1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.PublisherTest do
6 use Pleroma.Web.ConnCase
8 import ExUnit.CaptureLog
13 alias Pleroma.Activity
14 alias Pleroma.Instances
16 alias Pleroma.Web.ActivityPub.Publisher
17 alias Pleroma.Web.CommonAPI
19 @as_public "https://www.w3.org/ns/activitystreams#Public"
22 mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
27 clear_config([:instance, :federating], true)
28 clear_config([:instance, :quarantined_instances], [])
31 describe "gather_webfinger_links/1" do
32 test "it returns links" do
36 %{"href" => user.ap_id, "rel" => "self", "type" => "application/activity+json"},
40 "type" => "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
43 "rel" => "http://ostatus.org/schema/1.0/subscribe",
44 "template" => "#{Pleroma.Web.Endpoint.url()}/ostatus_subscribe?acct={uri}"
48 assert expected_links == Publisher.gather_webfinger_links(user)
52 describe "determine_inbox/2" do
53 test "it returns sharedInbox for messages involving as:Public in to" do
54 user = insert(:user, %{shared_inbox: "http://example.com/inbox"})
57 data: %{"to" => [@as_public], "cc" => [user.follower_address]}
60 assert Publisher.determine_inbox(activity, user) == "http://example.com/inbox"
63 test "it returns sharedInbox for messages involving as:Public in cc" do
64 user = insert(:user, %{shared_inbox: "http://example.com/inbox"})
67 data: %{"cc" => [@as_public], "to" => [user.follower_address]}
70 assert Publisher.determine_inbox(activity, user) == "http://example.com/inbox"
73 test "it returns sharedInbox for messages involving multiple recipients in to" do
74 user = insert(:user, %{shared_inbox: "http://example.com/inbox"})
75 user_two = insert(:user)
76 user_three = insert(:user)
79 data: %{"cc" => [], "to" => [user.ap_id, user_two.ap_id, user_three.ap_id]}
82 assert Publisher.determine_inbox(activity, user) == "http://example.com/inbox"
85 test "it returns sharedInbox for messages involving multiple recipients in cc" do
86 user = insert(:user, %{shared_inbox: "http://example.com/inbox"})
87 user_two = insert(:user)
88 user_three = insert(:user)
91 data: %{"to" => [], "cc" => [user.ap_id, user_two.ap_id, user_three.ap_id]}
94 assert Publisher.determine_inbox(activity, user) == "http://example.com/inbox"
97 test "it returns sharedInbox for messages involving multiple recipients in total" do
100 shared_inbox: "http://example.com/inbox",
101 inbox: "http://example.com/personal-inbox"
104 user_two = insert(:user)
106 activity = %Activity{
107 data: %{"to" => [user_two.ap_id], "cc" => [user.ap_id]}
110 assert Publisher.determine_inbox(activity, user) == "http://example.com/inbox"
113 test "it returns inbox for messages involving single recipients in total" do
116 shared_inbox: "http://example.com/inbox",
117 inbox: "http://example.com/personal-inbox"
120 activity = %Activity{
121 data: %{"to" => [user.ap_id], "cc" => []}
124 assert Publisher.determine_inbox(activity, user) == "http://example.com/personal-inbox"
128 describe "publish_one/1" do
129 test "publish to url with with different ports" do
130 inbox80 = "http://42.site/users/nick1/inbox"
131 inbox42 = "http://42.site:42/users/nick1/inbox"
134 %{method: :post, url: "http://42.site:42/users/nick1/inbox"} ->
135 {:ok, %Tesla.Env{status: 200, body: "port 42"}}
137 %{method: :post, url: "http://42.site/users/nick1/inbox"} ->
138 {:ok, %Tesla.Env{status: 200, body: "port 80"}}
141 actor = insert(:user)
143 assert {:ok, %{body: "port 42"}} =
144 Publisher.publish_one(%{
149 unreachable_since: true
152 assert {:ok, %{body: "port 80"}} =
153 Publisher.publish_one(%{
158 unreachable_since: true
162 test_with_mock "calls `Instances.set_reachable` on successful federation if `unreachable_since` is not specified",
166 actor = insert(:user)
167 inbox = "http://200.site/users/nick1/inbox"
169 assert {:ok, _} = Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1})
170 assert called(Instances.set_reachable(inbox))
173 test_with_mock "calls `Instances.set_reachable` on successful federation if `unreachable_since` is set",
177 actor = insert(:user)
178 inbox = "http://200.site/users/nick1/inbox"
181 Publisher.publish_one(%{
186 unreachable_since: NaiveDateTime.utc_now()
189 assert called(Instances.set_reachable(inbox))
192 test_with_mock "does NOT call `Instances.set_reachable` on successful federation if `unreachable_since` is nil",
196 actor = insert(:user)
197 inbox = "http://200.site/users/nick1/inbox"
200 Publisher.publish_one(%{
205 unreachable_since: nil
208 refute called(Instances.set_reachable(inbox))
211 test_with_mock "calls `Instances.set_unreachable` on target inbox on non-2xx HTTP response code",
215 actor = insert(:user)
216 inbox = "http://404.site/users/nick1/inbox"
218 assert {:error, _} = Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1})
220 assert called(Instances.set_unreachable(inbox))
223 test_with_mock "it calls `Instances.set_unreachable` on target inbox on request error of any kind",
227 actor = insert(:user)
228 inbox = "http://connrefused.site/users/nick1/inbox"
230 assert capture_log(fn ->
232 Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1})
233 end) =~ "connrefused"
235 assert called(Instances.set_unreachable(inbox))
238 test_with_mock "does NOT call `Instances.set_unreachable` if target is reachable",
242 actor = insert(:user)
243 inbox = "http://200.site/users/nick1/inbox"
245 assert {:ok, _} = Publisher.publish_one(%{inbox: inbox, json: "{}", actor: actor, id: 1})
247 refute called(Instances.set_unreachable(inbox))
250 test_with_mock "does NOT call `Instances.set_unreachable` if target instance has non-nil `unreachable_since`",
254 actor = insert(:user)
255 inbox = "http://connrefused.site/users/nick1/inbox"
257 assert capture_log(fn ->
259 Publisher.publish_one(%{
264 unreachable_since: NaiveDateTime.utc_now()
266 end) =~ "connrefused"
268 refute called(Instances.set_unreachable(inbox))
272 describe "publish/2" do
273 test_with_mock "doesn't publish any activity to quarantined instances.",
274 Pleroma.Web.Federator.Publisher,
277 Config.put([:instance, :quarantined_instances], [{"domain.com", "some reason"}])
282 inbox: "https://domain.com/users/nick1/inbox",
286 actor = insert(:user, follower_address: follower.ap_id)
288 {:ok, follower, actor} = Pleroma.User.follow(follower, actor)
289 actor = refresh_record(actor)
292 insert(:followers_only_note_activity,
294 recipients: [follower.ap_id]
297 public_note_activity =
298 insert(:note_activity,
300 recipients: [follower.ap_id, @as_public]
303 res = Publisher.publish(actor, note_activity)
307 :ok = Publisher.publish(actor, public_note_activity)
310 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
311 inbox: "https://domain.com/users/nick1/inbox",
313 id: note_activity.data["id"]
318 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
319 inbox: "https://domain.com/users/nick1/inbox",
321 id: public_note_activity.data["id"]
326 test_with_mock "Publishes a non-public activity to non-quarantined instances.",
327 Pleroma.Web.Federator.Publisher,
330 Config.put([:instance, :quarantined_instances], [{"somedomain.com", "some reason"}])
335 inbox: "https://domain.com/users/nick1/inbox",
339 actor = insert(:user, follower_address: follower.ap_id)
341 {:ok, follower, actor} = Pleroma.User.follow(follower, actor)
342 actor = refresh_record(actor)
345 insert(:followers_only_note_activity,
347 recipients: [follower.ap_id]
350 res = Publisher.publish(actor, note_activity)
355 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
356 inbox: "https://domain.com/users/nick1/inbox",
358 id: note_activity.data["id"]
363 test_with_mock "publishes an activity with BCC to all relevant peers.",
364 Pleroma.Web.Federator.Publisher,
367 Config.put([:instance, :quarantined_instances], [])
372 inbox: "https://domain.com/users/nick1/inbox",
376 actor = insert(:user, follower_address: follower.ap_id)
379 {:ok, follower, actor} = Pleroma.User.follow(follower, actor)
382 insert(:note_activity,
383 recipients: [follower.ap_id],
384 data_attrs: %{"bcc" => [user.ap_id]}
387 res = Publisher.publish(actor, note_activity)
391 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
392 inbox: "https://domain.com/users/nick1/inbox",
394 id: note_activity.data["id"]
399 test_with_mock "publishes a delete activity to peers who signed fetch requests to the create acitvity/object.",
400 Pleroma.Web.Federator.Publisher,
403 clear_config([:instance, :quarantined_instances], [])
408 inbox: "https://domain.com/users/nick1/inbox",
415 inbox: "https://domain2.com/users/nick1/inbox",
419 actor = insert(:user)
421 note_activity = insert(:note_activity, user: actor)
422 object = Object.normalize(note_activity, fetch: false)
424 activity_path = String.trim_leading(note_activity.data["id"], Pleroma.Web.Endpoint.url())
425 object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
428 |> put_req_header("accept", "application/activity+json")
429 |> assign(:user, fetcher)
431 |> json_response(200)
434 |> put_req_header("accept", "application/activity+json")
435 |> assign(:user, another_fetcher)
436 |> get(activity_path)
437 |> json_response(200)
439 {:ok, delete} = CommonAPI.delete(note_activity.id, actor)
441 res = Publisher.publish(actor, delete)
445 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
446 inbox: "https://domain.com/users/nick1/inbox",
448 id: delete.data["id"]
453 Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
454 inbox: "https://domain2.com/users/nick1/inbox",
456 id: delete.data["id"]