forked from AkkomaGang/akkoma
FloatingGhost
98cb255d12
OTP builds to 1.15 Changelog entry Ensure policies are fully loaded Fix :warn use main branch for linkify Fix warn in tests Migrations for phoenix 1.17 Revert "Migrations for phoenix 1.17" This reverts commit 6a3b2f15b74ea5e33150529385215b7a531f3999. Oban upgrade Add default empty whitelist mix format limit test to amd64 OTP 26 tests for 1.15 use OTP_VERSION tag baka just 1.15 Massive deps update Update locale, deps Mix format shell???? multiline??? ? max cases 1 use assert_recieve don't put_env in async tests don't async conn/fs tests mix format FIx some uploader issues Fix tests
1046 lines
37 KiB
Elixir
1046 lines
37 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.StreamerTest do
|
|
use Pleroma.DataCase
|
|
|
|
import Pleroma.Factory
|
|
|
|
alias Pleroma.Conversation.Participation
|
|
alias Pleroma.List
|
|
alias Pleroma.User
|
|
alias Pleroma.Web.CommonAPI
|
|
alias Pleroma.Web.Streamer
|
|
|
|
@moduletag needs_streamer: true, capture_log: true
|
|
|
|
setup do: clear_config([:instance, :skip_thread_containment])
|
|
|
|
describe "get_topic/_ (unauthenticated)" do
|
|
test "allows public" do
|
|
assert {:ok, "public"} = Streamer.get_topic("public", nil, nil)
|
|
assert {:ok, "public:local"} = Streamer.get_topic("public:local", nil, nil)
|
|
assert {:ok, "public:media"} = Streamer.get_topic("public:media", nil, nil)
|
|
assert {:ok, "public:local:media"} = Streamer.get_topic("public:local:media", nil, nil)
|
|
end
|
|
|
|
test "rejects local public streams if restricted_unauthenticated is on" do
|
|
clear_config([:restrict_unauthenticated, :timelines, :local], true)
|
|
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:local", nil, nil)
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:local:media", nil, nil)
|
|
end
|
|
|
|
test "rejects remote public streams if restricted_unauthenticated is on" do
|
|
clear_config([:restrict_unauthenticated, :timelines, :federated], true)
|
|
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public", nil, nil)
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:media", nil, nil)
|
|
|
|
assert {:error, :unauthorized} =
|
|
Streamer.get_topic("public:remote", nil, nil, %{"instance" => "lain.com"})
|
|
|
|
assert {:error, :unauthorized} =
|
|
Streamer.get_topic("public:remote:media", nil, nil, %{"instance" => "lain.com"})
|
|
end
|
|
|
|
test "allows instance streams" do
|
|
assert {:ok, "public:remote:lain.com"} =
|
|
Streamer.get_topic("public:remote", nil, nil, %{"instance" => "lain.com"})
|
|
|
|
assert {:ok, "public:remote:media:lain.com"} =
|
|
Streamer.get_topic("public:remote:media", nil, nil, %{"instance" => "lain.com"})
|
|
end
|
|
|
|
test "allows hashtag streams" do
|
|
assert {:ok, "hashtag:cofe"} = Streamer.get_topic("hashtag", nil, nil, %{"tag" => "cofe"})
|
|
end
|
|
|
|
test "disallows user streams" do
|
|
assert {:error, _} = Streamer.get_topic("user", nil, nil)
|
|
assert {:error, _} = Streamer.get_topic("user:notification", nil, nil)
|
|
assert {:error, _} = Streamer.get_topic("direct", nil, nil)
|
|
end
|
|
|
|
test "disallows list streams" do
|
|
assert {:error, _} = Streamer.get_topic("list", nil, nil, %{"list" => 42})
|
|
end
|
|
end
|
|
|
|
describe "get_topic/_ (authenticated)" do
|
|
setup do: oauth_access(["read"])
|
|
|
|
test "allows public streams (regardless of OAuth token scopes)", %{
|
|
user: user,
|
|
token: read_oauth_token
|
|
} do
|
|
with oauth_token <- [nil, read_oauth_token] do
|
|
assert {:ok, "public"} = Streamer.get_topic("public", user, oauth_token)
|
|
assert {:ok, "public:local"} = Streamer.get_topic("public:local", user, oauth_token)
|
|
assert {:ok, "public:media"} = Streamer.get_topic("public:media", user, oauth_token)
|
|
|
|
assert {:ok, "public:local:media"} =
|
|
Streamer.get_topic("public:local:media", user, oauth_token)
|
|
end
|
|
end
|
|
|
|
test "allows local public streams if restricted_unauthenticated is on", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
clear_config([:restrict_unauthenticated, :timelines, :local], true)
|
|
|
|
%{token: read_notifications_token} = oauth_access(["read:notifications"], user: user)
|
|
%{token: badly_scoped_token} = oauth_access(["irrelevant:scope"], user: user)
|
|
|
|
assert {:ok, "public:local"} = Streamer.get_topic("public:local", user, oauth_token)
|
|
|
|
assert {:ok, "public:local:media"} =
|
|
Streamer.get_topic("public:local:media", user, oauth_token)
|
|
|
|
for token <- [read_notifications_token, badly_scoped_token] do
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:local", user, token)
|
|
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:local:media", user, token)
|
|
end
|
|
end
|
|
|
|
test "allows remote public streams if restricted_unauthenticated is on", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
clear_config([:restrict_unauthenticated, :timelines, :federated], true)
|
|
|
|
%{token: read_notifications_token} = oauth_access(["read:notifications"], user: user)
|
|
%{token: badly_scoped_token} = oauth_access(["irrelevant:scope"], user: user)
|
|
|
|
assert {:ok, "public"} = Streamer.get_topic("public", user, oauth_token)
|
|
assert {:ok, "public:media"} = Streamer.get_topic("public:media", user, oauth_token)
|
|
|
|
assert {:ok, "public:remote:lain.com"} =
|
|
Streamer.get_topic("public:remote", user, oauth_token, %{"instance" => "lain.com"})
|
|
|
|
assert {:ok, "public:remote:media:lain.com"} =
|
|
Streamer.get_topic("public:remote:media", user, oauth_token, %{
|
|
"instance" => "lain.com"
|
|
})
|
|
|
|
for token <- [read_notifications_token, badly_scoped_token] do
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public", user, token)
|
|
assert {:error, :unauthorized} = Streamer.get_topic("public:media", user, token)
|
|
|
|
assert {:error, :unauthorized} =
|
|
Streamer.get_topic("public:remote", user, token, %{
|
|
"instance" => "lain.com"
|
|
})
|
|
|
|
assert {:error, :unauthorized} =
|
|
Streamer.get_topic("public:remote:media", user, token, %{
|
|
"instance" => "lain.com"
|
|
})
|
|
end
|
|
end
|
|
|
|
test "allows user streams (with proper OAuth token scopes)", %{
|
|
user: user,
|
|
token: read_oauth_token
|
|
} do
|
|
%{token: read_notifications_token} = oauth_access(["read:notifications"], user: user)
|
|
%{token: read_statuses_token} = oauth_access(["read:statuses"], user: user)
|
|
%{token: badly_scoped_token} = oauth_access(["irrelevant:scope"], user: user)
|
|
|
|
expected_user_topic = "user:#{user.id}"
|
|
expected_notification_topic = "user:notification:#{user.id}"
|
|
expected_direct_topic = "direct:#{user.id}"
|
|
|
|
for valid_user_token <- [read_oauth_token, read_statuses_token] do
|
|
assert {:ok, ^expected_user_topic} = Streamer.get_topic("user", user, valid_user_token)
|
|
|
|
assert {:ok, ^expected_direct_topic} =
|
|
Streamer.get_topic("direct", user, valid_user_token)
|
|
end
|
|
|
|
for invalid_user_token <- [read_notifications_token, badly_scoped_token],
|
|
user_topic <- ["user", "direct"] do
|
|
assert {:error, :unauthorized} = Streamer.get_topic(user_topic, user, invalid_user_token)
|
|
end
|
|
|
|
for valid_notification_token <- [read_oauth_token, read_notifications_token] do
|
|
assert {:ok, ^expected_notification_topic} =
|
|
Streamer.get_topic("user:notification", user, valid_notification_token)
|
|
end
|
|
|
|
for invalid_notification_token <- [read_statuses_token, badly_scoped_token] do
|
|
assert {:error, :unauthorized} =
|
|
Streamer.get_topic("user:notification", user, invalid_notification_token)
|
|
end
|
|
end
|
|
|
|
test "allows hashtag streams (regardless of OAuth token scopes)", %{
|
|
user: user,
|
|
token: read_oauth_token
|
|
} do
|
|
for oauth_token <- [nil, read_oauth_token] do
|
|
assert {:ok, "hashtag:cofe"} =
|
|
Streamer.get_topic("hashtag", user, oauth_token, %{"tag" => "cofe"})
|
|
end
|
|
end
|
|
|
|
test "disallows registering to another user's stream", %{user: user, token: read_oauth_token} do
|
|
another_user = insert(:user)
|
|
assert {:error, _} = Streamer.get_topic("user:#{another_user.id}", user, read_oauth_token)
|
|
|
|
assert {:error, _} =
|
|
Streamer.get_topic("user:notification:#{another_user.id}", user, read_oauth_token)
|
|
|
|
assert {:error, _} = Streamer.get_topic("direct:#{another_user.id}", user, read_oauth_token)
|
|
end
|
|
|
|
test "allows list stream that are owned by the user (with `read` or `read:lists` scopes)", %{
|
|
user: user,
|
|
token: read_oauth_token
|
|
} do
|
|
%{token: read_lists_token} = oauth_access(["read:lists"], user: user)
|
|
%{token: invalid_token} = oauth_access(["irrelevant:scope"], user: user)
|
|
{:ok, list} = List.create("Test", user)
|
|
|
|
assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, read_oauth_token)
|
|
|
|
for valid_token <- [read_oauth_token, read_lists_token] do
|
|
assert {:ok, _} = Streamer.get_topic("list", user, valid_token, %{"list" => list.id})
|
|
end
|
|
|
|
assert {:error, _} = Streamer.get_topic("list", user, invalid_token, %{"list" => list.id})
|
|
end
|
|
|
|
test "disallows list stream that are not owned by the user", %{user: user, token: oauth_token} do
|
|
another_user = insert(:user)
|
|
{:ok, list} = List.create("Test", another_user)
|
|
|
|
assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, oauth_token)
|
|
assert {:error, _} = Streamer.get_topic("list", user, oauth_token, %{"list" => list.id})
|
|
end
|
|
end
|
|
|
|
describe "user streams" do
|
|
setup do
|
|
%{user: user, token: token} = oauth_access(["read"])
|
|
notify = insert(:notification, user: user, activity: build(:note_activity))
|
|
{:ok, %{user: user, notify: notify, token: token}}
|
|
end
|
|
|
|
test "it streams the user's post in the 'user' stream", %{user: user, token: oauth_token} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey"})
|
|
|
|
stream_name = "user:#{user.id}"
|
|
assert_receive {:render_with_user, _, _, ^activity, ^stream_name}
|
|
refute Streamer.filtered_by_user?(user, activity)
|
|
end
|
|
|
|
test "it streams boosts of the user in the 'user' stream", %{user: user, token: oauth_token} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
|
|
other_user = insert(:user)
|
|
{:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
|
|
{:ok, announce} = CommonAPI.repeat(activity.id, user)
|
|
|
|
stream_name = "user:#{user.id}"
|
|
|
|
assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce,
|
|
^stream_name}
|
|
|
|
refute Streamer.filtered_by_user?(user, announce)
|
|
end
|
|
|
|
test "it does not stream announces of the user's own posts in the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
|
|
other_user = insert(:user)
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey"})
|
|
{:ok, announce} = CommonAPI.repeat(activity.id, other_user)
|
|
|
|
assert Streamer.filtered_by_user?(user, announce)
|
|
end
|
|
|
|
test "it does stream notifications announces of the user's own posts in the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
|
|
other_user = insert(:user)
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey"})
|
|
{:ok, announce} = CommonAPI.repeat(activity.id, other_user)
|
|
|
|
notification =
|
|
Pleroma.Notification
|
|
|> Repo.get_by(%{user_id: user.id, activity_id: announce.id})
|
|
|> Repo.preload(:activity)
|
|
|
|
refute Streamer.filtered_by_user?(user, notification)
|
|
end
|
|
|
|
test "it streams boosts of mastodon user in the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
|
|
other_user = insert(:user)
|
|
{:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
|
|
|
|
data =
|
|
File.read!("test/fixtures/mastodon-announce.json")
|
|
|> Jason.decode!()
|
|
|> Map.put("object", activity.data["object"])
|
|
|> Map.put("actor", user.ap_id)
|
|
|
|
{:ok, %Pleroma.Activity{data: _data, local: false} = announce} =
|
|
Pleroma.Web.ActivityPub.Transmogrifier.handle_incoming(data)
|
|
|
|
stream_name = "user:#{user.id}"
|
|
|
|
assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce,
|
|
^stream_name}
|
|
|
|
refute Streamer.filtered_by_user?(user, announce)
|
|
end
|
|
|
|
test "it sends notify to in the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token,
|
|
notify: notify
|
|
} do
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
Streamer.stream("user", notify)
|
|
|
|
assert_receive {:render_with_user, _, _, ^notify, "user"}
|
|
refute Streamer.filtered_by_user?(user, notify)
|
|
end
|
|
|
|
test "it sends notify to in the 'user:notification' stream", %{
|
|
user: user,
|
|
token: oauth_token,
|
|
notify: notify
|
|
} do
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
Streamer.stream("user:notification", notify)
|
|
|
|
assert_receive {:render_with_user, _, _, ^notify, "user:notification"}
|
|
refute Streamer.filtered_by_user?(user, notify)
|
|
end
|
|
|
|
test "it doesn't send notify to the 'user:notification' stream when a user is blocked", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
blocked = insert(:user)
|
|
{:ok, _user_relationship} = User.block(user, blocked)
|
|
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: ":("})
|
|
{:ok, _} = CommonAPI.favorite(blocked, activity.id)
|
|
|
|
refute_receive _
|
|
end
|
|
|
|
test "it doesn't send notify to the 'user:notification' stream when a thread is muted", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
user2 = insert(:user)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
|
|
{:ok, _} = CommonAPI.add_mute(user, activity)
|
|
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
|
|
{:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
|
|
|
|
refute_receive _
|
|
assert Streamer.filtered_by_user?(user, favorite_activity)
|
|
end
|
|
|
|
test "it sends favorite to 'user:notification' stream'", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
{:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
|
|
|
|
assert_receive {:render_with_user, _, "notification.json", notif, "user:notification"}
|
|
assert notif.activity.id == favorite_activity.id
|
|
refute Streamer.filtered_by_user?(user, notif)
|
|
end
|
|
|
|
test "it doesn't send the 'user:notification' stream' when a domain is blocked", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
|
|
|
|
{:ok, user} = User.block_domain(user, "hecking-lewd-place.com")
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
{:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
|
|
|
|
refute_receive _
|
|
assert Streamer.filtered_by_user?(user, favorite_activity)
|
|
end
|
|
|
|
test "it sends follow activities to the 'user:notification' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
user2 = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
|
|
{:ok, _follower, _followed, follow_activity} = CommonAPI.follow(user2, user)
|
|
|
|
assert_receive {:render_with_user, _, "notification.json", notif, "user:notification"}
|
|
assert notif.activity.id == follow_activity.id
|
|
refute Streamer.filtered_by_user?(user, notif)
|
|
end
|
|
|
|
test "it sends follow relationships updates to the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
user_id = user.id
|
|
other_user = insert(:user)
|
|
other_user_id = other_user.id
|
|
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
{:ok, _follower, _followed, _follow_activity} = CommonAPI.follow(user, other_user)
|
|
|
|
assert_receive {:text, event}
|
|
|
|
assert %{"event" => "pleroma:follow_relationships_update", "payload" => payload} =
|
|
Jason.decode!(event)
|
|
|
|
assert %{
|
|
"follower" => %{
|
|
"follower_count" => 0,
|
|
"following_count" => 0,
|
|
"id" => ^user_id
|
|
},
|
|
"following" => %{
|
|
"follower_count" => 0,
|
|
"following_count" => 0,
|
|
"id" => ^other_user_id
|
|
},
|
|
"state" => "follow_pending"
|
|
} = Jason.decode!(payload)
|
|
|
|
assert_receive {:text, event}
|
|
|
|
assert %{"event" => "pleroma:follow_relationships_update", "payload" => payload} =
|
|
Jason.decode!(event)
|
|
|
|
assert %{
|
|
"follower" => %{
|
|
"follower_count" => 0,
|
|
"following_count" => 1,
|
|
"id" => ^user_id
|
|
},
|
|
"following" => %{
|
|
"follower_count" => 1,
|
|
"following_count" => 0,
|
|
"id" => ^other_user_id
|
|
},
|
|
"state" => "follow_accept"
|
|
} = Jason.decode!(payload)
|
|
end
|
|
|
|
test "it streams edits in the 'user' stream", %{user: user, token: oauth_token} do
|
|
sender = insert(:user)
|
|
{:ok, _, _, _} = CommonAPI.follow(user, sender)
|
|
|
|
{:ok, activity} = CommonAPI.post(sender, %{status: "hey"})
|
|
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
{:ok, edited} = CommonAPI.update(sender, activity, %{status: "mew mew"})
|
|
create = Pleroma.Activity.get_create_by_object_ap_id_with_object(activity.object.data["id"])
|
|
|
|
stream = "user:#{user.id}"
|
|
assert_receive {:render_with_user, _, "status_update.json", ^create, ^stream}
|
|
refute Streamer.filtered_by_user?(user, edited)
|
|
end
|
|
|
|
test "it streams own edits in the 'user' stream", %{user: user, token: oauth_token} do
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "hey"})
|
|
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
{:ok, edited} = CommonAPI.update(user, activity, %{status: "mew mew"})
|
|
create = Pleroma.Activity.get_create_by_object_ap_id_with_object(activity.object.data["id"])
|
|
|
|
stream = "user:#{user.id}"
|
|
assert_receive {:render_with_user, _, "status_update.json", ^create, ^stream}
|
|
refute Streamer.filtered_by_user?(user, edited)
|
|
end
|
|
|
|
test "it streams posts containing followed hashtags on the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
hashtag = insert(:hashtag, %{name: "tenshi"})
|
|
other_user = insert(:user)
|
|
{:ok, user} = User.follow_hashtag(user, hashtag)
|
|
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
{:ok, activity} = CommonAPI.post(other_user, %{status: "hey #tenshi"})
|
|
|
|
assert_receive {:render_with_user, _, "update.json", ^activity, _}
|
|
end
|
|
|
|
test "should not stream private posts containing followed hashtags on the 'user' stream", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
hashtag = insert(:hashtag, %{name: "tenshi"})
|
|
other_user = insert(:user)
|
|
{:ok, user} = User.follow_hashtag(user, hashtag)
|
|
|
|
Streamer.get_topic_and_add_socket("user", user, oauth_token)
|
|
|
|
{:ok, activity} =
|
|
CommonAPI.post(other_user, %{status: "hey #tenshi", visibility: "private"})
|
|
|
|
refute_receive {:render_with_user, _, "update.json", ^activity, _}
|
|
end
|
|
end
|
|
|
|
describe "public streams" do
|
|
test "it sends to public (authenticated)" do
|
|
%{user: user, token: oauth_token} = oauth_access(["read"])
|
|
other_user = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
|
|
{:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
|
|
assert_receive {:render_with_user, _, _, ^activity, "public"}
|
|
refute Streamer.filtered_by_user?(other_user, activity)
|
|
end
|
|
|
|
test "it sends to public (unauthenticated)" do
|
|
user = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", nil, nil)
|
|
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "Test"})
|
|
activity_id = activity.id
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "update", "payload" => payload} = Jason.decode!(event)
|
|
assert %{"id" => ^activity_id} = Jason.decode!(payload)
|
|
|
|
{:ok, _} = CommonAPI.delete(activity.id, user)
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
|
|
end
|
|
|
|
test "handles deletions" do
|
|
%{user: user, token: oauth_token} = oauth_access(["read"])
|
|
other_user = insert(:user)
|
|
{:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
|
|
{:ok, _} = CommonAPI.delete(activity.id, other_user)
|
|
activity_id = activity.id
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
|
|
end
|
|
|
|
test "it streams edits in the 'public' stream" do
|
|
sender = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", nil, nil)
|
|
{:ok, activity} = CommonAPI.post(sender, %{status: "hey"})
|
|
assert_receive {:text, _}
|
|
|
|
{:ok, edited} = CommonAPI.update(sender, activity, %{status: "mew mew"})
|
|
|
|
edited = Pleroma.Activity.normalize(edited)
|
|
|
|
%{id: activity_id} = Pleroma.Activity.get_create_by_object_ap_id(edited.object.data["id"])
|
|
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "status.update", "payload" => payload} = Jason.decode!(event)
|
|
assert %{"id" => ^activity_id} = Jason.decode!(payload)
|
|
refute Streamer.filtered_by_user?(sender, edited)
|
|
end
|
|
|
|
test "it streams multiple edits in the 'public' stream correctly" do
|
|
sender = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", nil, nil)
|
|
{:ok, activity} = CommonAPI.post(sender, %{status: "hey"})
|
|
assert_receive {:text, _}
|
|
|
|
{:ok, edited} = CommonAPI.update(sender, activity, %{status: "mew mew"})
|
|
|
|
edited = Pleroma.Activity.normalize(edited)
|
|
|
|
%{id: activity_id} = Pleroma.Activity.get_create_by_object_ap_id(edited.object.data["id"])
|
|
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "status.update", "payload" => payload} = Jason.decode!(event)
|
|
assert %{"id" => ^activity_id} = Jason.decode!(payload)
|
|
refute Streamer.filtered_by_user?(sender, edited)
|
|
|
|
{:ok, edited} = CommonAPI.update(sender, activity, %{status: "mew mew 2"})
|
|
|
|
edited = Pleroma.Activity.normalize(edited)
|
|
|
|
%{id: activity_id} = Pleroma.Activity.get_create_by_object_ap_id(edited.object.data["id"])
|
|
assert_receive {:text, event}
|
|
assert %{"event" => "status.update", "payload" => payload} = Jason.decode!(event)
|
|
assert %{"id" => ^activity_id, "content" => "mew mew 2"} = Jason.decode!(payload)
|
|
refute Streamer.filtered_by_user?(sender, edited)
|
|
end
|
|
end
|
|
|
|
describe "thread_containment/2" do
|
|
test "it filters to user if recipients invalid and thread containment is enabled" do
|
|
clear_config([:instance, :skip_thread_containment], false)
|
|
author = insert(:user)
|
|
%{user: user, token: oauth_token} = oauth_access(["read"])
|
|
User.follow(user, author, :follow_accept)
|
|
|
|
activity =
|
|
insert(:note_activity,
|
|
note:
|
|
insert(:note,
|
|
user: author,
|
|
data: %{"to" => ["TEST-FFF"]}
|
|
)
|
|
)
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
Streamer.stream("public", activity)
|
|
assert_receive {:render_with_user, _, _, ^activity, "public"}
|
|
assert Streamer.filtered_by_user?(user, activity)
|
|
end
|
|
|
|
test "it sends message if recipients invalid and thread containment is disabled" do
|
|
clear_config([:instance, :skip_thread_containment], true)
|
|
author = insert(:user)
|
|
%{user: user, token: oauth_token} = oauth_access(["read"])
|
|
User.follow(user, author, :follow_accept)
|
|
|
|
activity =
|
|
insert(:note_activity,
|
|
note:
|
|
insert(:note,
|
|
user: author,
|
|
data: %{"to" => ["TEST-FFF"]}
|
|
)
|
|
)
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
Streamer.stream("public", activity)
|
|
|
|
assert_receive {:render_with_user, _, _, ^activity, "public"}
|
|
refute Streamer.filtered_by_user?(user, activity)
|
|
end
|
|
|
|
test "it sends message if recipients invalid and thread containment is enabled but user's thread containment is disabled" do
|
|
clear_config([:instance, :skip_thread_containment], false)
|
|
author = insert(:user)
|
|
user = insert(:user, skip_thread_containment: true)
|
|
%{token: oauth_token} = oauth_access(["read"], user: user)
|
|
User.follow(user, author, :follow_accept)
|
|
|
|
activity =
|
|
insert(:note_activity,
|
|
note:
|
|
insert(:note,
|
|
user: author,
|
|
data: %{"to" => ["TEST-FFF"]}
|
|
)
|
|
)
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
Streamer.stream("public", activity)
|
|
|
|
assert_receive {:render_with_user, _, _, ^activity, "public"}
|
|
refute Streamer.filtered_by_user?(user, activity)
|
|
end
|
|
end
|
|
|
|
describe "blocks" do
|
|
setup do: oauth_access(["read"])
|
|
|
|
test "it filters messages involving blocked users", %{user: user, token: oauth_token} do
|
|
blocked_user = insert(:user)
|
|
{:ok, _user_relationship} = User.block(user, blocked_user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", user, oauth_token)
|
|
{:ok, activity} = CommonAPI.post(blocked_user, %{status: "Test"})
|
|
assert_receive {:render_with_user, _, _, ^activity, "public"}
|
|
assert Streamer.filtered_by_user?(user, activity)
|
|
end
|
|
|
|
test "it filters messages transitively involving blocked users", %{
|
|
user: blocker,
|
|
token: blocker_token
|
|
} do
|
|
blockee = insert(:user)
|
|
friend = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("public", blocker, blocker_token)
|
|
|
|
{:ok, _user_relationship} = User.block(blocker, blockee)
|
|
|
|
{:ok, activity_one} = CommonAPI.post(friend, %{status: "hey! @#{blockee.nickname}"})
|
|
|
|
assert_receive {:render_with_user, _, _, ^activity_one, "public"}
|
|
assert Streamer.filtered_by_user?(blocker, activity_one)
|
|
|
|
{:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
|
|
|
|
assert_receive {:render_with_user, _, _, ^activity_two, "public"}
|
|
assert Streamer.filtered_by_user?(blocker, activity_two)
|
|
|
|
{:ok, activity_three} = CommonAPI.post(blockee, %{status: "hey! @#{blocker.nickname}"})
|
|
|
|
assert_receive {:render_with_user, _, _, ^activity_three, "public"}
|
|
assert Streamer.filtered_by_user?(blocker, activity_three)
|
|
end
|
|
end
|
|
|
|
describe "lists" do
|
|
setup do: oauth_access(["read"])
|
|
|
|
test "it doesn't send unwanted DMs to list", %{user: user_a, token: user_a_token} do
|
|
user_b = insert(:user)
|
|
user_c = insert(:user)
|
|
|
|
{:ok, user_a, user_b} = User.follow(user_a, user_b)
|
|
|
|
{:ok, list} = List.create("Test", user_a)
|
|
{:ok, list} = List.follow(list, user_b)
|
|
|
|
Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
|
|
|
|
{:ok, _activity} =
|
|
CommonAPI.post(user_b, %{
|
|
status: "@#{user_c.nickname} Test",
|
|
visibility: "direct"
|
|
})
|
|
|
|
refute_receive _
|
|
end
|
|
|
|
test "it doesn't send unwanted private posts to list", %{user: user_a, token: user_a_token} do
|
|
user_b = insert(:user)
|
|
|
|
{:ok, list} = List.create("Test", user_a)
|
|
{:ok, list} = List.follow(list, user_b)
|
|
|
|
Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
|
|
|
|
{:ok, _activity} =
|
|
CommonAPI.post(user_b, %{
|
|
status: "Test",
|
|
visibility: "private"
|
|
})
|
|
|
|
refute_receive _
|
|
end
|
|
|
|
test "it sends wanted private posts to list", %{user: user_a, token: user_a_token} do
|
|
user_b = insert(:user)
|
|
|
|
{:ok, user_a, user_b} = User.follow(user_a, user_b)
|
|
|
|
{:ok, list} = List.create("Test", user_a)
|
|
{:ok, list} = List.follow(list, user_b)
|
|
|
|
Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
|
|
|
|
{:ok, activity} =
|
|
CommonAPI.post(user_b, %{
|
|
status: "Test",
|
|
visibility: "private"
|
|
})
|
|
|
|
stream_name = "list:#{list.id}"
|
|
assert_receive {:render_with_user, _, _, ^activity, ^stream_name}
|
|
refute Streamer.filtered_by_user?(user_a, activity)
|
|
end
|
|
end
|
|
|
|
describe "muted reblogs" do
|
|
setup do: oauth_access(["read"])
|
|
|
|
test "it filters muted reblogs", %{user: user1, token: user1_token} do
|
|
user2 = insert(:user)
|
|
user3 = insert(:user)
|
|
CommonAPI.follow(user1, user2)
|
|
CommonAPI.hide_reblogs(user1, user2)
|
|
|
|
{:ok, create_activity} = CommonAPI.post(user3, %{status: "I'm kawen"})
|
|
|
|
Streamer.get_topic_and_add_socket("user", user1, user1_token)
|
|
{:ok, announce_activity} = CommonAPI.repeat(create_activity.id, user2)
|
|
stream_name = "user:#{user1.id}"
|
|
assert_receive {:render_with_user, _, _, ^announce_activity, ^stream_name}
|
|
assert Streamer.filtered_by_user?(user1, announce_activity)
|
|
end
|
|
|
|
test "it filters reblog notification for reblog-muted actors", %{
|
|
user: user1,
|
|
token: user1_token
|
|
} do
|
|
user2 = insert(:user)
|
|
CommonAPI.follow(user1, user2)
|
|
CommonAPI.hide_reblogs(user1, user2)
|
|
|
|
{:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
|
|
Streamer.get_topic_and_add_socket("user", user1, user1_token)
|
|
{:ok, _announce_activity} = CommonAPI.repeat(create_activity.id, user2)
|
|
|
|
assert_receive {:render_with_user, _, "notification.json", notif, "user"}
|
|
assert Streamer.filtered_by_user?(user1, notif)
|
|
end
|
|
|
|
test "it send non-reblog notification for reblog-muted actors", %{
|
|
user: user1,
|
|
token: user1_token
|
|
} do
|
|
user2 = insert(:user)
|
|
CommonAPI.follow(user1, user2)
|
|
CommonAPI.hide_reblogs(user1, user2)
|
|
|
|
{:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
|
|
Streamer.get_topic_and_add_socket("user", user1, user1_token)
|
|
{:ok, _favorite_activity} = CommonAPI.favorite(user2, create_activity.id)
|
|
|
|
assert_receive {:render_with_user, _, "notification.json", notif, "user"}
|
|
refute Streamer.filtered_by_user?(user1, notif)
|
|
end
|
|
end
|
|
|
|
describe "muted threads" do
|
|
test "it filters posts from muted threads" do
|
|
user = insert(:user)
|
|
%{user: user2, token: user2_token} = oauth_access(["read"])
|
|
Streamer.get_topic_and_add_socket("user", user2, user2_token)
|
|
|
|
{:ok, user2, user, _activity} = CommonAPI.follow(user2, user)
|
|
{:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
|
|
{:ok, _} = CommonAPI.add_mute(user2, activity)
|
|
|
|
stream_name = "user:#{user2.id}"
|
|
assert_receive {:render_with_user, _, _, ^activity, ^stream_name}
|
|
assert Streamer.filtered_by_user?(user2, activity)
|
|
end
|
|
end
|
|
|
|
describe "direct streams" do
|
|
setup do: oauth_access(["read"])
|
|
|
|
test "it sends conversation update to the 'direct' stream", %{user: user, token: oauth_token} do
|
|
another_user = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("direct", user, oauth_token)
|
|
|
|
{:ok, _create_activity} =
|
|
CommonAPI.post(another_user, %{
|
|
status: "hey @#{user.nickname}",
|
|
visibility: "direct"
|
|
})
|
|
|
|
assert_receive {:text, received_event}
|
|
|
|
assert %{"event" => "conversation", "payload" => received_payload} =
|
|
Jason.decode!(received_event)
|
|
|
|
assert %{"last_status" => last_status} = Jason.decode!(received_payload)
|
|
[participation] = Participation.for_user(user)
|
|
assert last_status["pleroma"]["direct_conversation_id"] == participation.id
|
|
end
|
|
|
|
test "it doesn't send conversation update to the 'direct' stream when the last message in the conversation is deleted",
|
|
%{user: user, token: oauth_token} do
|
|
another_user = insert(:user)
|
|
|
|
Streamer.get_topic_and_add_socket("direct", user, oauth_token)
|
|
|
|
{:ok, create_activity} =
|
|
CommonAPI.post(another_user, %{
|
|
status: "hi @#{user.nickname}",
|
|
visibility: "direct"
|
|
})
|
|
|
|
create_activity_id = create_activity.id
|
|
stream_name = "direct:#{user.id}"
|
|
assert_receive {:render_with_user, _, _, ^create_activity, ^stream_name}
|
|
assert_receive {:text, received_conversation1}
|
|
assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
|
|
|
|
{:ok, _} = CommonAPI.delete(create_activity_id, another_user)
|
|
|
|
assert_receive {:text, received_event}
|
|
|
|
assert %{"event" => "delete", "payload" => ^create_activity_id} =
|
|
Jason.decode!(received_event)
|
|
|
|
refute_receive _
|
|
end
|
|
|
|
@tag :erratic
|
|
test "it sends conversation update to the 'direct' stream when a message is deleted", %{
|
|
user: user,
|
|
token: oauth_token
|
|
} do
|
|
another_user = insert(:user)
|
|
Streamer.get_topic_and_add_socket("direct", user, oauth_token)
|
|
|
|
{:ok, create_activity} =
|
|
CommonAPI.post(another_user, %{
|
|
status: "hi @#{user.nickname}",
|
|
visibility: "direct"
|
|
})
|
|
|
|
{:ok, create_activity2} =
|
|
CommonAPI.post(another_user, %{
|
|
status: "hi @#{user.nickname} 2",
|
|
in_reply_to_status_id: create_activity.id,
|
|
visibility: "direct"
|
|
})
|
|
|
|
stream_name = "direct:#{user.id}"
|
|
assert_receive {:render_with_user, _, _, ^create_activity, ^stream_name}
|
|
assert_receive {:render_with_user, _, _, ^create_activity2, ^stream_name}
|
|
assert_receive {:text, received_conversation1}
|
|
assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
|
|
assert_receive {:text, received_conversation1}
|
|
assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
|
|
|
|
{:ok, _} = CommonAPI.delete(create_activity2.id, another_user)
|
|
|
|
assert_receive {:text, received_event}
|
|
assert %{"event" => "delete", "payload" => _} = Jason.decode!(received_event)
|
|
|
|
assert_receive {:text, received_event}
|
|
|
|
assert %{"event" => "conversation", "payload" => received_payload} =
|
|
Jason.decode!(received_event)
|
|
|
|
assert %{"last_status" => last_status} = Jason.decode!(received_payload)
|
|
assert last_status["id"] == to_string(create_activity.id)
|
|
end
|
|
end
|
|
|
|
describe "stop streaming if token got revoked" do
|
|
setup do
|
|
child_proc = fn start, finalize ->
|
|
fn ->
|
|
start.()
|
|
|
|
receive do
|
|
{StreamerTest, :ready} ->
|
|
assert_receive {:render_with_user, _, "update.json", _, _}
|
|
|
|
receive do
|
|
{StreamerTest, :revoked} -> finalize.()
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
starter = fn user, token ->
|
|
fn -> Streamer.get_topic_and_add_socket("user", user, token) end
|
|
end
|
|
|
|
hit = fn -> assert_receive :close end
|
|
miss = fn -> refute_receive :close end
|
|
|
|
send_all = fn tasks, thing -> Enum.each(tasks, &send(&1.pid, thing)) end
|
|
|
|
%{
|
|
child_proc: child_proc,
|
|
starter: starter,
|
|
hit: hit,
|
|
miss: miss,
|
|
send_all: send_all
|
|
}
|
|
end
|
|
|
|
test "do not revoke other tokens", %{
|
|
child_proc: child_proc,
|
|
starter: starter,
|
|
hit: hit,
|
|
miss: miss,
|
|
send_all: send_all
|
|
} do
|
|
%{user: user, token: token} = oauth_access(["read"])
|
|
%{token: token2} = oauth_access(["read"], user: user)
|
|
%{user: user2, token: user2_token} = oauth_access(["read"])
|
|
|
|
post_user = insert(:user)
|
|
CommonAPI.follow(user, post_user)
|
|
CommonAPI.follow(user2, post_user)
|
|
|
|
tasks = [
|
|
Task.async(child_proc.(starter.(user, token), hit)),
|
|
Task.async(child_proc.(starter.(user, token2), miss)),
|
|
Task.async(child_proc.(starter.(user2, user2_token), miss))
|
|
]
|
|
|
|
{:ok, _} =
|
|
CommonAPI.post(post_user, %{
|
|
status: "hi"
|
|
})
|
|
|
|
send_all.(tasks, {StreamerTest, :ready})
|
|
|
|
Pleroma.Web.OAuth.Token.Strategy.Revoke.revoke(token)
|
|
|
|
send_all.(tasks, {StreamerTest, :revoked})
|
|
|
|
Enum.each(tasks, &Task.await/1)
|
|
end
|
|
|
|
test "revoke all streams for this token", %{
|
|
child_proc: child_proc,
|
|
starter: starter,
|
|
hit: hit,
|
|
send_all: send_all
|
|
} do
|
|
%{user: user, token: token} = oauth_access(["read"])
|
|
|
|
post_user = insert(:user)
|
|
CommonAPI.follow(user, post_user)
|
|
|
|
tasks = [
|
|
Task.async(child_proc.(starter.(user, token), hit)),
|
|
Task.async(child_proc.(starter.(user, token), hit))
|
|
]
|
|
|
|
{:ok, _} =
|
|
CommonAPI.post(post_user, %{
|
|
status: "hi"
|
|
})
|
|
|
|
send_all.(tasks, {StreamerTest, :ready})
|
|
|
|
Pleroma.Web.OAuth.Token.Strategy.Revoke.revoke(token)
|
|
|
|
send_all.(tasks, {StreamerTest, :revoked})
|
|
|
|
Enum.each(tasks, &Task.await/1)
|
|
end
|
|
end
|
|
end
|