three -  end - -  describe "custom emoji" do -    test "with tags", %{conn: conn} do -      [emoji | _body] = -        conn -        |> get("/api/v1/custom_emojis") -        |> json_response(200) - -      assert Map.has_key?(emoji, "shortcode") -      assert Map.has_key?(emoji, "static_url") -      assert Map.has_key?(emoji, "tags") -      assert is_list(emoji["tags"]) -      assert Map.has_key?(emoji, "category") -      assert Map.has_key?(emoji, "url") -      assert Map.has_key?(emoji, "visible_in_picker") -    end -  end - -  describe "index/2 redirections" do -    setup %{conn: conn} do -      session_opts = [ -        store: :cookie, -        key: "_test", -        signing_salt: "cooldude" -      ] - -      conn = -        conn -        |> Plug.Session.call(Plug.Session.init(session_opts)) -        |> fetch_session() - -      test_path = "/web/statuses/test" -      %{conn: conn, path: test_path} -    end - -    test "redirects not logged-in users to the login page", %{conn: conn, path: path} do -      conn = get(conn, path) - -      assert conn.status == 302 -      assert redirected_to(conn) == "/web/login" -    end - -    test "does not redirect logged in users to the login page", %{conn: conn, path: path} do -      token = insert(:oauth_token) - -      conn = -        conn -        |> assign(:user, token.user) -        |> put_session(:oauth_token, token.token) -        |> get(path) - -      assert conn.status == 200 -    end - -    test "saves referer path to session", %{conn: conn, path: path} do -      conn = get(conn, path) -      return_to = Plug.Conn.get_session(conn, :return_to) - -      assert return_to == path -    end - -    test "redirects to the saved path after log in", %{conn: conn, path: path} do -      app = insert(:oauth_app, client_name: "Mastodon-Local", redirect_uris: ".") -      auth = insert(:oauth_authorization, app: app) - -      conn = -        conn -        |> put_session(:return_to, path) -        |> get("/web/login", %{code: auth.token}) - -      assert conn.status == 302 -      assert redirected_to(conn) == path -    end - -    test "redirects to the getting-started page when referer is not present", %{conn: conn} do -      app = insert(:oauth_app, client_name: "Mastodon-Local", redirect_uris: ".") -      auth = insert(:oauth_authorization, app: app) - -      conn = get(conn, "/web/login", %{code: auth.token}) - -      assert conn.status == 302 -      assert redirected_to(conn) == "/web/getting-started" -    end -  end - -  describe "scheduled activities" do -    test "creates a scheduled activity", %{conn: conn} do -      user = insert(:user) -      scheduled_at = NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "scheduled", -          "scheduled_at" => scheduled_at -        }) - -      assert %{"scheduled_at" => expected_scheduled_at} = json_response(conn, 200) -      assert expected_scheduled_at == Pleroma.Web.CommonAPI.Utils.to_masto_date(scheduled_at) -      assert [] == Repo.all(Activity) -    end - -    test "creates a scheduled activity with a media attachment", %{conn: conn} do -      user = insert(:user) -      scheduled_at = NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) - -      file = %Plug.Upload{ -        content_type: "image/jpg", -        path: Path.absname("test/fixtures/image.jpg"), -        filename: "an_image.jpg" -      } - -      {:ok, upload} = ActivityPub.upload(file, actor: user.ap_id) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "media_ids" => [to_string(upload.id)], -          "status" => "scheduled", -          "scheduled_at" => scheduled_at -        }) - -      assert %{"media_attachments" => [media_attachment]} = json_response(conn, 200) -      assert %{"type" => "image"} = media_attachment -    end - -    test "skips the scheduling and creates the activity if scheduled_at is earlier than 5 minutes from now", -         %{conn: conn} do -      user = insert(:user) - -      scheduled_at = -        NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(5) - 1, :millisecond) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{ -          "status" => "not scheduled", -          "scheduled_at" => scheduled_at -        }) - -      assert %{"content" => "not scheduled"} = json_response(conn, 200) -      assert [] == Repo.all(ScheduledActivity) -    end - -    test "returns error when daily user limit is exceeded", %{conn: conn} do -      user = insert(:user) - -      today = -        NaiveDateTime.utc_now() -        |> NaiveDateTime.add(:timer.minutes(6), :millisecond) -        |> NaiveDateTime.to_iso8601() - -      attrs = %{params: %{}, scheduled_at: today} -      {:ok, _} = ScheduledActivity.create(user, attrs) -      {:ok, _} = ScheduledActivity.create(user, attrs) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => today}) - -      assert %{"error" => "daily limit exceeded"} == json_response(conn, 422) -    end - -    test "returns error when total user limit is exceeded", %{conn: conn} do -      user = insert(:user) - -      today = -        NaiveDateTime.utc_now() -        |> NaiveDateTime.add(:timer.minutes(6), :millisecond) -        |> NaiveDateTime.to_iso8601() - -      tomorrow = -        NaiveDateTime.utc_now() -        |> NaiveDateTime.add(:timer.hours(36), :millisecond) -        |> NaiveDateTime.to_iso8601() - -      attrs = %{params: %{}, scheduled_at: today} -      {:ok, _} = ScheduledActivity.create(user, attrs) -      {:ok, _} = ScheduledActivity.create(user, attrs) -      {:ok, _} = ScheduledActivity.create(user, %{params: %{}, scheduled_at: tomorrow}) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => tomorrow}) - -      assert %{"error" => "total limit exceeded"} == json_response(conn, 422) -    end - -    test "shows scheduled activities", %{conn: conn} do -      user = insert(:user) -      scheduled_activity_id1 = insert(:scheduled_activity, user: user).id |> to_string() -      scheduled_activity_id2 = insert(:scheduled_activity, user: user).id |> to_string() -      scheduled_activity_id3 = insert(:scheduled_activity, user: user).id |> to_string() -      scheduled_activity_id4 = insert(:scheduled_activity, user: user).id |> to_string() - -      conn = -        conn -        |> assign(:user, user) - -      # min_id -      conn_res = -        conn -        |> get("/api/v1/scheduled_statuses?limit=2&min_id=#{scheduled_activity_id1}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^scheduled_activity_id3}, %{"id" => ^scheduled_activity_id2}] = result - -      # since_id -      conn_res = -        conn -        |> get("/api/v1/scheduled_statuses?limit=2&since_id=#{scheduled_activity_id1}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^scheduled_activity_id4}, %{"id" => ^scheduled_activity_id3}] = result - -      # max_id -      conn_res = -        conn -        |> get("/api/v1/scheduled_statuses?limit=2&max_id=#{scheduled_activity_id4}") - -      result = json_response(conn_res, 200) -      assert [%{"id" => ^scheduled_activity_id3}, %{"id" => ^scheduled_activity_id2}] = result -    end - -    test "shows a scheduled activity", %{conn: conn} do -      user = insert(:user) -      scheduled_activity = insert(:scheduled_activity, user: user) - -      res_conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/scheduled_statuses/#{scheduled_activity.id}") - -      assert %{"id" => scheduled_activity_id} = json_response(res_conn, 200) -      assert scheduled_activity_id == scheduled_activity.id |> to_string() - -      res_conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/scheduled_statuses/404") - -      assert %{"error" => "Record not found"} = json_response(res_conn, 404) -    end - -    test "updates a scheduled activity", %{conn: conn} do -      user = insert(:user) -      scheduled_activity = insert(:scheduled_activity, user: user) - -      new_scheduled_at = -        NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond) - -      res_conn = -        conn -        |> assign(:user, user) -        |> put("/api/v1/scheduled_statuses/#{scheduled_activity.id}", %{ -          scheduled_at: new_scheduled_at -        }) - -      assert %{"scheduled_at" => expected_scheduled_at} = json_response(res_conn, 200) -      assert expected_scheduled_at == Pleroma.Web.CommonAPI.Utils.to_masto_date(new_scheduled_at) - -      res_conn = -        conn -        |> assign(:user, user) -        |> put("/api/v1/scheduled_statuses/404", %{scheduled_at: new_scheduled_at}) - -      assert %{"error" => "Record not found"} = json_response(res_conn, 404) -    end - -    test "deletes a scheduled activity", %{conn: conn} do -      user = insert(:user) -      scheduled_activity = insert(:scheduled_activity, user: user) - -      res_conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/scheduled_statuses/#{scheduled_activity.id}") - -      assert %{} = json_response(res_conn, 200) -      assert nil == Repo.get(ScheduledActivity, scheduled_activity.id) - -      res_conn = -        conn -        |> assign(:user, user) -        |> delete("/api/v1/scheduled_statuses/#{scheduled_activity.id}") - -      assert %{"error" => "Record not found"} = json_response(res_conn, 404) -    end -  end - -  test "Repeated posts that are replies incorrectly have in_reply_to_id null", %{conn: conn} do -    user1 = insert(:user) -    user2 = insert(:user) -    user3 = insert(:user) - -    {:ok, replied_to} = CommonAPI.post(user1, %{"status" => "cofe"}) - -    # Reply to status from another user -    conn1 = -      conn -      |> assign(:user, user2) -      |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id}) - -    assert %{"content" => "xD", "id" => id} = json_response(conn1, 200) - -    activity = Activity.get_by_id_with_object(id) - -    assert Object.normalize(activity).data["inReplyTo"] == Object.normalize(replied_to).data["id"] -    assert Activity.get_in_reply_to_activity(activity).id == replied_to.id - -    # Reblog from the third user -    conn2 = -      conn -      |> assign(:user, user3) -      |> post("/api/v1/statuses/#{activity.id}/reblog") - -    assert %{"reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}} = -             json_response(conn2, 200) - -    assert to_string(activity.id) == id - -    # Getting third user status -    conn3 = -      conn -      |> assign(:user, user3) -      |> get("api/v1/timelines/home") - -    [reblogged_activity] = json_response(conn3, 200) - -    assert reblogged_activity["reblog"]["in_reply_to_id"] == replied_to.id - -    replied_to_user = User.get_by_ap_id(replied_to.data["actor"]) -    assert reblogged_activity["reblog"]["in_reply_to_account_id"] == replied_to_user.id -  end - -  describe "create account by app" do -    test "Account registration via Application", %{conn: conn} do -      conn = -        conn -        |> post("/api/v1/apps", %{ -          client_name: "client_name", -          redirect_uris: "urn:ietf:wg:oauth:2.0:oob", -          scopes: "read, write, follow" -        }) - -      %{ -        "client_id" => client_id, -        "client_secret" => client_secret, -        "id" => _, -        "name" => "client_name", -        "redirect_uri" => "urn:ietf:wg:oauth:2.0:oob", -        "vapid_key" => _, -        "website" => nil -      } = json_response(conn, 200) - -      conn = -        conn -        |> post("/oauth/token", %{ -          grant_type: "client_credentials", -          client_id: client_id, -          client_secret: client_secret -        }) - -      assert %{"access_token" => token, "refresh_token" => refresh, "scope" => scope} = -               json_response(conn, 200) - -      assert token -      token_from_db = Repo.get_by(Token, token: token) -      assert token_from_db -      assert refresh -      assert scope == "read write follow" - -      conn = -        build_conn() -        |> put_req_header("authorization", "Bearer " <> token) -        |> post("/api/v1/accounts", %{ -          username: "lain", -          email: "lain@example.org", -          password: "PlzDontHackLain", -          agreement: true -        }) - -      %{ -        "access_token" => token, -        "created_at" => _created_at, -        "scope" => _scope, -        "token_type" => "Bearer" -      } = json_response(conn, 200) - -      token_from_db = Repo.get_by(Token, token: token) -      assert token_from_db -      token_from_db = Repo.preload(token_from_db, :user) -      assert token_from_db.user - -      assert token_from_db.user.info.confirmation_pending -    end - -    test "rate limit", %{conn: conn} do -      app_token = insert(:oauth_token, user: nil) - -      conn = -        put_req_header(conn, "authorization", "Bearer " <> app_token.token) -        |> Map.put(:remote_ip, {15, 15, 15, 15}) - -      for i <- 1..5 do -        conn = -          conn -          |> post("/api/v1/accounts", %{ -            username: "#{i}lain", -            email: "#{i}lain@example.org", -            password: "PlzDontHackLain", -            agreement: true -          }) - -        %{ -          "access_token" => token, -          "created_at" => _created_at, -          "scope" => _scope, -          "token_type" => "Bearer" -        } = json_response(conn, 200) - -        token_from_db = Repo.get_by(Token, token: token) -        assert token_from_db -        token_from_db = Repo.preload(token_from_db, :user) -        assert token_from_db.user - -        assert token_from_db.user.info.confirmation_pending -      end - -      conn = -        conn -        |> post("/api/v1/accounts", %{ -          username: "6lain", -          email: "6lain@example.org", -          password: "PlzDontHackLain", -          agreement: true -        }) - -      assert json_response(conn, :too_many_requests) == %{"error" => "Throttled"} -    end -  end - -  describe "GET /api/v1/polls/:id" do -    test "returns poll entity for object id", %{conn: conn} do -      user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Pleroma does", -          "poll" => %{"options" => ["what Mastodon't", "n't what Mastodoes"], "expires_in" => 20} -        }) - -      object = Object.normalize(activity) - -      conn = -        conn -        |> assign(:user, user) -        |> get("/api/v1/polls/#{object.id}") - -      response = json_response(conn, 200) -      id = to_string(object.id) -      assert %{"id" => ^id, "expired" => false, "multiple" => false} = response -    end - -    test "does not expose polls for private statuses", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Pleroma does", -          "poll" => %{"options" => ["what Mastodon't", "n't what Mastodoes"], "expires_in" => 20}, -          "visibility" => "private" -        }) - -      object = Object.normalize(activity) - -      conn = -        conn -        |> assign(:user, other_user) -        |> get("/api/v1/polls/#{object.id}") - -      assert json_response(conn, 404) -    end -  end - -  describe "POST /api/v1/polls/:id/votes" do -    test "votes are added to the poll", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "A very delicious sandwich", -          "poll" => %{ -            "options" => ["Lettuce", "Grilled Bacon", "Tomato"], -            "expires_in" => 20, -            "multiple" => true -          } -        }) - -      object = Object.normalize(activity) - -      conn = -        conn -        |> assign(:user, other_user) -        |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [0, 1, 2]}) - -      assert json_response(conn, 200) -      object = Object.get_by_id(object.id) - -      assert Enum.all?(object.data["anyOf"], fn %{"replies" => %{"totalItems" => total_items}} -> -               total_items == 1 -             end) -    end - -    test "author can't vote", %{conn: conn} do -      user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Am I cute?", -          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20} -        }) - -      object = Object.normalize(activity) - -      assert conn -             |> assign(:user, user) -             |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [1]}) -             |> json_response(422) == %{"error" => "Poll's author can't vote"} - -      object = Object.get_by_id(object.id) - -      refute Enum.at(object.data["oneOf"], 1)["replies"]["totalItems"] == 1 -    end - -    test "does not allow multiple choices on a single-choice question", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "The glass is", -          "poll" => %{"options" => ["half empty", "half full"], "expires_in" => 20} -        }) - -      object = Object.normalize(activity) - -      assert conn -             |> assign(:user, other_user) -             |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [0, 1]}) -             |> json_response(422) == %{"error" => "Too many choices"} - -      object = Object.get_by_id(object.id) - -      refute Enum.any?(object.data["oneOf"], fn %{"replies" => %{"totalItems" => total_items}} -> -               total_items == 1 -             end) -    end - -    test "does not allow choice index to be greater than options count", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Am I cute?", -          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20} -        }) - -      object = Object.normalize(activity) - -      conn = -        conn -        |> assign(:user, other_user) -        |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [2]}) - -      assert json_response(conn, 422) == %{"error" => "Invalid indices"} -    end - -    test "returns 404 error when object is not exist", %{conn: conn} do -      user = insert(:user) - -      conn = -        conn -        |> assign(:user, user) -        |> post("/api/v1/polls/1/votes", %{"choices" => [0]}) - -      assert json_response(conn, 404) == %{"error" => "Record not found"} -    end - -    test "returns 404 when poll is private and not available for user", %{conn: conn} do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Am I cute?", -          "poll" => %{"options" => ["Yes", "No"], "expires_in" => 20}, -          "visibility" => "private" -        }) - -      object = Object.normalize(activity) - -      conn = -        conn -        |> assign(:user, other_user) -        |> post("/api/v1/polls/#{object.id}/votes", %{"choices" => [0]}) - -      assert json_response(conn, 404) == %{"error" => "Record not found"} -    end -  end - -  describe "GET /api/v1/statuses/:id/favourited_by" do -    setup do -      user = insert(:user) -      {:ok, activity} = CommonAPI.post(user, %{"status" => "test"}) - -      conn = -        build_conn() -        |> assign(:user, user) - -      [conn: conn, activity: activity] -    end - -    test "returns users who have favorited the status", %{conn: conn, activity: activity} do -      other_user = insert(:user) -      {:ok, _, _} = CommonAPI.favorite(activity.id, other_user) - -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/favourited_by") -        |> json_response(:ok) - -      [%{"id" => id}] = response - -      assert id == other_user.id -    end - -    test "returns empty array when status has not been favorited yet", %{ -      conn: conn, -      activity: activity -    } do -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/favourited_by") -        |> json_response(:ok) - -      assert Enum.empty?(response) -    end -  end - -  describe "GET /api/v1/statuses/:id/reblogged_by" do -    setup do -      user = insert(:user) -      {:ok, activity} = CommonAPI.post(user, %{"status" => "test"}) - -      conn = -        build_conn() -        |> assign(:user, user) - -      [conn: conn, activity: activity] -    end - -    test "returns users who have reblogged the status", %{conn: conn, activity: activity} do -      other_user = insert(:user) -      {:ok, _, _} = CommonAPI.repeat(activity.id, other_user) - -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") -        |> json_response(:ok) - -      [%{"id" => id}] = response - -      assert id == other_user.id -    end - -    test "returns empty array when status has not been reblogged yet", %{ -      conn: conn, -      activity: activity -    } do -      response = -        conn -        |> get("/api/v1/statuses/#{activity.id}/reblogged_by") -        |> json_response(:ok) - -      assert Enum.empty?(response) -    end -  end - -  describe "POST /auth/password, with valid parameters" do -    setup %{conn: conn} do -      user = insert(:user) -      conn = post(conn, "/auth/password?email=#{user.email}") -      %{conn: conn, user: user} -    end - -    test "it returns 204", %{conn: conn} do -      assert json_response(conn, :no_content) -    end - -    test "it creates a PasswordResetToken record for user", %{user: user} do -      token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id) -      assert token_record -    end - -    test "it sends an email to user", %{user: user} do -      token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id) - -      email = Pleroma.Emails.UserEmail.password_reset_email(user, token_record.token) -      notify_email = Pleroma.Config.get([:instance, :notify_email]) -      instance_name = Pleroma.Config.get([:instance, :name]) - -      assert_email_sent( -        from: {instance_name, notify_email}, -        to: {user.name, user.email}, -        html_body: email.html_body -      ) -    end -  end - -  describe "POST /auth/password, with invalid parameters" do -    setup do -      user = insert(:user) -      {:ok, user: user} -    end - -    test "it returns 404 when user is not found", %{conn: conn, user: user} do -      conn = post(conn, "/auth/password?email=nonexisting_#{user.email}") -      assert conn.status == 404 -      assert conn.resp_body == "" -    end - -    test "it returns 400 when user is not local", %{conn: conn, user: user} do -      {:ok, user} = Repo.update(Changeset.change(user, local: false)) -      conn = post(conn, "/auth/password?email=#{user.email}") -      assert conn.status == 400 -      assert conn.resp_body == "" +      assert res == []      end    end  end diff --git a/test/web/mastodon_api/mastodon_api_test.exs b/test/web/mastodon_api/mastodon_api_test.exs new file mode 100644 index 000000000..561ef05aa --- /dev/null +++ b/test/web/mastodon_api/mastodon_api_test.exs @@ -0,0 +1,104 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.MastodonAPITest do +  use Pleroma.Web.ConnCase + +  alias Pleroma.Notification +  alias Pleroma.ScheduledActivity +  alias Pleroma.User +  alias Pleroma.Web.CommonAPI +  alias Pleroma.Web.MastodonAPI.MastodonAPI + +  import Pleroma.Factory + +  describe "follow/3" do +    test "returns error when followed user is deactivated" do +      follower = insert(:user) +      user = insert(:user, local: true, deactivated: true) +      {:error, error} = MastodonAPI.follow(follower, user) +      assert error == "Could not follow user: #{user.nickname} is deactivated." +    end + +    test "following for user" do +      follower = insert(:user) +      user = insert(:user) +      {:ok, follower} = MastodonAPI.follow(follower, user) +      assert User.following?(follower, user) +    end + +    test "returns ok if user already followed" do +      follower = insert(:user) +      user = insert(:user) +      {:ok, follower} = User.follow(follower, user) +      {:ok, follower} = MastodonAPI.follow(follower, refresh_record(user)) +      assert User.following?(follower, user) +    end +  end + +  describe "get_followers/2" do +    test "returns user followers" do +      follower1_user = insert(:user) +      follower2_user = insert(:user) +      user = insert(:user) +      {:ok, _follower1_user} = User.follow(follower1_user, user) +      {:ok, follower2_user} = User.follow(follower2_user, user) + +      assert MastodonAPI.get_followers(user, %{"limit" => 1}) == [follower2_user] +    end +  end + +  describe "get_friends/2" do +    test "returns user friends" do +      user = insert(:user) +      followed_one = insert(:user) +      followed_two = insert(:user) +      followed_three = insert(:user) + +      {:ok, user} = User.follow(user, followed_one) +      {:ok, user} = User.follow(user, followed_two) +      {:ok, user} = User.follow(user, followed_three) +      res = MastodonAPI.get_friends(user) + +      assert length(res) == 3 +      assert Enum.member?(res, refresh_record(followed_three)) +      assert Enum.member?(res, refresh_record(followed_two)) +      assert Enum.member?(res, refresh_record(followed_one)) +    end +  end + +  describe "get_notifications/2" do +    test "returns notifications for user" do +      user = insert(:user) +      subscriber = insert(:user) + +      User.subscribe(subscriber, user) + +      {:ok, status} = CommonAPI.post(user, %{"status" => "Akariiiin"}) + +      {:ok, status1} = CommonAPI.post(user, %{"status" => "Magi"}) +      {:ok, [notification]} = Notification.create_notifications(status) +      {:ok, [notification1]} = Notification.create_notifications(status1) +      res = MastodonAPI.get_notifications(subscriber) + +      assert Enum.member?(Enum.map(res, & &1.id), notification.id) +      assert Enum.member?(Enum.map(res, & &1.id), notification1.id) +    end +  end + +  describe "get_scheduled_activities/2" do +    test "returns user scheduled activities" do +      user = insert(:user) + +      today = +        NaiveDateTime.utc_now() +        |> NaiveDateTime.add(:timer.minutes(6), :millisecond) +        |> NaiveDateTime.to_iso8601() + +      attrs = %{params: %{}, scheduled_at: today} +      {:ok, schedule} = ScheduledActivity.create(user, attrs) +      assert MastodonAPI.get_scheduled_activities(user) == [schedule] +    end +  end +end diff --git a/test/web/mastodon_api/account_view_test.exs b/test/web/mastodon_api/views/account_view_test.exs index fa44d35cc..2107bb85c 100644 --- a/test/web/mastodon_api/account_view_test.exs +++ b/test/web/mastodon_api/views/account_view_test.exs @@ -1,5 +1,5 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.AccountViewTest do @@ -26,12 +26,10 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do      user =        insert(:user, %{ -        info: %{ -          note_count: 5, -          follower_count: 3, -          source_data: source_data, -          background: background_image -        }, +        follower_count: 3, +        note_count: 5, +        source_data: source_data, +        background: background_image,          nickname: "shp@shitposter.club",          name: ":karjalanpiirakka: shp",          bio: "<script src=\"invalid-html\"></script><span>valid html</span>", @@ -67,7 +65,11 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        source: %{          note: "valid html",          sensitive: false, -        pleroma: %{} +        pleroma: %{ +          actor_type: "Person", +          discoverable: false +        }, +        fields: []        },        pleroma: %{          background_image: "https://example.com/images/asuka_hospital.png", @@ -78,36 +80,35 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do          hide_favorites: true,          hide_followers: false,          hide_follows: false, +        hide_followers_count: false, +        hide_follows_count: false,          relationship: %{},          skip_thread_containment: false        }      } -    assert expected == AccountView.render("account.json", %{user: user}) +    assert expected == AccountView.render("show.json", %{user: user})    end    test "Represent the user account for the account owner" do      user = insert(:user) -    notification_settings = %{ -      "followers" => true, -      "follows" => true, -      "non_follows" => true, -      "non_followers" => true -    } - -    privacy = user.info.default_scope +    notification_settings = %Pleroma.User.NotificationSetting{} +    privacy = user.default_scope      assert %{ -             pleroma: %{notification_settings: ^notification_settings}, +             pleroma: %{notification_settings: ^notification_settings, allow_following_move: true},               source: %{privacy: ^privacy} -           } = AccountView.render("account.json", %{user: user, for: user}) +           } = AccountView.render("show.json", %{user: user, for: user})    end    test "Represent a Service(bot) account" do      user =        insert(:user, %{ -        info: %{note_count: 5, follower_count: 3, source_data: %{"type" => "Service"}}, +        follower_count: 3, +        note_count: 5, +        source_data: %{}, +        actor_type: "Service",          nickname: "shp@shitposter.club",          inserted_at: ~N[2017-08-15 15:47:06.597036]        }) @@ -134,7 +135,11 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        source: %{          note: user.bio,          sensitive: false, -        pleroma: %{} +        pleroma: %{ +          actor_type: "Service", +          discoverable: false +        }, +        fields: []        },        pleroma: %{          background_image: nil, @@ -145,18 +150,20 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do          hide_favorites: true,          hide_followers: false,          hide_follows: false, +        hide_followers_count: false, +        hide_follows_count: false,          relationship: %{},          skip_thread_containment: false        }      } -    assert expected == AccountView.render("account.json", %{user: user}) +    assert expected == AccountView.render("show.json", %{user: user})    end    test "Represent a deactivated user for an admin" do -    admin = insert(:user, %{info: %{is_admin: true}}) -    deactivated_user = insert(:user, %{info: %{deactivated: true}}) -    represented = AccountView.render("account.json", %{user: deactivated_user, for: admin}) +    admin = insert(:user, is_admin: true) +    deactivated_user = insert(:user, deactivated: true) +    represented = AccountView.render("show.json", %{user: deactivated_user, for: admin})      assert represented[:pleroma][:deactivated] == true    end @@ -180,9 +187,9 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        {:ok, user} = User.follow(user, other_user)        {:ok, other_user} = User.follow(other_user, user) -      {:ok, other_user} = User.subscribe(user, other_user) -      {:ok, user} = User.mute(user, other_user, true) -      {:ok, user} = CommonAPI.hide_reblogs(user, other_user) +      {:ok, _subscription} = User.subscribe(user, other_user) +      {:ok, _user_relationships} = User.mute(user, other_user, true) +      {:ok, _reblog_mute} = CommonAPI.hide_reblogs(user, other_user)        expected = %{          id: to_string(other_user.id), @@ -208,9 +215,9 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        other_user = insert(:user)        {:ok, user} = User.follow(user, other_user) -      {:ok, other_user} = User.subscribe(user, other_user) -      {:ok, user} = User.block(user, other_user) -      {:ok, other_user} = User.block(other_user, user) +      {:ok, _subscription} = User.subscribe(user, other_user) +      {:ok, _user_relationship} = User.block(user, other_user) +      {:ok, _user_relationship} = User.block(other_user, user)        expected = %{          id: to_string(other_user.id), @@ -231,9 +238,19 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do                 AccountView.render("relationship.json", %{user: user, target: other_user})      end +    test "represent a relationship for the user blocking a domain" do +      user = insert(:user) +      other_user = insert(:user, ap_id: "https://bad.site/users/other_user") + +      {:ok, user} = User.block_domain(user, "bad.site") + +      assert %{domain_blocking: true, blocking: false} = +               AccountView.render("relationship.json", %{user: user, target: other_user}) +    end +      test "represent a relationship for the user with a pending follow request" do        user = insert(:user) -      other_user = insert(:user, %{info: %User.Info{locked: true}}) +      other_user = insert(:user, locked: true)        {:ok, user, other_user, _} = CommonAPI.follow(user, other_user)        user = User.get_cached_by_id(user.id) @@ -262,14 +279,17 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do    test "represent an embedded relationship" do      user =        insert(:user, %{ -        info: %{note_count: 5, follower_count: 0, source_data: %{"type" => "Service"}}, +        follower_count: 0, +        note_count: 5, +        source_data: %{}, +        actor_type: "Service",          nickname: "shp@shitposter.club",          inserted_at: ~N[2017-08-15 15:47:06.597036]        })      other_user = insert(:user)      {:ok, other_user} = User.follow(other_user, user) -    {:ok, other_user} = User.block(other_user, user) +    {:ok, _user_relationship} = User.block(other_user, user)      {:ok, _} = User.follow(insert(:user), user)      expected = %{ @@ -294,7 +314,11 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        source: %{          note: user.bio,          sensitive: false, -        pleroma: %{} +        pleroma: %{ +          actor_type: "Service", +          discoverable: false +        }, +        fields: []        },        pleroma: %{          background_image: nil, @@ -305,6 +329,8 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do          hide_favorites: true,          hide_followers: false,          hide_follows: false, +        hide_followers_count: false, +        hide_follows_count: false,          relationship: %{            id: to_string(user.id),            following: false, @@ -323,27 +349,179 @@ defmodule Pleroma.Web.MastodonAPI.AccountViewTest do        }      } -    assert expected == AccountView.render("account.json", %{user: user, for: other_user}) +    assert expected == +             AccountView.render("show.json", %{user: refresh_record(user), for: other_user})    end    test "returns the settings store if the requesting user is the represented user and it's requested specifically" do -    user = insert(:user, %{info: %User.Info{pleroma_settings_store: %{fe: "test"}}}) +    user = insert(:user, pleroma_settings_store: %{fe: "test"})      result = -      AccountView.render("account.json", %{user: user, for: user, with_pleroma_settings: true}) +      AccountView.render("show.json", %{user: user, for: user, with_pleroma_settings: true})      assert result.pleroma.settings_store == %{:fe => "test"} -    result = AccountView.render("account.json", %{user: user, with_pleroma_settings: true}) +    result = AccountView.render("show.json", %{user: user, with_pleroma_settings: true})      assert result.pleroma[:settings_store] == nil -    result = AccountView.render("account.json", %{user: user, for: user}) +    result = AccountView.render("show.json", %{user: user, for: user})      assert result.pleroma[:settings_store] == nil    end    test "sanitizes display names" do      user = insert(:user, name: "<marquee> username </marquee>") -    result = AccountView.render("account.json", %{user: user}) +    result = AccountView.render("show.json", %{user: user})      refute result.display_name == "<marquee> username </marquee>"    end + +  test "never display nil user follow counts" do +    user = insert(:user, following_count: 0, follower_count: 0) +    result = AccountView.render("show.json", %{user: user}) + +    assert result.following_count == 0 +    assert result.followers_count == 0 +  end + +  describe "hiding follows/following" do +    test "shows when follows/followers stats are hidden and sets follow/follower count to 0" do +      user = +        insert(:user, %{ +          hide_followers: true, +          hide_followers_count: true, +          hide_follows: true, +          hide_follows_count: true +        }) + +      other_user = insert(:user) +      {:ok, user, other_user, _activity} = CommonAPI.follow(user, other_user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{ +               followers_count: 0, +               following_count: 0, +               pleroma: %{hide_follows_count: true, hide_followers_count: true} +             } = AccountView.render("show.json", %{user: user}) +    end + +    test "shows when follows/followers are hidden" do +      user = insert(:user, hide_followers: true, hide_follows: true) +      other_user = insert(:user) +      {:ok, user, other_user, _activity} = CommonAPI.follow(user, other_user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{ +               followers_count: 1, +               following_count: 1, +               pleroma: %{hide_follows: true, hide_followers: true} +             } = AccountView.render("show.json", %{user: user}) +    end + +    test "shows actual follower/following count to the account owner" do +      user = insert(:user, hide_followers: true, hide_follows: true) +      other_user = insert(:user) +      {:ok, user, other_user, _activity} = CommonAPI.follow(user, other_user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{ +               followers_count: 1, +               following_count: 1 +             } = AccountView.render("show.json", %{user: user, for: user}) +    end + +    test "shows unread_conversation_count only to the account owner" do +      user = insert(:user) +      other_user = insert(:user) + +      {:ok, _activity} = +        CommonAPI.post(other_user, %{ +          "status" => "Hey @#{user.nickname}.", +          "visibility" => "direct" +        }) + +      user = User.get_cached_by_ap_id(user.ap_id) + +      assert AccountView.render("show.json", %{user: user, for: other_user})[:pleroma][ +               :unread_conversation_count +             ] == nil + +      assert AccountView.render("show.json", %{user: user, for: user})[:pleroma][ +               :unread_conversation_count +             ] == 1 +    end +  end + +  describe "follow requests counter" do +    test "shows zero when no follow requests are pending" do +      user = insert(:user) + +      assert %{follow_requests_count: 0} = +               AccountView.render("show.json", %{user: user, for: user}) + +      other_user = insert(:user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{follow_requests_count: 0} = +               AccountView.render("show.json", %{user: user, for: user}) +    end + +    test "shows non-zero when follow requests are pending" do +      user = insert(:user, locked: true) + +      assert %{locked: true} = AccountView.render("show.json", %{user: user, for: user}) + +      other_user = insert(:user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{locked: true, follow_requests_count: 1} = +               AccountView.render("show.json", %{user: user, for: user}) +    end + +    test "decreases when accepting a follow request" do +      user = insert(:user, locked: true) + +      assert %{locked: true} = AccountView.render("show.json", %{user: user, for: user}) + +      other_user = insert(:user) +      {:ok, other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{locked: true, follow_requests_count: 1} = +               AccountView.render("show.json", %{user: user, for: user}) + +      {:ok, _other_user} = CommonAPI.accept_follow_request(other_user, user) + +      assert %{locked: true, follow_requests_count: 0} = +               AccountView.render("show.json", %{user: user, for: user}) +    end + +    test "decreases when rejecting a follow request" do +      user = insert(:user, locked: true) + +      assert %{locked: true} = AccountView.render("show.json", %{user: user, for: user}) + +      other_user = insert(:user) +      {:ok, other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      assert %{locked: true, follow_requests_count: 1} = +               AccountView.render("show.json", %{user: user, for: user}) + +      {:ok, _other_user} = CommonAPI.reject_follow_request(other_user, user) + +      assert %{locked: true, follow_requests_count: 0} = +               AccountView.render("show.json", %{user: user, for: user}) +    end + +    test "shows non-zero when historical unapproved requests are present" do +      user = insert(:user, locked: true) + +      assert %{locked: true} = AccountView.render("show.json", %{user: user, for: user}) + +      other_user = insert(:user) +      {:ok, _other_user, user, _activity} = CommonAPI.follow(other_user, user) + +      {:ok, user} = User.update_and_set_cache(user, %{locked: false}) + +      assert %{locked: false, follow_requests_count: 1} = +               AccountView.render("show.json", %{user: user, for: user}) +    end +  end  end diff --git a/test/web/mastodon_api/views/conversation_view_test.exs b/test/web/mastodon_api/views/conversation_view_test.exs new file mode 100644 index 000000000..6ed22597d --- /dev/null +++ b/test/web/mastodon_api/views/conversation_view_test.exs @@ -0,0 +1,35 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ConversationViewTest do +  use Pleroma.DataCase + +  alias Pleroma.Conversation.Participation +  alias Pleroma.Web.CommonAPI +  alias Pleroma.Web.MastodonAPI.ConversationView + +  import Pleroma.Factory + +  test "represents a Mastodon Conversation entity" do +    user = insert(:user) +    other_user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{"status" => "hey @#{other_user.nickname}", "visibility" => "direct"}) + +    [participation] = Participation.for_user_with_last_activity_id(user) + +    assert participation + +    conversation = +      ConversationView.render("participation.json", %{participation: participation, for: user}) + +    assert conversation.id == participation.id |> to_string() +    assert conversation.last_status.id == activity.id + +    assert [account] = conversation.accounts +    assert account.id == other_user.id +    assert conversation.last_status.pleroma.direct_conversation_id == participation.id +  end +end diff --git a/test/web/mastodon_api/views/list_view_test.exs b/test/web/mastodon_api/views/list_view_test.exs new file mode 100644 index 000000000..59e896a7c --- /dev/null +++ b/test/web/mastodon_api/views/list_view_test.exs @@ -0,0 +1,32 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.ListViewTest do +  use Pleroma.DataCase +  import Pleroma.Factory +  alias Pleroma.Web.MastodonAPI.ListView + +  test "show" do +    user = insert(:user) +    title = "mortal enemies" +    {:ok, list} = Pleroma.List.create(title, user) + +    expected = %{ +      id: to_string(list.id), +      title: title +    } + +    assert expected == ListView.render("show.json", %{list: list}) +  end + +  test "index" do +    user = insert(:user) + +    {:ok, list} = Pleroma.List.create("my list", user) +    {:ok, list2} = Pleroma.List.create("cofe", user) + +    assert [%{id: _, title: "my list"}, %{id: _, title: "cofe"}] = +             ListView.render("index.json", lists: [list, list2]) +  end +end diff --git a/test/web/mastodon_api/views/marker_view_test.exs b/test/web/mastodon_api/views/marker_view_test.exs new file mode 100644 index 000000000..8a5c89d56 --- /dev/null +++ b/test/web/mastodon_api/views/marker_view_test.exs @@ -0,0 +1,27 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.MarkerViewTest do +  use Pleroma.DataCase +  alias Pleroma.Web.MastodonAPI.MarkerView +  import Pleroma.Factory + +  test "returns markers" do +    marker1 = insert(:marker, timeline: "notifications", last_read_id: "17") +    marker2 = insert(:marker, timeline: "home", last_read_id: "42") + +    assert MarkerView.render("markers.json", %{markers: [marker1, marker2]}) == %{ +             "home" => %{ +               last_read_id: "42", +               updated_at: NaiveDateTime.to_iso8601(marker2.updated_at), +               version: 0 +             }, +             "notifications" => %{ +               last_read_id: "17", +               updated_at: NaiveDateTime.to_iso8601(marker1.updated_at), +               version: 0 +             } +           } +  end +end diff --git a/test/web/mastodon_api/notification_view_test.exs b/test/web/mastodon_api/views/notification_view_test.exs index 977ea1e87..1fe83cb2c 100644 --- a/test/web/mastodon_api/notification_view_test.exs +++ b/test/web/mastodon_api/views/notification_view_test.exs @@ -1,5 +1,5 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do @@ -27,8 +27,8 @@ defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do        id: to_string(notification.id),        pleroma: %{is_seen: false},        type: "mention", -      account: AccountView.render("account.json", %{user: user, for: mentioned_user}), -      status: StatusView.render("status.json", %{activity: activity, for: mentioned_user}), +      account: AccountView.render("show.json", %{user: user, for: mentioned_user}), +      status: StatusView.render("show.json", %{activity: activity, for: mentioned_user}),        created_at: Utils.to_masto_date(notification.inserted_at)      } @@ -50,8 +50,8 @@ defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do        id: to_string(notification.id),        pleroma: %{is_seen: false},        type: "favourite", -      account: AccountView.render("account.json", %{user: another_user, for: user}), -      status: StatusView.render("status.json", %{activity: create_activity, for: user}), +      account: AccountView.render("show.json", %{user: another_user, for: user}), +      status: StatusView.render("show.json", %{activity: create_activity, for: user}),        created_at: Utils.to_masto_date(notification.inserted_at)      } @@ -72,8 +72,8 @@ defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do        id: to_string(notification.id),        pleroma: %{is_seen: false},        type: "reblog", -      account: AccountView.render("account.json", %{user: another_user, for: user}), -      status: StatusView.render("status.json", %{activity: reblog_activity, for: user}), +      account: AccountView.render("show.json", %{user: another_user, for: user}), +      status: StatusView.render("show.json", %{activity: reblog_activity, for: user}),        created_at: Utils.to_masto_date(notification.inserted_at)      } @@ -92,7 +92,7 @@ defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do        id: to_string(notification.id),        pleroma: %{is_seen: false},        type: "follow", -      account: AccountView.render("account.json", %{user: follower, for: followed}), +      account: AccountView.render("show.json", %{user: follower, for: followed}),        created_at: Utils.to_masto_date(notification.inserted_at)      } @@ -100,5 +100,65 @@ defmodule Pleroma.Web.MastodonAPI.NotificationViewTest do        NotificationView.render("index.json", %{notifications: [notification], for: followed})      assert [expected] == result + +    User.perform(:delete, follower) +    notification = Notification |> Repo.one() |> Repo.preload(:activity) + +    assert [] == +             NotificationView.render("index.json", %{notifications: [notification], for: followed}) +  end + +  test "Move notification" do +    old_user = insert(:user) +    new_user = insert(:user, also_known_as: [old_user.ap_id]) +    follower = insert(:user) + +    User.follow(follower, old_user) +    Pleroma.Web.ActivityPub.ActivityPub.move(old_user, new_user) +    Pleroma.Tests.ObanHelpers.perform_all() + +    old_user = refresh_record(old_user) +    new_user = refresh_record(new_user) + +    [notification] = Notification.for_user(follower, %{with_move: true}) + +    expected = %{ +      id: to_string(notification.id), +      pleroma: %{is_seen: false}, +      type: "move", +      account: AccountView.render("show.json", %{user: old_user, for: follower}), +      target: AccountView.render("show.json", %{user: new_user, for: follower}), +      created_at: Utils.to_masto_date(notification.inserted_at) +    } + +    assert [expected] == +             NotificationView.render("index.json", %{notifications: [notification], for: follower}) +  end + +  test "EmojiReaction notification" do +    user = insert(:user) +    other_user = insert(:user) + +    {:ok, activity} = CommonAPI.post(user, %{"status" => "#cofe"}) +    {:ok, _activity, _} = CommonAPI.react_with_emoji(activity.id, other_user, "☕") + +    activity = Repo.get(Activity, activity.id) + +    [notification] = Notification.for_user(user) + +    assert notification + +    expected = %{ +      id: to_string(notification.id), +      pleroma: %{is_seen: false}, +      type: "pleroma:emoji_reaction", +      emoji: "☕", +      account: AccountView.render("show.json", %{user: other_user, for: user}), +      status: StatusView.render("show.json", %{activity: activity, for: user}), +      created_at: Utils.to_masto_date(notification.inserted_at) +    } + +    assert expected == +             NotificationView.render("show.json", %{notification: notification, for: user})    end  end diff --git a/test/web/mastodon_api/views/poll_view_test.exs b/test/web/mastodon_api/views/poll_view_test.exs new file mode 100644 index 000000000..8cd7636a5 --- /dev/null +++ b/test/web/mastodon_api/views/poll_view_test.exs @@ -0,0 +1,126 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.MastodonAPI.PollViewTest do +  use Pleroma.DataCase + +  alias Pleroma.Object +  alias Pleroma.Web.CommonAPI +  alias Pleroma.Web.MastodonAPI.PollView + +  import Pleroma.Factory +  import Tesla.Mock + +  setup do +    mock(fn env -> apply(HttpRequestMock, :request, [env]) end) +    :ok +  end + +  test "renders a poll" do +    user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{ +        "status" => "Is Tenshi eating a corndog cute?", +        "poll" => %{ +          "options" => ["absolutely!", "sure", "yes", "why are you even asking?"], +          "expires_in" => 20 +        } +      }) + +    object = Object.normalize(activity) + +    expected = %{ +      emojis: [], +      expired: false, +      id: to_string(object.id), +      multiple: false, +      options: [ +        %{title: "absolutely!", votes_count: 0}, +        %{title: "sure", votes_count: 0}, +        %{title: "yes", votes_count: 0}, +        %{title: "why are you even asking?", votes_count: 0} +      ], +      voted: false, +      votes_count: 0 +    } + +    result = PollView.render("show.json", %{object: object}) +    expires_at = result.expires_at +    result = Map.delete(result, :expires_at) + +    assert result == expected + +    expires_at = NaiveDateTime.from_iso8601!(expires_at) +    assert NaiveDateTime.diff(expires_at, NaiveDateTime.utc_now()) in 15..20 +  end + +  test "detects if it is multiple choice" do +    user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{ +        "status" => "Which Mastodon developer is your favourite?", +        "poll" => %{ +          "options" => ["Gargron", "Eugen"], +          "expires_in" => 20, +          "multiple" => true +        } +      }) + +    object = Object.normalize(activity) + +    assert %{multiple: true} = PollView.render("show.json", %{object: object}) +  end + +  test "detects emoji" do +    user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{ +        "status" => "What's with the smug face?", +        "poll" => %{ +          "options" => [":blank: sip", ":blank::blank: sip", ":blank::blank::blank: sip"], +          "expires_in" => 20 +        } +      }) + +    object = Object.normalize(activity) + +    assert %{emojis: [%{shortcode: "blank"}]} = PollView.render("show.json", %{object: object}) +  end + +  test "detects vote status" do +    user = insert(:user) +    other_user = insert(:user) + +    {:ok, activity} = +      CommonAPI.post(user, %{ +        "status" => "Which input devices do you use?", +        "poll" => %{ +          "options" => ["mouse", "trackball", "trackpoint"], +          "multiple" => true, +          "expires_in" => 20 +        } +      }) + +    object = Object.normalize(activity) + +    {:ok, _, object} = CommonAPI.vote(other_user, object, [1, 2]) + +    result = PollView.render("show.json", %{object: object, for: other_user}) + +    assert result[:voted] == true +    assert Enum.at(result[:options], 1)[:votes_count] == 1 +    assert Enum.at(result[:options], 2)[:votes_count] == 1 +  end + +  test "does not crash on polls with no end date" do +    object = Object.normalize("https://skippers-bin.com/notes/7x9tmrp97i") +    result = PollView.render("show.json", %{object: object}) + +    assert result[:expires_at] == nil +    assert result[:expired] == false +  end +end diff --git a/test/web/mastodon_api/push_subscription_view_test.exs b/test/web/mastodon_api/views/push_subscription_view_test.exs index dc935fc82..4e4f5b7e6 100644 --- a/test/web/mastodon_api/push_subscription_view_test.exs +++ b/test/web/mastodon_api/views/push_subscription_view_test.exs @@ -1,5 +1,5 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.PushSubscriptionViewTest do diff --git a/test/web/mastodon_api/scheduled_activity_view_test.exs b/test/web/mastodon_api/views/scheduled_activity_view_test.exs index ecbb855d4..6387e4555 100644 --- a/test/web/mastodon_api/scheduled_activity_view_test.exs +++ b/test/web/mastodon_api/views/scheduled_activity_view_test.exs @@ -1,5 +1,5 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.ScheduledActivityViewTest do diff --git a/test/web/mastodon_api/status_view_test.exs b/test/web/mastodon_api/views/status_view_test.exs index 3447c5b1f..25777b011 100644 --- a/test/web/mastodon_api/status_view_test.exs +++ b/test/web/mastodon_api/views/status_view_test.exs @@ -1,5 +1,5 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.StatusViewTest do @@ -7,6 +7,8 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do    alias Pleroma.Activity    alias Pleroma.Bookmark +  alias Pleroma.Conversation.Participation +  alias Pleroma.HTML    alias Pleroma.Object    alias Pleroma.Repo    alias Pleroma.User @@ -14,7 +16,6 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do    alias Pleroma.Web.CommonAPI.Utils    alias Pleroma.Web.MastodonAPI.AccountView    alias Pleroma.Web.MastodonAPI.StatusView -  alias Pleroma.Web.OStatus    import Pleroma.Factory    import Tesla.Mock @@ -23,6 +24,59 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      :ok    end +  test "has an emoji reaction list" do +    user = insert(:user) +    other_user = insert(:user) +    third_user = insert(:user) +    {:ok, activity} = CommonAPI.post(user, %{"status" => "dae cofe??"}) + +    {:ok, _, _} = CommonAPI.react_with_emoji(activity.id, user, "☕") +    {:ok, _, _} = CommonAPI.react_with_emoji(activity.id, third_user, "🍵") +    {:ok, _, _} = CommonAPI.react_with_emoji(activity.id, other_user, "☕") +    activity = Repo.get(Activity, activity.id) +    status = StatusView.render("show.json", activity: activity) + +    assert status[:pleroma][:emoji_reactions] == [ +             %{emoji: "☕", count: 2}, +             %{emoji: "🍵", count: 1} +           ] +  end + +  test "loads and returns the direct conversation id when given the `with_direct_conversation_id` option" do +    user = insert(:user) + +    {:ok, activity} = CommonAPI.post(user, %{"status" => "Hey @shp!", "visibility" => "direct"}) +    [participation] = Participation.for_user(user) + +    status = +      StatusView.render("show.json", +        activity: activity, +        with_direct_conversation_id: true, +        for: user +      ) + +    assert status[:pleroma][:direct_conversation_id] == participation.id + +    status = StatusView.render("show.json", activity: activity, for: user) +    assert status[:pleroma][:direct_conversation_id] == nil +  end + +  test "returns the direct conversation id when given the `direct_conversation_id` option" do +    user = insert(:user) + +    {:ok, activity} = CommonAPI.post(user, %{"status" => "Hey @shp!", "visibility" => "direct"}) +    [participation] = Participation.for_user(user) + +    status = +      StatusView.render("show.json", +        activity: activity, +        direct_conversation_id: participation.id, +        for: user +      ) + +    assert status[:pleroma][:direct_conversation_id] == participation.id +  end +    test "returns a temporary ap_id based user for activities missing db users" do      user = insert(:user) @@ -31,7 +85,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      Repo.delete(user)      Cachex.clear(:user_cache) -    %{account: ms_user} = StatusView.render("status.json", activity: activity) +    %{account: ms_user} = StatusView.render("show.json", activity: activity)      assert ms_user.acct == "erroruser@example.com"    end @@ -48,7 +102,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      Cachex.clear(:user_cache) -    result = StatusView.render("status.json", activity: activity) +    result = StatusView.render("show.json", activity: activity)      assert result[:account][:id] == to_string(user.id)    end @@ -66,7 +120,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      User.get_cached_by_ap_id(note.data["actor"]) -    status = StatusView.render("status.json", %{activity: note}) +    status = StatusView.render("show.json", %{activity: note})      assert status.content == ""    end @@ -78,7 +132,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      convo_id = Utils.context_to_conversation_id(object_data["context"]) -    status = StatusView.render("status.json", %{activity: note}) +    status = StatusView.render("show.json", %{activity: note})      created_at =        (object_data["published"] || "") @@ -88,12 +142,12 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do        id: to_string(note.id),        uri: object_data["id"],        url: Pleroma.Web.Router.Helpers.o_status_url(Pleroma.Web.Endpoint, :notice, note), -      account: AccountView.render("account.json", %{user: user}), +      account: AccountView.render("show.json", %{user: user}),        in_reply_to_id: nil,        in_reply_to_account_id: nil,        card: nil,        reblog: nil, -      content: HtmlSanitizeEx.basic_html(object_data["content"]), +      content: HTML.filter_tags(object_data["content"]),        created_at: created_at,        reblogs_count: 0,        replies_count: 0, @@ -105,7 +159,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do        pinned: false,        sensitive: false,        poll: nil, -      spoiler_text: HtmlSanitizeEx.basic_html(object_data["summary"]), +      spoiler_text: HTML.filter_tags(object_data["summary"]),        visibility: "public",        media_attachments: [],        mentions: [], @@ -132,8 +186,12 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do          local: true,          conversation_id: convo_id,          in_reply_to_account_acct: nil, -        content: %{"text/plain" => HtmlSanitizeEx.strip_tags(object_data["content"])}, -        spoiler_text: %{"text/plain" => HtmlSanitizeEx.strip_tags(object_data["summary"])} +        content: %{"text/plain" => HTML.strip_tags(object_data["content"])}, +        spoiler_text: %{"text/plain" => HTML.strip_tags(object_data["summary"])}, +        expires_at: nil, +        direct_conversation_id: nil, +        thread_muted: false, +        emoji_reactions: []        }      } @@ -144,27 +202,45 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      user = insert(:user)      other_user = insert(:user) -    {:ok, user} = User.mute(user, other_user) +    {:ok, _user_relationships} = User.mute(user, other_user)      {:ok, activity} = CommonAPI.post(other_user, %{"status" => "test"}) -    status = StatusView.render("status.json", %{activity: activity}) +    status = StatusView.render("show.json", %{activity: activity})      assert status.muted == false -    status = StatusView.render("status.json", %{activity: activity, for: user}) +    status = StatusView.render("show.json", %{activity: activity, for: user})      assert status.muted == true    end +  test "tells if the message is thread muted" do +    user = insert(:user) +    other_user = insert(:user) + +    {:ok, _user_relationships} = User.mute(user, other_user) + +    {:ok, activity} = CommonAPI.post(other_user, %{"status" => "test"}) +    status = StatusView.render("show.json", %{activity: activity, for: user}) + +    assert status.pleroma.thread_muted == false + +    {:ok, activity} = CommonAPI.add_mute(user, activity) + +    status = StatusView.render("show.json", %{activity: activity, for: user}) + +    assert status.pleroma.thread_muted == true +  end +    test "tells if the status is bookmarked" do      user = insert(:user)      {:ok, activity} = CommonAPI.post(user, %{"status" => "Cute girls doing cute things"}) -    status = StatusView.render("status.json", %{activity: activity}) +    status = StatusView.render("show.json", %{activity: activity})      assert status.bookmarked == false -    status = StatusView.render("status.json", %{activity: activity, for: user}) +    status = StatusView.render("show.json", %{activity: activity, for: user})      assert status.bookmarked == false @@ -172,7 +248,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      activity = Activity.get_by_id_with_object(activity.id) -    status = StatusView.render("status.json", %{activity: activity, for: user}) +    status = StatusView.render("show.json", %{activity: activity, for: user})      assert status.bookmarked == true    end @@ -184,7 +260,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      {:ok, activity} =        CommonAPI.post(user, %{"status" => "he", "in_reply_to_status_id" => note.id}) -    status = StatusView.render("status.json", %{activity: activity}) +    status = StatusView.render("show.json", %{activity: activity})      assert status.in_reply_to_id == to_string(note.id) @@ -194,17 +270,15 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do    end    test "contains mentions" do -    incoming = File.read!("test/fixtures/incoming_reply_mastodon.xml") -    # a user with this ap id might be in the cache. -    recipient = "https://pleroma.soykaf.com/users/lain" -    user = insert(:user, %{ap_id: recipient}) +    user = insert(:user) +    mentioned = insert(:user) -    {:ok, [activity]} = OStatus.handle_incoming(incoming) +    {:ok, activity} = CommonAPI.post(user, %{"status" => "hi @#{mentioned.nickname}"}) -    status = StatusView.render("status.json", %{activity: activity}) +    status = StatusView.render("show.json", %{activity: activity})      assert status.mentions == -             Enum.map([user], fn u -> AccountView.render("mention.json", %{user: u}) end) +             Enum.map([mentioned], fn u -> AccountView.render("mention.json", %{user: u}) end)    end    test "create mentions from the 'to' field" do @@ -227,7 +301,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      assert length(activity.recipients) == 3 -    %{mentions: [mention] = mentions} = StatusView.render("status.json", %{activity: activity}) +    %{mentions: [mention] = mentions} = StatusView.render("show.json", %{activity: activity})      assert length(mentions) == 1      assert mention.url == recipient_ap_id @@ -264,7 +338,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      assert length(activity.recipients) == 3 -    %{mentions: [mention] = mentions} = StatusView.render("status.json", %{activity: activity}) +    %{mentions: [mention] = mentions} = StatusView.render("show.json", %{activity: activity})      assert length(mentions) == 1      assert mention.url == recipient.ap_id @@ -300,13 +374,23 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      assert %{id: "2"} = StatusView.render("attachment.json", %{attachment: object})    end +  test "put the url advertised in the Activity in to the url attribute" do +    id = "https://wedistribute.org/wp-json/pterotype/v1/object/85810" +    [activity] = Activity.search(nil, id) + +    status = StatusView.render("show.json", %{activity: activity}) + +    assert status.uri == id +    assert status.url == "https://wedistribute.org/2019/07/mastodon-drops-ostatus/" +  end +    test "a reblog" do      user = insert(:user)      activity = insert(:note_activity)      {:ok, reblog, _} = CommonAPI.repeat(activity.id, user) -    represented = StatusView.render("status.json", %{for: user, activity: reblog}) +    represented = StatusView.render("show.json", %{for: user, activity: reblog})      assert represented[:id] == to_string(reblog.id)      assert represented[:reblog][:id] == to_string(activity.id) @@ -323,12 +407,27 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      %Activity{} = activity = Activity.get_create_by_object_ap_id(object.data["id"]) -    represented = StatusView.render("status.json", %{for: user, activity: activity}) +    represented = StatusView.render("show.json", %{for: user, activity: activity})      assert represented[:id] == to_string(activity.id)      assert length(represented[:media_attachments]) == 1    end +  test "a Mobilizon event" do +    user = insert(:user) + +    {:ok, object} = +      Pleroma.Object.Fetcher.fetch_object_from_id( +        "https://mobilizon.org/events/252d5816-00a3-4a89-a66f-15bf65c33e39" +      ) + +    %Activity{} = activity = Activity.get_create_by_object_ap_id(object.data["id"]) + +    represented = StatusView.render("show.json", %{for: user, activity: activity}) + +    assert represented[:id] == to_string(activity.id) +  end +    describe "build_tags/1" do      test "it returns a a dictionary tags" do        object_tags = [ @@ -405,108 +504,6 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      end    end -  describe "poll view" do -    test "renders a poll" do -      user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Is Tenshi eating a corndog cute?", -          "poll" => %{ -            "options" => ["absolutely!", "sure", "yes", "why are you even asking?"], -            "expires_in" => 20 -          } -        }) - -      object = Object.normalize(activity) - -      expected = %{ -        emojis: [], -        expired: false, -        id: to_string(object.id), -        multiple: false, -        options: [ -          %{title: "absolutely!", votes_count: 0}, -          %{title: "sure", votes_count: 0}, -          %{title: "yes", votes_count: 0}, -          %{title: "why are you even asking?", votes_count: 0} -        ], -        voted: false, -        votes_count: 0 -      } - -      result = StatusView.render("poll.json", %{object: object}) -      expires_at = result.expires_at -      result = Map.delete(result, :expires_at) - -      assert result == expected - -      expires_at = NaiveDateTime.from_iso8601!(expires_at) -      assert NaiveDateTime.diff(expires_at, NaiveDateTime.utc_now()) in 15..20 -    end - -    test "detects if it is multiple choice" do -      user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Which Mastodon developer is your favourite?", -          "poll" => %{ -            "options" => ["Gargron", "Eugen"], -            "expires_in" => 20, -            "multiple" => true -          } -        }) - -      object = Object.normalize(activity) - -      assert %{multiple: true} = StatusView.render("poll.json", %{object: object}) -    end - -    test "detects emoji" do -      user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "What's with the smug face?", -          "poll" => %{ -            "options" => [":blank: sip", ":blank::blank: sip", ":blank::blank::blank: sip"], -            "expires_in" => 20 -          } -        }) - -      object = Object.normalize(activity) - -      assert %{emojis: [%{shortcode: "blank"}]} = -               StatusView.render("poll.json", %{object: object}) -    end - -    test "detects vote status" do -      user = insert(:user) -      other_user = insert(:user) - -      {:ok, activity} = -        CommonAPI.post(user, %{ -          "status" => "Which input devices do you use?", -          "poll" => %{ -            "options" => ["mouse", "trackball", "trackpoint"], -            "multiple" => true, -            "expires_in" => 20 -          } -        }) - -      object = Object.normalize(activity) - -      {:ok, _, object} = CommonAPI.vote(other_user, object, [1, 2]) - -      result = StatusView.render("poll.json", %{object: object, for: other_user}) - -      assert result[:voted] == true -      assert Enum.at(result[:options], 1)[:votes_count] == 1 -      assert Enum.at(result[:options], 2)[:votes_count] == 1 -    end -  end -    test "embeds a relationship in the account" do      user = insert(:user)      other_user = insert(:user) @@ -516,7 +513,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do          "status" => "drink more water"        }) -    result = StatusView.render("status.json", %{activity: activity, for: other_user}) +    result = StatusView.render("show.json", %{activity: activity, for: other_user})      assert result[:account][:pleroma][:relationship] ==               AccountView.render("relationship.json", %{user: other_user, target: user}) @@ -533,7 +530,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      {:ok, activity, _object} = CommonAPI.repeat(activity.id, other_user) -    result = StatusView.render("status.json", %{activity: activity, for: user}) +    result = StatusView.render("show.json", %{activity: activity, for: user})      assert result[:account][:pleroma][:relationship] ==               AccountView.render("relationship.json", %{user: user, target: other_user}) @@ -550,8 +547,17 @@ defmodule Pleroma.Web.MastodonAPI.StatusViewTest do      {:ok, activity} =        CommonAPI.post(user, %{"status" => "foobar", "visibility" => "list:#{list.id}"}) -    status = StatusView.render("status.json", activity: activity) +    status = StatusView.render("show.json", activity: activity)      assert status.visibility == "list"    end + +  test "successfully renders a Listen activity (pleroma extension)" do +    listen_activity = insert(:listen) + +    status = StatusView.render("listen.json", activity: listen_activity) + +    assert status.length == listen_activity.data["object"]["length"] +    assert status.title == listen_activity.data["object"]["title"] +  end  end  | 
