1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.StreamerTest do
11 alias Pleroma.Chat.MessageReference
12 alias Pleroma.Conversation.Participation
16 alias Pleroma.Web.CommonAPI
17 alias Pleroma.Web.Streamer
18 alias Pleroma.Web.StreamerView
20 @moduletag needs_streamer: true, capture_log: true
22 setup do: clear_config([:instance, :skip_thread_containment])
24 describe "get_topic/_ (unauthenticated)" do
25 test "allows public" do
26 assert {:ok, "public"} = Streamer.get_topic("public", nil, nil)
27 assert {:ok, "public:local"} = Streamer.get_topic("public:local", nil, nil)
28 assert {:ok, "public:media"} = Streamer.get_topic("public:media", nil, nil)
29 assert {:ok, "public:local:media"} = Streamer.get_topic("public:local:media", nil, nil)
32 test "allows hashtag streams" do
33 assert {:ok, "hashtag:cofe"} = Streamer.get_topic("hashtag", nil, nil, %{"tag" => "cofe"})
36 test "disallows user streams" do
37 assert {:error, _} = Streamer.get_topic("user", nil, nil)
38 assert {:error, _} = Streamer.get_topic("user:notification", nil, nil)
39 assert {:error, _} = Streamer.get_topic("direct", nil, nil)
42 test "disallows list streams" do
43 assert {:error, _} = Streamer.get_topic("list", nil, nil, %{"list" => 42})
47 describe "get_topic/_ (authenticated)" do
48 setup do: oauth_access(["read"])
50 test "allows public streams (regardless of OAuth token scopes)", %{
52 token: read_oauth_token
54 with oauth_token <- [nil, read_oauth_token] do
55 assert {:ok, "public"} = Streamer.get_topic("public", user, oauth_token)
56 assert {:ok, "public:local"} = Streamer.get_topic("public:local", user, oauth_token)
57 assert {:ok, "public:media"} = Streamer.get_topic("public:media", user, oauth_token)
59 assert {:ok, "public:local:media"} =
60 Streamer.get_topic("public:local:media", user, oauth_token)
64 test "allows user streams (with proper OAuth token scopes)", %{
66 token: read_oauth_token
68 %{token: read_notifications_token} = oauth_access(["read:notifications"], user: user)
69 %{token: read_statuses_token} = oauth_access(["read:statuses"], user: user)
70 %{token: badly_scoped_token} = oauth_access(["irrelevant:scope"], user: user)
72 expected_user_topic = "user:#{user.id}"
73 expected_notification_topic = "user:notification:#{user.id}"
74 expected_direct_topic = "direct:#{user.id}"
75 expected_pleroma_chat_topic = "user:pleroma_chat:#{user.id}"
77 for valid_user_token <- [read_oauth_token, read_statuses_token] do
78 assert {:ok, ^expected_user_topic} = Streamer.get_topic("user", user, valid_user_token)
80 assert {:ok, ^expected_direct_topic} =
81 Streamer.get_topic("direct", user, valid_user_token)
83 assert {:ok, ^expected_pleroma_chat_topic} =
84 Streamer.get_topic("user:pleroma_chat", user, valid_user_token)
87 for invalid_user_token <- [read_notifications_token, badly_scoped_token],
88 user_topic <- ["user", "direct", "user:pleroma_chat"] do
89 assert {:error, :unauthorized} = Streamer.get_topic(user_topic, user, invalid_user_token)
92 for valid_notification_token <- [read_oauth_token, read_notifications_token] do
93 assert {:ok, ^expected_notification_topic} =
94 Streamer.get_topic("user:notification", user, valid_notification_token)
97 for invalid_notification_token <- [read_statuses_token, badly_scoped_token] do
98 assert {:error, :unauthorized} =
99 Streamer.get_topic("user:notification", user, invalid_notification_token)
103 test "allows hashtag streams (regardless of OAuth token scopes)", %{
105 token: read_oauth_token
107 for oauth_token <- [nil, read_oauth_token] do
108 assert {:ok, "hashtag:cofe"} =
109 Streamer.get_topic("hashtag", user, oauth_token, %{"tag" => "cofe"})
113 test "disallows registering to another user's stream", %{user: user, token: read_oauth_token} do
114 another_user = insert(:user)
115 assert {:error, _} = Streamer.get_topic("user:#{another_user.id}", user, read_oauth_token)
118 Streamer.get_topic("user:notification:#{another_user.id}", user, read_oauth_token)
120 assert {:error, _} = Streamer.get_topic("direct:#{another_user.id}", user, read_oauth_token)
123 test "allows list stream that are owned by the user (with `read` or `read:lists` scopes)", %{
125 token: read_oauth_token
127 %{token: read_lists_token} = oauth_access(["read:lists"], user: user)
128 %{token: invalid_token} = oauth_access(["irrelevant:scope"], user: user)
129 {:ok, list} = List.create("Test", user)
131 assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, read_oauth_token)
133 for valid_token <- [read_oauth_token, read_lists_token] do
134 assert {:ok, _} = Streamer.get_topic("list", user, valid_token, %{"list" => list.id})
137 assert {:error, _} = Streamer.get_topic("list", user, invalid_token, %{"list" => list.id})
140 test "disallows list stream that are not owned by the user", %{user: user, token: oauth_token} do
141 another_user = insert(:user)
142 {:ok, list} = List.create("Test", another_user)
144 assert {:error, _} = Streamer.get_topic("list:#{list.id}", user, oauth_token)
145 assert {:error, _} = Streamer.get_topic("list", user, oauth_token, %{"list" => list.id})
149 describe "user streams" do
151 %{user: user, token: token} = oauth_access(["read"])
152 notify = insert(:notification, user: user, activity: build(:note_activity))
153 {:ok, %{user: user, notify: notify, token: token}}
156 test "it streams the user's post in the 'user' stream", %{user: user, token: oauth_token} do
157 Streamer.get_topic_and_add_socket("user", user, oauth_token)
158 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
160 assert_receive {:render_with_user, _, _, ^activity}
161 refute Streamer.filtered_by_user?(user, activity)
164 test "it streams boosts of the user in the 'user' stream", %{user: user, token: oauth_token} do
165 Streamer.get_topic_and_add_socket("user", user, oauth_token)
167 other_user = insert(:user)
168 {:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
169 {:ok, announce} = CommonAPI.repeat(activity.id, user)
171 assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce}
172 refute Streamer.filtered_by_user?(user, announce)
175 test "it does not stream announces of the user's own posts in the 'user' stream", %{
179 Streamer.get_topic_and_add_socket("user", user, oauth_token)
181 other_user = insert(:user)
182 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
183 {:ok, announce} = CommonAPI.repeat(activity.id, other_user)
185 assert Streamer.filtered_by_user?(user, announce)
188 test "it does stream notifications announces of the user's own posts in the 'user' stream", %{
192 Streamer.get_topic_and_add_socket("user", user, oauth_token)
194 other_user = insert(:user)
195 {:ok, activity} = CommonAPI.post(user, %{status: "hey"})
196 {:ok, announce} = CommonAPI.repeat(activity.id, other_user)
200 |> Repo.get_by(%{user_id: user.id, activity_id: announce.id})
201 |> Repo.preload(:activity)
203 refute Streamer.filtered_by_user?(user, notification)
206 test "it streams boosts of mastodon user in the 'user' stream", %{
210 Streamer.get_topic_and_add_socket("user", user, oauth_token)
212 other_user = insert(:user)
213 {:ok, activity} = CommonAPI.post(other_user, %{status: "hey"})
216 File.read!("test/fixtures/mastodon-announce.json")
218 |> Map.put("object", activity.data["object"])
219 |> Map.put("actor", user.ap_id)
221 {:ok, %Pleroma.Activity{data: _data, local: false} = announce} =
222 Pleroma.Web.ActivityPub.Transmogrifier.handle_incoming(data)
224 assert_receive {:render_with_user, Pleroma.Web.StreamerView, "update.json", ^announce}
225 refute Streamer.filtered_by_user?(user, announce)
228 test "it sends notify to in the 'user' stream", %{
233 Streamer.get_topic_and_add_socket("user", user, oauth_token)
234 Streamer.stream("user", notify)
236 assert_receive {:render_with_user, _, _, ^notify}
237 refute Streamer.filtered_by_user?(user, notify)
240 test "it sends notify to in the 'user:notification' stream", %{
245 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
246 Streamer.stream("user:notification", notify)
248 assert_receive {:render_with_user, _, _, ^notify}
249 refute Streamer.filtered_by_user?(user, notify)
252 test "it sends chat messages to the 'user:pleroma_chat' stream", %{
256 other_user = insert(:user)
258 {:ok, create_activity} =
259 CommonAPI.post_chat_message(other_user, user, "hey cirno", idempotency_key: "123")
261 object = Object.normalize(create_activity, false)
262 chat = Chat.get(user.id, other_user.ap_id)
263 cm_ref = MessageReference.for_chat_and_object(chat, object)
264 cm_ref = %{cm_ref | chat: chat, object: object}
266 Streamer.get_topic_and_add_socket("user:pleroma_chat", user, oauth_token)
267 Streamer.stream("user:pleroma_chat", {user, cm_ref})
269 text = StreamerView.render("chat_update.json", %{chat_message_reference: cm_ref})
271 assert text =~ "hey cirno"
272 assert_receive {:text, ^text}
275 test "it sends chat messages to the 'user' stream", %{user: user, token: oauth_token} do
276 other_user = insert(:user)
278 {:ok, create_activity} = CommonAPI.post_chat_message(other_user, user, "hey cirno")
279 object = Object.normalize(create_activity, false)
280 chat = Chat.get(user.id, other_user.ap_id)
281 cm_ref = MessageReference.for_chat_and_object(chat, object)
282 cm_ref = %{cm_ref | chat: chat, object: object}
284 Streamer.get_topic_and_add_socket("user", user, oauth_token)
285 Streamer.stream("user", {user, cm_ref})
287 text = StreamerView.render("chat_update.json", %{chat_message_reference: cm_ref})
289 assert text =~ "hey cirno"
290 assert_receive {:text, ^text}
293 test "it sends chat message notifications to the 'user:notification' stream", %{
297 other_user = insert(:user)
299 {:ok, create_activity} = CommonAPI.post_chat_message(other_user, user, "hey")
302 Repo.get_by(Pleroma.Notification, user_id: user.id, activity_id: create_activity.id)
303 |> Repo.preload(:activity)
305 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
306 Streamer.stream("user:notification", notify)
308 assert_receive {:render_with_user, _, _, ^notify}
309 refute Streamer.filtered_by_user?(user, notify)
312 test "it doesn't send notify to the 'user:notification' stream when a user is blocked", %{
316 blocked = insert(:user)
317 {:ok, _user_relationship} = User.block(user, blocked)
319 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
321 {:ok, activity} = CommonAPI.post(user, %{status: ":("})
322 {:ok, _} = CommonAPI.favorite(blocked, activity.id)
327 test "it doesn't send notify to the 'user:notification' stream when a thread is muted", %{
331 user2 = insert(:user)
333 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
334 {:ok, _} = CommonAPI.add_mute(user, activity)
336 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
338 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
341 assert Streamer.filtered_by_user?(user, favorite_activity)
344 test "it sends favorite to 'user:notification' stream'", %{
348 user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
350 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
351 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
352 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
354 assert_receive {:render_with_user, _, "notification.json", notif}
355 assert notif.activity.id == favorite_activity.id
356 refute Streamer.filtered_by_user?(user, notif)
359 test "it doesn't send the 'user:notification' stream' when a domain is blocked", %{
363 user2 = insert(:user, %{ap_id: "https://hecking-lewd-place.com/user/meanie"})
365 {:ok, user} = User.block_domain(user, "hecking-lewd-place.com")
366 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
367 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
368 {:ok, favorite_activity} = CommonAPI.favorite(user2, activity.id)
371 assert Streamer.filtered_by_user?(user, favorite_activity)
374 test "it sends follow activities to the 'user:notification' stream", %{
378 user_url = user.ap_id
379 user2 = insert(:user)
382 File.read!("test/fixtures/users_mock/localhost.json")
383 |> String.replace("{{nickname}}", user.nickname)
386 Tesla.Mock.mock_global(fn
387 %{method: :get, url: ^user_url} ->
388 %Tesla.Env{status: 200, body: body}
391 Streamer.get_topic_and_add_socket("user:notification", user, oauth_token)
392 {:ok, _follower, _followed, follow_activity} = CommonAPI.follow(user2, user)
394 assert_receive {:render_with_user, _, "notification.json", notif}
395 assert notif.activity.id == follow_activity.id
396 refute Streamer.filtered_by_user?(user, notif)
400 describe "public streams" do
401 test "it sends to public (authenticated)" do
402 %{user: user, token: oauth_token} = oauth_access(["read"])
403 other_user = insert(:user)
405 Streamer.get_topic_and_add_socket("public", user, oauth_token)
407 {:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
408 assert_receive {:render_with_user, _, _, ^activity}
409 refute Streamer.filtered_by_user?(other_user, activity)
412 test "it sends to public (unauthenticated)" do
415 Streamer.get_topic_and_add_socket("public", nil, nil)
417 {:ok, activity} = CommonAPI.post(user, %{status: "Test"})
418 activity_id = activity.id
419 assert_receive {:text, event}
420 assert %{"event" => "update", "payload" => payload} = Jason.decode!(event)
421 assert %{"id" => ^activity_id} = Jason.decode!(payload)
423 {:ok, _} = CommonAPI.delete(activity.id, user)
424 assert_receive {:text, event}
425 assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
428 test "handles deletions" do
429 %{user: user, token: oauth_token} = oauth_access(["read"])
430 other_user = insert(:user)
431 {:ok, activity} = CommonAPI.post(other_user, %{status: "Test"})
433 Streamer.get_topic_and_add_socket("public", user, oauth_token)
435 {:ok, _} = CommonAPI.delete(activity.id, other_user)
436 activity_id = activity.id
437 assert_receive {:text, event}
438 assert %{"event" => "delete", "payload" => ^activity_id} = Jason.decode!(event)
442 describe "thread_containment/2" do
443 test "it filters to user if recipients invalid and thread containment is enabled" do
444 Pleroma.Config.put([:instance, :skip_thread_containment], false)
445 author = insert(:user)
446 %{user: user, token: oauth_token} = oauth_access(["read"])
447 User.follow(user, author, :follow_accept)
450 insert(:note_activity,
454 data: %{"to" => ["TEST-FFF"]}
458 Streamer.get_topic_and_add_socket("public", user, oauth_token)
459 Streamer.stream("public", activity)
460 assert_receive {:render_with_user, _, _, ^activity}
461 assert Streamer.filtered_by_user?(user, activity)
464 test "it sends message if recipients invalid and thread containment is disabled" do
465 Pleroma.Config.put([:instance, :skip_thread_containment], true)
466 author = insert(:user)
467 %{user: user, token: oauth_token} = oauth_access(["read"])
468 User.follow(user, author, :follow_accept)
471 insert(:note_activity,
475 data: %{"to" => ["TEST-FFF"]}
479 Streamer.get_topic_and_add_socket("public", user, oauth_token)
480 Streamer.stream("public", activity)
482 assert_receive {:render_with_user, _, _, ^activity}
483 refute Streamer.filtered_by_user?(user, activity)
486 test "it sends message if recipients invalid and thread containment is enabled but user's thread containment is disabled" do
487 Pleroma.Config.put([:instance, :skip_thread_containment], false)
488 author = insert(:user)
489 user = insert(:user, skip_thread_containment: true)
490 %{token: oauth_token} = oauth_access(["read"], user: user)
491 User.follow(user, author, :follow_accept)
494 insert(:note_activity,
498 data: %{"to" => ["TEST-FFF"]}
502 Streamer.get_topic_and_add_socket("public", user, oauth_token)
503 Streamer.stream("public", activity)
505 assert_receive {:render_with_user, _, _, ^activity}
506 refute Streamer.filtered_by_user?(user, activity)
511 setup do: oauth_access(["read"])
513 test "it filters messages involving blocked users", %{user: user, token: oauth_token} do
514 blocked_user = insert(:user)
515 {:ok, _user_relationship} = User.block(user, blocked_user)
517 Streamer.get_topic_and_add_socket("public", user, oauth_token)
518 {:ok, activity} = CommonAPI.post(blocked_user, %{status: "Test"})
519 assert_receive {:render_with_user, _, _, ^activity}
520 assert Streamer.filtered_by_user?(user, activity)
523 test "it filters messages transitively involving blocked users", %{
527 blockee = insert(:user)
528 friend = insert(:user)
530 Streamer.get_topic_and_add_socket("public", blocker, blocker_token)
532 {:ok, _user_relationship} = User.block(blocker, blockee)
534 {:ok, activity_one} = CommonAPI.post(friend, %{status: "hey! @#{blockee.nickname}"})
536 assert_receive {:render_with_user, _, _, ^activity_one}
537 assert Streamer.filtered_by_user?(blocker, activity_one)
539 {:ok, activity_two} = CommonAPI.post(blockee, %{status: "hey! @#{friend.nickname}"})
541 assert_receive {:render_with_user, _, _, ^activity_two}
542 assert Streamer.filtered_by_user?(blocker, activity_two)
544 {:ok, activity_three} = CommonAPI.post(blockee, %{status: "hey! @#{blocker.nickname}"})
546 assert_receive {:render_with_user, _, _, ^activity_three}
547 assert Streamer.filtered_by_user?(blocker, activity_three)
552 setup do: oauth_access(["read"])
554 test "it doesn't send unwanted DMs to list", %{user: user_a, token: user_a_token} do
555 user_b = insert(:user)
556 user_c = insert(:user)
558 {:ok, user_a} = User.follow(user_a, user_b)
560 {:ok, list} = List.create("Test", user_a)
561 {:ok, list} = List.follow(list, user_b)
563 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
566 CommonAPI.post(user_b, %{
567 status: "@#{user_c.nickname} Test",
574 test "it doesn't send unwanted private posts to list", %{user: user_a, token: user_a_token} do
575 user_b = insert(:user)
577 {:ok, list} = List.create("Test", user_a)
578 {:ok, list} = List.follow(list, user_b)
580 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
583 CommonAPI.post(user_b, %{
585 visibility: "private"
591 test "it sends wanted private posts to list", %{user: user_a, token: user_a_token} do
592 user_b = insert(:user)
594 {:ok, user_a} = User.follow(user_a, user_b)
596 {:ok, list} = List.create("Test", user_a)
597 {:ok, list} = List.follow(list, user_b)
599 Streamer.get_topic_and_add_socket("list", user_a, user_a_token, %{"list" => list.id})
602 CommonAPI.post(user_b, %{
604 visibility: "private"
607 assert_receive {:render_with_user, _, _, ^activity}
608 refute Streamer.filtered_by_user?(user_a, activity)
612 describe "muted reblogs" do
613 setup do: oauth_access(["read"])
615 test "it filters muted reblogs", %{user: user1, token: user1_token} do
616 user2 = insert(:user)
617 user3 = insert(:user)
618 CommonAPI.follow(user1, user2)
619 CommonAPI.hide_reblogs(user1, user2)
621 {:ok, create_activity} = CommonAPI.post(user3, %{status: "I'm kawen"})
623 Streamer.get_topic_and_add_socket("user", user1, user1_token)
624 {:ok, announce_activity} = CommonAPI.repeat(create_activity.id, user2)
625 assert_receive {:render_with_user, _, _, ^announce_activity}
626 assert Streamer.filtered_by_user?(user1, announce_activity)
629 test "it filters reblog notification for reblog-muted actors", %{
633 user2 = insert(:user)
634 CommonAPI.follow(user1, user2)
635 CommonAPI.hide_reblogs(user1, user2)
637 {:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
638 Streamer.get_topic_and_add_socket("user", user1, user1_token)
639 {:ok, _announce_activity} = CommonAPI.repeat(create_activity.id, user2)
641 assert_receive {:render_with_user, _, "notification.json", notif}
642 assert Streamer.filtered_by_user?(user1, notif)
645 test "it send non-reblog notification for reblog-muted actors", %{
649 user2 = insert(:user)
650 CommonAPI.follow(user1, user2)
651 CommonAPI.hide_reblogs(user1, user2)
653 {:ok, create_activity} = CommonAPI.post(user1, %{status: "I'm kawen"})
654 Streamer.get_topic_and_add_socket("user", user1, user1_token)
655 {:ok, _favorite_activity} = CommonAPI.favorite(user2, create_activity.id)
657 assert_receive {:render_with_user, _, "notification.json", notif}
658 refute Streamer.filtered_by_user?(user1, notif)
662 describe "muted threads" do
663 test "it filters posts from muted threads" do
665 %{user: user2, token: user2_token} = oauth_access(["read"])
666 Streamer.get_topic_and_add_socket("user", user2, user2_token)
668 {:ok, user2, user, _activity} = CommonAPI.follow(user2, user)
669 {:ok, activity} = CommonAPI.post(user, %{status: "super hot take"})
670 {:ok, _} = CommonAPI.add_mute(user2, activity)
672 assert_receive {:render_with_user, _, _, ^activity}
673 assert Streamer.filtered_by_user?(user2, activity)
677 describe "direct streams" do
678 setup do: oauth_access(["read"])
680 test "it sends conversation update to the 'direct' stream", %{user: user, token: oauth_token} do
681 another_user = insert(:user)
683 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
685 {:ok, _create_activity} =
686 CommonAPI.post(another_user, %{
687 status: "hey @#{user.nickname}",
691 assert_receive {:text, received_event}
693 assert %{"event" => "conversation", "payload" => received_payload} =
694 Jason.decode!(received_event)
696 assert %{"last_status" => last_status} = Jason.decode!(received_payload)
697 [participation] = Participation.for_user(user)
698 assert last_status["pleroma"]["direct_conversation_id"] == participation.id
701 test "it doesn't send conversation update to the 'direct' stream when the last message in the conversation is deleted",
702 %{user: user, token: oauth_token} do
703 another_user = insert(:user)
705 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
707 {:ok, create_activity} =
708 CommonAPI.post(another_user, %{
709 status: "hi @#{user.nickname}",
713 create_activity_id = create_activity.id
714 assert_receive {:render_with_user, _, _, ^create_activity}
715 assert_receive {:text, received_conversation1}
716 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
718 {:ok, _} = CommonAPI.delete(create_activity_id, another_user)
720 assert_receive {:text, received_event}
722 assert %{"event" => "delete", "payload" => ^create_activity_id} =
723 Jason.decode!(received_event)
728 test "it sends conversation update to the 'direct' stream when a message is deleted", %{
732 another_user = insert(:user)
733 Streamer.get_topic_and_add_socket("direct", user, oauth_token)
735 {:ok, create_activity} =
736 CommonAPI.post(another_user, %{
737 status: "hi @#{user.nickname}",
741 {:ok, create_activity2} =
742 CommonAPI.post(another_user, %{
743 status: "hi @#{user.nickname} 2",
744 in_reply_to_status_id: create_activity.id,
748 assert_receive {:render_with_user, _, _, ^create_activity}
749 assert_receive {:render_with_user, _, _, ^create_activity2}
750 assert_receive {:text, received_conversation1}
751 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
752 assert_receive {:text, received_conversation1}
753 assert %{"event" => "conversation", "payload" => _} = Jason.decode!(received_conversation1)
755 {:ok, _} = CommonAPI.delete(create_activity2.id, another_user)
757 assert_receive {:text, received_event}
758 assert %{"event" => "delete", "payload" => _} = Jason.decode!(received_event)
760 assert_receive {:text, received_event}
762 assert %{"event" => "conversation", "payload" => received_payload} =
763 Jason.decode!(received_event)
765 assert %{"last_status" => last_status} = Jason.decode!(received_payload)
766 assert last_status["id"] == to_string(create_activity.id)