2019-12-20 13:34:14 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-13 06:49:20 +00:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2019-12-20 13:34:14 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.Web.TwitterAPI.RemoteFollowControllerTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
|
|
|
|
2020-05-07 08:14:54 +00:00
|
|
|
alias Pleroma.MFA
|
|
|
|
alias Pleroma.MFA.TOTP
|
2019-12-20 13:34:14 +00:00
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.CommonAPI
|
2020-02-22 16:48:41 +00:00
|
|
|
|
2019-12-20 13:34:14 +00:00
|
|
|
import ExUnit.CaptureLog
|
|
|
|
import Pleroma.Factory
|
2020-05-07 08:14:54 +00:00
|
|
|
import Ecto.Query
|
2019-12-20 13:34:14 +00:00
|
|
|
|
2020-03-20 15:33:00 +00:00
|
|
|
setup_all do: clear_config([:instance, :federating], true)
|
|
|
|
setup do: clear_config([:user, :deny_follow_blocked])
|
2019-12-20 13:34:14 +00:00
|
|
|
|
|
|
|
describe "GET /ostatus_subscribe - remote_follow/2" do
|
|
|
|
test "adds status to pleroma instance if the `acct` is a status", %{conn: conn} do
|
2020-12-21 14:05:56 +00:00
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie/statuses/101849165031453009"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body: File.read!("test/fixtures/tesla_mock/status.emelie.json")
|
|
|
|
}
|
|
|
|
|
2021-02-03 13:09:28 +00:00
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie/collections/featured"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body:
|
|
|
|
File.read!("test/fixtures/users_mock/masto_featured.json")
|
|
|
|
|> String.replace("{{domain}}", "mastodon.social")
|
|
|
|
|> String.replace("{{nickname}}", "emelie")
|
|
|
|
}
|
|
|
|
|
2020-12-21 14:05:56 +00:00
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body: File.read!("test/fixtures/tesla_mock/emelie.json")
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
2019-12-22 18:17:19 +00:00
|
|
|
assert conn
|
|
|
|
|> get(
|
|
|
|
remote_follow_path(conn, :follow, %{
|
|
|
|
acct: "https://mastodon.social/users/emelie/statuses/101849165031453009"
|
|
|
|
})
|
|
|
|
)
|
|
|
|
|> redirected_to() =~ "/notice/"
|
2019-12-20 13:34:14 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
test "show follow account page if the `acct` is a account link", %{conn: conn} do
|
2020-12-21 14:05:56 +00:00
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body: File.read!("test/fixtures/tesla_mock/emelie.json")
|
|
|
|
}
|
2021-02-03 13:09:28 +00:00
|
|
|
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie/collections/featured"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body:
|
|
|
|
File.read!("test/fixtures/users_mock/masto_featured.json")
|
|
|
|
|> String.replace("{{domain}}", "mastodon.social")
|
|
|
|
|> String.replace("{{nickname}}", "emelie")
|
|
|
|
}
|
2020-12-21 14:05:56 +00:00
|
|
|
end)
|
|
|
|
|
2019-12-20 13:34:14 +00:00
|
|
|
response =
|
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> get(remote_follow_path(conn, :follow, %{acct: "https://mastodon.social/users/emelie"}))
|
2019-12-20 13:34:14 +00:00
|
|
|
|> html_response(200)
|
|
|
|
|
|
|
|
assert response =~ "Log in to follow"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "show follow page if the `acct` is a account link", %{conn: conn} do
|
2020-12-21 14:05:56 +00:00
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body: File.read!("test/fixtures/tesla_mock/emelie.json")
|
|
|
|
}
|
2021-02-03 13:09:28 +00:00
|
|
|
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/emelie/collections/featured"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 200,
|
|
|
|
headers: [{"content-type", "application/activity+json"}],
|
|
|
|
body:
|
|
|
|
File.read!("test/fixtures/users_mock/masto_featured.json")
|
|
|
|
|> String.replace("{{domain}}", "mastodon.social")
|
|
|
|
|> String.replace("{{nickname}}", "emelie")
|
|
|
|
}
|
2020-12-21 14:05:56 +00:00
|
|
|
end)
|
|
|
|
|
2019-12-20 13:34:14 +00:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-12-22 18:17:19 +00:00
|
|
|
|> get(remote_follow_path(conn, :follow, %{acct: "https://mastodon.social/users/emelie"}))
|
2019-12-20 13:34:14 +00:00
|
|
|
|> html_response(200)
|
|
|
|
|
|
|
|
assert response =~ "Remote follow"
|
|
|
|
end
|
|
|
|
|
2020-12-21 14:05:56 +00:00
|
|
|
test "show follow page with error when user can not be fetched by `acct` link", %{conn: conn} do
|
|
|
|
Tesla.Mock.mock(fn
|
|
|
|
%{method: :get, url: "https://mastodon.social/users/not_found"} ->
|
|
|
|
%Tesla.Env{
|
|
|
|
status: 404
|
|
|
|
}
|
|
|
|
end)
|
|
|
|
|
2019-12-20 13:34:14 +00:00
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
assert capture_log(fn ->
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-12-22 18:17:19 +00:00
|
|
|
|> get(
|
|
|
|
remote_follow_path(conn, :follow, %{
|
|
|
|
acct: "https://mastodon.social/users/not_found"
|
|
|
|
})
|
|
|
|
)
|
|
|
|
|> html_response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error fetching user"
|
2019-12-20 13:34:14 +00:00
|
|
|
end) =~ "Object has been deleted"
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-12-25 12:12:43 +00:00
|
|
|
describe "POST /ostatus_subscribe - do_follow/2 with assigned user " do
|
|
|
|
test "required `follow | write:follows` scope", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
read_token = insert(:oauth_token, user: user, scopes: ["read"])
|
|
|
|
|
|
|
|
assert capture_log(fn ->
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
|
|
|
|> assign(:token, read_token)
|
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => user2.id}})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end) =~ "Insufficient permissions: follow | write:follows."
|
|
|
|
end
|
|
|
|
|
2019-12-20 13:34:14 +00:00
|
|
|
test "follows user", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
conn =
|
2019-12-20 13:34:14 +00:00
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2020-01-12 18:14:09 +00:00
|
|
|
|> assign(:token, insert(:oauth_token, user: user, scopes: ["write:follows"]))
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => user2.id}})
|
2019-12-20 13:34:14 +00:00
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
assert redirected_to(conn) == "/users/#{user2.id}"
|
2019-12-20 13:34:14 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when user is deactivated", %{conn: conn} do
|
2020-10-12 22:42:27 +00:00
|
|
|
user = insert(:user, is_active: false)
|
2019-12-20 13:34:14 +00:00
|
|
|
user2 = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => user2.id}})
|
2019-12-20 13:34:14 +00:00
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when user is blocked", %{conn: conn} do
|
2021-01-26 17:58:43 +00:00
|
|
|
clear_config([:user, :deny_follow_blocked], true)
|
2019-12-20 13:34:14 +00:00
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
|
|
|
{:ok, _user_block} = Pleroma.User.block(user2, user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => user2.id}})
|
2019-12-20 13:34:14 +00:00
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when followee not found", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => "jimm"}})
|
2019-12-20 13:34:14 +00:00
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns success result when user already in followers", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
{:ok, _, _, _} = CommonAPI.follow(user, user2)
|
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
conn =
|
2019-12-20 13:34:14 +00:00
|
|
|
conn
|
|
|
|
|> assign(:user, refresh_record(user))
|
2020-01-12 18:14:09 +00:00
|
|
|
|> assign(:token, insert(:oauth_token, user: user, scopes: ["write:follows"]))
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{"user" => %{"id" => user2.id}})
|
2019-12-20 13:34:14 +00:00
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
assert redirected_to(conn) == "/users/#{user2.id}"
|
2019-12-20 13:34:14 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-05-07 08:14:54 +00:00
|
|
|
describe "POST /ostatus_subscribe - follow/2 with enabled Two-Factor Auth " do
|
|
|
|
test "render the MFA login form", %{conn: conn} do
|
|
|
|
otp_secret = TOTP.generate_secret()
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
|
|
enabled: true,
|
|
|
|
totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "test", "id" => user2.id}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
mfa_token = Pleroma.Repo.one(from(q in Pleroma.MFA.Token, where: q.user_id == ^user.id))
|
|
|
|
|
|
|
|
assert response =~ "Two-factor authentication"
|
|
|
|
assert response =~ "Authentication code"
|
|
|
|
assert response =~ mfa_token.token
|
|
|
|
refute user2.follower_address in User.following(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when password is incorrect", %{conn: conn} do
|
|
|
|
otp_secret = TOTP.generate_secret()
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
|
|
enabled: true,
|
|
|
|
totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "test1", "id" => user2.id}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Wrong username or password"
|
|
|
|
refute user2.follower_address in User.following(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "follows", %{conn: conn} do
|
|
|
|
otp_secret = TOTP.generate_secret()
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
|
|
enabled: true,
|
|
|
|
totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2020-09-05 15:35:01 +00:00
|
|
|
{:ok, %{token: token}} = MFA.Token.create(user)
|
2020-05-07 08:14:54 +00:00
|
|
|
|
|
|
|
user2 = insert(:user)
|
|
|
|
otp_token = TOTP.generate_token(otp_secret)
|
|
|
|
|
|
|
|
conn =
|
|
|
|
conn
|
|
|
|
|> post(
|
|
|
|
remote_follow_path(conn, :do_follow),
|
|
|
|
%{
|
|
|
|
"mfa" => %{"code" => otp_token, "token" => token, "id" => user2.id}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
assert redirected_to(conn) == "/users/#{user2.id}"
|
|
|
|
assert user2.follower_address in User.following(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when auth code is incorrect", %{conn: conn} do
|
|
|
|
otp_secret = TOTP.generate_secret()
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user,
|
|
|
|
multi_factor_authentication_settings: %MFA.Settings{
|
|
|
|
enabled: true,
|
|
|
|
totp: %MFA.Settings.TOTP{secret: otp_secret, confirmed: true}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2020-09-05 15:35:01 +00:00
|
|
|
{:ok, %{token: token}} = MFA.Token.create(user)
|
2020-05-07 08:14:54 +00:00
|
|
|
|
|
|
|
user2 = insert(:user)
|
|
|
|
otp_token = TOTP.generate_token(TOTP.generate_secret())
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> post(
|
|
|
|
remote_follow_path(conn, :do_follow),
|
|
|
|
%{
|
|
|
|
"mfa" => %{"code" => otp_token, "token" => token, "id" => user2.id}
|
|
|
|
}
|
|
|
|
)
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Wrong authentication code"
|
|
|
|
refute user2.follower_address in User.following(user)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-12-25 12:12:43 +00:00
|
|
|
describe "POST /ostatus_subscribe - follow/2 without assigned user " do
|
2019-12-20 13:34:14 +00:00
|
|
|
test "follows", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
conn =
|
2019-12-20 13:34:14 +00:00
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
2019-12-20 13:34:14 +00:00
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "test", "id" => user2.id}
|
|
|
|
})
|
|
|
|
|
2020-01-21 15:16:59 +00:00
|
|
|
assert redirected_to(conn) == "/users/#{user2.id}"
|
2019-12-20 13:34:14 +00:00
|
|
|
assert user2.follower_address in User.following(user)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when followee not found", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
2019-12-20 13:34:14 +00:00
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "test", "id" => "jimm"}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when login invalid", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
2019-12-20 13:34:14 +00:00
|
|
|
"authorization" => %{"name" => "jimm", "password" => "test", "id" => user.id}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Wrong username or password"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when password invalid", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
2019-12-20 13:34:14 +00:00
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "42", "id" => user2.id}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Wrong username or password"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "returns error when user is blocked", %{conn: conn} do
|
2021-01-26 17:58:43 +00:00
|
|
|
clear_config([:user, :deny_follow_blocked], true)
|
2019-12-20 13:34:14 +00:00
|
|
|
user = insert(:user)
|
|
|
|
user2 = insert(:user)
|
|
|
|
{:ok, _user_block} = Pleroma.User.block(user2, user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2019-12-22 18:17:19 +00:00
|
|
|
|> post(remote_follow_path(conn, :do_follow), %{
|
2019-12-20 13:34:14 +00:00
|
|
|
"authorization" => %{"name" => user.nickname, "password" => "test", "id" => user2.id}
|
|
|
|
})
|
|
|
|
|> response(200)
|
|
|
|
|
|
|
|
assert response =~ "Error following account"
|
|
|
|
end
|
|
|
|
end
|
2022-07-10 04:10:35 +00:00
|
|
|
|
|
|
|
describe "avatar url" do
|
|
|
|
test "without media proxy" do
|
|
|
|
clear_config([:media_proxy, :enabled], false)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user, %{
|
|
|
|
local: false,
|
|
|
|
avatar: %{"url" => [%{"href" => "https://remote.org/avatar.png"}]}
|
|
|
|
})
|
|
|
|
|
|
|
|
avatar_url = Pleroma.Web.TwitterAPI.RemoteFollowView.avatar_url(user)
|
|
|
|
|
|
|
|
assert avatar_url == "https://remote.org/avatar.png"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "with media proxy" do
|
|
|
|
clear_config([:media_proxy, :enabled], true)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user, %{
|
|
|
|
local: false,
|
|
|
|
avatar: %{"url" => [%{"href" => "https://remote.org/avatar.png"}]}
|
|
|
|
})
|
|
|
|
|
|
|
|
avatar_url = Pleroma.Web.TwitterAPI.RemoteFollowView.avatar_url(user)
|
|
|
|
url = Pleroma.Web.Endpoint.url()
|
|
|
|
|
|
|
|
assert String.starts_with?(avatar_url, url)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "local avatar is not proxied" do
|
|
|
|
clear_config([:media_proxy, :enabled], true)
|
|
|
|
|
|
|
|
user =
|
|
|
|
insert(:user, %{
|
|
|
|
local: true,
|
|
|
|
avatar: %{"url" => [%{"href" => "#{Pleroma.Web.Endpoint.url()}/localuser/avatar.png"}]}
|
|
|
|
})
|
|
|
|
|
|
|
|
avatar_url = Pleroma.Web.TwitterAPI.RemoteFollowView.avatar_url(user)
|
|
|
|
|
|
|
|
assert avatar_url == "#{Pleroma.Web.Endpoint.url()}/localuser/avatar.png"
|
|
|
|
end
|
|
|
|
end
|
2019-12-20 13:34:14 +00:00
|
|
|
end
|