1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ObjectValidators.DeleteValidationTest do
6 use Pleroma.DataCase, async: true
9 alias Pleroma.Web.ActivityPub.Builder
10 alias Pleroma.Web.ActivityPub.ObjectValidator
11 alias Pleroma.Web.CommonAPI
13 import Pleroma.Factory
18 {:ok, post_activity} = CommonAPI.post(user, %{status: "cancel me daddy"})
20 {:ok, valid_post_delete, _} = Builder.delete(user, post_activity.data["object"])
21 {:ok, valid_user_delete, _} = Builder.delete(user, user.ap_id)
23 %{user: user, valid_post_delete: valid_post_delete, valid_user_delete: valid_user_delete}
26 test "it is valid for a post deletion", %{valid_post_delete: valid_post_delete} do
27 {:ok, valid_post_delete, _} = ObjectValidator.validate(valid_post_delete, [])
29 assert valid_post_delete["deleted_activity_id"]
32 test "it is invalid if the object isn't in a list of certain types", %{
33 valid_post_delete: valid_post_delete
35 object = Object.get_by_ap_id(valid_post_delete["object"])
39 |> Map.put("type", "Like")
43 |> Ecto.Changeset.change(%{data: data})
44 |> Object.update_and_set_cache()
46 {:error, cng} = ObjectValidator.validate(valid_post_delete, [])
47 assert {:object, {"object not in allowed types", []}} in cng.errors
50 test "it is valid for a user deletion", %{valid_user_delete: valid_user_delete} do
51 assert match?({:ok, _, _}, ObjectValidator.validate(valid_user_delete, []))
54 test "it's invalid if the id is missing", %{valid_post_delete: valid_post_delete} do
59 {:error, cng} = ObjectValidator.validate(no_id, [])
61 assert {:id, {"can't be blank", [validation: :required]}} in cng.errors
64 test "it's invalid if the object doesn't exist", %{valid_post_delete: valid_post_delete} do
67 |> Map.put("object", "http://does.not/exist")
69 {:error, cng} = ObjectValidator.validate(missing_object, [])
71 assert {:object, {"can't find object", []}} in cng.errors
74 test "it's invalid if the actor of the object and the actor of delete are from different domains",
75 %{valid_post_delete: valid_post_delete} do
76 valid_user = insert(:user)
80 |> Map.put("actor", valid_user.ap_id)
82 assert match?({:ok, _, _}, ObjectValidator.validate(valid_other_actor, []))
86 |> Map.put("actor", "https://gensokyo.2hu/users/raymoo")
88 {:error, cng} = ObjectValidator.validate(invalid_other_actor, [])
90 assert {:actor, {"is not allowed to modify object", []}} in cng.errors
93 test "it's valid if the actor of the object is a local superuser",
94 %{valid_post_delete: valid_post_delete} do
96 insert(:user, local: true, is_moderator: true, ap_id: "https://gensokyo.2hu/users/raymoo")
100 |> Map.put("actor", user.ap_id)
102 {:ok, _, meta} = ObjectValidator.validate(valid_other_actor, [])
103 assert meta[:do_not_federate]