Transmogrifier: Don't fetch actor that's guaranteed to be there.
[akkoma] / test / web / activity_pub / transmogrifier / delete_handling_test.exs
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Web.ActivityPub.Transmogrifier.DeleteHandlingTest do
6 use Oban.Testing, repo: Pleroma.Repo
7 use Pleroma.DataCase
8
9 alias Pleroma.Activity
10 alias Pleroma.Object
11 alias Pleroma.Tests.ObanHelpers
12 alias Pleroma.User
13 alias Pleroma.Web.ActivityPub.Transmogrifier
14
15 import Pleroma.Factory
16
17 setup_all do
18 Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
19 :ok
20 end
21
22 test "it works for incoming deletes" do
23 activity = insert(:note_activity)
24 deleting_user = insert(:user)
25
26 data =
27 File.read!("test/fixtures/mastodon-delete.json")
28 |> Poison.decode!()
29 |> Map.put("actor", deleting_user.ap_id)
30 |> put_in(["object", "id"], activity.data["object"])
31
32 {:ok, %Activity{actor: actor, local: false, data: %{"id" => id}}} =
33 Transmogrifier.handle_incoming(data)
34
35 assert id == data["id"]
36
37 # We delete the Create activity because we base our timelines on it.
38 # This should be changed after we unify objects and activities
39 refute Activity.get_by_id(activity.id)
40 assert actor == deleting_user.ap_id
41
42 # Objects are replaced by a tombstone object.
43 object = Object.normalize(activity.data["object"])
44 assert object.data["type"] == "Tombstone"
45 end
46
47 test "it fails for incoming deletes with spoofed origin" do
48 activity = insert(:note_activity)
49 %{ap_id: ap_id} = insert(:user, ap_id: "https://gensokyo.2hu/users/raymoo")
50
51 data =
52 File.read!("test/fixtures/mastodon-delete.json")
53 |> Poison.decode!()
54 |> Map.put("actor", ap_id)
55 |> put_in(["object", "id"], activity.data["object"])
56
57 assert match?({:error, _}, Transmogrifier.handle_incoming(data))
58 end
59
60 @tag capture_log: true
61 test "it works for incoming user deletes" do
62 %{ap_id: ap_id} = insert(:user, ap_id: "http://mastodon.example.org/users/admin")
63
64 data =
65 File.read!("test/fixtures/mastodon-delete-user.json")
66 |> Poison.decode!()
67
68 {:ok, _} = Transmogrifier.handle_incoming(data)
69 ObanHelpers.perform_all()
70
71 refute User.get_cached_by_ap_id(ap_id)
72 end
73
74 test "it fails for incoming user deletes with spoofed origin" do
75 %{ap_id: ap_id} = insert(:user)
76
77 data =
78 File.read!("test/fixtures/mastodon-delete-user.json")
79 |> Poison.decode!()
80 |> Map.put("actor", ap_id)
81
82 assert match?({:error, _}, Transmogrifier.handle_incoming(data))
83
84 assert User.get_cached_by_ap_id(ap_id)
85 end
86 end