Merge branch 'feature/jobs' into 'develop'
[akkoma] / test / web / federator_test.exs
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Web.FederatorTest do
6 alias Pleroma.Web.CommonAPI
7 alias Pleroma.Web.Federator
8 alias Pleroma.Instances
9 use Pleroma.DataCase
10 import Pleroma.Factory
11 import Mock
12
13 setup_all do
14 Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
15 :ok
16 end
17
18 describe "Publish an activity" do
19 setup do
20 user = insert(:user)
21 {:ok, activity} = CommonAPI.post(user, %{"status" => "HI"})
22
23 relay_mock = {
24 Pleroma.Web.ActivityPub.Relay,
25 [],
26 [publish: fn _activity -> send(self(), :relay_publish) end]
27 }
28
29 %{activity: activity, relay_mock: relay_mock}
30 end
31
32 test "with relays active, it publishes to the relay", %{
33 activity: activity,
34 relay_mock: relay_mock
35 } do
36 with_mocks([relay_mock]) do
37 Federator.publish(activity)
38 end
39
40 assert_received :relay_publish
41 end
42
43 test "with relays deactivated, it does not publish to the relay", %{
44 activity: activity,
45 relay_mock: relay_mock
46 } do
47 Pleroma.Config.put([:instance, :allow_relay], false)
48
49 with_mocks([relay_mock]) do
50 Federator.publish(activity)
51 end
52
53 refute_received :relay_publish
54
55 Pleroma.Config.put([:instance, :allow_relay], true)
56 end
57 end
58
59 describe "Targets reachability filtering in `publish`" do
60 test_with_mock "it federates only to reachable instances via AP",
61 Federator,
62 [:passthrough],
63 [] do
64 user = insert(:user)
65
66 {inbox1, inbox2} =
67 {"https://domain.com/users/nick1/inbox", "https://domain2.com/users/nick2/inbox"}
68
69 insert(:user, %{
70 local: false,
71 nickname: "nick1@domain.com",
72 ap_id: "https://domain.com/users/nick1",
73 info: %{ap_enabled: true, source_data: %{"inbox" => inbox1}}
74 })
75
76 insert(:user, %{
77 local: false,
78 nickname: "nick2@domain2.com",
79 ap_id: "https://domain2.com/users/nick2",
80 info: %{ap_enabled: true, source_data: %{"inbox" => inbox2}}
81 })
82
83 dt = NaiveDateTime.utc_now()
84 Instances.set_unreachable(inbox1, dt)
85
86 Instances.set_consistently_unreachable(URI.parse(inbox2).host)
87
88 {:ok, _activity} =
89 CommonAPI.post(user, %{"status" => "HI @nick1@domain.com, @nick2@domain2.com!"})
90
91 assert called(Federator.publish_single_ap(%{inbox: inbox1, unreachable_since: dt}))
92
93 refute called(Federator.publish_single_ap(%{inbox: inbox2}))
94 end
95
96 test_with_mock "it federates only to reachable instances via Websub",
97 Federator,
98 [:passthrough],
99 [] do
100 user = insert(:user)
101 websub_topic = Pleroma.Web.OStatus.feed_path(user)
102
103 sub1 =
104 insert(:websub_subscription, %{
105 topic: websub_topic,
106 state: "active",
107 callback: "http://pleroma.soykaf.com/cb"
108 })
109
110 sub2 =
111 insert(:websub_subscription, %{
112 topic: websub_topic,
113 state: "active",
114 callback: "https://pleroma2.soykaf.com/cb"
115 })
116
117 dt = NaiveDateTime.utc_now()
118 Instances.set_unreachable(sub2.callback, dt)
119
120 Instances.set_consistently_unreachable(sub1.callback)
121
122 {:ok, _activity} = CommonAPI.post(user, %{"status" => "HI"})
123
124 assert called(
125 Federator.publish_single_websub(%{
126 callback: sub2.callback,
127 unreachable_since: dt
128 })
129 )
130
131 refute called(Federator.publish_single_websub(%{callback: sub1.callback}))
132 end
133
134 test_with_mock "it federates only to reachable instances via Salmon",
135 Federator,
136 [:passthrough],
137 [] do
138 user = insert(:user)
139
140 remote_user1 =
141 insert(:user, %{
142 local: false,
143 nickname: "nick1@domain.com",
144 ap_id: "https://domain.com/users/nick1",
145 info: %{salmon: "https://domain.com/salmon"}
146 })
147
148 remote_user2 =
149 insert(:user, %{
150 local: false,
151 nickname: "nick2@domain2.com",
152 ap_id: "https://domain2.com/users/nick2",
153 info: %{salmon: "https://domain2.com/salmon"}
154 })
155
156 dt = NaiveDateTime.utc_now()
157 Instances.set_unreachable(remote_user2.ap_id, dt)
158
159 Instances.set_consistently_unreachable("domain.com")
160
161 {:ok, _activity} =
162 CommonAPI.post(user, %{"status" => "HI @nick1@domain.com, @nick2@domain2.com!"})
163
164 assert called(
165 Federator.publish_single_salmon(%{
166 recipient: remote_user2,
167 unreachable_since: dt
168 })
169 )
170
171 refute called(Federator.publish_single_websub(%{recipient: remote_user1}))
172 end
173 end
174
175 describe "Receive an activity" do
176 test "successfully processes incoming AP docs with correct origin" do
177 params = %{
178 "@context" => "https://www.w3.org/ns/activitystreams",
179 "actor" => "http://mastodon.example.org/users/admin",
180 "type" => "Create",
181 "id" => "http://mastodon.example.org/users/admin/activities/1",
182 "object" => %{
183 "type" => "Note",
184 "content" => "hi world!",
185 "id" => "http://mastodon.example.org/users/admin/objects/1",
186 "attributedTo" => "http://mastodon.example.org/users/admin"
187 },
188 "to" => ["https://www.w3.org/ns/activitystreams#Public"]
189 }
190
191 {:ok, _activity} = Federator.incoming_ap_doc(params)
192 end
193
194 test "rejects incoming AP docs with incorrect origin" do
195 params = %{
196 "@context" => "https://www.w3.org/ns/activitystreams",
197 "actor" => "https://niu.moe/users/rye",
198 "type" => "Create",
199 "id" => "http://mastodon.example.org/users/admin/activities/1",
200 "object" => %{
201 "type" => "Note",
202 "content" => "hi world!",
203 "id" => "http://mastodon.example.org/users/admin/objects/1",
204 "attributedTo" => "http://mastodon.example.org/users/admin"
205 },
206 "to" => ["https://www.w3.org/ns/activitystreams#Public"]
207 }
208
209 :error = Federator.incoming_ap_doc(params)
210 end
211 end
212 end