diff options
Diffstat (limited to 'test')
77 files changed, 1039 insertions, 325 deletions
diff --git a/test/fixtures/ccworld-ap-bridge_note.json b/test/fixtures/ccworld-ap-bridge_note.json new file mode 100644 index 000000000..4b13b4bc1 --- /dev/null +++ b/test/fixtures/ccworld-ap-bridge_note.json @@ -0,0 +1 @@ +{"@context":"https://www.w3.org/ns/activitystreams","type":"Note","id":"https://cc.mkdir.uk/ap/note/e5d1d0a1-1ab3-4498-9949-588e3fdea286","attributedTo":"https://cc.mkdir.uk/ap/acct/hiira","inReplyTo":"","quoteUrl":"","content":"おはコンー","published":"2024-01-19T22:08:05Z","to":["https://www.w3.org/ns/activitystreams#Public"],"tag":null,"attachment":[],"object":null} diff --git a/test/fixtures/minds-invalid-mention-post.json b/test/fixtures/minds-invalid-mention-post.json new file mode 100644 index 000000000..ea2cb2739 --- /dev/null +++ b/test/fixtures/minds-invalid-mention-post.json @@ -0,0 +1 @@ +{"@context":"https://www.w3.org/ns/activitystreams","type":"Note","id":"https://www.minds.com/api/activitypub/users/1198929502760083472/entities/urn:comment:1600926863310458883:0:0:0:1600932467852709903","attributedTo":"https://www.minds.com/api/activitypub/users/1198929502760083472","content":"\u003Ca class=\u0022u-url mention\u0022 href=\u0022https://www.minds.com/lain\u0022 target=\u0022_blank\u0022\u003E@lain\u003C/a\u003E corn syrup.","to":["https://www.w3.org/ns/activitystreams#Public"],"cc":["https://www.minds.com/api/activitypub/users/1198929502760083472/followers","https://lain.com/users/lain"],"tag":[{"type":"Mention","href":"https://www.minds.com/api/activitypub/users/464237775479123984","name":"@lain"}],"url":"https://www.minds.com/newsfeed/1600926863310458883?focusedCommentUrn=urn:comment:1600926863310458883:0:0:0:1600932467852709903","published":"2024-02-04T17:34:03+00:00","inReplyTo":"https://lain.com/objects/36254095-c839-4167-bcc2-b361d5de9198","source":{"content":"@lain corn syrup.","mediaType":"text/plain"}}
\ No newline at end of file diff --git a/test/fixtures/minds-pleroma-mentioned-post.json b/test/fixtures/minds-pleroma-mentioned-post.json new file mode 100644 index 000000000..9dfa42c90 --- /dev/null +++ b/test/fixtures/minds-pleroma-mentioned-post.json @@ -0,0 +1 @@ +{"@context":["https://www.w3.org/ns/activitystreams","https://lain.com/schemas/litepub-0.1.jsonld",{"@language":"und"}],"actor":"https://lain.com/users/lain","attachment":[],"attributedTo":"https://lain.com/users/lain","cc":["https://lain.com/users/lain/followers"],"content":"which diet is the best for cognitive dissonance","context":"https://lain.com/contexts/98c8a130-e813-4797-8973-600e80114317","conversation":"https://lain.com/contexts/98c8a130-e813-4797-8973-600e80114317","id":"https://lain.com/objects/36254095-c839-4167-bcc2-b361d5de9198","published":"2024-02-04T17:11:23.931890Z","repliesCount":11,"sensitive":null,"source":{"content":"which diet is the best for cognitive dissonance","mediaType":"text/plain"},"summary":"","tag":[],"to":["https://www.w3.org/ns/activitystreams#Public"],"type":"Note"}
\ No newline at end of file diff --git a/test/fixtures/rich_media/google.html b/test/fixtures/rich_media/google.html new file mode 100644 index 000000000..c068397a5 --- /dev/null +++ b/test/fixtures/rich_media/google.html @@ -0,0 +1,12 @@ +<meta property="og:url" content="https://google.com"> +<meta property="og:type" content="website"> +<meta property="og:title" content="Google"> +<meta property="og:description" content="Search the world's information, including webpages, images, videos and more. Google has many special features to help you find exactly what you're looking for."> +<meta property="og:image" content=""> + +<meta name="twitter:card" content="summary_large_image"> +<meta property="twitter:domain" content="google.com"> +<meta property="twitter:url" content="https://google.com"> +<meta name="twitter:title" content="Google"> +<meta name="twitter:description" content="Search the world's information, including webpages, images, videos and more. Google has many special features to help you find exactly what you're looking for."> +<meta name="twitter:image" content=""> diff --git a/test/fixtures/rich_media/oembed.html b/test/fixtures/rich_media/oembed.html index 55f17004b..5429630d0 100644 --- a/test/fixtures/rich_media/oembed.html +++ b/test/fixtures/rich_media/oembed.html @@ -1,3 +1,3 @@  <link rel="alternate" type="application/json+oembed" -  href="http://example.com/oembed.json" +  href="https://example.com/oembed.json"    title="Bacon Lollys oEmbed Profile" /> diff --git a/test/fixtures/rich_media/yahoo.html b/test/fixtures/rich_media/yahoo.html new file mode 100644 index 000000000..41d8c5cd9 --- /dev/null +++ b/test/fixtures/rich_media/yahoo.html @@ -0,0 +1,12 @@ +<meta property="og:url" content="https://yahoo.com"> +<meta property="og:type" content="website"> +<meta property="og:title" content="Yahoo | Mail, Weather, Search, Politics, News, Finance, Sports & Videos"> +<meta property="og:description" content="Latest news coverage, email, free stock quotes, live scores and video are just the beginning. Discover more every day at Yahoo!"> +<meta property="og:image" content="https://s.yimg.com/cv/apiv2/social/images/yahoo_default_logo.png"> + +<meta name="twitter:card" content="summary_large_image"> +<meta property="twitter:domain" content="yahoo.com"> +<meta property="twitter:url" content="https://yahoo.com"> +<meta name="twitter:title" content="Yahoo | Mail, Weather, Search, Politics, News, Finance, Sports & Videos"> +<meta name="twitter:description" content="Latest news coverage, email, free stock quotes, live scores and video are just the beginning. Discover more every day at Yahoo!"> +<meta name="twitter:image" content="https://s.yimg.com/cv/apiv2/social/images/yahoo_default_logo.png"> diff --git a/test/fixtures/tesla_mock/smithereen_non_anonymous_poll.json b/test/fixtures/tesla_mock/smithereen_non_anonymous_poll.json new file mode 100644 index 000000000..2b343ea64 --- /dev/null +++ b/test/fixtures/tesla_mock/smithereen_non_anonymous_poll.json @@ -0,0 +1 @@ +{"type":"Question","id":"https://friends.grishka.me/posts/54642","attributedTo":"https://friends.grishka.me/users/1","content":"<p>здесь тоже можно что-то написать отдельно от опроса</p>","published":"2021-09-04T00:22:16Z","url":"https://friends.grishka.me/posts/54642","to":["https://www.w3.org/ns/activitystreams#Public"],"cc":["https://friends.grishka.me/users/1/followers"],"replies":{"type":"Collection","id":"https://friends.grishka.me/posts/54642/replies","first":{"type":"CollectionPage","items":[],"partOf":"https://friends.grishka.me/posts/54642/replies","next":"https://friends.grishka.me/posts/54642/replies?page=1"}},"sensitive":false,"likes":"https://friends.grishka.me/posts/54642/likes","name":"тестовый опрос","oneOf":[{"type":"Note","id":"https://friends.grishka.me/posts/54642#options/76","name":"тестовый ответ 1","replies":{"type":"Collection","id":"https://friends.grishka.me/activitypub/objects/polls/24/options/76/votes","totalItems":4,"items":[]}},{"type":"Note","id":"https://friends.grishka.me/posts/54642#options/77","name":"тестовый ответ 2","replies":{"type":"Collection","id":"https://friends.grishka.me/activitypub/objects/polls/24/options/77/votes","totalItems":4,"items":[]}},{"type":"Note","id":"https://friends.grishka.me/posts/54642#options/78","name":"тестовый ответ 3","replies":{"type":"Collection","id":"https://friends.grishka.me/activitypub/objects/polls/24/options/78/votes","totalItems":6,"items":[]}}],"votersCount":14,"nonAnonymous":true,"@context":["https://www.w3.org/ns/activitystreams",{"sensitive":"as:sensitive","toot":"http://joinmastodon.org/ns#","sm":"http://smithereen.software/ns#","votersCount":"toot:votersCount","nonAnonymous":"sm:nonAnonymous"}]}
\ No newline at end of file diff --git a/test/fixtures/tesla_mock/smithereen_user.json b/test/fixtures/tesla_mock/smithereen_user.json new file mode 100644 index 000000000..6468fc519 --- /dev/null +++ b/test/fixtures/tesla_mock/smithereen_user.json @@ -0,0 +1 @@ +{"type":"Person","id":"https://friends.grishka.me/users/1","name":"Григорий Клюшников","icon":{"type":"Image","image":{"type":"Image","url":"https://friends.grishka.me/i/6QLsOws97AWp5N_osd74C1IC1ijnFopyCBD9MSEeXNQ/q:93/bG9jYWw6Ly8vcy91cGxvYWRzL2F2YXRhcnMvNTYzODRhODEwODk5ZTRjMzI4YmY4YmQwM2Q2MWM3NmMud2VicA.jpg","mediaType":"image/jpeg","width":1280,"height":960},"width":573,"height":572,"cropRegion":[0.26422762870788574,0.3766937553882599,0.7113820910453796,0.9728997349739075],"url":"https://friends.grishka.me/i/ql_49PQcETAWgY_nC-Qj63H_Oa6FyOAEoWFkUSSkUvQ/c:573:572:nowe:338:362/q:93/bG9jYWw6Ly8vcy91cGxvYWRzL2F2YXRhcnMvNTYzODRhODEwODk5ZTRjMzI4YmY4YmQwM2Q2MWM3NmMud2VicA.jpg","mediaType":"image/jpeg"},"summary":"<p>Делаю эту хрень, пытаюсь вырвать социальные сети из жадных лап корпораций</p>\n<p></p>\n<p></p>\n<p></p>\n<p></p>\n<p></p>\n<p></p>\n<p></p>\n<p>This server does NOT support direct messages. Please write me <a href=\"https://t.me/grishka\">on Telegram</a> or <a href=\"https://matrix.to/#/@grishk:matrix.org\">Matrix</a>.</p>","url":"https://friends.grishka.me/grishka","preferredUsername":"grishka","inbox":"https://friends.grishka.me/users/1/inbox","outbox":"https://friends.grishka.me/users/1/outbox","followers":"https://friends.grishka.me/users/1/followers","following":"https://friends.grishka.me/users/1/following","endpoints":{"sharedInbox":"https://friends.grishka.me/activitypub/sharedInbox","collectionSimpleQuery":"https://friends.grishka.me/users/1/collectionQuery"},"publicKey":{"id":"https://friends.grishka.me/users/1#main-key","owner":"https://friends.grishka.me/users/1","publicKeyPem":"-----BEGIN PUBLIC KEY-----\nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAjlakm+i/d9ER/hIeR7KfiFW+SdLZj2SkKIeM8cmR+YFJuh9ghFqXrkFEjcaqUnAFqe5gYDNSQACnDLA8y4DnzjfGNIohKAnRoa9x6GORmfKQvcnjaTZ53S1NvUiPPyc0Pv/vfCtY/Ab0CEXe5BLqL38oZn817Jf7pBrPRTYH7m012kvwAUTT6k0Y8lPITBEG7nzYbbuGcrN9Y/RDdwE08jmBXlZ45bahRH3VNXVpQE17dCzJB+7k+iJ1R7YCoI+DuMlBYGXGE2KVk46NZTuLnOjFV9SyXfWX4/SrJM4oxev+SX2N75tQgmNZmVVHeqg2ZcbC0WCfNjJOi2HHS9MujwIDAQAB\n-----END PUBLIC KEY-----\n"},"wall":"https://friends.grishka.me/users/1/wall","firstName":"Григорий","lastName":"Клюшников","middleName":"Александрович","vcard:bday":"1993-01-22","gender":"http://schema.org#Male","supportsFriendRequests":true,"friends":"https://friends.grishka.me/users/1/friends","groups":"https://friends.grishka.me/users/1/groups","capabilities":{"supportsFriendRequests":true},"@context":["https://www.w3.org/ns/activitystreams",{"sm":"http://smithereen.software/ns#","cropRegion":{"@id":"sm:cropRegion","@container":"@list"},"wall":{"@id":"sm:wall","@type":"@id"},"collectionSimpleQuery":"sm:collectionSimpleQuery","sc":"http://schema.org#","firstName":"sc:givenName","lastName":"sc:familyName","middleName":"sc:additionalName","gender":{"@id":"sc:gender","@type":"sc:GenderType"},"maidenName":"sm:maidenName","friends":{"@id":"sm:friends","@type":"@id"},"groups":{"@id":"sm:groups","@type":"@id"},"vcard":"http://www.w3.org/2006/vcard/ns#","capabilities":"litepub:capabilities","supportsFriendRequests":"sm:supportsFriendRequests","litepub":"http://litepub.social/ns#"},"https://w3id.org/security/v1"]}
\ No newline at end of file diff --git a/test/mix/pleroma_test.exs b/test/mix/pleroma_test.exs index c981ee9b9..e362223b2 100644 --- a/test/mix/pleroma_test.exs +++ b/test/mix/pleroma_test.exs @@ -39,7 +39,7 @@ defmodule Mix.PleromaTest do    describe "get_option/3" do      test "get from options" do -      assert get_option([domain: "some-domain.com"], :domain, "Promt") == "some-domain.com" +      assert get_option([domain: "some-domain.com"], :domain, "Prompt") == "some-domain.com"      end      test "get from prompt" do diff --git a/test/mix/tasks/pleroma/config_test.exs b/test/mix/tasks/pleroma/config_test.exs index cf6d74907..7b2134129 100644 --- a/test/mix/tasks/pleroma/config_test.exs +++ b/test/mix/tasks/pleroma/config_test.exs @@ -140,7 +140,6 @@ defmodule Mix.Tasks.Pleroma.ConfigTest do            federating: true,            federation_incoming_replies_max_depth: 100,            federation_reachability_timeout_days: 7, -          federation_publisher_modules: [Pleroma.Web.ActivityPub.Publisher],            allow_relay: true,            public: true,            quarantined_instances: [], @@ -183,8 +182,8 @@ defmodule Mix.Tasks.Pleroma.ConfigTest do        assert File.exists?(temp_file)        {:ok, file} = File.read(temp_file) -      assert file == -               "import Config\n\nconfig :pleroma, :instance,\n  name: \"Pleroma\",\n  email: \"example@example.com\",\n  notify_email: \"noreply@example.com\",\n  description: \"A Pleroma instance, an alternative fediverse server\",\n  limit: 5000,\n  chat_limit: 5000,\n  remote_limit: 100_000,\n  upload_limit: 16_000_000,\n  avatar_upload_limit: 2_000_000,\n  background_upload_limit: 4_000_000,\n  banner_upload_limit: 4_000_000,\n  poll_limits: %{\n    max_expiration: 31_536_000,\n    max_option_chars: 200,\n    max_options: 20,\n    min_expiration: 0\n  },\n  registrations_open: true,\n  federating: true,\n  federation_incoming_replies_max_depth: 100,\n  federation_reachability_timeout_days: 7,\n  federation_publisher_modules: [Pleroma.Web.ActivityPub.Publisher],\n  allow_relay: true,\n  public: true,\n  quarantined_instances: [],\n  managed_config: true,\n  static_dir: \"instance/static/\",\n  allowed_post_formats: [\"text/plain\", \"text/html\", \"text/markdown\", \"text/bbcode\"],\n  autofollowed_nicknames: [],\n  max_pinned_statuses: 1,\n  attachment_links: false,\n  max_report_comment_size: 1000,\n  safe_dm_mentions: false,\n  healthcheck: false,\n  remote_post_retention_days: 90,\n  skip_thread_containment: true,\n  limit_to_local_content: :unauthenticated,\n  user_bio_length: 5000,\n  user_name_length: 100,\n  max_account_fields: 10,\n  max_remote_account_fields: 20,\n  account_field_name_length: 512,\n  account_field_value_length: 2048,\n  external_user_synchronization: true,\n  extended_nickname_format: true,\n  multi_factor_authentication: [\n    totp: [digits: 6, period: 30],\n    backup_codes: [number: 2, length: 6]\n  ]\n" +      assert file =~ "import Config\n" +      assert file =~ "A Pleroma instance, an alternative fediverse server"      end    end diff --git a/test/mix/tasks/pleroma/ecto/rollback_test.exs b/test/mix/tasks/pleroma/ecto/rollback_test.exs index db8641e7f..4036b2da6 100644 --- a/test/mix/tasks/pleroma/ecto/rollback_test.exs +++ b/test/mix/tasks/pleroma/ecto/rollback_test.exs @@ -13,7 +13,7 @@ defmodule Mix.Tasks.Pleroma.Ecto.RollbackTest do      assert capture_log(fn ->               Mix.Tasks.Pleroma.Ecto.Rollback.run(["--env", "test"]) -           end) =~ "[info] Rollback succesfully" +           end) =~ "[info] Rollback successfully"      Logger.configure(level: level)    end diff --git a/test/mix/tasks/pleroma/robots_txt_test.exs b/test/mix/tasks/pleroma/robots_txt_test.exs index 4426fe526..dd6ca9fc8 100644 --- a/test/mix/tasks/pleroma/robots_txt_test.exs +++ b/test/mix/tasks/pleroma/robots_txt_test.exs @@ -26,7 +26,7 @@ defmodule Mix.Tasks.Pleroma.RobotsTxtTest do      assert file == "User-Agent: *\nDisallow: /\n"    end -  test "to existance folder" do +  test "to existing folder" do      path = "test/fixtures/"      file_path = path <> "robots.txt"      clear_config([:instance, :static_dir], path) diff --git a/test/pleroma/activity_test.exs b/test/pleroma/activity_test.exs index e38384c9c..67943d879 100644 --- a/test/pleroma/activity_test.exs +++ b/test/pleroma/activity_test.exs @@ -145,6 +145,7 @@ defmodule Pleroma.ActivityTest do      setup do: clear_config([:instance, :limit_to_local_content]) +    @tag :skip_darwin      test "finds utf8 text in statuses", %{        japanese_activity: japanese_activity,        user: user diff --git a/test/pleroma/config/deprecation_warnings_test.exs b/test/pleroma/config/deprecation_warnings_test.exs index f3453ddb0..fca2324ff 100644 --- a/test/pleroma/config/deprecation_warnings_test.exs +++ b/test/pleroma/config/deprecation_warnings_test.exs @@ -125,13 +125,12 @@ defmodule Pleroma.Config.DeprecationWarningsTest do          media_removal: ["some.removal", {"some.other.instance", "Some reason"}]        ) -      expected_config = [ +      expected_config =          {:media_removal, [{"some.removal", ""}, {"some.other.instance", "Some reason"}]} -      ]        capture_log(fn -> DeprecationWarnings.warn() end) -      assert Config.get([:mrf_simple]) == expected_config +      assert expected_config in Config.get([:mrf_simple])      end      test "doesn't give a warning with correct config" do @@ -215,7 +214,7 @@ defmodule Pleroma.Config.DeprecationWarningsTest do                 ```                 config :pleroma, :mrf, -                 transparency_exclusions: [{"instance.tld", "Reason to exlude transparency"}] +                 transparency_exclusions: [{"instance.tld", "Reason to exclude transparency"}]                 ```                 """      end @@ -327,11 +326,11 @@ defmodule Pleroma.Config.DeprecationWarningsTest do             end) =~ "Your config is using old namespace for activity expiration configuration."    end -  test "check_uploders_s3_public_endpoint/0" do +  test "check_uploaders_s3_public_endpoint/0" do      clear_config([Pleroma.Uploaders.S3], public_endpoint: "https://fake.amazonaws.com/bucket/")      assert capture_log(fn -> -             DeprecationWarnings.check_uploders_s3_public_endpoint() +             DeprecationWarnings.check_uploaders_s3_public_endpoint()             end) =~               "Your config is using the old setting for controlling the URL of media uploaded to your S3 bucket."    end diff --git a/test/pleroma/config_db_test.exs b/test/pleroma/config_db_test.exs index 97adb9e51..e20da1574 100644 --- a/test/pleroma/config_db_test.exs +++ b/test/pleroma/config_db_test.exs @@ -321,7 +321,7 @@ defmodule Pleroma.ConfigDBTest do               }) == {:proxy_url, {:socks5, {127, 0, 0, 1}, 1234}}      end -    test "tuple with n childs" do +    test "tuple with n children" do        assert ConfigDB.to_elixir_types(%{                 "tuple" => [                   "v1", @@ -399,7 +399,7 @@ defmodule Pleroma.ConfigDBTest do        assert ConfigDB.to_elixir_types(a: 1, b: 2, c: "string") == [a: 1, b: 2, c: "string"]      end -    test "complex keyword with nested mixed childs" do +    test "complex keyword with nested mixed children" do        assert ConfigDB.to_elixir_types([                 %{"tuple" => [":uploader", "Pleroma.Uploaders.Local"]},                 %{"tuple" => [":filters", ["Pleroma.Upload.Filter.Dedupe"]]}, diff --git a/test/pleroma/conversation/participation_test.exs b/test/pleroma/conversation/participation_test.exs index a84437677..697bdb7f9 100644 --- a/test/pleroma/conversation/participation_test.exs +++ b/test/pleroma/conversation/participation_test.exs @@ -57,7 +57,7 @@ defmodule Pleroma.Conversation.ParticipationTest do      assert Participation.unread_count(other_user) == 0    end -  test "for a new conversation, it sets the recipents of the participation" do +  test "for a new conversation, it sets the recipients of the participation" do      user = insert(:user)      other_user = insert(:user)      third_user = insert(:user) diff --git a/test/pleroma/emoji/loader_test.exs b/test/pleroma/emoji/loader_test.exs index 717424fc8..22ee4e8d1 100644 --- a/test/pleroma/emoji/loader_test.exs +++ b/test/pleroma/emoji/loader_test.exs @@ -72,7 +72,7 @@ defmodule Pleroma.Emoji.LoaderTest do        assert group == "special file"      end -    test "no mathing returns nil", %{groups: groups} do +    test "no matching returns nil", %{groups: groups} do        group =          groups          |> Loader.match_extra("/emoji/some_undefined.png") diff --git a/test/pleroma/emoji_test.exs b/test/pleroma/emoji_test.exs index 18063c223..85f4e8bbf 100644 --- a/test/pleroma/emoji_test.exs +++ b/test/pleroma/emoji_test.exs @@ -6,26 +6,26 @@ defmodule Pleroma.EmojiTest do    use ExUnit.Case, async: true    alias Pleroma.Emoji -  describe "is_unicode_emoji?/1" do +  describe "unicode?/1" do      test "tells if a string is an unicode emoji" do -      refute Emoji.is_unicode_emoji?("X") -      refute Emoji.is_unicode_emoji?("ね") +      refute Emoji.unicode?("X") +      refute Emoji.unicode?("ね")        # Only accept fully-qualified (RGI) emoji        # See http://www.unicode.org/reports/tr51/ -      refute Emoji.is_unicode_emoji?("❤") -      refute Emoji.is_unicode_emoji?("☂") +      refute Emoji.unicode?("❤") +      refute Emoji.unicode?("☂") -      assert Emoji.is_unicode_emoji?("🥺") -      assert Emoji.is_unicode_emoji?("🤰") -      assert Emoji.is_unicode_emoji?("❤️") -      assert Emoji.is_unicode_emoji?("🏳️⚧️") -      assert Emoji.is_unicode_emoji?("🫵") +      assert Emoji.unicode?("🥺") +      assert Emoji.unicode?("🤰") +      assert Emoji.unicode?("❤️") +      assert Emoji.unicode?("🏳️⚧️") +      assert Emoji.unicode?("🫵")        # Additionally, we accept regional indicators. -      assert Emoji.is_unicode_emoji?("🇵") -      assert Emoji.is_unicode_emoji?("🇴") -      assert Emoji.is_unicode_emoji?("🇬") +      assert Emoji.unicode?("🇵") +      assert Emoji.unicode?("🇴") +      assert Emoji.unicode?("🇬")      end    end diff --git a/test/pleroma/formatter_test.exs b/test/pleroma/formatter_test.exs index 5e431f6c9..46bb1db67 100644 --- a/test/pleroma/formatter_test.exs +++ b/test/pleroma/formatter_test.exs @@ -324,7 +324,7 @@ defmodule Pleroma.FormatterTest do        assert {_text, [], ^expected_tags} = Formatter.linkify(text)      end -    test "parses mulitple tags in html" do +    test "parses multiple tags in html" do        text = "<p>#tag1 #tag2 #tag3 #tag4</p>"        expected_tags = [ @@ -347,7 +347,7 @@ defmodule Pleroma.FormatterTest do        assert {_text, [], ^expected_tags} = Formatter.linkify(text)      end -    test "parses mulitple tags on mulitple lines in html" do +    test "parses multiple tags on multiple lines in html" do        text =          "<p>testing...</p><p>#tag1 #tag2 #tag3 #tag4</p><p>paragraph</p><p>#tag5 #tag6 #tag7 #tag8</p>" diff --git a/test/pleroma/healthcheck_test.exs b/test/pleroma/healthcheck_test.exs index dc540c9be..a8ab865ac 100644 --- a/test/pleroma/healthcheck_test.exs +++ b/test/pleroma/healthcheck_test.exs @@ -9,14 +9,16 @@ defmodule Pleroma.HealthcheckTest do    test "system_info/0" do      result = Healthcheck.system_info() |> Map.from_struct() -    assert Map.keys(result) == [ +    keys = Map.keys(result) + +    assert Keyword.equal?(keys, [               :active,               :healthy,               :idle,               :job_queue_stats,               :memory_used,               :pool_size -           ] +           ])    end    describe "check_health/1" do @@ -25,7 +27,7 @@ defmodule Pleroma.HealthcheckTest do        refute result.healthy      end -    test "chech_health/1" do +    test "check_health/1" do        result = Healthcheck.check_health(%Healthcheck{pool_size: 10, active: 9})        assert result.healthy      end diff --git a/test/pleroma/http/adapter_helper/gun_test.exs b/test/pleroma/http/adapter_helper/gun_test.exs index 7515f4e79..d567bc844 100644 --- a/test/pleroma/http/adapter_helper/gun_test.exs +++ b/test/pleroma/http/adapter_helper/gun_test.exs @@ -36,7 +36,7 @@ defmodule Pleroma.HTTP.AdapterHelper.GunTest do        assert opts[:certificates_verification]      end -    test "https url with non standart port" do +    test "https url with non-standard port" do        uri = URI.parse("https://example.com:115")        opts = Gun.options([receive_conn: false], uri) @@ -44,7 +44,7 @@ defmodule Pleroma.HTTP.AdapterHelper.GunTest do        assert opts[:certificates_verification]      end -    test "merges with defaul http adapter config" do +    test "merges with default http adapter config" do        defaults = Gun.options([receive_conn: false], URI.parse("https://example.com"))        assert Keyword.has_key?(defaults, :a)        assert Keyword.has_key?(defaults, :b) diff --git a/test/pleroma/integration/mastodon_websocket_test.exs b/test/pleroma/integration/mastodon_websocket_test.exs index a2c20f0a6..a0ffddf8d 100644 --- a/test/pleroma/integration/mastodon_websocket_test.exs +++ b/test/pleroma/integration/mastodon_websocket_test.exs @@ -268,17 +268,6 @@ defmodule Pleroma.Integration.MastodonWebsocketTest do        end)      end -    test "accepts valid token on Sec-WebSocket-Protocol header", %{token: token} do -      assert {:ok, _} = start_socket("?stream=user", [{"Sec-WebSocket-Protocol", token.token}]) - -      capture_log(fn -> -        assert {:error, %WebSockex.RequestError{code: 401}} = -                 start_socket("?stream=user", [{"Sec-WebSocket-Protocol", "I am a friend"}]) - -        Process.sleep(30) -      end) -    end -      test "accepts valid token on client-sent event", %{token: token} do        assert {:ok, pid} = start_socket() diff --git a/test/pleroma/maps_test.exs b/test/pleroma/maps_test.exs new file mode 100644 index 000000000..05f1b18b2 --- /dev/null +++ b/test/pleroma/maps_test.exs @@ -0,0 +1,22 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2024 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.MapsTest do +  use Pleroma.DataCase, async: true + +  alias Pleroma.Maps + +  describe "filter_empty_values/1" do +    assert %{"bar" => "b", "ray" => ["foo"], "objs" => %{"a" => "b"}} == +             Maps.filter_empty_values(%{ +               "foo" => nil, +               "fooz" => "", +               "bar" => "b", +               "rei" => [], +               "ray" => ["foo"], +               "obj" => %{}, +               "objs" => %{"a" => "b"} +             }) +  end +end diff --git a/test/pleroma/mfa/totp_test.exs b/test/pleroma/mfa/totp_test.exs index 56e4f48ed..f291ed14b 100644 --- a/test/pleroma/mfa/totp_test.exs +++ b/test/pleroma/mfa/totp_test.exs @@ -7,6 +7,8 @@ defmodule Pleroma.MFA.TOTPTest do    alias Pleroma.MFA.TOTP +  import Pleroma.Tests.Helpers, only: [uri_equal?: 2] +    test "create provisioning_uri to generate qrcode" do      uri =        TOTP.provisioning_uri("test-secrcet", "test@example.com", @@ -15,7 +17,9 @@ defmodule Pleroma.MFA.TOTPTest do          period: 60        ) -    assert uri == +    assert uri_equal?( +             uri,               "otpauth://totp/test@example.com?digits=8&issuer=Plerome-42&period=60&secret=test-secrcet" +           )    end  end diff --git a/test/pleroma/object/fetcher_test.exs b/test/pleroma/object/fetcher_test.exs index 53c9277d6..6f21452a7 100644 --- a/test/pleroma/object/fetcher_test.exs +++ b/test/pleroma/object/fetcher_test.exs @@ -101,8 +101,7 @@ defmodule Pleroma.Object.FetcherTest do      test "it returns thread depth exceeded error if thread depth is exceeded" do        clear_config([:instance, :federation_incoming_replies_max_depth], 0) -      assert {:error, "Max thread distance exceeded."} = -               Fetcher.fetch_object_from_id(@ap_id, depth: 1) +      assert {:error, :allowed_depth} = Fetcher.fetch_object_from_id(@ap_id, depth: 1)      end      test "it fetches object if max thread depth is restricted to 0 and depth is not specified" do @@ -220,14 +219,14 @@ defmodule Pleroma.Object.FetcherTest do      end      test "handle HTTP 410 Gone response" do -      assert {:error, "Object has been deleted"} == +      assert {:error, :not_found} ==                 Fetcher.fetch_and_contain_remote_object_from_id(                   "https://mastodon.example.org/users/userisgone"                 )      end      test "handle HTTP 404 response" do -      assert {:error, "Object has been deleted"} == +      assert {:error, :not_found} ==                 Fetcher.fetch_and_contain_remote_object_from_id(                   "https://mastodon.example.org/users/userisgone404"                 ) diff --git a/test/pleroma/otp_version_test.exs b/test/pleroma/otp_version_test.exs index 642cd1310..21701d5a8 100644 --- a/test/pleroma/otp_version_test.exs +++ b/test/pleroma/otp_version_test.exs @@ -28,7 +28,7 @@ defmodule Pleroma.OTPVersionTest do                 "23.0"      end -    test "with non existance file" do +    test "with nonexistent file" do        assert OTPVersion.get_version_from_files([                 "test/fixtures/warnings/otp_version/non-exising",                 "test/fixtures/warnings/otp_version/22.4" diff --git a/test/pleroma/repo/migrations/autolinker_to_linkify_test.exs b/test/pleroma/repo/migrations/autolinker_to_linkify_test.exs index 52a606368..9847781f0 100644 --- a/test/pleroma/repo/migrations/autolinker_to_linkify_test.exs +++ b/test/pleroma/repo/migrations/autolinker_to_linkify_test.exs @@ -29,13 +29,13 @@ defmodule Pleroma.Repo.Migrations.AutolinkerToLinkifyTest do      %{value: new_opts} = ConfigDB.get_by_params(%{group: :pleroma, key: Pleroma.Formatter}) -    assert new_opts == [ +    assert Keyword.equal?(new_opts,               class: false,               extra: true,               new_window: false,               rel: "testing",               strip_prefix: false -           ] +           )      clear_config(Pleroma.Formatter, new_opts)      assert new_opts == Pleroma.Config.get(Pleroma.Formatter) @@ -67,6 +67,6 @@ defmodule Pleroma.Repo.Migrations.AutolinkerToLinkifyTest do        strip_prefix: false      ] -    assert migration.transform_opts(old_opts) == expected_opts +    assert Keyword.equal?(migration.transform_opts(old_opts), expected_opts)    end  end diff --git a/test/pleroma/repo/migrations/fix_malformed_formatter_config_test.exs b/test/pleroma/repo/migrations/fix_malformed_formatter_config_test.exs index 4c45adb4b..cf3fe5aac 100644 --- a/test/pleroma/repo/migrations/fix_malformed_formatter_config_test.exs +++ b/test/pleroma/repo/migrations/fix_malformed_formatter_config_test.exs @@ -26,13 +26,13 @@ defmodule Pleroma.Repo.Migrations.FixMalformedFormatterConfigTest do      %{value: new_opts} = ConfigDB.get_by_params(%{group: :pleroma, key: Pleroma.Formatter}) -    assert new_opts == [ +    assert Keyword.equal?(new_opts,               class: false,               extra: true,               new_window: false,               rel: "F",               strip_prefix: false -           ] +           )      clear_config(Pleroma.Formatter, new_opts)      assert new_opts == Pleroma.Config.get(Pleroma.Formatter) diff --git a/test/pleroma/reverse_proxy_test.exs b/test/pleroma/reverse_proxy_test.exs index 0bd4db8d1..fb330232a 100644 --- a/test/pleroma/reverse_proxy_test.exs +++ b/test/pleroma/reverse_proxy_test.exs @@ -306,7 +306,7 @@ defmodule Pleroma.ReverseProxyTest do    end    describe "response content disposition header" do -    test "not atachment", %{conn: conn} do +    test "not attachment", %{conn: conn} do        disposition_headers_mock([          {"content-type", "image/gif"},          {"content-length", "0"} diff --git a/test/pleroma/signature_test.exs b/test/pleroma/signature_test.exs index f5a915fa8..8edf67a7b 100644 --- a/test/pleroma/signature_test.exs +++ b/test/pleroma/signature_test.exs @@ -113,7 +113,7 @@ defmodule Pleroma.SignatureTest do      test "it calls webfinger for 'acct:' accounts" do        with_mock(Pleroma.Web.WebFinger, -        finger: fn _ -> %{"ap_id" => "https://gensokyo.2hu/users/raymoo"} end +        finger: fn _ -> {:ok, %{"ap_id" => "https://gensokyo.2hu/users/raymoo"}} end        ) do          assert Signature.key_id_to_actor_id("acct:raymoo@gensokyo.2hu") ==                   {:ok, "https://gensokyo.2hu/users/raymoo"} diff --git a/test/pleroma/user/backup_test.exs b/test/pleroma/user/backup_test.exs index 0ac57e334..5503d15bc 100644 --- a/test/pleroma/user/backup_test.exs +++ b/test/pleroma/user/backup_test.exs @@ -166,6 +166,7 @@ defmodule Pleroma.User.BackupTest do    test "it creates a zip archive with user data" do      user = insert(:user, %{nickname: "cofe", name: "Cofe", ap_id: "http://cofe.io/users/cofe"}) +    %{ap_id: other_ap_id} = other_user = insert(:user)      {:ok, %{object: %{data: %{"id" => id1}}} = status1} =        CommonAPI.post(user, %{status: "status1"}) @@ -182,6 +183,8 @@ defmodule Pleroma.User.BackupTest do      Bookmark.create(user.id, status2.id)      Bookmark.create(user.id, status3.id) +    CommonAPI.follow(user, other_user) +      assert {:ok, backup} = user |> Backup.new() |> Repo.insert()      assert {:ok, path} = Backup.export(backup, self())      assert {:ok, zipfile} = :zip.zip_open(String.to_charlist(path), [:memory]) @@ -261,6 +264,16 @@ defmodule Pleroma.User.BackupTest do               "type" => "OrderedCollection"             } = Jason.decode!(json) +    assert {:ok, {'following.json', json}} = :zip.zip_get('following.json', zipfile) + +    assert %{ +             "@context" => "https://www.w3.org/ns/activitystreams", +             "id" => "following.json", +             "orderedItems" => [^other_ap_id], +             "totalItems" => 1, +             "type" => "OrderedCollection" +           } = Jason.decode!(json) +      :zip.zip_close(zipfile)      File.rm!(path)    end diff --git a/test/pleroma/user_test.exs b/test/pleroma/user_test.exs index 77ca9198b..a93f81659 100644 --- a/test/pleroma/user_test.exs +++ b/test/pleroma/user_test.exs @@ -226,7 +226,7 @@ defmodule Pleroma.UserTest do      assert [] = User.get_follow_requests(followed)    end -  test "follow_all follows mutliple users" do +  test "follow_all follows multiple users" do      user = insert(:user)      followed_zero = insert(:user)      followed_one = insert(:user) @@ -250,7 +250,7 @@ defmodule Pleroma.UserTest do      refute User.following?(user, reverse_blocked)    end -  test "follow_all follows mutliple users without duplicating" do +  test "follow_all follows multiple users without duplicating" do      user = insert(:user)      followed_zero = insert(:user)      followed_one = insert(:user) @@ -873,7 +873,7 @@ defmodule Pleroma.UserTest do      end    end -  describe "get_or_fetch/1 remote users with tld, while BE is runned on subdomain" do +  describe "get_or_fetch/1 remote users with tld, while BE is running on a subdomain" do      setup do: clear_config([Pleroma.Web.WebFinger, :update_nickname_on_user_fetch], true)      test "for mastodon" do @@ -1018,13 +1018,13 @@ defmodule Pleroma.UserTest do      @tag capture_log: true      test "returns nil if no user could be fetched" do -      {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant@social.heldscal.la") -      assert fetched_user == "not found nonexistant@social.heldscal.la" +      {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistent@social.heldscal.la") +      assert fetched_user == "not found nonexistent@social.heldscal.la"      end -    test "returns nil for nonexistant local user" do -      {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistant") -      assert fetched_user == "not found nonexistant" +    test "returns nil for nonexistent local user" do +      {:error, fetched_user} = User.get_or_fetch_by_nickname("nonexistent") +      assert fetched_user == "not found nonexistent"      end      test "updates an existing user, if stale" do @@ -1132,7 +1132,7 @@ defmodule Pleroma.UserTest do        assert cs.valid?      end -    test "it sets the follower_adress" do +    test "it sets the follower_address" do        cs = User.remote_user_changeset(@valid_remote)        # remote users get a fake local follower address        assert cs.changes.follower_address == @@ -2424,20 +2424,20 @@ defmodule Pleroma.UserTest do      end    end -  describe "is_internal_user?/1" do +  describe "internal?/1" do      test "non-internal user returns false" do        user = insert(:user) -      refute User.is_internal_user?(user) +      refute User.internal?(user)      end      test "user with no nickname returns true" do        user = insert(:user, %{nickname: nil}) -      assert User.is_internal_user?(user) +      assert User.internal?(user)      end      test "user with internal-prefixed nickname returns true" do        user = insert(:user, %{nickname: "internal.test"}) -      assert User.is_internal_user?(user) +      assert User.internal?(user)      end    end @@ -2683,13 +2683,23 @@ defmodule Pleroma.UserTest do    end    describe "full_nickname/1" do -    test "returns fully qualified nickname for local and remote users" do -      local_user = -        insert(:user, nickname: "local_user", ap_id: "https://somehost.com/users/local_user") +    test "returns fully qualified nickname for local users" do +      local_user = insert(:user, nickname: "local_user") +      assert User.full_nickname(local_user) == "local_user@localhost" +    end + +    test "returns fully qualified nickname for local users when using different domain for webfinger" do +      clear_config([Pleroma.Web.WebFinger, :domain], "plemora.dev") + +      local_user = insert(:user, nickname: "local_user") + +      assert User.full_nickname(local_user) == "local_user@plemora.dev" +    end + +    test "returns fully qualified nickname for remote users" do        remote_user = insert(:user, nickname: "remote@host.com", local: false) -      assert User.full_nickname(local_user) == "local_user@somehost.com"        assert User.full_nickname(remote_user) == "remote@host.com"      end @@ -2918,4 +2928,51 @@ defmodule Pleroma.UserTest do        refute User.endorses?(user, pinned_user)      end    end + +  test "it checks fields links for a backlink" do +    user = insert(:user, ap_id: "https://social.example.org/users/lain") + +    fields = [ +      %{"name" => "Link", "value" => "http://example.com/rel_me/null"}, +      %{"name" => "Verified link", "value" => "http://example.com/rel_me/link"}, +      %{"name" => "Not a link", "value" => "i'm not a link"} +    ] + +    user +    |> User.update_and_set_cache(%{raw_fields: fields}) + +    ObanHelpers.perform_all() + +    user = User.get_cached_by_id(user.id) + +    assert [ +             %{"verified_at" => nil}, +             %{"verified_at" => verified_at}, +             %{"verified_at" => nil} +           ] = user.fields + +    assert is_binary(verified_at) +  end + +  test "updating fields does not invalidate previously validated links" do +    user = insert(:user, ap_id: "https://social.example.org/users/lain") + +    user +    |> User.update_and_set_cache(%{ +      raw_fields: [%{"name" => "verified link", "value" => "http://example.com/rel_me/link"}] +    }) + +    ObanHelpers.perform_all() + +    %User{fields: [%{"verified_at" => verified_at}]} = user = User.get_cached_by_id(user.id) + +    user +    |> User.update_and_set_cache(%{ +      raw_fields: [%{"name" => "Verified link", "value" => "http://example.com/rel_me/link"}] +    }) + +    user = User.get_cached_by_id(user.id) + +    assert [%{"verified_at" => ^verified_at}] = user.fields +  end  end diff --git a/test/pleroma/web/activity_pub/activity_pub_controller_test.exs b/test/pleroma/web/activity_pub/activity_pub_controller_test.exs index 069736925..ec4c04c62 100644 --- a/test/pleroma/web/activity_pub/activity_pub_controller_test.exs +++ b/test/pleroma/web/activity_pub/activity_pub_controller_test.exs @@ -221,7 +221,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do        user = insert(:user)        {:ok, post} = CommonAPI.post(user, %{status: "test", visibility: "local"}) -      assert Pleroma.Web.ActivityPub.Visibility.is_local_public?(post) +      assert Pleroma.Web.ActivityPub.Visibility.local_public?(post)        object = Object.normalize(post, fetch: false)        uuid = String.split(object.data["id"], "/") |> List.last() @@ -238,7 +238,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do        user = insert(:user)        {:ok, post} = CommonAPI.post(user, %{status: "test", visibility: "local"}) -      assert Pleroma.Web.ActivityPub.Visibility.is_local_public?(post) +      assert Pleroma.Web.ActivityPub.Visibility.local_public?(post)        object = Object.normalize(post, fetch: false)        uuid = String.split(object.data["id"], "/") |> List.last() @@ -259,7 +259,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do        {:ok, post} =          CommonAPI.post(user, %{status: "test @#{reader.nickname}", visibility: "local"}) -      assert Pleroma.Web.ActivityPub.Visibility.is_local_public?(post) +      assert Pleroma.Web.ActivityPub.Visibility.local_public?(post)        object = Object.normalize(post, fetch: false)        uuid = String.split(object.data["id"], "/") |> List.last() @@ -436,7 +436,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do        user = insert(:user)        {:ok, post} = CommonAPI.post(user, %{status: "test", visibility: "local"}) -      assert Pleroma.Web.ActivityPub.Visibility.is_local_public?(post) +      assert Pleroma.Web.ActivityPub.Visibility.local_public?(post)        uuid = String.split(post.data["id"], "/") |> List.last() @@ -452,7 +452,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubControllerTest do        user = insert(:user)        {:ok, post} = CommonAPI.post(user, %{status: "test", visibility: "local"}) -      assert Pleroma.Web.ActivityPub.Visibility.is_local_public?(post) +      assert Pleroma.Web.ActivityPub.Visibility.local_public?(post)        uuid = String.split(post.data["id"], "/") |> List.last() diff --git a/test/pleroma/web/activity_pub/activity_pub_test.exs b/test/pleroma/web/activity_pub/activity_pub_test.exs index a024e8d0f..524294385 100644 --- a/test/pleroma/web/activity_pub/activity_pub_test.exs +++ b/test/pleroma/web/activity_pub/activity_pub_test.exs @@ -1028,7 +1028,7 @@ defmodule Pleroma.Web.ActivityPub.ActivityPubTest do      refute repeat_activity in activities    end -  test "see your own posts even when they adress actors from blocked domains" do +  test "see your own posts even when they address actors from blocked domains" do      user = insert(:user)      domain = "dogwhistle.zone" diff --git a/test/pleroma/web/activity_pub/mrf/ensure_re_prepended_test.exs b/test/pleroma/web/activity_pub/mrf/ensure_re_prepended_test.exs index 859e6f1e9..5afab0cf9 100644 --- a/test/pleroma/web/activity_pub/mrf/ensure_re_prepended_test.exs +++ b/test/pleroma/web/activity_pub/mrf/ensure_re_prepended_test.exs @@ -24,7 +24,7 @@ defmodule Pleroma.Web.ActivityPub.MRF.EnsureRePrependedTest do        assert res["object"]["summary"] == "re: object-summary"      end -    test "it adds `re:` to summary object when child summary containts re-subject of parent summary " do +    test "it adds `re:` to summary object when child summary contains re-subject of parent summary " do        message = %{          "type" => "Create",          "object" => %{ diff --git a/test/pleroma/web/activity_pub/mrf/force_mention_test.exs b/test/pleroma/web/activity_pub/mrf/force_mention_test.exs new file mode 100644 index 000000000..b026bab66 --- /dev/null +++ b/test/pleroma/web/activity_pub/mrf/force_mention_test.exs @@ -0,0 +1,73 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2024 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Web.ActivityPub.MRF.ForceMentionTest do +  use Pleroma.DataCase +  require Pleroma.Constants + +  alias Pleroma.Web.ActivityPub.MRF.ForceMention + +  import Pleroma.Factory + +  test "adds mention to a reply" do +    lain = +      insert(:user, ap_id: "https://lain.com/users/lain", nickname: "lain@lain.com", local: false) + +    niobleoum = +      insert(:user, +        ap_id: "https://www.minds.com/api/activitypub/users/1198929502760083472", +        nickname: "niobleoum@minds.com", +        local: false +      ) + +    status = File.read!("test/fixtures/minds-pleroma-mentioned-post.json") |> Jason.decode!() + +    status_activity = %{ +      "type" => "Create", +      "actor" => lain.ap_id, +      "object" => status +    } + +    Pleroma.Web.ActivityPub.Transmogrifier.handle_incoming(status_activity) + +    reply = File.read!("test/fixtures/minds-invalid-mention-post.json") |> Jason.decode!() + +    reply_activity = %{ +      "type" => "Create", +      "actor" => niobleoum.ap_id, +      "object" => reply +    } + +    {:ok, %{"object" => %{"tag" => tag}}} = ForceMention.filter(reply_activity) + +    assert Enum.find(tag, fn %{"href" => href} -> href == lain.ap_id end) +  end + +  test "adds mention to a quote" do +    user1 = insert(:user, ap_id: "https://misskey.io/users/83ssedkv53") +    user2 = insert(:user, ap_id: "https://misskey.io/users/7rkrarq81i") + +    status = File.read!("test/fixtures/tesla_mock/misskey.io_8vs6wxufd0.json") |> Jason.decode!() + +    status_activity = %{ +      "type" => "Create", +      "actor" => user1.ap_id, +      "object" => status +    } + +    Pleroma.Web.ActivityPub.Transmogrifier.handle_incoming(status_activity) + +    quote_post = File.read!("test/fixtures/quote_post/misskey_quote_post.json") |> Jason.decode!() + +    quote_activity = %{ +      "type" => "Create", +      "actor" => user2.ap_id, +      "object" => quote_post +    } + +    {:ok, %{"object" => %{"tag" => tag}}} = ForceMention.filter(quote_activity) + +    assert Enum.find(tag, fn %{"href" => href} -> href == user1.ap_id end) +  end +end diff --git a/test/pleroma/web/activity_pub/mrf/steal_emoji_policy_test.exs b/test/pleroma/web/activity_pub/mrf/steal_emoji_policy_test.exs index 89d32352f..2c7497da5 100644 --- a/test/pleroma/web/activity_pub/mrf/steal_emoji_policy_test.exs +++ b/test/pleroma/web/activity_pub/mrf/steal_emoji_policy_test.exs @@ -60,6 +60,59 @@ defmodule Pleroma.Web.ActivityPub.MRF.StealEmojiPolicyTest do             |> File.exists?()    end +  test "works with unknown extension", %{path: path} do +    message = %{ +      "type" => "Create", +      "object" => %{ +        "emoji" => [{"firedfox", "https://example.org/emoji/firedfox"}], +        "actor" => "https://example.org/users/admin" +      } +    } + +    fullpath = Path.join(path, "firedfox.png") + +    Tesla.Mock.mock(fn %{method: :get, url: "https://example.org/emoji/firedfox"} -> +      %Tesla.Env{status: 200, body: File.read!("test/fixtures/image.jpg")} +    end) + +    clear_config(:mrf_steal_emoji, hosts: ["example.org"], size_limit: 284_468) + +    refute "firedfox" in installed() +    refute File.exists?(path) + +    assert {:ok, _message} = StealEmojiPolicy.filter(message) + +    assert "firedfox" in installed() +    assert File.exists?(path) +    assert File.exists?(fullpath) +  end + +  test "rejects invalid shortcodes", %{path: path} do +    message = %{ +      "type" => "Create", +      "object" => %{ +        "emoji" => [{"fired/fox", "https://example.org/emoji/firedfox"}], +        "actor" => "https://example.org/users/admin" +      } +    } + +    fullpath = Path.join(path, "fired/fox.png") + +    Tesla.Mock.mock(fn %{method: :get, url: "https://example.org/emoji/firedfox"} -> +      %Tesla.Env{status: 200, body: File.read!("test/fixtures/image.jpg")} +    end) + +    clear_config(:mrf_steal_emoji, hosts: ["example.org"], size_limit: 284_468) + +    refute "firedfox" in installed() +    refute File.exists?(path) + +    assert {:ok, _message} = StealEmojiPolicy.filter(message) + +    refute "fired/fox" in installed() +    refute File.exists?(fullpath) +  end +    test "reject regex shortcode", %{message: message} do      refute "firedfox" in installed() diff --git a/test/pleroma/web/activity_pub/mrf_test.exs b/test/pleroma/web/activity_pub/mrf_test.exs index 4ad45c818..3ead73792 100644 --- a/test/pleroma/web/activity_pub/mrf_test.exs +++ b/test/pleroma/web/activity_pub/mrf_test.exs @@ -1,10 +1,13 @@  # Pleroma: A lightweight social networking server -# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/> +# Copyright © 2017-2023 Pleroma Authors <https://pleroma.social/>  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.ActivityPub.MRFTest do    use ExUnit.Case    use Pleroma.Tests.Helpers + +  import ExUnit.CaptureLog +    alias Pleroma.Web.ActivityPub.MRF    test "subdomains_regex/1" do @@ -61,6 +64,14 @@ defmodule Pleroma.Web.ActivityPub.MRFTest do        refute MRF.subdomain_match?(regexes, "EXAMPLE.COM")        refute MRF.subdomain_match?(regexes, "example.com")      end + +    @tag capture_log: true +    test "logs sensible error on accidental wildcard" do +      assert_raise Regex.CompileError, fn -> +        assert capture_log(MRF.subdomains_regex(["*unsafe.tld"])) =~ +                 "MRF: Invalid subdomain Regex: *unsafe.tld" +      end +    end    end    describe "instance_list_from_tuples/1" do diff --git a/test/pleroma/web/activity_pub/object_validators/article_note_page_validator_test.exs b/test/pleroma/web/activity_pub/object_validators/article_note_page_validator_test.exs index 4703c3801..2b33950d6 100644 --- a/test/pleroma/web/activity_pub/object_validators/article_note_page_validator_test.exs +++ b/test/pleroma/web/activity_pub/object_validators/article_note_page_validator_test.exs @@ -93,6 +93,17 @@ defmodule Pleroma.Web.ActivityPub.ObjectValidators.ArticleNotePageValidatorTest      %{valid?: true} = ArticleNotePageValidator.cast_and_validate(note)    end +  test "a Note from Convergence AP Bridge validates" do +    insert(:user, ap_id: "https://cc.mkdir.uk/ap/acct/hiira") + +    note = +      "test/fixtures/ccworld-ap-bridge_note.json" +      |> File.read!() +      |> Jason.decode!() + +    %{valid?: true} = ArticleNotePageValidator.cast_and_validate(note) +  end +    test "a note with an attachment should work", _ do      insert(:user, %{ap_id: "https://owncast.localhost.localdomain/federation/user/streamer"}) diff --git a/test/pleroma/web/activity_pub/object_validators/attachment_validator_test.exs b/test/pleroma/web/activity_pub/object_validators/attachment_validator_test.exs index 3b8a2df86..a615c1d9a 100644 --- a/test/pleroma/web/activity_pub/object_validators/attachment_validator_test.exs +++ b/test/pleroma/web/activity_pub/object_validators/attachment_validator_test.exs @@ -164,7 +164,7 @@ defmodule Pleroma.Web.ActivityPub.ObjectValidators.AttachmentValidatorTest do        assert attachment.mediaType == "image/jpeg"      end -    test "it transforms image dimentions to our internal format" do +    test "it transforms image dimensions to our internal format" do        attachment = %{          "type" => "Document",          "name" => "Hello world", diff --git a/test/pleroma/web/activity_pub/object_validators/chat_validation_test.exs b/test/pleroma/web/activity_pub/object_validators/chat_validation_test.exs index 812944452..301fed60d 100644 --- a/test/pleroma/web/activity_pub/object_validators/chat_validation_test.exs +++ b/test/pleroma/web/activity_pub/object_validators/chat_validation_test.exs @@ -147,6 +147,21 @@ defmodule Pleroma.Web.ActivityPub.ObjectValidators.ChatValidationTest do        assert object["attachment"]      end +    test "validates for a basic object with content but attachment set to empty array", %{ +      user: user, +      recipient: recipient +    } do +      {:ok, valid_chat_message, _} = Builder.chat_message(user, recipient.ap_id, "Hello!") + +      valid_chat_message = +        valid_chat_message +        |> Map.put("attachment", []) + +      assert {:ok, object, _meta} = ObjectValidator.validate(valid_chat_message, []) + +      assert object == Map.drop(valid_chat_message, ["attachment"]) +    end +      test "does not validate if the message has no content", %{        valid_chat_message: valid_chat_message      } do diff --git a/test/pleroma/web/activity_pub/publisher_test.exs b/test/pleroma/web/activity_pub/publisher_test.exs index 9800144b5..870f1f77a 100644 --- a/test/pleroma/web/activity_pub/publisher_test.exs +++ b/test/pleroma/web/activity_pub/publisher_test.exs @@ -25,6 +25,17 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do    setup_all do: clear_config([:instance, :federating], true) +  describe "should_federate?/1" do +    test "it returns false when the inbox is nil" do +      refute Publisher.should_federate?(nil, false) +      refute Publisher.should_federate?(nil, true) +    end + +    test "it returns true when public is true" do +      assert Publisher.should_federate?(false, true) +    end +  end +    describe "gather_webfinger_links/1" do      test "it returns links" do        user = insert(:user) @@ -205,6 +216,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        refute called(Instances.set_reachable(inbox))      end +    @tag capture_log: true      test_with_mock "calls `Instances.set_unreachable` on target inbox on non-2xx HTTP response code",                     Instances,                     [:passthrough], @@ -212,7 +224,8 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        actor = insert(:user)        inbox = "http://404.site/users/nick1/inbox" -      assert {:error, _} = Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1}) +      assert {:discard, _} = +               Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1})        assert called(Instances.set_unreachable(inbox))      end @@ -268,7 +281,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do    describe "publish/2" do      test_with_mock "doesn't publish a non-public activity to quarantined instances.", -                   Pleroma.Web.Federator.Publisher, +                   Pleroma.Web.ActivityPub.Publisher,                     [:passthrough],                     [] do        Config.put([:instance, :quarantined_instances], [{"domain.com", "some reason"}]) @@ -295,7 +308,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        assert res == :ok        assert not called( -               Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{ +               Publisher.enqueue_one(%{                   inbox: "https://domain.com/users/nick1/inbox",                   actor_id: actor.id,                   id: note_activity.data["id"] @@ -304,7 +317,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do      end      test_with_mock "Publishes a non-public activity to non-quarantined instances.", -                   Pleroma.Web.Federator.Publisher, +                   Pleroma.Web.ActivityPub.Publisher,                     [:passthrough],                     [] do        Config.put([:instance, :quarantined_instances], [{"somedomain.com", "some reason"}]) @@ -331,8 +344,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        assert res == :ok        assert called( -               Pleroma.Web.Federator.Publisher.enqueue_one( -                 Publisher, +               Publisher.enqueue_one(                   %{                     inbox: "https://domain.com/users/nick1/inbox",                     actor_id: actor.id, @@ -344,7 +356,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do      end      test_with_mock "Publishes to directly addressed actors with higher priority.", -                   Pleroma.Web.Federator.Publisher, +                   Pleroma.Web.ActivityPub.Publisher,                     [:passthrough],                     [] do        note_activity = insert(:direct_note_activity) @@ -356,8 +368,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        assert res == :ok        assert called( -               Pleroma.Web.Federator.Publisher.enqueue_one( -                 Publisher, +               Publisher.enqueue_one(                   %{                     inbox: :_,                     actor_id: actor.id, @@ -369,7 +380,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do      end      test_with_mock "publishes an activity with BCC to all relevant peers.", -                   Pleroma.Web.Federator.Publisher, +                   Pleroma.Web.ActivityPub.Publisher,                     [:passthrough],                     [] do        follower = @@ -393,7 +404,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        assert res == :ok        assert called( -               Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{ +               Publisher.enqueue_one(%{                   inbox: "https://domain.com/users/nick1/inbox",                   actor_id: actor.id,                   id: note_activity.data["id"] @@ -402,7 +413,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do      end      test_with_mock "publishes a delete activity to peers who signed fetch requests to the create acitvity/object.", -                   Pleroma.Web.Federator.Publisher, +                   Pleroma.Web.ActivityPub.Publisher,                     [:passthrough],                     [] do        fetcher = @@ -443,8 +454,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do        assert res == :ok        assert called( -               Pleroma.Web.Federator.Publisher.enqueue_one( -                 Publisher, +               Publisher.enqueue_one(                   %{                     inbox: "https://domain.com/users/nick1/inbox",                     actor_id: actor.id, @@ -455,8 +465,7 @@ defmodule Pleroma.Web.ActivityPub.PublisherTest do               )        assert called( -               Pleroma.Web.Federator.Publisher.enqueue_one( -                 Publisher, +               Publisher.enqueue_one(                   %{                     inbox: "https://domain2.com/users/nick1/inbox",                     actor_id: actor.id, diff --git a/test/pleroma/web/activity_pub/side_effects_test.exs b/test/pleroma/web/activity_pub/side_effects_test.exs index 6820e23d0..94cc80b76 100644 --- a/test/pleroma/web/activity_pub/side_effects_test.exs +++ b/test/pleroma/web/activity_pub/side_effects_test.exs @@ -17,11 +17,19 @@ defmodule Pleroma.Web.ActivityPub.SideEffectsTest do    alias Pleroma.Web.ActivityPub.ActivityPub    alias Pleroma.Web.ActivityPub.Builder    alias Pleroma.Web.ActivityPub.SideEffects +  alias Pleroma.Web.ActivityPub.Utils    alias Pleroma.Web.CommonAPI +  alias Pleroma.Web.CommonAPI.ActivityDraft    import Mock    import Pleroma.Factory +  defp get_announces_of_object(%{data: %{"id" => id}} = _object) do +    Pleroma.Activity.Queries.by_type("Announce") +    |> Pleroma.Activity.Queries.by_object_id(id) +    |> Pleroma.Repo.all() +  end +    describe "handle_after_transaction" do      test "it streams out notifications and streams" do        author = insert(:user, local: true) @@ -915,4 +923,85 @@ defmodule Pleroma.Web.ActivityPub.SideEffectsTest do        assert User.get_follow_state(user, followed, nil) == nil      end    end + +  describe "Group actors" do +    setup do +      poster = +        insert(:user, +          local: false, +          nickname: "poster@example.com", +          ap_id: "https://example.com/users/poster" +        ) + +      group = insert(:user, actor_type: "Group") + +      make_create = fn mentioned_users -> +        mentions = mentioned_users |> Enum.map(fn u -> "@#{u.nickname}" end) |> Enum.join(" ") +        {:ok, draft} = ActivityDraft.create(poster, %{status: "#{mentions} hey"}) + +        create_activity_data = +          Utils.make_create_data(draft.changes |> Map.put(:published, nil), %{}) +          |> put_in(["object", "id"], "https://example.com/object") +          |> put_in(["id"], "https://example.com/activity") + +        assert Enum.all?(mentioned_users, fn u -> u.ap_id in create_activity_data["to"] end) + +        create_activity_data +      end + +      %{poster: poster, group: group, make_create: make_create} +    end + +    test "group should boost it", %{make_create: make_create, group: group} do +      create_activity_data = make_create.([group]) +      {:ok, create_activity, _meta} = ActivityPub.persist(create_activity_data, local: false) + +      {:ok, _create_activity, _meta} = +        SideEffects.handle(create_activity, +          local: false, +          object_data: create_activity_data["object"] +        ) + +      object = Object.normalize(create_activity, fetch: false) +      assert [announce] = get_announces_of_object(object) +      assert announce.actor == group.ap_id +    end + +    test "remote group should not boost it", %{make_create: make_create, group: group} do +      remote_group = +        insert(:user, actor_type: "Group", local: false, nickname: "remotegroup@example.com") + +      create_activity_data = make_create.([group, remote_group]) +      {:ok, create_activity, _meta} = ActivityPub.persist(create_activity_data, local: false) + +      {:ok, _create_activity, _meta} = +        SideEffects.handle(create_activity, +          local: false, +          object_data: create_activity_data["object"] +        ) + +      object = Object.normalize(create_activity, fetch: false) +      assert [announce] = get_announces_of_object(object) +      assert announce.actor == group.ap_id +    end + +    test "group should not boost it if group is blocking poster", %{ +      make_create: make_create, +      group: group, +      poster: poster +    } do +      {:ok, _} = CommonAPI.block(group, poster) +      create_activity_data = make_create.([group]) +      {:ok, create_activity, _meta} = ActivityPub.persist(create_activity_data, local: false) + +      {:ok, _create_activity, _meta} = +        SideEffects.handle(create_activity, +          local: false, +          object_data: create_activity_data["object"] +        ) + +      object = Object.normalize(create_activity, fetch: false) +      assert [] = get_announces_of_object(object) +    end +  end  end diff --git a/test/pleroma/web/activity_pub/transmogrifier/note_handling_test.exs b/test/pleroma/web/activity_pub/transmogrifier/note_handling_test.exs index a9ad3e9c8..2507fa2b0 100644 --- a/test/pleroma/web/activity_pub/transmogrifier/note_handling_test.exs +++ b/test/pleroma/web/activity_pub/transmogrifier/note_handling_test.exs @@ -221,6 +221,19 @@ defmodule Pleroma.Web.ActivityPub.Transmogrifier.NoteHandlingTest do                 "<p><span class=\"h-card\"><a href=\"http://localtesting.pleroma.lol/users/lain\" class=\"u-url mention\">@<span>lain</span></a></span></p>"      end +    test "it works for incoming notices with a nil contentMap (firefish)" do +      data = +        File.read!("test/fixtures/mastodon-post-activity-contentmap.json") +        |> Jason.decode!() +        |> Map.put("contentMap", nil) + +      {:ok, %Activity{data: data, local: false}} = Transmogrifier.handle_incoming(data) +      object = Object.normalize(data["object"], fetch: false) + +      assert object.data["content"] == +               "<p><span class=\"h-card\"><a href=\"http://localtesting.pleroma.lol/users/lain\" class=\"u-url mention\">@<span>lain</span></a></span></p>" +    end +      test "it works for incoming notices with to/cc not being an array (kroeg)" do        data = File.read!("test/fixtures/kroeg-post-activity.json") |> Jason.decode!() @@ -508,7 +521,7 @@ defmodule Pleroma.Web.ActivityPub.Transmogrifier.NoteHandlingTest do        [data: data]      end -    test "returns not modified object when hasn't containts inReplyTo field", %{data: data} do +    test "returns not modified object when has no inReplyTo field", %{data: data} do        assert Transmogrifier.fix_in_reply_to(data) == data      end diff --git a/test/pleroma/web/activity_pub/transmogrifier/undo_handling_test.exs b/test/pleroma/web/activity_pub/transmogrifier/undo_handling_test.exs index 846d25cbe..ea01c92fa 100644 --- a/test/pleroma/web/activity_pub/transmogrifier/undo_handling_test.exs +++ b/test/pleroma/web/activity_pub/transmogrifier/undo_handling_test.exs @@ -32,7 +32,7 @@ defmodule Pleroma.Web.ActivityPub.Transmogrifier.UndoHandlingTest do      assert activity.data["type"] == "Undo"    end -  test "it returns an error for incoming unlikes wihout a like activity" do +  test "it returns an error for incoming unlikes without a like activity" do      user = insert(:user)      {:ok, activity} = CommonAPI.post(user, %{status: "leave a like pls"}) diff --git a/test/pleroma/web/activity_pub/transmogrifier_test.exs b/test/pleroma/web/activity_pub/transmogrifier_test.exs index 9c5983347..a49e459a6 100644 --- a/test/pleroma/web/activity_pub/transmogrifier_test.exs +++ b/test/pleroma/web/activity_pub/transmogrifier_test.exs @@ -132,7 +132,7 @@ defmodule Pleroma.Web.ActivityPub.TransmogrifierTest do                 assert {:ok, activity} = Transmogrifier.handle_incoming(message)                 object = Object.normalize(activity)                 assert [%{"type" => "Mention"}, %{"type" => "Link"}] = object.data["tag"] -             end) =~ "Error while fetching" +             end) =~ "Object rejected while fetching"      end      test "it accepts quote posts" do @@ -410,7 +410,7 @@ defmodule Pleroma.Web.ActivityPub.TransmogrifierTest do        assert capture_log(fn ->                 {:error, _} = Transmogrifier.handle_incoming(data) -             end) =~ "Object containment failed" +             end) =~ "Object rejected while fetching"      end      test "it rejects activities which reference objects that have an incorrect attribution (variant 1)" do @@ -425,7 +425,7 @@ defmodule Pleroma.Web.ActivityPub.TransmogrifierTest do        assert capture_log(fn ->                 {:error, _} = Transmogrifier.handle_incoming(data) -             end) =~ "Object containment failed" +             end) =~ "Object rejected while fetching"      end      test "it rejects activities which reference objects that have an incorrect attribution (variant 2)" do @@ -440,7 +440,7 @@ defmodule Pleroma.Web.ActivityPub.TransmogrifierTest do        assert capture_log(fn ->                 {:error, _} = Transmogrifier.handle_incoming(data) -             end) =~ "Object containment failed" +             end) =~ "Object rejected while fetching"      end    end diff --git a/test/pleroma/web/activity_pub/utils_test.exs b/test/pleroma/web/activity_pub/utils_test.exs index 9ca21f5d9..cd61e3e4b 100644 --- a/test/pleroma/web/activity_pub/utils_test.exs +++ b/test/pleroma/web/activity_pub/utils_test.exs @@ -17,7 +17,7 @@ defmodule Pleroma.Web.ActivityPub.UtilsTest do    require Pleroma.Constants    describe "strip_report_status_data/1" do -    test "does not break on issues with the reported activites" do +    test "does not break on issues with the reported activities" do        reporter = insert(:user)        target_account = insert(:user)        {:ok, activity} = CommonAPI.post(target_account, %{status: "foobar"}) @@ -153,7 +153,7 @@ defmodule Pleroma.Web.ActivityPub.UtilsTest do        assert Enum.sort(cc) == expected_cc      end -    test "does not adress actor's follower address if the activity is not public", %{ +    test "does not address actor's follower address if the activity is not public", %{        user: user,        other_user: other_user,        third_user: third_user @@ -622,7 +622,7 @@ defmodule Pleroma.Web.ActivityPub.UtilsTest do    end    describe "get_cached_emoji_reactions/1" do -    test "returns the normalized data or an emtpy list" do +    test "returns the normalized data or an empty list" do        object = insert(:note)        assert Utils.get_cached_emoji_reactions(object) == [] diff --git a/test/pleroma/web/activity_pub/visibility_test.exs b/test/pleroma/web/activity_pub/visibility_test.exs index 8c4c06a95..fd3dc83a1 100644 --- a/test/pleroma/web/activity_pub/visibility_test.exs +++ b/test/pleroma/web/activity_pub/visibility_test.exs @@ -52,60 +52,60 @@ defmodule Pleroma.Web.ActivityPub.VisibilityTest do      }    end -  test "is_direct?", %{ +  test "direct?", %{      public: public,      private: private,      direct: direct,      unlisted: unlisted,      list: list    } do -    assert Visibility.is_direct?(direct) -    refute Visibility.is_direct?(public) -    refute Visibility.is_direct?(private) -    refute Visibility.is_direct?(unlisted) -    assert Visibility.is_direct?(list) +    assert Visibility.direct?(direct) +    refute Visibility.direct?(public) +    refute Visibility.direct?(private) +    refute Visibility.direct?(unlisted) +    assert Visibility.direct?(list)    end -  test "is_public?", %{ +  test "public?", %{      public: public,      private: private,      direct: direct,      unlisted: unlisted,      list: list    } do -    refute Visibility.is_public?(direct) -    assert Visibility.is_public?(public) -    refute Visibility.is_public?(private) -    assert Visibility.is_public?(unlisted) -    refute Visibility.is_public?(list) +    refute Visibility.public?(direct) +    assert Visibility.public?(public) +    refute Visibility.public?(private) +    assert Visibility.public?(unlisted) +    refute Visibility.public?(list)    end -  test "is_private?", %{ +  test "private?", %{      public: public,      private: private,      direct: direct,      unlisted: unlisted,      list: list    } do -    refute Visibility.is_private?(direct) -    refute Visibility.is_private?(public) -    assert Visibility.is_private?(private) -    refute Visibility.is_private?(unlisted) -    refute Visibility.is_private?(list) +    refute Visibility.private?(direct) +    refute Visibility.private?(public) +    assert Visibility.private?(private) +    refute Visibility.private?(unlisted) +    refute Visibility.private?(list)    end -  test "is_list?", %{ +  test "list?", %{      public: public,      private: private,      direct: direct,      unlisted: unlisted,      list: list    } do -    refute Visibility.is_list?(direct) -    refute Visibility.is_list?(public) -    refute Visibility.is_list?(private) -    refute Visibility.is_list?(unlisted) -    assert Visibility.is_list?(list) +    refute Visibility.list?(direct) +    refute Visibility.list?(public) +    refute Visibility.list?(private) +    refute Visibility.list?(unlisted) +    assert Visibility.list?(list)    end    test "visible_for_user? Activity", %{ @@ -227,7 +227,7 @@ defmodule Pleroma.Web.ActivityPub.VisibilityTest do         } do      Repo.delete(user)      Pleroma.User.invalidate_cache(user) -    refute Visibility.is_private?(direct) +    refute Visibility.private?(direct)    end    test "get_visibility", %{ diff --git a/test/pleroma/web/admin_api/controllers/config_controller_test.exs b/test/pleroma/web/admin_api/controllers/config_controller_test.exs index 19ce3681c..734aca752 100644 --- a/test/pleroma/web/admin_api/controllers/config_controller_test.exs +++ b/test/pleroma/web/admin_api/controllers/config_controller_test.exs @@ -873,7 +873,7 @@ defmodule Pleroma.Web.AdminAPI.ConfigControllerTest do                                    %{                                      "tuple" => [                                        ":_", -                                      "Phoenix.Endpoint.Cowboy2Handler", +                                      "Plug.Cowboy.Handler",                                        %{"tuple" => ["Pleroma.Web.Endpoint", []]}                                      ]                                    } @@ -937,7 +937,7 @@ defmodule Pleroma.Web.AdminAPI.ConfigControllerTest do                                         %{                                           "tuple" => [                                             ":_", -                                           "Phoenix.Endpoint.Cowboy2Handler", +                                           "Plug.Cowboy.Handler",                                             %{"tuple" => ["Pleroma.Web.Endpoint", []]}                                           ]                                         } diff --git a/test/pleroma/web/admin_api/controllers/o_auth_app_controller_test.exs b/test/pleroma/web/admin_api/controllers/o_auth_app_controller_test.exs index 80646dd25..10eefbeca 100644 --- a/test/pleroma/web/admin_api/controllers/o_auth_app_controller_test.exs +++ b/test/pleroma/web/admin_api/controllers/o_auth_app_controller_test.exs @@ -163,7 +163,7 @@ defmodule Pleroma.Web.AdminAPI.OAuthAppControllerTest do        assert response == ""      end -    test "with non existance id", %{conn: conn} do +    test "with nonexistent id", %{conn: conn} do        response =          conn          |> delete("/api/pleroma/admin/oauth_app/0") diff --git a/test/pleroma/web/common_api_test.exs b/test/pleroma/web/common_api_test.exs index 06583bf7e..58cd1fd42 100644 --- a/test/pleroma/web/common_api_test.exs +++ b/test/pleroma/web/common_api_test.exs @@ -27,8 +27,15 @@ defmodule Pleroma.Web.CommonAPITest do    import Mox    import Pleroma.Factory +  require Pleroma.Activity.Queries    require Pleroma.Constants +  defp get_announces_of_object(%{data: %{"id" => id}} = _object) do +    Pleroma.Activity.Queries.by_type("Announce") +    |> Pleroma.Activity.Queries.by_object_id(id) +    |> Pleroma.Repo.all() +  end +    setup_all do      Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)      :ok @@ -500,7 +507,7 @@ defmodule Pleroma.Web.CommonAPITest do      {:ok, convo_reply} =        CommonAPI.post(user, %{status: ".", in_reply_to_conversation_id: participation.id}) -    assert Visibility.is_direct?(convo_reply) +    assert Visibility.direct?(convo_reply)      assert activity.data["context"] == convo_reply.data["context"]    end @@ -918,7 +925,7 @@ defmodule Pleroma.Web.CommonAPITest do        {:ok, activity} = CommonAPI.post(other_user, %{status: "cofe"})        {:ok, %Activity{} = announce_activity} = CommonAPI.repeat(activity.id, user) -      assert Visibility.is_public?(announce_activity) +      assert Visibility.public?(announce_activity)      end      test "can't repeat a repeat" do @@ -940,7 +947,7 @@ defmodule Pleroma.Web.CommonAPITest do        {:ok, %Activity{} = announce_activity} =          CommonAPI.repeat(activity.id, user, %{visibility: "private"}) -      assert Visibility.is_private?(announce_activity) +      assert Visibility.private?(announce_activity)        refute Visibility.visible_for_user?(announce_activity, nil)      end @@ -953,7 +960,7 @@ defmodule Pleroma.Web.CommonAPITest do        {:ok, %Activity{} = announce_activity} = CommonAPI.repeat(activity.id, author) -      assert Visibility.is_private?(announce_activity) +      assert Visibility.private?(announce_activity)        refute Visibility.visible_for_user?(announce_activity, nil)        assert Visibility.visible_for_user?(activity, follower) @@ -1625,7 +1632,7 @@ defmodule Pleroma.Web.CommonAPITest do        with_mock Pleroma.Web.Federator, publish: fn _ -> :ok end do          {:ok, activity} = CommonAPI.post(user, %{status: "#2hu #2HU", visibility: "local"}) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          assert_not_called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1640,7 +1647,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"deleted_activity_id" => ^activity_id}} = activity} =                   CommonAPI.delete(activity_id, user) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          assert_not_called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1656,7 +1663,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"type" => "Announce"}} = activity} =                   CommonAPI.repeat(activity_id, user) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1674,7 +1681,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"type" => "Undo"}} = activity} =                   CommonAPI.unrepeat(activity_id, user) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1689,7 +1696,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"type" => "Like"}} = activity} =                   CommonAPI.favorite(user, activity.id) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1704,7 +1711,7 @@ defmodule Pleroma.Web.CommonAPITest do        with_mock Pleroma.Web.Federator, publish: fn _ -> :ok end do          assert {:ok, activity} = CommonAPI.unfavorite(activity.id, user) -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1718,7 +1725,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"type" => "EmojiReact"}} = activity} =                   CommonAPI.react_with_emoji(activity.id, user, "👍") -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1734,7 +1741,7 @@ defmodule Pleroma.Web.CommonAPITest do          assert {:ok, %Activity{data: %{"type" => "Undo"}} = activity} =                   CommonAPI.unreact_with_emoji(activity.id, user, "👍") -        assert Visibility.is_local_public?(activity) +        assert Visibility.local_public?(activity)          refute called(Pleroma.Web.Federator.publish(activity))        end      end @@ -1863,4 +1870,54 @@ defmodule Pleroma.Web.CommonAPITest do        assert Map.has_key?(updated_object.data, "updated")      end    end + +  describe "Group actors" do +    setup do +      poster = insert(:user) +      group = insert(:user, actor_type: "Group") +      other_group = insert(:user, actor_type: "Group") +      %{poster: poster, group: group, other_group: other_group} +    end + +    test "it boosts public posts", %{poster: poster, group: group} do +      {:ok, post} = CommonAPI.post(poster, %{status: "hey @#{group.nickname}"}) + +      announces = get_announces_of_object(post.object) +      assert [_] = announces +    end + +    test "it does not boost private posts", %{poster: poster, group: group} do +      {:ok, private_post} = +        CommonAPI.post(poster, %{status: "hey @#{group.nickname}", visibility: "private"}) + +      assert [] = get_announces_of_object(private_post.object) +    end + +    test "remote groups do not boost any posts", %{poster: poster} do +      remote_group = +        insert(:user, actor_type: "Group", local: false, nickname: "remote@example.com") + +      {:ok, post} = CommonAPI.post(poster, %{status: "hey @#{User.full_nickname(remote_group)}"}) +      assert remote_group.ap_id in post.data["to"] + +      announces = get_announces_of_object(post.object) +      assert [] = announces +    end + +    test "multiple groups mentioned", %{poster: poster, group: group, other_group: other_group} do +      {:ok, post} = +        CommonAPI.post(poster, %{status: "hey @#{group.nickname} @#{other_group.nickname}"}) + +      announces = get_announces_of_object(post.object) +      assert [_, _] = announces +    end + +    test "it does not boost if group is blocking poster", %{poster: poster, group: group} do +      {:ok, _} = CommonAPI.block(group, poster) +      {:ok, post} = CommonAPI.post(poster, %{status: "hey @#{group.nickname}"}) + +      announces = get_announces_of_object(post.object) +      assert [] = announces +    end +  end  end diff --git a/test/pleroma/web/federator_test.exs b/test/pleroma/web/federator_test.exs index 6826e6c2f..4a398f239 100644 --- a/test/pleroma/web/federator_test.exs +++ b/test/pleroma/web/federator_test.exs @@ -40,6 +40,44 @@ defmodule Pleroma.Web.FederatorTest do        %{activity: activity, relay_mock: relay_mock}      end +    test "to shared inbox when multiple actors from same instance are recipients" do +      user = insert(:user) + +      shared_inbox = "https://domain.com/inbox" + +      follower_one = +        insert(:user, %{ +          local: false, +          nickname: "nick1@domain.com", +          ap_id: "https://domain.com/users/nick1", +          inbox: "https://domain.com/users/nick1/inbox", +          shared_inbox: shared_inbox +        }) + +      follower_two = +        insert(:user, %{ +          local: false, +          nickname: "nick2@domain.com", +          ap_id: "https://domain.com/users/nick2", +          inbox: "https://domain.com/users/nick2/inbox", +          shared_inbox: shared_inbox +        }) + +      {:ok, _, _} = Pleroma.User.follow(follower_one, user) +      {:ok, _, _} = Pleroma.User.follow(follower_two, user) + +      {:ok, _activity} = CommonAPI.post(user, %{status: "Happy Friday everyone!"}) + +      ObanHelpers.perform(all_enqueued(worker: PublisherWorker)) + +      inboxes = +        all_enqueued(worker: PublisherWorker) +        |> Enum.filter(&(get_in(&1, [Access.key(:args), Access.key("op")]) == "publish_one")) +        |> Enum.map(&get_in(&1, [Access.key(:args), Access.key("params"), Access.key("inbox")])) + +      assert [shared_inbox] == inboxes +    end +      test "with relays active, it publishes to the relay", %{        activity: activity,        relay_mock: relay_mock diff --git a/test/pleroma/web/mastodon_api/controllers/account_controller_test.exs b/test/pleroma/web/mastodon_api/controllers/account_controller_test.exs index d8e5f9d39..aa7726a9c 100644 --- a/test/pleroma/web/mastodon_api/controllers/account_controller_test.exs +++ b/test/pleroma/web/mastodon_api/controllers/account_controller_test.exs @@ -1360,7 +1360,7 @@ defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do        assert user.registration_reason == "I'm a cool dude, bro"      end -    test "returns error when user already registred", %{conn: conn, valid_params: valid_params} do +    test "returns error when user already registered", %{conn: conn, valid_params: valid_params} do        _user = insert(:user, email: "lain@example.org")        app_token = insert(:oauth_token, user: nil) @@ -1495,7 +1495,7 @@ defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do          |> Plug.Conn.put_req_header("authorization", "Bearer " <> token)          |> put_req_header("content-type", "multipart/form-data")          |> post("/api/v1/accounts", %{ -          nickname: "nickanme", +          nickname: "nickname",            agreement: true,            email: "email@example.com",            fullname: "Lain", @@ -1781,7 +1781,7 @@ defmodule Pleroma.Web.MastodonAPI.AccountControllerTest do        assert %{language: "ru_RU"} = Pleroma.User.get_by_nickname("foo")      end -    test "createing an account without language parameter should fallback to cookie/header language", +    test "creating an account without language parameter should fallback to cookie/header language",           %{conn: conn} do        params = %{          username: "foo2", diff --git a/test/pleroma/web/mastodon_api/controllers/instance_controller_test.exs b/test/pleroma/web/mastodon_api/controllers/instance_controller_test.exs index 3d2f7bf87..bfc672ff7 100644 --- a/test/pleroma/web/mastodon_api/controllers/instance_controller_test.exs +++ b/test/pleroma/web/mastodon_api/controllers/instance_controller_test.exs @@ -109,6 +109,18 @@ defmodule Pleroma.Web.MastodonAPI.InstanceControllerTest do               |> json_response_and_validate_schema(200)    end +  test "get instance contact information", %{conn: conn} do +    user = insert(:user, %{local: true}) + +    clear_config([:instance, :contact_username], user.nickname) + +    conn = get(conn, "/api/v1/instance") + +    assert result = json_response_and_validate_schema(conn, 200) + +    assert result["contact_account"]["id"] == user.id +  end +    test "get instance information v2", %{conn: conn} do      clear_config([:auth, :oauth_consumer_strategies], []) diff --git a/test/pleroma/web/mastodon_api/controllers/search_controller_test.exs b/test/pleroma/web/mastodon_api/controllers/search_controller_test.exs index 3654c6b20..b05487abe 100644 --- a/test/pleroma/web/mastodon_api/controllers/search_controller_test.exs +++ b/test/pleroma/web/mastodon_api/controllers/search_controller_test.exs @@ -42,6 +42,7 @@ defmodule Pleroma.Web.MastodonAPI.SearchControllerTest do        end      end +    @tag :skip_darwin      test "search", %{conn: conn} do        user = insert(:user)        user_two = insert(:user, %{nickname: "shp@shitposter.club"}) diff --git a/test/pleroma/web/mastodon_api/controllers/status_controller_test.exs b/test/pleroma/web/mastodon_api/controllers/status_controller_test.exs index 4e3d34172..f95f15ec3 100644 --- a/test/pleroma/web/mastodon_api/controllers/status_controller_test.exs +++ b/test/pleroma/web/mastodon_api/controllers/status_controller_test.exs @@ -12,6 +12,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusControllerTest do    alias Pleroma.Object    alias Pleroma.Repo    alias Pleroma.ScheduledActivity +  alias Pleroma.Tests.Helpers    alias Pleroma.Tests.ObanHelpers    alias Pleroma.User    alias Pleroma.Web.ActivityPub.ActivityPub @@ -335,13 +336,7 @@ defmodule Pleroma.Web.MastodonAPI.StatusControllerTest do          path -> Pleroma.Test.StaticConfig.get(path)        end) -      Tesla.Mock.mock(fn -        %{ -          method: :get, -          url: "https://example.com/twitter-card" -        } -> -          %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/twitter_card.html")} - +      Tesla.Mock.mock_global(fn          env ->            apply(HttpRequestMock, :request, [env])        end) @@ -2191,7 +2186,10 @@ defmodule Pleroma.Web.MastodonAPI.StatusControllerTest do      # Using the header for pagination works correctly      [next, _] = get_resp_header(result, "link") |> hd() |> String.split(", ") -    [_, max_id] = Regex.run(~r/max_id=([^&]+)/, next) +    [next_url, _next_rel] = String.split(next, ";") +    next_url = String.trim_trailing(next_url, ">") |> String.trim_leading("<") + +    max_id = Helpers.get_query_parameter(next_url, "max_id")      assert max_id == third_favorite.id diff --git a/test/pleroma/web/mastodon_api/controllers/subscription_controller_test.exs b/test/pleroma/web/mastodon_api/controllers/subscription_controller_test.exs index ce7cfa9c7..837dc0dce 100644 --- a/test/pleroma/web/mastodon_api/controllers/subscription_controller_test.exs +++ b/test/pleroma/web/mastodon_api/controllers/subscription_controller_test.exs @@ -3,7 +3,7 @@  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.MastodonAPI.SubscriptionControllerTest do -  use Pleroma.Web.ConnCase, async: true +  use Pleroma.Web.ConnCase, async: false    import Pleroma.Factory @@ -35,17 +35,20 @@ defmodule Pleroma.Web.MastodonAPI.SubscriptionControllerTest do    defmacro assert_error_when_disable_push(do: yield) do      quote do -      vapid_details = Application.get_env(:web_push_encryption, :vapid_details, []) -      Application.put_env(:web_push_encryption, :vapid_details, []) -        assert %{"error" => "Web push subscription is disabled on this Pleroma instance"} ==                 unquote(yield) - -      Application.put_env(:web_push_encryption, :vapid_details, vapid_details)      end    end    describe "when disabled" do +    setup do +      vapid_config = Application.get_env(:web_push_encryption, :vapid_details) + +      Application.put_env(:web_push_encryption, :vapid_details, []) + +      on_exit(fn -> Application.put_env(:web_push_encryption, :vapid_details, vapid_config) end) +    end +      test "POST returns error", %{conn: conn} do        assert_error_when_disable_push do          conn diff --git a/test/pleroma/web/mastodon_api/update_credentials_test.exs b/test/pleroma/web/mastodon_api/update_credentials_test.exs index fc8b79536..bea0cae69 100644 --- a/test/pleroma/web/mastodon_api/update_credentials_test.exs +++ b/test/pleroma/web/mastodon_api/update_credentials_test.exs @@ -511,10 +511,15 @@ defmodule Pleroma.Web.MastodonAPI.UpdateCredentialsTest do          |> json_response_and_validate_schema(200)        assert account_data["fields"] == [ -               %{"name" => "<a href=\"http://google.com\">foo</a>", "value" => "bar"}, +               %{ +                 "name" => "<a href=\"http://google.com\">foo</a>", +                 "value" => "bar", +                 "verified_at" => nil +               },                 %{                   "name" => "link.io", -                 "value" => ~S(<a href="http://cofe.io" rel="ugc">cofe.io</a>) +                 "value" => ~S(<a href="http://cofe.io" rel="ugc">cofe.io</a>), +                 "verified_at" => nil                 }               ] @@ -573,8 +578,8 @@ defmodule Pleroma.Web.MastodonAPI.UpdateCredentialsTest do          |> json_response_and_validate_schema(200)        assert account_data["fields"] == [ -               %{"name" => ":firefox:", "value" => "is best 2hu"}, -               %{"name" => "they wins", "value" => ":blank:"} +               %{"name" => ":firefox:", "value" => "is best 2hu", "verified_at" => nil}, +               %{"name" => "they wins", "value" => ":blank:", "verified_at" => nil}               ]        assert account_data["source"]["fields"] == [ @@ -602,10 +607,11 @@ defmodule Pleroma.Web.MastodonAPI.UpdateCredentialsTest do          |> json_response_and_validate_schema(200)        assert account["fields"] == [ -               %{"name" => "foo", "value" => "bar"}, +               %{"name" => "foo", "value" => "bar", "verified_at" => nil},                 %{                   "name" => "link", -                 "value" => ~S(<a href="http://cofe.io" rel="ugc">http://cofe.io</a>) +                 "value" => ~S(<a href="http://cofe.io" rel="ugc">http://cofe.io</a>), +                 "verified_at" => nil                 }               ] @@ -627,7 +633,7 @@ defmodule Pleroma.Web.MastodonAPI.UpdateCredentialsTest do          |> json_response_and_validate_schema(200)        assert account["fields"] == [ -               %{"name" => "foo", "value" => ""} +               %{"name" => "foo", "value" => "", "verified_at" => nil}               ]      end @@ -732,4 +738,20 @@ defmodule Pleroma.Web.MastodonAPI.UpdateCredentialsTest do        assert account["source"]["pleroma"]["actor_type"] == "Person"      end    end + +  describe "Mark account as group" do +    setup do: oauth_access(["write:accounts"]) +    setup :request_content_type + +    test "changing actor_type to Group makes account a Group and enables bot indicator for backward compatibility", +         %{conn: conn} do +      account = +        conn +        |> patch("/api/v1/accounts/update_credentials", %{actor_type: "Group"}) +        |> json_response_and_validate_schema(200) + +      assert account["bot"] +      assert account["source"]["pleroma"]["actor_type"] == "Group" +    end +  end  end diff --git a/test/pleroma/web/mastodon_api/views/poll_view_test.exs b/test/pleroma/web/mastodon_api/views/poll_view_test.exs index a73d862fd..3aa73c224 100644 --- a/test/pleroma/web/mastodon_api/views/poll_view_test.exs +++ b/test/pleroma/web/mastodon_api/views/poll_view_test.exs @@ -43,7 +43,8 @@ defmodule Pleroma.Web.MastodonAPI.PollViewTest do          %{title: "why are you even asking?", votes_count: 0}        ],        votes_count: 0, -      voters_count: 0 +      voters_count: 0, +      pleroma: %{non_anonymous: false}      }      result = PollView.render("show.json", %{object: object}) @@ -165,4 +166,11 @@ defmodule Pleroma.Web.MastodonAPI.PollViewTest do               ]             } = PollView.render("show.json", %{object: object})    end + +  test "that poll is non anonymous" do +    object = Object.normalize("https://friends.grishka.me/posts/54642", fetch: true) +    result = PollView.render("show.json", %{object: object}) + +    assert result[:pleroma][:non_anonymous] == true +  end  end diff --git a/test/pleroma/web/media_proxy/media_proxy_controller_test.exs b/test/pleroma/web/media_proxy/media_proxy_controller_test.exs index 5b3f5fbdc..f0c1dd640 100644 --- a/test/pleroma/web/media_proxy/media_proxy_controller_test.exs +++ b/test/pleroma/web/media_proxy/media_proxy_controller_test.exs @@ -182,7 +182,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        media_proxy_url: media_proxy_url      } do        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 500, body: ""}        end) @@ -197,7 +197,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        media_proxy_url: media_proxy_url      } do        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "application/pdf"}]}        end) @@ -217,7 +217,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        clear_config([:media_preview_proxy, :min_content_length], 1_000_000_000)        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{              status: 200,              body: "", @@ -242,7 +242,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do             media_proxy_url: media_proxy_url           } do        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "image/gif"}]}        end) @@ -260,7 +260,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do             media_proxy_url: media_proxy_url           } do        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "image/jpeg"}]}        end) @@ -280,7 +280,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        clear_config([:media_preview_proxy, :min_content_length], 100_000)        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{              status: 200,              body: "", @@ -302,7 +302,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        assert_dependencies_installed()        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "image/png"}]}          %{method: :get, url: ^media_proxy_url} -> @@ -324,7 +324,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        assert_dependencies_installed()        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "image/jpeg"}]}          %{method: :get, url: ^media_proxy_url} -> @@ -344,7 +344,7 @@ defmodule Pleroma.Web.MediaProxy.MediaProxyControllerTest do        media_proxy_url: media_proxy_url      } do        Tesla.Mock.mock(fn -        %{method: "HEAD", url: ^media_proxy_url} -> +        %{method: :head, url: ^media_proxy_url} ->            %Tesla.Env{status: 200, body: "", headers: [{"content-type", "image/jpeg"}]}          %{method: :get, url: ^media_proxy_url} -> diff --git a/test/pleroma/web/o_auth/mfa_controller_test.exs b/test/pleroma/web/o_auth/mfa_controller_test.exs index 62404c768..ac854e818 100644 --- a/test/pleroma/web/o_auth/mfa_controller_test.exs +++ b/test/pleroma/web/o_auth/mfa_controller_test.exs @@ -214,7 +214,7 @@ defmodule Pleroma.Web.OAuth.MFAControllerTest do        assert response == %{"error" => "Invalid code"}      end -    test "returns error when client credentails is wrong ", %{conn: conn, user: user} do +    test "returns error when client credentials is wrong ", %{conn: conn, user: user} do        otp_token = TOTP.generate_token(user.multi_factor_authentication_settings.totp.secret)        mfa_token = insert(:mfa_token, user: user) diff --git a/test/pleroma/web/o_auth/token/utils_test.exs b/test/pleroma/web/o_auth/token/utils_test.exs index e688ad750..f4027985d 100644 --- a/test/pleroma/web/o_auth/token/utils_test.exs +++ b/test/pleroma/web/o_auth/token/utils_test.exs @@ -13,7 +13,7 @@ defmodule Pleroma.Web.OAuth.Token.UtilsTest do                 Utils.fetch_app(%Plug.Conn{params: %{"client_id" => 1, "client_secret" => "x"}})      end -    test "returns App by params credentails" do +    test "returns App by params credentials" do        app = insert(:oauth_app)        assert {:ok, load_app} = @@ -24,7 +24,7 @@ defmodule Pleroma.Web.OAuth.Token.UtilsTest do        assert load_app == app      end -    test "returns App by header credentails" do +    test "returns App by header credentials" do        app = insert(:oauth_app)        header = "Basic " <> Base.encode64("#{app.client_id}:#{app.client_secret}") diff --git a/test/pleroma/web/pleroma_api/controllers/chat_controller_test.exs b/test/pleroma/web/pleroma_api/controllers/chat_controller_test.exs index 7138a6636..0d3452559 100644 --- a/test/pleroma/web/pleroma_api/controllers/chat_controller_test.exs +++ b/test/pleroma/web/pleroma_api/controllers/chat_controller_test.exs @@ -7,6 +7,7 @@ defmodule Pleroma.Web.PleromaAPI.ChatControllerTest do    alias Pleroma.Chat    alias Pleroma.Chat.MessageReference    alias Pleroma.Object +  alias Pleroma.Tests.Helpers    alias Pleroma.UnstubbedConfigMock, as: ConfigMock    alias Pleroma.User    alias Pleroma.Web.ActivityPub.ActivityPub @@ -212,36 +213,63 @@ defmodule Pleroma.Web.PleromaAPI.ChatControllerTest do        result = json_response_and_validate_schema(response, 200)        [next, prev] = get_resp_header(response, "link") |> hd() |> String.split(", ") -      api_endpoint = "/api/v1/pleroma/chats/" +      api_endpoint = Pleroma.Web.Endpoint.url() <> "/api/v1/pleroma/chats/" + +      [next_url, next_rel] = String.split(next, ";") +      next_url = String.trim_trailing(next_url, ">") |> String.trim_leading("<") + +      next_url_sorted = Helpers.uri_query_sort(next_url)        assert String.match?( -               next, -               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*; rel=\"next\"$) +               next_url_sorted, +               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*&offset=\d+$)               ) +      assert next_rel =~ "next" + +      [prev_url, prev_rel] = String.split(prev, ";") +      prev_url = String.trim_trailing(prev_url, ">") |> String.trim_leading("<") + +      prev_url_sorted = Helpers.uri_query_sort(prev_url) +        assert String.match?( -               prev, -               ~r(#{api_endpoint}.*/messages\?limit=\d+&min_id=.*; rel=\"prev\"$) +               prev_url_sorted, +               ~r(#{api_endpoint}.*/messages\?limit=\d+&min_id=.*&offset=\d+$)               ) +      assert prev_rel =~ "prev" +        assert length(result) == 20 -      response = -        get(conn, "/api/v1/pleroma/chats/#{chat.id}/messages?max_id=#{List.last(result)["id"]}") +      response = get(conn, "#{api_endpoint}#{chat.id}/messages?max_id=#{List.last(result)["id"]}")        result = json_response_and_validate_schema(response, 200)        [next, prev] = get_resp_header(response, "link") |> hd() |> String.split(", ") +      [next_url, next_rel] = String.split(next, ";") +      next_url = String.trim_trailing(next_url, ">") |> String.trim_leading("<") + +      next_url_sorted = Helpers.uri_query_sort(next_url) +        assert String.match?( -               next, -               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*; rel=\"next\"$) +               next_url_sorted, +               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*&offset=\d+$)               ) +      assert next_rel =~ "next" + +      [prev_url, prev_rel] = String.split(prev, ";") +      prev_url = String.trim_trailing(prev_url, ">") |> String.trim_leading("<") + +      prev_url_sorted = Helpers.uri_query_sort(prev_url) +        assert String.match?( -               prev, -               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*&min_id=.*; rel=\"prev\"$) +               prev_url_sorted, +               ~r(#{api_endpoint}.*/messages\?limit=\d+&max_id=.*&min_id=.*&offset=\d+$)               ) +      assert prev_rel =~ "prev" +        assert length(result) == 10      end diff --git a/test/pleroma/web/pleroma_api/controllers/emoji_pack_controller_test.exs b/test/pleroma/web/pleroma_api/controllers/emoji_pack_controller_test.exs index 1d5240639..92334487c 100644 --- a/test/pleroma/web/pleroma_api/controllers/emoji_pack_controller_test.exs +++ b/test/pleroma/web/pleroma_api/controllers/emoji_pack_controller_test.exs @@ -116,7 +116,7 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{method: :get, url: "https://example.com/nodeinfo/2.1.json"} ->            json(%{metadata: %{features: ["shareable_emoji_packs"]}}) -        %{method: :get, url: "https://example.com/api/pleroma/emoji/packs?page=2&page_size=1"} -> +        %{method: :get, url: "https://example.com/api/v1/pleroma/emoji/packs?page=2&page_size=1"} ->            json(resp)        end) @@ -199,7 +199,7 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/pack?name=test_pack" +          url: "https://example.com/api/v1/pleroma/emoji/pack?name=test_pack&page_size=" <> _n          } ->            conn            |> get("/api/pleroma/emoji/pack?name=test_pack") @@ -208,7 +208,7 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/packs/archive?name=test_pack" +          url: "https://example.com/api/v1/pleroma/emoji/packs/archive?name=test_pack"          } ->            conn            |> get("/api/pleroma/emoji/packs/archive?name=test_pack") @@ -217,7 +217,9 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/pack?name=test_pack_nonshared" +          url: +            "https://example.com/api/v1/pleroma/emoji/pack?name=test_pack_nonshared&page_size=" <> +                _n          } ->            conn            |> get("/api/pleroma/emoji/pack?name=test_pack_nonshared") @@ -305,14 +307,14 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/pack?name=pack_bad_sha" +          url: "https://example.com/api/v1/pleroma/emoji/pack?name=pack_bad_sha&page_size=" <> _n          } ->            {:ok, pack} = Pleroma.Emoji.Pack.load_pack("pack_bad_sha")            %Tesla.Env{status: 200, body: Jason.encode!(pack)}          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/packs/archive?name=pack_bad_sha" +          url: "https://example.com/api/v1/pleroma/emoji/packs/archive?name=pack_bad_sha"          } ->            %Tesla.Env{              status: 200, @@ -342,7 +344,7 @@ defmodule Pleroma.Web.PleromaAPI.EmojiPackControllerTest do          %{            method: :get, -          url: "https://example.com/api/pleroma/emoji/pack?name=test_pack" +          url: "https://example.com/api/v1/pleroma/emoji/pack?name=test_pack&page_size=" <> _n          } ->            {:ok, pack} = Pleroma.Emoji.Pack.load_pack("test_pack")            %Tesla.Env{status: 200, body: Jason.encode!(pack)} diff --git a/test/pleroma/web/pleroma_api/controllers/instances_controller_test.exs b/test/pleroma/web/pleroma_api/controllers/instances_controller_test.exs index 02afeda67..0d4951a73 100644 --- a/test/pleroma/web/pleroma_api/controllers/instances_controller_test.exs +++ b/test/pleroma/web/pleroma_api/controllers/instances_controller_test.exs @@ -16,7 +16,7 @@ defmodule Pleroma.Web.PleromaApi.InstancesControllerTest do      {:ok, %Pleroma.Instances.Instance{unreachable_since: constant_unreachable}} =        Instances.set_consistently_unreachable(constant) -    _eventual_unrechable = Instances.set_unreachable(eventual) +    _eventual_unreachable = Instances.set_unreachable(eventual)      %{constant_unreachable: constant_unreachable, constant: constant}    end diff --git a/test/pleroma/web/pleroma_api/views/chat_message_reference_view_test.exs b/test/pleroma/web/pleroma_api/views/chat_message_reference_view_test.exs index 44d40269c..c8b3cb391 100644 --- a/test/pleroma/web/pleroma_api/views/chat_message_reference_view_test.exs +++ b/test/pleroma/web/pleroma_api/views/chat_message_reference_view_test.exs @@ -49,6 +49,7 @@ defmodule Pleroma.Web.PleromaAPI.ChatMessageReferenceViewTest do        :chat_message_id_idempotency_key_cache, ^id -> {:ok, "123"}        cache, key -> NullCache.get(cache, key)      end) +    |> stub(:fetch, fn :rich_media_cache, _, _ -> {:ok, {:ok, %{}}} end)      chat_message = MessageReferenceView.render("show.json", chat_message_reference: cm_ref) diff --git a/test/pleroma/web/rich_media/helpers_test.exs b/test/pleroma/web/rich_media/helpers_test.exs index 3ef5705ce..13d2341ad 100644 --- a/test/pleroma/web/rich_media/helpers_test.exs +++ b/test/pleroma/web/rich_media/helpers_test.exs @@ -3,7 +3,7 @@  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.RichMedia.HelpersTest do -  use Pleroma.DataCase, async: true +  use Pleroma.DataCase, async: false    alias Pleroma.StaticStubbedConfigMock, as: ConfigMock    alias Pleroma.Web.CommonAPI @@ -14,7 +14,7 @@ defmodule Pleroma.Web.RichMedia.HelpersTest do    import Tesla.Mock    setup do -    mock(fn env -> apply(HttpRequestMock, :request, [env]) end) +    mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)      ConfigMock      |> stub(:get, fn @@ -83,8 +83,34 @@ defmodule Pleroma.Web.RichMedia.HelpersTest do               Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity)    end -  # This does not seem to work. The urls are being fetched. -  @tag skip: true +  test "recrawls URLs on updates" do +    original_url = "https://google.com/" +    updated_url = "https://yahoo.com/" + +    Pleroma.StaticStubbedConfigMock +    |> stub(:get, fn +      [:rich_media, :enabled] -> true +      path -> Pleroma.Test.StaticConfig.get(path) +    end) + +    user = insert(:user) +    {:ok, activity} = CommonAPI.post(user, %{status: "I like this site #{original_url}"}) + +    assert match?( +             %{page_url: ^original_url, rich_media: _}, +             Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity) +           ) + +    {:ok, _} = CommonAPI.update(user, activity, %{status: "I like this site #{updated_url}"}) + +    activity = Pleroma.Activity.get_by_id(activity.id) + +    assert match?( +             %{page_url: ^updated_url, rich_media: _}, +             Pleroma.Web.RichMedia.Helpers.fetch_data_for_activity(activity) +           ) +  end +    test "refuses to crawl URLs of private network from posts" do      user = insert(:user) @@ -102,10 +128,10 @@ defmodule Pleroma.Web.RichMedia.HelpersTest do        path -> Pleroma.Test.StaticConfig.get(path)      end) -    assert %{} = Helpers.fetch_data_for_activity(activity) -    assert %{} = Helpers.fetch_data_for_activity(activity2) -    assert %{} = Helpers.fetch_data_for_activity(activity3) -    assert %{} = Helpers.fetch_data_for_activity(activity4) -    assert %{} = Helpers.fetch_data_for_activity(activity5) +    assert %{} == Helpers.fetch_data_for_activity(activity) +    assert %{} == Helpers.fetch_data_for_activity(activity2) +    assert %{} == Helpers.fetch_data_for_activity(activity3) +    assert %{} == Helpers.fetch_data_for_activity(activity4) +    assert %{} == Helpers.fetch_data_for_activity(activity5)    end  end diff --git a/test/pleroma/web/rich_media/parser/ttl/aws_signed_url_test.exs b/test/pleroma/web/rich_media/parser/ttl/aws_signed_url_test.exs index 59b3330ba..b90f7d9e2 100644 --- a/test/pleroma/web/rich_media/parser/ttl/aws_signed_url_test.exs +++ b/test/pleroma/web/rich_media/parser/ttl/aws_signed_url_test.exs @@ -22,7 +22,7 @@ defmodule Pleroma.Web.RichMedia.Parser.TTL.AwsSignedUrlTest do      expire_time =        Timex.parse!(timestamp, "{ISO:Basic:Z}") |> Timex.to_unix() |> Kernel.+(valid_till) -    assert {:ok, expire_time} == Pleroma.Web.RichMedia.Parser.TTL.AwsSignedUrl.ttl(metadata, url) +    assert expire_time == Pleroma.Web.RichMedia.Parser.TTL.AwsSignedUrl.ttl(metadata, url)    end    test "s3 signed url is parsed and correct ttl is set for rich media" do diff --git a/test/pleroma/web/rich_media/parser_test.exs b/test/pleroma/web/rich_media/parser_test.exs index 9064138a6..a05b89a2b 100644 --- a/test/pleroma/web/rich_media/parser_test.exs +++ b/test/pleroma/web/rich_media/parser_test.exs @@ -3,95 +3,26 @@  # SPDX-License-Identifier: AGPL-3.0-only  defmodule Pleroma.Web.RichMedia.ParserTest do -  use ExUnit.Case, async: true +  use Pleroma.DataCase, async: false    alias Pleroma.Web.RichMedia.Parser -  setup do -    Tesla.Mock.mock(fn -      %{ -        method: :get, -        url: "http://example.com/ogp" -      } -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/ogp.html")} - -      %{ -        method: :get, -        url: "http://example.com/non-ogp" -      } -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/non_ogp_embed.html")} - -      %{ -        method: :get, -        url: "http://example.com/ogp-missing-title" -      } -> -        %Tesla.Env{ -          status: 200, -          body: File.read!("test/fixtures/rich_media/ogp-missing-title.html") -        } - -      %{ -        method: :get, -        url: "http://example.com/twitter-card" -      } -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/twitter_card.html")} - -      %{ -        method: :get, -        url: "http://example.com/oembed" -      } -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/oembed.html")} - -      %{ -        method: :get, -        url: "http://example.com/oembed.json" -      } -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/oembed.json")} - -      %{method: :get, url: "http://example.com/empty"} -> -        %Tesla.Env{status: 200, body: "hello"} +  import Tesla.Mock -      %{method: :get, url: "http://example.com/malformed"} -> -        %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/malformed-data.html")} - -      %{method: :get, url: "http://example.com/error"} -> -        {:error, :overload} - -      %{ -        method: :head, -        url: "http://example.com/huge-page" -      } -> -        %Tesla.Env{ -          status: 200, -          headers: [{"content-length", "2000001"}, {"content-type", "text/html"}] -        } - -      %{ -        method: :head, -        url: "http://example.com/pdf-file" -      } -> -        %Tesla.Env{ -          status: 200, -          headers: [{"content-length", "1000000"}, {"content-type", "application/pdf"}] -        } - -      %{method: :head} -> -        %Tesla.Env{status: 404, body: "", headers: []} -    end) - -    :ok +  setup do +    mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)    end    test "returns error when no metadata present" do -    assert {:error, _} = Parser.parse("http://example.com/empty") +    assert {:error, _} = Parser.parse("https://example.com/empty")    end    test "doesn't just add a title" do -    assert {:error, {:invalid_metadata, _}} = Parser.parse("http://example.com/non-ogp") +    assert {:error, {:invalid_metadata, _}} = Parser.parse("https://example.com/non-ogp")    end    test "parses ogp" do -    assert Parser.parse("http://example.com/ogp") == +    assert Parser.parse("https://example.com/ogp") ==               {:ok,                %{                  "image" => "http://ia.media-imdb.com/images/rock.jpg", @@ -99,12 +30,12 @@ defmodule Pleroma.Web.RichMedia.ParserTest do                  "description" =>                    "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer.",                  "type" => "video.movie", -                "url" => "http://example.com/ogp" +                "url" => "https://example.com/ogp"                }}    end    test "falls back to <title> when ogp:title is missing" do -    assert Parser.parse("http://example.com/ogp-missing-title") == +    assert Parser.parse("https://example.com/ogp-missing-title") ==               {:ok,                %{                  "image" => "http://ia.media-imdb.com/images/rock.jpg", @@ -112,12 +43,12 @@ defmodule Pleroma.Web.RichMedia.ParserTest do                  "description" =>                    "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer.",                  "type" => "video.movie", -                "url" => "http://example.com/ogp-missing-title" +                "url" => "https://example.com/ogp-missing-title"                }}    end    test "parses twitter card" do -    assert Parser.parse("http://example.com/twitter-card") == +    assert Parser.parse("https://example.com/twitter-card") ==               {:ok,                %{                  "card" => "summary", @@ -125,12 +56,12 @@ defmodule Pleroma.Web.RichMedia.ParserTest do                  "image" => "https://farm6.staticflickr.com/5510/14338202952_93595258ff_z.jpg",                  "title" => "Small Island Developing States Photo Submission",                  "description" => "View the album on Flickr.", -                "url" => "http://example.com/twitter-card" +                "url" => "https://example.com/twitter-card"                }}    end    test "parses OEmbed and filters HTML tags" do -    assert Parser.parse("http://example.com/oembed") == +    assert Parser.parse("https://example.com/oembed") ==               {:ok,                %{                  "author_name" => "\u202E\u202D\u202Cbees\u202C", @@ -150,7 +81,7 @@ defmodule Pleroma.Web.RichMedia.ParserTest do                  "thumbnail_width" => 150,                  "title" => "Bacon Lollys",                  "type" => "photo", -                "url" => "http://example.com/oembed", +                "url" => "https://example.com/oembed",                  "version" => "1.0",                  "web_page" => "https://www.flickr.com/photos/bees/2362225867/",                  "web_page_short_url" => "https://flic.kr/p/4AK2sc", @@ -159,18 +90,18 @@ defmodule Pleroma.Web.RichMedia.ParserTest do    end    test "rejects invalid OGP data" do -    assert {:error, _} = Parser.parse("http://example.com/malformed") +    assert {:error, _} = Parser.parse("https://example.com/malformed")    end    test "returns error if getting page was not successful" do -    assert {:error, :overload} = Parser.parse("http://example.com/error") +    assert {:error, :overload} = Parser.parse("https://example.com/error")    end    test "does a HEAD request to check if the body is too large" do -    assert {:error, :body_too_large} = Parser.parse("http://example.com/huge-page") +    assert {:error, :body_too_large} = Parser.parse("https://example.com/huge-page")    end    test "does a HEAD request to check if the body is html" do -    assert {:error, {:content_type, _}} = Parser.parse("http://example.com/pdf-file") +    assert {:error, {:content_type, _}} = Parser.parse("https://example.com/pdf-file")    end  end diff --git a/test/pleroma/web/twitter_api/remote_follow_controller_test.exs b/test/pleroma/web/twitter_api/remote_follow_controller_test.exs index 41f8ebcd7..c6ecb53f4 100644 --- a/test/pleroma/web/twitter_api/remote_follow_controller_test.exs +++ b/test/pleroma/web/twitter_api/remote_follow_controller_test.exs @@ -137,7 +137,7 @@ defmodule Pleroma.Web.TwitterAPI.RemoteFollowControllerTest do                   |> html_response(200)                 assert response =~ "Error fetching user" -             end) =~ "Object has been deleted" +             end) =~ ":not_found"      end    end diff --git a/test/pleroma/web/web_finger/web_finger_controller_test.exs b/test/pleroma/web/web_finger/web_finger_controller_test.exs index 5e3ac26f9..80e072163 100644 --- a/test/pleroma/web/web_finger/web_finger_controller_test.exs +++ b/test/pleroma/web/web_finger/web_finger_controller_test.exs @@ -23,8 +23,15 @@ defmodule Pleroma.Web.WebFinger.WebFingerControllerTest do      assert response.status == 200 -    assert response.resp_body == -             ~s(<?xml version="1.0" encoding="UTF-8"?><XRD xmlns="http://docs.oasis-open.org/ns/xri/xrd-1.0"><Link rel="lrdd" template="#{Pleroma.Web.Endpoint.url()}/.well-known/webfinger?resource={uri}" type="application/xrd+xml" /></XRD>) +    response_xml = +      response.resp_body +      |> Floki.parse_document!(html_parser: Floki.HTMLParser.Mochiweb, attributes_as_maps: true) + +    expected_xml = +      ~s(<?xml version="1.0" encoding="UTF-8"?><XRD xmlns="http://docs.oasis-open.org/ns/xri/xrd-1.0"><Link rel="lrdd" template="#{Pleroma.Web.Endpoint.url()}/.well-known/webfinger?resource={uri}" type="application/xrd+xml" /></XRD>) +      |> Floki.parse_document!(html_parser: Floki.HTMLParser.Mochiweb, attributes_as_maps: true) + +    assert match?(^response_xml, expected_xml)    end    test "Webfinger JRD" do @@ -48,12 +55,7 @@ defmodule Pleroma.Web.WebFinger.WebFingerControllerTest do             ]    end -  test "reach user on tld, while pleroma is runned on subdomain" do -    Pleroma.Web.Endpoint.config_change( -      [{Pleroma.Web.Endpoint, url: [host: "sub.example.com"]}], -      [] -    ) - +  test "reach user on tld, while pleroma is running on subdomain" do      clear_config([Pleroma.Web.Endpoint, :url, :host], "sub.example.com")      clear_config([Pleroma.Web.WebFinger, :domain], "example.com") @@ -68,13 +70,6 @@ defmodule Pleroma.Web.WebFinger.WebFingerControllerTest do      assert response["subject"] == "acct:#{user.nickname}@example.com"      assert response["aliases"] == ["https://sub.example.com/users/#{user.nickname}"] - -    on_exit(fn -> -      Pleroma.Web.Endpoint.config_change( -        [{Pleroma.Web.Endpoint, url: [host: "localhost"]}], -        [] -      ) -    end)    end    test "it returns 404 when user isn't found (JSON)" do diff --git a/test/pleroma/workers/remote_fetcher_worker_test.exs b/test/pleroma/workers/remote_fetcher_worker_test.exs new file mode 100644 index 000000000..c30e773d4 --- /dev/null +++ b/test/pleroma/workers/remote_fetcher_worker_test.exs @@ -0,0 +1,69 @@ +# Pleroma: A lightweight social networking server +# Copyright © 2017-2023 Pleroma Authors <https://pleroma.social/> +# SPDX-License-Identifier: AGPL-3.0-only + +defmodule Pleroma.Workers.RemoteFetcherWorkerTest do +  use Pleroma.DataCase +  use Oban.Testing, repo: Pleroma.Repo + +  alias Pleroma.Workers.RemoteFetcherWorker + +  @deleted_object_one "https://deleted-404.example.com/" +  @deleted_object_two "https://deleted-410.example.com/" +  @unauthorized_object "https://unauthorized.example.com/" +  @depth_object "https://depth.example.com/" + +  describe "RemoteFetcherWorker" do +    setup do +      Tesla.Mock.mock(fn +        %{method: :get, url: @deleted_object_one} -> +          %Tesla.Env{ +            status: 404 +          } + +        %{method: :get, url: @deleted_object_two} -> +          %Tesla.Env{ +            status: 410 +          } + +        %{method: :get, url: @unauthorized_object} -> +          %Tesla.Env{ +            status: 403 +          } + +        %{method: :get, url: @depth_object} -> +          %Tesla.Env{ +            status: 200 +          } +      end) +    end + +    test "does not requeue a deleted object" do +      assert {:discard, _} = +               RemoteFetcherWorker.perform(%Oban.Job{ +                 args: %{"op" => "fetch_remote", "id" => @deleted_object_one} +               }) + +      assert {:discard, _} = +               RemoteFetcherWorker.perform(%Oban.Job{ +                 args: %{"op" => "fetch_remote", "id" => @deleted_object_two} +               }) +    end + +    test "does not requeue an unauthorized object" do +      assert {:discard, _} = +               RemoteFetcherWorker.perform(%Oban.Job{ +                 args: %{"op" => "fetch_remote", "id" => @unauthorized_object} +               }) +    end + +    test "does not requeue an object that exceeded depth" do +      clear_config([:instance, :federation_incoming_replies_max_depth], 0) + +      assert {:discard, _} = +               RemoteFetcherWorker.perform(%Oban.Job{ +                 args: %{"op" => "fetch_remote", "id" => @depth_object, "depth" => 1} +               }) +    end +  end +end diff --git a/test/support/cachex_proxy.ex b/test/support/cachex_proxy.ex index 83ae5610f..8f27986a9 100644 --- a/test/support/cachex_proxy.ex +++ b/test/support/cachex_proxy.ex @@ -27,9 +27,15 @@ defmodule Pleroma.CachexProxy do    defdelegate fetch!(cache, key, func), to: Cachex    @impl true +  defdelegate fetch(cache, key, func), to: Cachex + +  @impl true    defdelegate expire_at(cache, str, num), to: Cachex    @impl true +  defdelegate expire(cache, str, num), to: Cachex + +  @impl true    defdelegate exists?(cache, key), to: Cachex    @impl true diff --git a/test/support/helpers.ex b/test/support/helpers.ex index e3bfa73d2..7fa6c31a4 100644 --- a/test/support/helpers.ex +++ b/test/support/helpers.ex @@ -10,6 +10,39 @@ defmodule Pleroma.Tests.Helpers do    require Logger +  @doc "Accepts two URLs/URIs and sorts the query parameters before comparing" +  def uri_equal?(a, b) do +    a_sorted = uri_query_sort(a) +    b_sorted = uri_query_sort(b) + +    match?(^a_sorted, b_sorted) +  end + +  @doc "Accepts a URL/URI and sorts the query parameters" +  def uri_query_sort(uri) do +    parsed = URI.parse(uri) + +    sorted_query = +      String.split(parsed.query, "&") +      |> Enum.sort() +      |> Enum.join("&") + +    parsed +    |> Map.put(:query, sorted_query) +    |> URI.to_string() +  end + +  @doc "Returns the value of the specified query parameter for the provided URL" +  def get_query_parameter(url, param) do +    url +    |> URI.parse() +    |> Map.get(:query) +    |> URI.query_decoder() +    |> Enum.to_list() +    |> Enum.into(%{}, fn {x, y} -> {x, y} end) +    |> Map.get(param) +  end +    defmacro clear_config(config_path) do      quote do        clear_config(unquote(config_path)) do diff --git a/test/support/http_request_mock.ex b/test/support/http_request_mock.ex index 11cc2eb94..f656c9412 100644 --- a/test/support/http_request_mock.ex +++ b/test/support/http_request_mock.ex @@ -178,7 +178,7 @@ defmodule HttpRequestMock do    end    def get( -        "https://social.heldscal.la/.well-known/webfinger?resource=nonexistant@social.heldscal.la", +        "https://social.heldscal.la/.well-known/webfinger?resource=nonexistent@social.heldscal.la",          _,          _,          [{"accept", "application/xrd+xml,application/jrd+json"}] @@ -186,7 +186,7 @@ defmodule HttpRequestMock do      {:ok,       %Tesla.Env{         status: 200, -       body: File.read!("test/fixtures/tesla_mock/nonexistant@social.heldscal.la.xml") +       body: File.read!("test/fixtures/tesla_mock/nonexistent@social.heldscal.la.xml")       }}    end @@ -1059,7 +1059,7 @@ defmodule HttpRequestMock do       }}    end -  def get("http://example.com/malformed", _, _, _) do +  def get("https://example.com/malformed", _, _, _) do      {:ok,       %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/malformed-data.html")}}    end @@ -1464,6 +1464,63 @@ defmodule HttpRequestMock do       }}    end +  def get("https://google.com/", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/google.html")}} +  end + +  def get("https://yahoo.com/", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/yahoo.html")}} +  end + +  def get("https://example.com/error", _, _, _), do: {:error, :overload} + +  def get("https://example.com/ogp-missing-title", _, _, _) do +    {:ok, +     %Tesla.Env{ +       status: 200, +       body: File.read!("test/fixtures/rich_media/ogp-missing-title.html") +     }} +  end + +  def get("https://example.com/oembed", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/oembed.html")}} +  end + +  def get("https://example.com/oembed.json", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/oembed.json")}} +  end + +  def get("https://example.com/twitter-card", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/twitter_card.html")}} +  end + +  def get("https://example.com/non-ogp", _, _, _) do +    {:ok, +     %Tesla.Env{status: 200, body: File.read!("test/fixtures/rich_media/non_ogp_embed.html")}} +  end + +  def get("https://example.com/empty", _, _, _) do +    {:ok, %Tesla.Env{status: 200, body: "hello"}} +  end + +  def get("https://friends.grishka.me/posts/54642", _, _, _) do +    {:ok, +     %Tesla.Env{ +       status: 200, +       body: File.read!("test/fixtures/tesla_mock/smithereen_non_anonymous_poll.json"), +       headers: activitypub_object_headers() +     }} +  end + +  def get("https://friends.grishka.me/users/1", _, _, _) do +    {:ok, +     %Tesla.Env{ +       status: 200, +       body: File.read!("test/fixtures/tesla_mock/smithereen_user.json"), +       headers: activitypub_object_headers() +     }} +  end +    def get(url, query, body, headers) do      {:error,       "Mock response not implemented for GET #{inspect(url)}, #{query}, #{inspect(body)}, #{inspect(headers)}"} @@ -1537,14 +1594,41 @@ defmodule HttpRequestMock do    # Most of the rich media mocks are missing HEAD requests, so we just return 404.    @rich_media_mocks [ +    "https://example.com/empty", +    "https://example.com/error", +    "https://example.com/malformed", +    "https://example.com/non-ogp", +    "https://example.com/oembed", +    "https://example.com/oembed.json",      "https://example.com/ogp",      "https://example.com/ogp-missing-data", -    "https://example.com/twitter-card" +    "https://example.com/ogp-missing-title", +    "https://example.com/twitter-card", +    "https://google.com/", +    "https://pleroma.local/notice/9kCP7V", +    "https://yahoo.com/"    ] +    def head(url, _query, _body, _headers) when url in @rich_media_mocks do      {:ok, %Tesla.Env{status: 404, body: ""}}    end +  def head("https://example.com/pdf-file", _, _, _) do +    {:ok, +     %Tesla.Env{ +       status: 200, +       headers: [{"content-length", "1000000"}, {"content-type", "application/pdf"}] +     }} +  end + +  def head("https://example.com/huge-page", _, _, _) do +    {:ok, +     %Tesla.Env{ +       status: 200, +       headers: [{"content-length", "2000001"}, {"content-type", "text/html"}] +     }} +  end +    def head(url, query, body, headers) do      {:error,       "Mock response not implemented for HEAD #{inspect(url)}, #{query}, #{inspect(body)}, #{inspect(headers)}"} diff --git a/test/support/null_cache.ex b/test/support/null_cache.ex index 9f1d45f1d..47c84174e 100644 --- a/test/support/null_cache.ex +++ b/test/support/null_cache.ex @@ -29,6 +29,9 @@ defmodule Pleroma.NullCache do    end    @impl true +  def fetch(_, key, func), do: func.(key) + +  @impl true    def get_and_update(_, _, func) do      func.(nil)    end @@ -37,6 +40,9 @@ defmodule Pleroma.NullCache do    def expire_at(_, _, _), do: {:ok, true}    @impl true +  def expire(_, _, _), do: {:ok, true} + +  @impl true    def exists?(_, _), do: {:ok, false}    @impl true diff --git a/test/test_helper.exs b/test/test_helper.exs index 27b777d5f..e65f7c1d1 100644 --- a/test/test_helper.exs +++ b/test/test_helper.exs @@ -6,6 +6,12 @@ Code.put_compiler_option(:warnings_as_errors, true)  ExUnit.start(exclude: [:federated, :erratic]) +if match?({:unix, :darwin}, :os.type()) do +  excluded = ExUnit.configuration() |> Keyword.get(:exclude, []) +  excluded = excluded ++ [:skip_darwin] +  ExUnit.configure(exclude: excluded) +end +  Ecto.Adapters.SQL.Sandbox.mode(Pleroma.Repo, :manual)  Mox.defmock(Pleroma.ReverseProxy.ClientMock, for: Pleroma.ReverseProxy.Client)  | 
