1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.StreamerTest do
11 alias Pleroma.Chat.MessageReference
12 alias Pleroma.Conversation.Participation
16 alias Pleroma.Web.CommonAPI
17 alias Pleroma.Web.Streamer
18 alias Pleroma.Web.StreamerView
20 @moduletag needs_streamer: true, capture_log: true
22 setup do: clear_config([:instance, :skip_thread_containment])
24 describe "get_topic/_ (unauthenticated)" do
25 test "allows public" do
26 assert {:ok, "public"} = Streamer.get_topic("public", nil, nil)
27 assert {:ok, "public:local"} = Streamer.get_topic("public:local", nil, nil)
28 assert {:ok, "public:media"} = Streamer.get_topic("public:media", nil, nil)
29 assert {:ok, "public:local:media"} = Streamer.get_topic("public:local:media", nil, nil)
32 test "allows instance streams" do
33 assert {:ok, "public:remote:lain.com"} =
34 Streamer.get_topic("public:remote", nil, nil, %{"instance" => "lain.com"})
36 assert {:ok, "public:remote:media:lain.com"} =
37 Streamer.get_topic("public:remote:media", nil, nil, %{"instance" => "lain.com"})
40 test "allows hashtag streams" do
41 assert {:ok, "hashtag:cofe"} = Streamer.get_topic("hashtag", nil, nil, %{"tag" => "cofe"})
44 test "disallows user streams" do
45 assert {:error, _} = Streamer.get_topic("user", nil, nil)
46 assert {:error, _} = Streamer.get_topic("user:notification", nil, nil)
47 assert {:error, _} = Streamer.get_topic("direct", nil, nil)
50 test "disallows list streams" do
51 assert {:error, _} = Streamer.get_topic("list", nil, nil, %{"list" => 42})
55 describe "get_topic/_ (authenticated)" do
56 setup do: oauth_access(["read"])
58 test "allows public streams (regardless of OAuth token scopes)", %{
60 token: read_oauth_token
62 with oauth_token <- [nil, read_oauth_token] do
63 assert {:ok, "public"} = Streamer.get_topic("public", user, oauth_token)
64 assert {:ok, "public:local"} = Streamer.get_topic("public:local", user, oauth_token)
65 assert {:ok, "public:media"} = Streamer.get_topic("public:media", user, oauth_token)
67 assert {:ok, "public:local:media"} =
68 Streamer.get_topic("public:local:media", user, oauth_token)
72 test "allows user streams (with proper OAuth token scopes)", %{
74 token: read_oauth_token
76 %{token: read_notifications_token} = oauth_access(["read:notifications"], user: user)
77 %{token: read_statuses_token} = oauth_access(["read:statuses"], user: user)
78 %{token: badly_scoped_token} = oauth_access(["irrelevant:scope"], user: user)
80 expected_user_topic = "user:#{user.id}"
81 expected_notification_topic = "user:notification:#{user.id}"
82 expected_direct_topic = "direct:#{user.id}"
83 expected_pleroma_chat_topic = "user:pleroma_chat:#{user.id}"
85 for valid_user_token <- [read_oauth_token, read_statuses_token] do
86 assert {:ok, ^expected_user_topic} = Streamer.get_topic("user", user, valid_user_token)
88 assert {:ok, ^expected_direct_topic} =
89 Streamer.get_topic("direct", user, valid_user_token)
91 assert {:ok, ^expected_pleroma_chat_topic} =
92 Streamer.get_topic("user:pleroma_chat", user, valid_user_token)
95 for invalid_user_token <- [read_notifications_token, badly_scoped_token],
96 user_topic <- ["user", "direct", "user:pleroma_chat"] do
97 assert {:error, :unauthorized} = Streamer.get_topic(user_topic, user, invalid_user_token)
100 for valid_notification_token <- [read_oauth_token, read_notifications_token] do
101 assert {:ok, ^expected_notification_topic} =
102 Streamer.get_topic("user:notification", user, valid_notification_token)
105 for invalid_notification_token <- [read_statuses_token, badly_scoped_token] do
106 assert {:error, :unauthorized} =
107 Streamer.get_topic("user:notification", user, invalid_notification_token)
111 test "allows hashtag streams (regardless of OAuth token scopes)", %{
113 token: read_oauth_token
115 for oauth_token <- [nil, read_oauth_token] do
116 assert {:ok, "hashtag:cofe"} =
117 Streamer.get_topic("hashtag", user, oauth_token, %{"tag" => "cofe"})
121 test "disallows registering to another user's stream", %{user: user, token: read_oauth_token} do
122 another_user = insert(:user)
123 assert {:error, _} = Streamer.get_topic("user:#{another_user.id}", user, read_oauth_token)
126 Streamer.get_topic("user:notification:#{another_user.id}", user, read_oauth_token)
128 assert {:error, _} = Streamer.get_topic("direct:#{another_user.id}", user, read_oauth_token)
131 test "allows list stream that are owned by the user (with `read` or `read:lists` scopes)", %{
133 token: read_oauth_token
135 %{token: read_lists_token} = oauth_access(["read:lists"], user: user)
136 %{token: invalid_token} = oauth_access(["irrelevant:scope"], user: user)
137 {:ok, list} = List.create("Test", user)
139 assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, read_oauth_token)
141 for valid_token <- [read_oauth_token, read_lists_token] do
142 assert {:ok, _} = Streamer.get_topic("list", user, valid_token, %{"list" => list.id})
145 assert {:error, _} = Streamer.get_topic("list", user, invalid_token, %{"list" => list.id})
148 test "disallows list stream that are not owned by the user", %{user: user, token: oauth_token} do
149 another_user = insert(:user)
150 {:ok, list} = List.create("Test", another_user)
152 assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, oauth_token)
153 assert {:error, _} = Streamer.get_topic("list", user, oauth_token, %{"list" => list.id})
157 describe "user streams" do
159 %{user: user, token: token} = oauth_access(["read"])
160 notify = insert(:notification, user: user, activity: build(:note_activity))
161 {:ok, %{user: user, notify: notify, token: token}}
164 test "it streams the user's post in the 'user' stream", %{user: user, token: oauth_token} do
165 Streamer.get_topic_and_add_socket("user", user, oauth_token)
166 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
168 assert_receive {:render_with_user, _, _, ^activity}
169 refute Streamer.filtered_by_user?(user, activity)
172 test "it streams boosts of the user in the 'user' stream", %{user: user, token: oauth_token} do
173 Streamer.get_topic_and_add_socket("user", user, oauth_token)
175 other_user = insert(:user)
176 {:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
177 {:ok, announce} = CommonAPI.repeat(activity.id, user)
179 assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce}
180 refute Streamer.filtered_by_user?(user, announce)
183 test "it does not stream announces of the user's own posts in the 'user' stream", %{
187 Streamer.get_topic_and_add_socket("user", user, oauth_token)
189 other_user = insert(:user)
190 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
191 {:ok, announce} = CommonAPI.repeat(activity.id, other_user)
193 assert Streamer.filtered_by_user?(user, announce)
196 test "it does stream notifications announces of the user's own posts in the 'user' stream", %{
200 Streamer.get_topic_and_add_socket("user", user, oauth_token)
202 other_user = insert(:user)
203 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
204 {:ok, announce} = CommonAPI.repeat(activity.id, other_user)
208 |> Repo.get_by(%{user_id: user.id, activity_id: announce.id})
209 |> Repo.preload(:activity)
211 refute Streamer.filtered_by_user?(user, notification)
214 test "it streams boosts of mastodon user in the 'user' stream", %{
218 Streamer.get_topic_and_add_socket("user", user, oauth_token)
220 other_user = insert(:user)
221 {:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
224 File.read!("test/fixtures/mastodon-announce.json")
226 |> Map.put("object", activity.data["object"])
227 |> Map.put("actor", user.ap_id)
229 {:ok, %Pleroma.Activity{data: _data, local: false} = announce} =
230 Pleroma.Web.ActivityPub.Transmogrifier.handle_incoming(data)
232 assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce}
233 refute Streamer.filtered_by_user?(user, announce)
236 test "it sends notify to in the 'user' stream", %{
241 Streamer.get_topic_and_add_socket("user", user, oauth_token)
242 Streamer.stream("user", notify)
244 assert_receive {:render_with_user, _, _, ^notify}
245 refute Streamer.filtered_by_user?(user, notify)
248 test "it sends notify to in the 'user:notification' stream", %{
253 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
254 Streamer.stream("user:notification", notify)
256 assert_receive {:render_with_user, _, _, ^notify}
257 refute Streamer.filtered_by_user?(user, notify)
260 test "it sends chat messages to the 'user:pleroma_chat' stream", %{
264 other_user = insert(:user)
266 {:ok, create_activity} =
267 CommonAPI.post_chat_message(other_user, user, "hey cirno", idempotency_key: "123")
269 object = Object.normalize(create_activity, false)
270 chat = Chat.get(user.id, other_user.ap_id)
271 cm_ref = MessageReference.for_chat_and_object(chat, object)
272 cm_ref = %{cm_ref | chat: chat, object: object}
274 Streamer.get_topic_and_add_socket("user:pleroma_chat", user, oauth_token)
275 Streamer.stream("user:pleroma_chat", {user, cm_ref})
277 text = StreamerView.render("chat_update.json", %{chat_message_reference: cm_ref})
279 assert text =~ "hey cirno"
280 assert_receive {:text, ^text}
283 test "it sends chat messages to the 'user' stream", %{user: user, token: oauth_token} do
284 other_user = insert(:user)
286 {:ok, create_activity} = CommonAPI.post_chat_message(other_user, user, "hey cirno")
287 object = Object.normalize(create_activity, false)
288 chat = Chat.get(user.id, other_user.ap_id)
289 cm_ref = MessageReference.for_chat_and_object(chat, object)
290 cm_ref = %{cm_ref | chat: chat, object: object}
292 Streamer.get_topic_and_add_socket("user", user, oauth_token)
293 Streamer.stream("user", {user, cm_ref})
295 text = StreamerView.render("chat_update.json", %{chat_message_reference: cm_ref})
297 assert text =~ "hey cirno"
298 assert_receive {:text, ^text}
301 test "it sends chat message notifications to the 'user:notification' stream", %{
305 other_user = insert(:user)
307 {:ok, create_activity} = CommonAPI.post_chat_message(other_user, user, "hey")
310 Repo.get_by(Pleroma.Notification, user_id: user.id, activity_id: create_activity.id)
311 |> Repo.preload(:activity)
313 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
314 Streamer.stream("user:notification", notify)
316 assert_receive {:render_with_user, _, _, ^notify}
317 refute Streamer.filtered_by_user?(user, notify)
320 test "it doesn't send notify to the 'user:notification' stream when a user is blocked", %{
324 blocked = insert(:user)
325 {:ok, _user_relationship} = User.block(user, blocked)
327 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
329 {:ok, activity} = CommonAPI.post(user, %{status: ":("})
330 {:ok, _} = CommonAPI.favorite(blocked, activity.id)
335 test "it doesn't send notify to the 'user:notification' stream when a thread is muted", %{
339 user2 = insert(:user)
341 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
342 {:ok, _} = CommonAPI.add_mute(user, activity)
344 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
346 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
349 assert Streamer.filtered_by_user?(user, favorite_activity)
352 test "it sends favorite to 'user:notification' stream'", %{
356 user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
358 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
359 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
360 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
362 assert_receive {:render_with_user, _, "notification.json", notif}
363 assert notif.activity.id == favorite_activity.id
364 refute Streamer.filtered_by_user?(user, notif)
367 test "it doesn't send the 'user:notification' stream' when a domain is blocked", %{
371 user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
373 {:ok, user} = User.block_domain(user, "hecking-lewd-place.com")
374 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
375 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
376 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
379 assert Streamer.filtered_by_user?(user, favorite_activity)
382 test "it sends follow activities to the 'user:notification' stream", %{
386 user_url = user.ap_id
387 user2 = insert(:user)
390 File.read!("test/fixtures/users_mock/localhost.json")
391 |> String.replace("{{nickname}}", user.nickname)
394 Tesla.Mock.mock_global(fn
395 %{method: :get, url: ^user_url} ->
396 %Tesla.Env{status: 200, body: body}
399 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
400 {:ok, _follower, _followed, follow_activity} = CommonAPI.follow(user2, user)
402 assert_receive {:render_with_user, _, "notification.json", notif}
403 assert notif.activity.id == follow_activity.id
404 refute Streamer.filtered_by_user?(user, notif)
407 test "it sends relationships updates to the 'user' stream", %{
412 user_url = user.ap_id
413 follower = insert(:user)
414 follower_token = insert(:oauth_token, user: follower)
415 follower_id = follower.id
418 File.read!("test/fixtures/users_mock/localhost.json")
419 |> String.replace("{{nickname}}", user.nickname)
422 Tesla.Mock.mock_global(fn
423 %{method: :get, url: ^user_url} ->
424 %Tesla.Env{status: 200, body: body}
427 Streamer.get_topic_and_add_socket("user", user, oauth_token)
428 Streamer.get_topic_and_add_socket("user", follower, follower_token)
429 {:ok, _follower, _followed, _follow_activity} = CommonAPI.follow(follower, user)
431 # follow_pending event sent to both follower and following
432 assert_receive {:text, event}
433 assert_receive {:text, ^event}
435 assert %{"event" => "pleroma:relationships_update", "payload" => payload} =
440 "follower_count" => 0,
441 "following_count" => 0,
445 "follower_count" => 0,
446 "following_count" => 0,
449 "state" => "follow_pending"
450 } = Jason.decode!(payload)
452 # follow_accept event sent to both follower and following
453 assert_receive {:text, event}
454 assert_receive {:text, ^event}
456 assert %{"event" => "pleroma:relationships_update", "payload" => payload} =
461 "follower_count" => 0,
462 "following_count" => 1,
466 "follower_count" => 1,
467 "following_count" => 0,
470 "state" => "follow_accept"
471 } = Jason.decode!(payload)
475 describe "public streams" do
476 test "it sends to public (authenticated)" do
477 %{user: user, token: oauth_token} = oauth_access(["read"])
478 other_user = insert(:user)
480 Streamer.get_topic_and_add_socket("public", user, oauth_token)
482 {:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
483 assert_receive {:render_with_user, _, _, ^activity}
484 refute Streamer.filtered_by_user?(other_user, activity)
487 test "it sends to public (unauthenticated)" do
490 Streamer.get_topic_and_add_socket("public", nil, nil)
492 {:ok, activity} = CommonAPI.post(user, %{status: "Test"})
493 activity_id = activity.id
494 assert_receive {:text, event}
495 assert %{"event" => "update", "payload" => payload} = Jason.decode!(event)
496 assert %{"id" => ^activity_id} = Jason.decode!(payload)
498 {:ok, _} = CommonAPI.delete(activity.id, user)
499 assert_receive {:text, event}
500 assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
503 test "handles deletions" do
504 %{user: user, token: oauth_token} = oauth_access(["read"])
505 other_user = insert(:user)
506 {:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
508 Streamer.get_topic_and_add_socket("public", user, oauth_token)
510 {:ok, _} = CommonAPI.delete(activity.id, other_user)
511 activity_id = activity.id
512 assert_receive {:text, event}
513 assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
517 describe "thread_containment/2" do
518 test "it filters to user if recipients invalid and thread containment is enabled" do
519 Pleroma.Config.put([:instance, :skip_thread_containment], false)
520 author = insert(:user)
521 %{user: user, token: oauth_token} = oauth_access(["read"])
522 User.follow(user, author, :follow_accept)
525 insert(:note_activity,
529 data: %{"to" => ["TEST-FFF"]}
533 Streamer.get_topic_and_add_socket("public", user, oauth_token)
534 Streamer.stream("public", activity)
535 assert_receive {:render_with_user, _, _, ^activity}
536 assert Streamer.filtered_by_user?(user, activity)
539 test "it sends message if recipients invalid and thread containment is disabled" do
540 Pleroma.Config.put([:instance, :skip_thread_containment], true)
541 author = insert(:user)
542 %{user: user, token: oauth_token} = oauth_access(["read"])
543 User.follow(user, author, :follow_accept)
546 insert(:note_activity,
550 data: %{"to" => ["TEST-FFF"]}
554 Streamer.get_topic_and_add_socket("public", user, oauth_token)
555 Streamer.stream("public", activity)
557 assert_receive {:render_with_user, _, _, ^activity}
558 refute Streamer.filtered_by_user?(user, activity)
561 test "it sends message if recipients invalid and thread containment is enabled but user's thread containment is disabled" do
562 Pleroma.Config.put([:instance, :skip_thread_containment], false)
563 author = insert(:user)
564 user = insert(:user, skip_thread_containment: true)
565 %{token: oauth_token} = oauth_access(["read"], user: user)
566 User.follow(user, author, :follow_accept)
569 insert(:note_activity,
573 data: %{"to" => ["TEST-FFF"]}
577 Streamer.get_topic_and_add_socket("public", user, oauth_token)
578 Streamer.stream("public", activity)
580 assert_receive {:render_with_user, _, _, ^activity}
581 refute Streamer.filtered_by_user?(user, activity)
586 setup do: oauth_access(["read"])
588 test "it filters messages involving blocked users", %{user: user, token: oauth_token} do
589 blocked_user = insert(:user)
590 {:ok, _user_relationship} = User.block(user, blocked_user)
592 Streamer.get_topic_and_add_socket("public", user, oauth_token)
593 {:ok, activity} = CommonAPI.post(blocked_user, %{status: "Test"})
594 assert_receive {:render_with_user, _, _, ^activity}
595 assert Streamer.filtered_by_user?(user, activity)
598 test "it filters messages transitively involving blocked users", %{
602 blockee = insert(:user)
603 friend = insert(:user)
605 Streamer.get_topic_and_add_socket("public", blocker, blocker_token)
607 {:ok, _user_relationship} = User.block(blocker, blockee)
609 {:ok, activity_one} = CommonAPI.post(friend, %{status: "hey! @#{blockee.nickname}"})
611 assert_receive {:render_with_user, _, _, ^activity_one}
612 assert Streamer.filtered_by_user?(blocker, activity_one)
614 {:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
616 assert_receive {:render_with_user, _, _, ^activity_two}
617 assert Streamer.filtered_by_user?(blocker, activity_two)
619 {:ok, activity_three} = CommonAPI.post(blockee, %{status: "hey! @#{blocker.nickname}"})
621 assert_receive {:render_with_user, _, _, ^activity_three}
622 assert Streamer.filtered_by_user?(blocker, activity_three)
627 setup do: oauth_access(["read"])
629 test "it doesn't send unwanted DMs to list", %{user: user_a, token: user_a_token} do
630 user_b = insert(:user)
631 user_c = insert(:user)
633 {:ok, user_a, user_b} = User.follow(user_a, user_b)
635 {:ok, list} = List.create("Test", user_a)
636 {:ok, list} = List.follow(list, user_b)
638 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
641 CommonAPI.post(user_b, %{
642 status: "@#{user_c.nickname} Test",
649 test "it doesn't send unwanted private posts to list", %{user: user_a, token: user_a_token} do
650 user_b = insert(:user)
652 {:ok, list} = List.create("Test", user_a)
653 {:ok, list} = List.follow(list, user_b)
655 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
658 CommonAPI.post(user_b, %{
660 visibility: "private"
666 test "it sends wanted private posts to list", %{user: user_a, token: user_a_token} do
667 user_b = insert(:user)
669 {:ok, user_a, user_b} = User.follow(user_a, user_b)
671 {:ok, list} = List.create("Test", user_a)
672 {:ok, list} = List.follow(list, user_b)
674 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
677 CommonAPI.post(user_b, %{
679 visibility: "private"
682 assert_receive {:render_with_user, _, _, ^activity}
683 refute Streamer.filtered_by_user?(user_a, activity)
687 describe "muted reblogs" do
688 setup do: oauth_access(["read"])
690 test "it filters muted reblogs", %{user: user1, token: user1_token} do
691 user2 = insert(:user)
692 user3 = insert(:user)
693 CommonAPI.follow(user1, user2)
694 CommonAPI.hide_reblogs(user1, user2)
696 {:ok, create_activity} = CommonAPI.post(user3, %{status: "I'm kawen"})
698 Streamer.get_topic_and_add_socket("user", user1, user1_token)
699 {:ok, announce_activity} = CommonAPI.repeat(create_activity.id, user2)
700 assert_receive {:render_with_user, _, _, ^announce_activity}
701 assert Streamer.filtered_by_user?(user1, announce_activity)
704 test "it filters reblog notification for reblog-muted actors", %{
708 user2 = insert(:user)
709 CommonAPI.follow(user1, user2)
710 CommonAPI.hide_reblogs(user1, user2)
712 {:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
713 Streamer.get_topic_and_add_socket("user", user1, user1_token)
714 {:ok, _announce_activity} = CommonAPI.repeat(create_activity.id, user2)
716 assert_receive {:render_with_user, _, "notification.json", notif}
717 assert Streamer.filtered_by_user?(user1, notif)
720 test "it send non-reblog notification for reblog-muted actors", %{
724 user2 = insert(:user)
725 CommonAPI.follow(user1, user2)
726 CommonAPI.hide_reblogs(user1, user2)
728 {:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
729 Streamer.get_topic_and_add_socket("user", user1, user1_token)
730 {:ok, _favorite_activity} = CommonAPI.favorite(user2, create_activity.id)
732 assert_receive {:render_with_user, _, "notification.json", notif}
733 refute Streamer.filtered_by_user?(user1, notif)
737 describe "muted threads" do
738 test "it filters posts from muted threads" do
740 %{user: user2, token: user2_token} = oauth_access(["read"])
741 Streamer.get_topic_and_add_socket("user", user2, user2_token)
743 {:ok, user2, user, _activity} = CommonAPI.follow(user2, user)
744 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
745 {:ok, _} = CommonAPI.add_mute(user2, activity)
747 assert_receive {:render_with_user, _, _, ^activity}
748 assert Streamer.filtered_by_user?(user2, activity)
752 describe "direct streams" do
753 setup do: oauth_access(["read"])
755 test "it sends conversation update to the 'direct' stream", %{user: user, token: oauth_token} do
756 another_user = insert(:user)
758 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
760 {:ok, _create_activity} =
761 CommonAPI.post(another_user, %{
762 status: "hey @#{user.nickname}",
766 assert_receive {:text, received_event}
768 assert %{"event" => "conversation", "payload" => received_payload} =
769 Jason.decode!(received_event)
771 assert %{"last_status" => last_status} = Jason.decode!(received_payload)
772 [participation] = Participation.for_user(user)
773 assert last_status["pleroma"]["direct_conversation_id"] == participation.id
776 test "it doesn't send conversation update to the 'direct' stream when the last message in the conversation is deleted",
777 %{user: user, token: oauth_token} do
778 another_user = insert(:user)
780 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
782 {:ok, create_activity} =
783 CommonAPI.post(another_user, %{
784 status: "hi @#{user.nickname}",
788 create_activity_id = create_activity.id
789 assert_receive {:render_with_user, _, _, ^create_activity}
790 assert_receive {:text, received_conversation1}
791 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
793 {:ok, _} = CommonAPI.delete(create_activity_id, another_user)
795 assert_receive {:text, received_event}
797 assert %{"event" => "delete", "payload" => ^create_activity_id} =
798 Jason.decode!(received_event)
803 test "it sends conversation update to the 'direct' stream when a message is deleted", %{
807 another_user = insert(:user)
808 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
810 {:ok, create_activity} =
811 CommonAPI.post(another_user, %{
812 status: "hi @#{user.nickname}",
816 {:ok, create_activity2} =
817 CommonAPI.post(another_user, %{
818 status: "hi @#{user.nickname} 2",
819 in_reply_to_status_id: create_activity.id,
823 assert_receive {:render_with_user, _, _, ^create_activity}
824 assert_receive {:render_with_user, _, _, ^create_activity2}
825 assert_receive {:text, received_conversation1}
826 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
827 assert_receive {:text, received_conversation1}
828 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
830 {:ok, _} = CommonAPI.delete(create_activity2.id, another_user)
832 assert_receive {:text, received_event}
833 assert %{"event" => "delete", "payload" => _} = Jason.decode!(received_event)
835 assert_receive {:text, received_event}
837 assert %{"event" => "conversation", "payload" => received_payload} =
838 Jason.decode!(received_event)
840 assert %{"last_status" => last_status} = Jason.decode!(received_payload)
841 assert last_status["id"] == to_string(create_activity.id)