1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.ActivityPub.ActivityPubTest do
8 alias Pleroma.Builders.ActivityBuilder
11 alias Pleroma.Web.ActivityPub.ActivityPub
12 alias Pleroma.Web.ActivityPub.Utils
13 alias Pleroma.Web.AdminAPI.AccountView
14 alias Pleroma.Web.CommonAPI
16 import Pleroma.Factory
21 mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
25 clear_config([:instance, :federating])
27 describe "streaming out participations" do
28 test "it streams them out" do
30 {:ok, activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"})
32 {:ok, conversation} = Pleroma.Conversation.create_or_bump_for(activity)
35 conversation.participations
36 |> Repo.preload(:user)
38 with_mock Pleroma.Web.Streamer,
39 stream: fn _, _ -> nil end do
40 ActivityPub.stream_out_participations(conversation.participations)
42 assert called(Pleroma.Web.Streamer.stream("participation", participations))
47 describe "fetching restricted by visibility" do
48 test "it restricts by the appropriate visibility" do
51 {:ok, public_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "public"})
53 {:ok, direct_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"})
55 {:ok, unlisted_activity} =
56 CommonAPI.post(user, %{"status" => ".", "visibility" => "unlisted"})
58 {:ok, private_activity} =
59 CommonAPI.post(user, %{"status" => ".", "visibility" => "private"})
62 ActivityPub.fetch_activities([], %{:visibility => "direct", "actor_id" => user.ap_id})
64 assert activities == [direct_activity]
67 ActivityPub.fetch_activities([], %{:visibility => "unlisted", "actor_id" => user.ap_id})
69 assert activities == [unlisted_activity]
72 ActivityPub.fetch_activities([], %{:visibility => "private", "actor_id" => user.ap_id})
74 assert activities == [private_activity]
77 ActivityPub.fetch_activities([], %{:visibility => "public", "actor_id" => user.ap_id})
79 assert activities == [public_activity]
82 ActivityPub.fetch_activities([], %{
83 :visibility => ~w[private public],
84 "actor_id" => user.ap_id
87 assert activities == [public_activity, private_activity]
91 describe "fetching excluded by visibility" do
92 test "it excludes by the appropriate visibility" do
95 {:ok, public_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "public"})
97 {:ok, direct_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"})
99 {:ok, unlisted_activity} =
100 CommonAPI.post(user, %{"status" => ".", "visibility" => "unlisted"})
102 {:ok, private_activity} =
103 CommonAPI.post(user, %{"status" => ".", "visibility" => "private"})
106 ActivityPub.fetch_activities([], %{
107 "exclude_visibilities" => "direct",
108 "actor_id" => user.ap_id
111 assert public_activity in activities
112 assert unlisted_activity in activities
113 assert private_activity in activities
114 refute direct_activity in activities
117 ActivityPub.fetch_activities([], %{
118 "exclude_visibilities" => "unlisted",
119 "actor_id" => user.ap_id
122 assert public_activity in activities
123 refute unlisted_activity in activities
124 assert private_activity in activities
125 assert direct_activity in activities
128 ActivityPub.fetch_activities([], %{
129 "exclude_visibilities" => "private",
130 "actor_id" => user.ap_id
133 assert public_activity in activities
134 assert unlisted_activity in activities
135 refute private_activity in activities
136 assert direct_activity in activities
139 ActivityPub.fetch_activities([], %{
140 "exclude_visibilities" => "public",
141 "actor_id" => user.ap_id
144 refute public_activity in activities
145 assert unlisted_activity in activities
146 assert private_activity in activities
147 assert direct_activity in activities
151 describe "building a user from his ap id" do
152 test "it returns a user" do
153 user_id = "http://mastodon.example.org/users/admin"
154 {:ok, user} = ActivityPub.make_user_from_ap_id(user_id)
155 assert user.ap_id == user_id
156 assert user.nickname == "admin@mastodon.example.org"
157 assert user.info.source_data
158 assert user.info.ap_enabled
159 assert user.follower_address == "http://mastodon.example.org/users/admin/followers"
162 test "it fetches the appropriate tag-restricted posts" do
165 {:ok, status_one} = CommonAPI.post(user, %{"status" => ". #test"})
166 {:ok, status_two} = CommonAPI.post(user, %{"status" => ". #essais"})
167 {:ok, status_three} = CommonAPI.post(user, %{"status" => ". #test #reject"})
169 fetch_one = ActivityPub.fetch_activities([], %{"type" => "Create", "tag" => "test"})
172 ActivityPub.fetch_activities([], %{"type" => "Create", "tag" => ["test", "essais"]})
175 ActivityPub.fetch_activities([], %{
177 "tag" => ["test", "essais"],
178 "tag_reject" => ["reject"]
182 ActivityPub.fetch_activities([], %{
185 "tag_all" => ["test", "reject"]
188 assert fetch_one == [status_one, status_three]
189 assert fetch_two == [status_one, status_two, status_three]
190 assert fetch_three == [status_one, status_two]
191 assert fetch_four == [status_three]
195 describe "insertion" do
196 test "drops activities beyond a certain limit" do
197 limit = Pleroma.Config.get([:instance, :remote_limit])
200 :crypto.strong_rand_bytes(limit + 1)
202 |> binary_part(0, limit + 1)
207 "content" => random_text
211 assert {:error, {:remote_limit_error, _}} = ActivityPub.insert(data)
214 test "doesn't drop activities with content being null" do
218 "actor" => user.ap_id,
221 "actor" => user.ap_id,
228 assert {:ok, _} = ActivityPub.insert(data)
231 test "returns the activity if one with the same id is already in" do
232 activity = insert(:note_activity)
233 {:ok, new_activity} = ActivityPub.insert(activity.data)
235 assert activity.id == new_activity.id
238 test "inserts a given map into the activity database, giving it an id if it has none." do
242 "actor" => user.ap_id,
245 "actor" => user.ap_id,
252 {:ok, %Activity{} = activity} = ActivityPub.insert(data)
253 assert activity.data["ok"] == data["ok"]
254 assert is_binary(activity.data["id"])
260 "actor" => user.ap_id,
262 "context" => "blabla",
264 "actor" => user.ap_id,
271 {:ok, %Activity{} = activity} = ActivityPub.insert(data)
272 assert activity.data["ok"] == data["ok"]
273 assert activity.data["id"] == given_id
274 assert activity.data["context"] == "blabla"
275 assert activity.data["context_id"]
278 test "adds a context when none is there" do
282 "actor" => user.ap_id,
285 "actor" => user.ap_id,
292 {:ok, %Activity{} = activity} = ActivityPub.insert(data)
293 object = Pleroma.Object.normalize(activity)
295 assert is_binary(activity.data["context"])
296 assert is_binary(object.data["context"])
297 assert activity.data["context_id"]
298 assert object.data["context_id"]
301 test "adds an id to a given object if it lacks one and is a note and inserts it to the object database" do
305 "actor" => user.ap_id,
308 "actor" => user.ap_id,
315 {:ok, %Activity{} = activity} = ActivityPub.insert(data)
316 assert object = Object.normalize(activity)
317 assert is_binary(object.data["id"])
321 describe "listen activities" do
322 test "does not increase user note count" do
326 ActivityPub.listen(%{
327 to: ["https://www.w3.org/ns/activitystreams#Public"],
331 "actor" => user.ap_id,
332 "to" => ["https://www.w3.org/ns/activitystreams#Public"],
334 "title" => "lain radio episode 1",
340 assert activity.actor == user.ap_id
342 user = User.get_cached_by_id(user.id)
343 assert user.info.note_count == 0
346 test "can be fetched into a timeline" do
347 _listen_activity_1 = insert(:listen)
348 _listen_activity_2 = insert(:listen)
349 _listen_activity_3 = insert(:listen)
351 timeline = ActivityPub.fetch_activities([], %{"type" => ["Listen"]})
353 assert length(timeline) == 3
357 describe "create activities" do
358 test "removes doubled 'to' recipients" do
362 ActivityPub.create(%{
363 to: ["user1", "user1", "user2"],
367 "to" => ["user1", "user1", "user2"],
369 "content" => "testing"
373 assert activity.data["to"] == ["user1", "user2"]
374 assert activity.actor == user.ap_id
375 assert activity.recipients == ["user1", "user2", user.ap_id]
378 test "increases user note count only for public activities" do
382 CommonAPI.post(User.get_cached_by_id(user.id), %{
384 "visibility" => "public"
388 CommonAPI.post(User.get_cached_by_id(user.id), %{
390 "visibility" => "unlisted"
394 CommonAPI.post(User.get_cached_by_id(user.id), %{
396 "visibility" => "private"
400 CommonAPI.post(User.get_cached_by_id(user.id), %{
402 "visibility" => "direct"
405 user = User.get_cached_by_id(user.id)
406 assert user.info.note_count == 2
409 test "increases replies count" do
411 user2 = insert(:user)
413 {:ok, activity} = CommonAPI.post(user, %{"status" => "1", "visibility" => "public"})
414 ap_id = activity.data["id"]
415 reply_data = %{"status" => "1", "in_reply_to_status_id" => activity.id}
418 {:ok, _} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "public"))
419 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
420 assert object.data["repliesCount"] == 1
423 {:ok, _} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "unlisted"))
424 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
425 assert object.data["repliesCount"] == 2
428 {:ok, _} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "private"))
429 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
430 assert object.data["repliesCount"] == 2
433 {:ok, _} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "direct"))
434 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
435 assert object.data["repliesCount"] == 2
439 describe "fetch activities for recipients" do
440 test "retrieve the activities for certain recipients" do
441 {:ok, activity_one} = ActivityBuilder.insert(%{"to" => ["someone"]})
442 {:ok, activity_two} = ActivityBuilder.insert(%{"to" => ["someone_else"]})
443 {:ok, _activity_three} = ActivityBuilder.insert(%{"to" => ["noone"]})
445 activities = ActivityPub.fetch_activities(["someone", "someone_else"])
446 assert length(activities) == 2
447 assert activities == [activity_one, activity_two]
451 describe "fetch activities in context" do
452 test "retrieves activities that have a given context" do
453 {:ok, activity} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
454 {:ok, activity_two} = ActivityBuilder.insert(%{"type" => "Create", "context" => "2hu"})
455 {:ok, _activity_three} = ActivityBuilder.insert(%{"type" => "Create", "context" => "3hu"})
456 {:ok, _activity_four} = ActivityBuilder.insert(%{"type" => "Announce", "context" => "2hu"})
457 activity_five = insert(:note_activity)
460 {:ok, user} = User.block(user, %{ap_id: activity_five.data["actor"]})
462 activities = ActivityPub.fetch_activities_for_context("2hu", %{"blocking_user" => user})
463 assert activities == [activity_two, activity]
467 test "doesn't return blocked activities" do
468 activity_one = insert(:note_activity)
469 activity_two = insert(:note_activity)
470 activity_three = insert(:note_activity)
472 booster = insert(:user)
473 {:ok, user} = User.block(user, %{ap_id: activity_one.data["actor"]})
476 ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
478 assert Enum.member?(activities, activity_two)
479 assert Enum.member?(activities, activity_three)
480 refute Enum.member?(activities, activity_one)
482 {:ok, user} = User.unblock(user, %{ap_id: activity_one.data["actor"]})
485 ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
487 assert Enum.member?(activities, activity_two)
488 assert Enum.member?(activities, activity_three)
489 assert Enum.member?(activities, activity_one)
491 {:ok, user} = User.block(user, %{ap_id: activity_three.data["actor"]})
492 {:ok, _announce, %{data: %{"id" => id}}} = CommonAPI.repeat(activity_three.id, booster)
493 %Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
494 activity_three = Activity.get_by_id(activity_three.id)
497 ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
499 assert Enum.member?(activities, activity_two)
500 refute Enum.member?(activities, activity_three)
501 refute Enum.member?(activities, boost_activity)
502 assert Enum.member?(activities, activity_one)
505 ActivityPub.fetch_activities([], %{"blocking_user" => nil, "skip_preload" => true})
507 assert Enum.member?(activities, activity_two)
508 assert Enum.member?(activities, activity_three)
509 assert Enum.member?(activities, boost_activity)
510 assert Enum.member?(activities, activity_one)
513 test "doesn't return transitive interactions concerning blocked users" do
514 blocker = insert(:user)
515 blockee = insert(:user)
516 friend = insert(:user)
518 {:ok, blocker} = User.block(blocker, blockee)
520 {:ok, activity_one} = CommonAPI.post(friend, %{"status" => "hey!"})
522 {:ok, activity_two} = CommonAPI.post(friend, %{"status" => "hey! @#{blockee.nickname}"})
524 {:ok, activity_three} = CommonAPI.post(blockee, %{"status" => "hey! @#{friend.nickname}"})
526 {:ok, activity_four} = CommonAPI.post(blockee, %{"status" => "hey! @#{blocker.nickname}"})
528 activities = ActivityPub.fetch_activities([], %{"blocking_user" => blocker})
530 assert Enum.member?(activities, activity_one)
531 refute Enum.member?(activities, activity_two)
532 refute Enum.member?(activities, activity_three)
533 refute Enum.member?(activities, activity_four)
536 test "doesn't return announce activities concerning blocked users" do
537 blocker = insert(:user)
538 blockee = insert(:user)
539 friend = insert(:user)
541 {:ok, blocker} = User.block(blocker, blockee)
543 {:ok, activity_one} = CommonAPI.post(friend, %{"status" => "hey!"})
545 {:ok, activity_two} = CommonAPI.post(blockee, %{"status" => "hey! @#{friend.nickname}"})
547 {:ok, activity_three, _} = CommonAPI.repeat(activity_two.id, friend)
550 ActivityPub.fetch_activities([], %{"blocking_user" => blocker})
551 |> Enum.map(fn act -> act.id end)
553 assert Enum.member?(activities, activity_one.id)
554 refute Enum.member?(activities, activity_two.id)
555 refute Enum.member?(activities, activity_three.id)
558 test "doesn't return activities from blocked domains" do
559 domain = "dogwhistle.zone"
560 domain_user = insert(:user, %{ap_id: "https://#{domain}/@pundit"})
561 note = insert(:note, %{data: %{"actor" => domain_user.ap_id}})
562 activity = insert(:note_activity, %{note: note})
564 {:ok, user} = User.block_domain(user, domain)
567 ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
569 refute activity in activities
571 followed_user = insert(:user)
572 ActivityPub.follow(user, followed_user)
573 {:ok, repeat_activity, _} = CommonAPI.repeat(activity.id, followed_user)
576 ActivityPub.fetch_activities([], %{"blocking_user" => user, "skip_preload" => true})
578 refute repeat_activity in activities
581 test "doesn't return muted activities" do
582 activity_one = insert(:note_activity)
583 activity_two = insert(:note_activity)
584 activity_three = insert(:note_activity)
586 booster = insert(:user)
587 {:ok, user} = User.mute(user, %User{ap_id: activity_one.data["actor"]})
590 ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
592 assert Enum.member?(activities, activity_two)
593 assert Enum.member?(activities, activity_three)
594 refute Enum.member?(activities, activity_one)
596 # Calling with 'with_muted' will deliver muted activities, too.
598 ActivityPub.fetch_activities([], %{
599 "muting_user" => user,
600 "with_muted" => true,
601 "skip_preload" => true
604 assert Enum.member?(activities, activity_two)
605 assert Enum.member?(activities, activity_three)
606 assert Enum.member?(activities, activity_one)
608 {:ok, user} = User.unmute(user, %User{ap_id: activity_one.data["actor"]})
611 ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
613 assert Enum.member?(activities, activity_two)
614 assert Enum.member?(activities, activity_three)
615 assert Enum.member?(activities, activity_one)
617 {:ok, user} = User.mute(user, %User{ap_id: activity_three.data["actor"]})
618 {:ok, _announce, %{data: %{"id" => id}}} = CommonAPI.repeat(activity_three.id, booster)
619 %Activity{} = boost_activity = Activity.get_create_by_object_ap_id(id)
620 activity_three = Activity.get_by_id(activity_three.id)
623 ActivityPub.fetch_activities([], %{"muting_user" => user, "skip_preload" => true})
625 assert Enum.member?(activities, activity_two)
626 refute Enum.member?(activities, activity_three)
627 refute Enum.member?(activities, boost_activity)
628 assert Enum.member?(activities, activity_one)
630 activities = ActivityPub.fetch_activities([], %{"muting_user" => nil, "skip_preload" => true})
632 assert Enum.member?(activities, activity_two)
633 assert Enum.member?(activities, activity_three)
634 assert Enum.member?(activities, boost_activity)
635 assert Enum.member?(activities, activity_one)
638 test "doesn't return thread muted activities" do
640 _activity_one = insert(:note_activity)
641 note_two = insert(:note, data: %{"context" => "suya.."})
642 activity_two = insert(:note_activity, note: note_two)
644 {:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
646 assert [_activity_one] = ActivityPub.fetch_activities([], %{"muting_user" => user})
649 test "returns thread muted activities when with_muted is set" do
651 _activity_one = insert(:note_activity)
652 note_two = insert(:note, data: %{"context" => "suya.."})
653 activity_two = insert(:note_activity, note: note_two)
655 {:ok, _activity_two} = CommonAPI.add_mute(user, activity_two)
657 assert [_activity_two, _activity_one] =
658 ActivityPub.fetch_activities([], %{"muting_user" => user, "with_muted" => true})
661 test "does include announces on request" do
662 activity_three = insert(:note_activity)
664 booster = insert(:user)
666 {:ok, user} = User.follow(user, booster)
668 {:ok, announce, _object} = CommonAPI.repeat(activity_three.id, booster)
670 [announce_activity] = ActivityPub.fetch_activities([user.ap_id | user.following])
672 assert announce_activity.id == announce.id
675 test "excludes reblogs on request" do
677 {:ok, expected_activity} = ActivityBuilder.insert(%{"type" => "Create"}, %{:user => user})
678 {:ok, _} = ActivityBuilder.insert(%{"type" => "Announce"}, %{:user => user})
680 [activity] = ActivityPub.fetch_user_activities(user, nil, %{"exclude_reblogs" => "true"})
682 assert activity == expected_activity
685 describe "public fetch activities" do
686 test "doesn't retrieve unlisted activities" do
689 {:ok, _unlisted_activity} =
690 CommonAPI.post(user, %{"status" => "yeah", "visibility" => "unlisted"})
692 {:ok, listed_activity} = CommonAPI.post(user, %{"status" => "yeah"})
694 [activity] = ActivityPub.fetch_public_activities()
696 assert activity == listed_activity
699 test "retrieves public activities" do
700 _activities = ActivityPub.fetch_public_activities()
702 %{public: public} = ActivityBuilder.public_and_non_public()
704 activities = ActivityPub.fetch_public_activities()
705 assert length(activities) == 1
706 assert Enum.at(activities, 0) == public
709 test "retrieves a maximum of 20 activities" do
710 activities = ActivityBuilder.insert_list(30)
711 last_expected = List.last(activities)
713 activities = ActivityPub.fetch_public_activities()
714 last = List.last(activities)
716 assert length(activities) == 20
717 assert last == last_expected
720 test "retrieves ids starting from a since_id" do
721 activities = ActivityBuilder.insert_list(30)
722 later_activities = ActivityBuilder.insert_list(10)
723 since_id = List.last(activities).id
724 last_expected = List.last(later_activities)
726 activities = ActivityPub.fetch_public_activities(%{"since_id" => since_id})
727 last = List.last(activities)
729 assert length(activities) == 10
730 assert last == last_expected
733 test "retrieves ids up to max_id" do
734 _first_activities = ActivityBuilder.insert_list(10)
735 activities = ActivityBuilder.insert_list(20)
736 later_activities = ActivityBuilder.insert_list(10)
737 max_id = List.first(later_activities).id
738 last_expected = List.last(activities)
740 activities = ActivityPub.fetch_public_activities(%{"max_id" => max_id})
741 last = List.last(activities)
743 assert length(activities) == 20
744 assert last == last_expected
747 test "paginates via offset/limit" do
748 _first_activities = ActivityBuilder.insert_list(10)
749 activities = ActivityBuilder.insert_list(10)
750 _later_activities = ActivityBuilder.insert_list(10)
751 first_expected = List.first(activities)
754 ActivityPub.fetch_public_activities(%{"page" => "2", "page_size" => "20"}, :offset)
756 first = List.first(activities)
758 assert length(activities) == 20
759 assert first == first_expected
762 test "doesn't return reblogs for users for whom reblogs have been muted" do
763 activity = insert(:note_activity)
765 booster = insert(:user)
766 {:ok, user} = CommonAPI.hide_reblogs(user, booster)
768 {:ok, activity, _} = CommonAPI.repeat(activity.id, booster)
770 activities = ActivityPub.fetch_activities([], %{"muting_user" => user})
772 refute Enum.any?(activities, fn %{id: id} -> id == activity.id end)
775 test "returns reblogs for users for whom reblogs have not been muted" do
776 activity = insert(:note_activity)
778 booster = insert(:user)
779 {:ok, user} = CommonAPI.hide_reblogs(user, booster)
780 {:ok, user} = CommonAPI.show_reblogs(user, booster)
782 {:ok, activity, _} = CommonAPI.repeat(activity.id, booster)
784 activities = ActivityPub.fetch_activities([], %{"muting_user" => user})
786 assert Enum.any?(activities, fn %{id: id} -> id == activity.id end)
790 describe "like an object" do
791 test_with_mock "sends an activity to federation", Pleroma.Web.Federator, [:passthrough], [] do
792 Pleroma.Config.put([:instance, :federating], true)
793 note_activity = insert(:note_activity)
794 assert object_activity = Object.normalize(note_activity)
798 {:ok, like_activity, _object} = ActivityPub.like(user, object_activity)
799 assert called(Pleroma.Web.Federator.publish(like_activity))
802 test "returns exist activity if object already liked" do
803 note_activity = insert(:note_activity)
804 assert object_activity = Object.normalize(note_activity)
808 {:ok, like_activity, _object} = ActivityPub.like(user, object_activity)
810 {:ok, like_activity_exist, _object} = ActivityPub.like(user, object_activity)
811 assert like_activity == like_activity_exist
814 test "adds a like activity to the db" do
815 note_activity = insert(:note_activity)
816 assert object = Object.normalize(note_activity)
819 user_two = insert(:user)
821 {:ok, like_activity, object} = ActivityPub.like(user, object)
823 assert like_activity.data["actor"] == user.ap_id
824 assert like_activity.data["type"] == "Like"
825 assert like_activity.data["object"] == object.data["id"]
826 assert like_activity.data["to"] == [User.ap_followers(user), note_activity.data["actor"]]
827 assert like_activity.data["context"] == object.data["context"]
828 assert object.data["like_count"] == 1
829 assert object.data["likes"] == [user.ap_id]
831 # Just return the original activity if the user already liked it.
832 {:ok, same_like_activity, object} = ActivityPub.like(user, object)
834 assert like_activity == same_like_activity
835 assert object.data["likes"] == [user.ap_id]
836 assert object.data["like_count"] == 1
838 {:ok, _like_activity, object} = ActivityPub.like(user_two, object)
839 assert object.data["like_count"] == 2
843 describe "unliking" do
844 test_with_mock "sends an activity to federation", Pleroma.Web.Federator, [:passthrough], [] do
845 Pleroma.Config.put([:instance, :federating], true)
847 note_activity = insert(:note_activity)
848 object = Object.normalize(note_activity)
851 {:ok, object} = ActivityPub.unlike(user, object)
852 refute called(Pleroma.Web.Federator.publish())
854 {:ok, _like_activity, object} = ActivityPub.like(user, object)
855 assert object.data["like_count"] == 1
857 {:ok, unlike_activity, _, object} = ActivityPub.unlike(user, object)
858 assert object.data["like_count"] == 0
860 assert called(Pleroma.Web.Federator.publish(unlike_activity))
863 test "unliking a previously liked object" do
864 note_activity = insert(:note_activity)
865 object = Object.normalize(note_activity)
868 # Unliking something that hasn't been liked does nothing
869 {:ok, object} = ActivityPub.unlike(user, object)
870 assert object.data["like_count"] == 0
872 {:ok, like_activity, object} = ActivityPub.like(user, object)
873 assert object.data["like_count"] == 1
875 {:ok, unlike_activity, _, object} = ActivityPub.unlike(user, object)
876 assert object.data["like_count"] == 0
878 assert Activity.get_by_id(like_activity.id) == nil
879 assert note_activity.actor in unlike_activity.recipients
883 describe "announcing an object" do
884 test "adds an announce activity to the db" do
885 note_activity = insert(:note_activity)
886 object = Object.normalize(note_activity)
889 {:ok, announce_activity, object} = ActivityPub.announce(user, object)
890 assert object.data["announcement_count"] == 1
891 assert object.data["announcements"] == [user.ap_id]
893 assert announce_activity.data["to"] == [
894 User.ap_followers(user),
895 note_activity.data["actor"]
898 assert announce_activity.data["object"] == object.data["id"]
899 assert announce_activity.data["actor"] == user.ap_id
900 assert announce_activity.data["context"] == object.data["context"]
904 describe "announcing a private object" do
905 test "adds an announce activity to the db if the audience is not widened" do
907 {:ok, note_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "private"})
908 object = Object.normalize(note_activity)
910 {:ok, announce_activity, object} = ActivityPub.announce(user, object, nil, true, false)
912 assert announce_activity.data["to"] == [User.ap_followers(user)]
914 assert announce_activity.data["object"] == object.data["id"]
915 assert announce_activity.data["actor"] == user.ap_id
916 assert announce_activity.data["context"] == object.data["context"]
919 test "does not add an announce activity to the db if the audience is widened" do
921 {:ok, note_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "private"})
922 object = Object.normalize(note_activity)
924 assert {:error, _} = ActivityPub.announce(user, object, nil, true, true)
927 test "does not add an announce activity to the db if the announcer is not the author" do
929 announcer = insert(:user)
930 {:ok, note_activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "private"})
931 object = Object.normalize(note_activity)
933 assert {:error, _} = ActivityPub.announce(announcer, object, nil, true, false)
937 describe "unannouncing an object" do
938 test "unannouncing a previously announced object" do
939 note_activity = insert(:note_activity)
940 object = Object.normalize(note_activity)
943 # Unannouncing an object that is not announced does nothing
944 # {:ok, object} = ActivityPub.unannounce(user, object)
945 # assert object.data["announcement_count"] == 0
947 {:ok, announce_activity, object} = ActivityPub.announce(user, object)
948 assert object.data["announcement_count"] == 1
950 {:ok, unannounce_activity, object} = ActivityPub.unannounce(user, object)
951 assert object.data["announcement_count"] == 0
953 assert unannounce_activity.data["to"] == [
954 User.ap_followers(user),
958 assert unannounce_activity.data["type"] == "Undo"
959 assert unannounce_activity.data["object"] == announce_activity.data
960 assert unannounce_activity.data["actor"] == user.ap_id
961 assert unannounce_activity.data["context"] == announce_activity.data["context"]
963 assert Activity.get_by_id(announce_activity.id) == nil
967 describe "uploading files" do
968 test "copies the file to the configured folder" do
970 content_type: "image/jpg",
971 path: Path.absname("test/fixtures/image.jpg"),
972 filename: "an_image.jpg"
975 {:ok, %Object{} = object} = ActivityPub.upload(file)
976 assert object.data["name"] == "an_image.jpg"
979 test "works with base64 encoded images" do
984 {:ok, %Object{}} = ActivityPub.upload(file)
988 describe "fetch the latest Follow" do
989 test "fetches the latest Follow activity" do
990 %Activity{data: %{"type" => "Follow"}} = activity = insert(:follow_activity)
991 follower = Repo.get_by(User, ap_id: activity.data["actor"])
992 followed = Repo.get_by(User, ap_id: activity.data["object"])
994 assert activity == Utils.fetch_latest_follow(follower, followed)
998 describe "following / unfollowing" do
999 test "creates a follow activity" do
1000 follower = insert(:user)
1001 followed = insert(:user)
1003 {:ok, activity} = ActivityPub.follow(follower, followed)
1004 assert activity.data["type"] == "Follow"
1005 assert activity.data["actor"] == follower.ap_id
1006 assert activity.data["object"] == followed.ap_id
1009 test "creates an undo activity for the last follow" do
1010 follower = insert(:user)
1011 followed = insert(:user)
1013 {:ok, follow_activity} = ActivityPub.follow(follower, followed)
1014 {:ok, activity} = ActivityPub.unfollow(follower, followed)
1016 assert activity.data["type"] == "Undo"
1017 assert activity.data["actor"] == follower.ap_id
1019 embedded_object = activity.data["object"]
1020 assert is_map(embedded_object)
1021 assert embedded_object["type"] == "Follow"
1022 assert embedded_object["object"] == followed.ap_id
1023 assert embedded_object["id"] == follow_activity.data["id"]
1027 describe "blocking / unblocking" do
1028 test "creates a block activity" do
1029 blocker = insert(:user)
1030 blocked = insert(:user)
1032 {:ok, activity} = ActivityPub.block(blocker, blocked)
1034 assert activity.data["type"] == "Block"
1035 assert activity.data["actor"] == blocker.ap_id
1036 assert activity.data["object"] == blocked.ap_id
1039 test "creates an undo activity for the last block" do
1040 blocker = insert(:user)
1041 blocked = insert(:user)
1043 {:ok, block_activity} = ActivityPub.block(blocker, blocked)
1044 {:ok, activity} = ActivityPub.unblock(blocker, blocked)
1046 assert activity.data["type"] == "Undo"
1047 assert activity.data["actor"] == blocker.ap_id
1049 embedded_object = activity.data["object"]
1050 assert is_map(embedded_object)
1051 assert embedded_object["type"] == "Block"
1052 assert embedded_object["object"] == blocked.ap_id
1053 assert embedded_object["id"] == block_activity.data["id"]
1057 describe "deletion" do
1058 test "it creates a delete activity and deletes the original object" do
1059 note = insert(:note_activity)
1060 object = Object.normalize(note)
1061 {:ok, delete} = ActivityPub.delete(object)
1063 assert delete.data["type"] == "Delete"
1064 assert delete.data["actor"] == note.data["actor"]
1065 assert delete.data["object"] == object.data["id"]
1067 assert Activity.get_by_id(delete.id) != nil
1069 assert Repo.get(Object, object.id).data["type"] == "Tombstone"
1072 test "decrements user note count only for public activities" do
1073 user = insert(:user, info: %{note_count: 10})
1076 CommonAPI.post(User.get_cached_by_id(user.id), %{
1078 "visibility" => "public"
1082 CommonAPI.post(User.get_cached_by_id(user.id), %{
1084 "visibility" => "unlisted"
1088 CommonAPI.post(User.get_cached_by_id(user.id), %{
1090 "visibility" => "private"
1094 CommonAPI.post(User.get_cached_by_id(user.id), %{
1096 "visibility" => "direct"
1099 {:ok, _} = Object.normalize(a1) |> ActivityPub.delete()
1100 {:ok, _} = Object.normalize(a2) |> ActivityPub.delete()
1101 {:ok, _} = Object.normalize(a3) |> ActivityPub.delete()
1102 {:ok, _} = Object.normalize(a4) |> ActivityPub.delete()
1104 user = User.get_cached_by_id(user.id)
1105 assert user.info.note_count == 10
1108 test "it creates a delete activity and checks that it is also sent to users mentioned by the deleted object" do
1109 user = insert(:user)
1110 note = insert(:note_activity)
1111 object = Object.normalize(note)
1117 "actor" => object.data["actor"],
1118 "id" => object.data["id"],
1119 "to" => [user.ap_id],
1123 |> Object.update_and_set_cache()
1125 {:ok, delete} = ActivityPub.delete(object)
1127 assert user.ap_id in delete.data["to"]
1130 test "decreases reply count" do
1131 user = insert(:user)
1132 user2 = insert(:user)
1134 {:ok, activity} = CommonAPI.post(user, %{"status" => "1", "visibility" => "public"})
1135 reply_data = %{"status" => "1", "in_reply_to_status_id" => activity.id}
1136 ap_id = activity.data["id"]
1138 {:ok, public_reply} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "public"))
1139 {:ok, unlisted_reply} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "unlisted"))
1140 {:ok, private_reply} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "private"))
1141 {:ok, direct_reply} = CommonAPI.post(user2, Map.put(reply_data, "visibility", "direct"))
1143 _ = CommonAPI.delete(direct_reply.id, user2)
1144 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
1145 assert object.data["repliesCount"] == 2
1147 _ = CommonAPI.delete(private_reply.id, user2)
1148 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
1149 assert object.data["repliesCount"] == 2
1151 _ = CommonAPI.delete(public_reply.id, user2)
1152 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
1153 assert object.data["repliesCount"] == 1
1155 _ = CommonAPI.delete(unlisted_reply.id, user2)
1156 assert %{data: data, object: object} = Activity.get_by_ap_id_with_object(ap_id)
1157 assert object.data["repliesCount"] == 0
1161 describe "timeline post-processing" do
1162 test "it filters broken threads" do
1163 user1 = insert(:user)
1164 user2 = insert(:user)
1165 user3 = insert(:user)
1167 {:ok, user1} = User.follow(user1, user3)
1168 assert User.following?(user1, user3)
1170 {:ok, user2} = User.follow(user2, user3)
1171 assert User.following?(user2, user3)
1173 {:ok, user3} = User.follow(user3, user2)
1174 assert User.following?(user3, user2)
1176 {:ok, public_activity} = CommonAPI.post(user3, %{"status" => "hi 1"})
1178 {:ok, private_activity_1} =
1179 CommonAPI.post(user3, %{"status" => "hi 2", "visibility" => "private"})
1181 {:ok, private_activity_2} =
1182 CommonAPI.post(user2, %{
1184 "visibility" => "private",
1185 "in_reply_to_status_id" => private_activity_1.id
1188 {:ok, private_activity_3} =
1189 CommonAPI.post(user3, %{
1191 "visibility" => "private",
1192 "in_reply_to_status_id" => private_activity_2.id
1196 ActivityPub.fetch_activities([user1.ap_id | user1.following])
1197 |> Enum.map(fn a -> a.id end)
1199 private_activity_1 = Activity.get_by_ap_id_with_object(private_activity_1.data["id"])
1201 assert [public_activity.id, private_activity_1.id, private_activity_3.id] == activities
1203 assert length(activities) == 3
1206 ActivityPub.fetch_activities([user1.ap_id | user1.following], %{"user" => user1})
1207 |> Enum.map(fn a -> a.id end)
1209 assert [public_activity.id, private_activity_1.id] == activities
1210 assert length(activities) == 2
1214 describe "update" do
1215 test "it creates an update activity with the new user data" do
1216 user = insert(:user)
1217 {:ok, user} = User.ensure_keys_present(user)
1218 user_data = Pleroma.Web.ActivityPub.UserView.render("user.json", %{user: user})
1221 ActivityPub.update(%{
1222 actor: user_data["id"],
1223 to: [user.follower_address],
1228 assert update.data["actor"] == user.ap_id
1229 assert update.data["to"] == [user.follower_address]
1230 assert embedded_object = update.data["object"]
1231 assert embedded_object["id"] == user_data["id"]
1232 assert embedded_object["type"] == user_data["type"]
1236 test "returned pinned statuses" do
1237 Pleroma.Config.put([:instance, :max_pinned_statuses], 3)
1238 user = insert(:user)
1240 {:ok, activity_one} = CommonAPI.post(user, %{"status" => "HI!!!"})
1241 {:ok, activity_two} = CommonAPI.post(user, %{"status" => "HI!!!"})
1242 {:ok, activity_three} = CommonAPI.post(user, %{"status" => "HI!!!"})
1244 CommonAPI.pin(activity_one.id, user)
1245 user = refresh_record(user)
1247 CommonAPI.pin(activity_two.id, user)
1248 user = refresh_record(user)
1250 CommonAPI.pin(activity_three.id, user)
1251 user = refresh_record(user)
1253 activities = ActivityPub.fetch_user_activities(user, nil, %{"pinned" => "true"})
1255 assert 3 = length(activities)
1258 describe "flag/1" do
1260 reporter = insert(:user)
1261 target_account = insert(:user)
1263 {:ok, activity} = CommonAPI.post(target_account, %{"status" => content})
1264 context = Utils.generate_context_id()
1266 reporter_ap_id = reporter.ap_id
1267 target_ap_id = target_account.ap_id
1268 activity_ap_id = activity.data["id"]
1270 activity_with_object = Activity.get_by_ap_id_with_object(activity_ap_id)
1276 target_account: target_account,
1277 reported_activity: activity,
1279 activity_ap_id: activity_ap_id,
1280 activity_with_object: activity_with_object,
1281 reporter_ap_id: reporter_ap_id,
1282 target_ap_id: target_ap_id
1286 test "it can create a Flag activity",
1290 target_account: target_account,
1291 reported_activity: reported_activity,
1293 activity_ap_id: activity_ap_id,
1294 activity_with_object: activity_with_object,
1295 reporter_ap_id: reporter_ap_id,
1296 target_ap_id: target_ap_id
1298 assert {:ok, activity} =
1302 account: target_account,
1303 statuses: [reported_activity],
1309 "id" => activity_ap_id,
1310 "content" => content,
1311 "published" => activity_with_object.object.data["published"],
1312 "actor" => AccountView.render("show.json", %{user: target_account})
1316 actor: ^reporter_ap_id,
1319 "content" => ^content,
1320 "context" => ^context,
1321 "object" => [^target_ap_id, ^note_obj]
1326 test_with_mock "strips status data from Flag, before federating it",
1330 target_account: target_account,
1331 reported_activity: reported_activity,
1341 account: target_account,
1342 statuses: [reported_activity],
1347 put_in(activity.data, ["object"], [target_account.ap_id, reported_activity.data["id"]])
1349 assert_called(Utils.maybe_federate(%{activity | data: new_data}))
1353 test "fetch_activities/2 returns activities addressed to a list " do
1354 user = insert(:user)
1355 member = insert(:user)
1356 {:ok, list} = Pleroma.List.create("foo", user)
1357 {:ok, list} = Pleroma.List.follow(list, member)
1360 CommonAPI.post(user, %{"status" => "foobar", "visibility" => "list:#{list.id}"})
1362 activity = Repo.preload(activity, :bookmark)
1363 activity = %Activity{activity | thread_muted?: !!activity.thread_muted?}
1365 assert ActivityPub.fetch_activities([], %{"user" => user}) == [activity]
1369 File.read!("test/fixtures/avatar_data_uri")
1372 describe "fetch_activities_bounded" do
1373 test "fetches private posts for followed users" do
1374 user = insert(:user)
1377 CommonAPI.post(user, %{
1378 "status" => "thought I looked cute might delete later :3",
1379 "visibility" => "private"
1382 [result] = ActivityPub.fetch_activities_bounded([user.follower_address], [])
1383 assert result.id == activity.id
1386 test "fetches only public posts for other users" do
1387 user = insert(:user)
1388 {:ok, activity} = CommonAPI.post(user, %{"status" => "#cofe", "visibility" => "public"})
1390 {:ok, _private_activity} =
1391 CommonAPI.post(user, %{
1392 "status" => "why is tenshi eating a corndog so cute?",
1393 "visibility" => "private"
1396 [result] = ActivityPub.fetch_activities_bounded([], [user.follower_address])
1397 assert result.id == activity.id
1401 describe "fetch_follow_information_for_user" do
1402 test "syncronizes following/followers counters" do
1406 follower_address: "http://localhost:4001/users/fuser2/followers",
1407 following_address: "http://localhost:4001/users/fuser2/following"
1410 {:ok, info} = ActivityPub.fetch_follow_information_for_user(user)
1411 assert info.follower_count == 527
1412 assert info.following_count == 267
1415 test "detects hidden followers" do
1418 "http://localhost:4001/users/masto_closed/followers?page=1" ->
1419 %Tesla.Env{status: 403, body: ""}
1422 apply(HttpRequestMock, :request, [env])
1429 follower_address: "http://localhost:4001/users/masto_closed/followers",
1430 following_address: "http://localhost:4001/users/masto_closed/following"
1433 {:ok, info} = ActivityPub.fetch_follow_information_for_user(user)
1434 assert info.hide_followers == true
1435 assert info.hide_follows == false
1438 test "detects hidden follows" do
1441 "http://localhost:4001/users/masto_closed/following?page=1" ->
1442 %Tesla.Env{status: 403, body: ""}
1445 apply(HttpRequestMock, :request, [env])
1452 follower_address: "http://localhost:4001/users/masto_closed/followers",
1453 following_address: "http://localhost:4001/users/masto_closed/following"
1456 {:ok, info} = ActivityPub.fetch_follow_information_for_user(user)
1457 assert info.hide_followers == false
1458 assert info.hide_follows == true