1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.MastodonAPI.StatusControllerTest do
6 use Pleroma.Web.ConnCase
9 alias Pleroma.ActivityExpiration
11 alias Pleroma.Conversation.Participation
14 alias Pleroma.ScheduledActivity
15 alias Pleroma.Tests.ObanHelpers
17 alias Pleroma.Web.ActivityPub.ActivityPub
18 alias Pleroma.Web.CommonAPI
20 import Pleroma.Factory
22 setup do: clear_config([:instance, :federating])
23 setup do: clear_config([:instance, :allow_relay])
24 setup do: clear_config([:instance, :show_reactions])
25 setup do: clear_config([:rich_media, :enabled])
26 setup do: clear_config([:mrf, :policies])
27 setup do: clear_config([:mrf_keyword, :reject])
29 describe "posting statuses" do
30 setup do: oauth_access(["write:statuses"])
32 test "posting a status does not increment reblog_count when relaying", %{conn: conn} do
33 Pleroma.Config.put([:instance, :federating], true)
34 Pleroma.Config.get([:instance, :allow_relay], true)
38 |> put_req_header("content-type", "application/json")
39 |> post("api/v1/statuses", %{
40 "content_type" => "text/plain",
41 "source" => "Pleroma FE",
42 "status" => "Hello world",
43 "visibility" => "public"
45 |> json_response_and_validate_schema(200)
47 assert response["reblogs_count"] == 0
48 ObanHelpers.perform_all()
52 |> get("api/v1/statuses/#{response["id"]}", %{})
53 |> json_response_and_validate_schema(200)
55 assert response["reblogs_count"] == 0
58 test "posting a status", %{conn: conn} do
59 idempotency_key = "Pikachu rocks!"
63 |> put_req_header("content-type", "application/json")
64 |> put_req_header("idempotency-key", idempotency_key)
65 |> post("/api/v1/statuses", %{
67 "spoiler_text" => "2hu",
71 {:ok, ttl} = Cachex.ttl(:idempotency_cache, idempotency_key)
73 assert ttl > :timer.seconds(6 * 60 * 60 - 1)
75 assert %{"content" => "cofe", "id" => id, "spoiler_text" => "2hu", "sensitive" => false} =
76 json_response_and_validate_schema(conn_one, 200)
78 assert Activity.get_by_id(id)
82 |> put_req_header("content-type", "application/json")
83 |> put_req_header("idempotency-key", idempotency_key)
84 |> post("/api/v1/statuses", %{
86 "spoiler_text" => "2hu",
90 assert %{"id" => second_id} = json_response(conn_two, 200)
91 assert id == second_id
95 |> put_req_header("content-type", "application/json")
96 |> post("/api/v1/statuses", %{
98 "spoiler_text" => "2hu",
99 "sensitive" => "False"
102 assert %{"id" => third_id} = json_response_and_validate_schema(conn_three, 200)
103 refute id == third_id
105 # An activity that will expire:
107 expires_in = 120 * 60
111 |> put_req_header("content-type", "application/json")
112 |> post("api/v1/statuses", %{
113 "status" => "oolong",
114 "expires_in" => expires_in
117 assert fourth_response =
118 %{"id" => fourth_id} = json_response_and_validate_schema(conn_four, 200)
120 assert activity = Activity.get_by_id(fourth_id)
121 assert expiration = ActivityExpiration.get_by_activity_id(fourth_id)
123 estimated_expires_at =
124 NaiveDateTime.utc_now()
125 |> NaiveDateTime.add(expires_in)
126 |> NaiveDateTime.truncate(:second)
128 # This assert will fail if the test takes longer than a minute. I sure hope it never does:
129 assert abs(NaiveDateTime.diff(expiration.scheduled_at, estimated_expires_at, :second)) < 60
131 assert fourth_response["pleroma"]["expires_at"] ==
132 NaiveDateTime.to_iso8601(expiration.scheduled_at)
135 test "it fails to create a status if `expires_in` is less or equal than an hour", %{
141 assert %{"error" => "Expiry date is too soon"} =
143 |> put_req_header("content-type", "application/json")
144 |> post("api/v1/statuses", %{
145 "status" => "oolong",
146 "expires_in" => expires_in
148 |> json_response_and_validate_schema(422)
153 assert %{"error" => "Expiry date is too soon"} =
155 |> put_req_header("content-type", "application/json")
156 |> post("api/v1/statuses", %{
157 "status" => "oolong",
158 "expires_in" => expires_in
160 |> json_response_and_validate_schema(422)
163 test "Get MRF reason when posting a status is rejected by one", %{conn: conn} do
164 Pleroma.Config.put([:mrf_keyword, :reject], ["GNO"])
165 Pleroma.Config.put([:mrf, :policies], [Pleroma.Web.ActivityPub.MRF.KeywordPolicy])
167 assert %{"error" => "[KeywordPolicy] Matches with rejected keyword"} =
169 |> put_req_header("content-type", "application/json")
170 |> post("api/v1/statuses", %{"status" => "GNO/Linux"})
171 |> json_response_and_validate_schema(422)
174 test "posting an undefined status with an attachment", %{user: user, conn: conn} do
176 content_type: "image/jpg",
177 path: Path.absname("test/fixtures/image.jpg"),
178 filename: "an_image.jpg"
181 {:ok, upload} = ActivityPub.upload(file, actor: user.ap_id)
185 |> put_req_header("content-type", "application/json")
186 |> post("/api/v1/statuses", %{
187 "media_ids" => [to_string(upload.id)]
190 assert json_response_and_validate_schema(conn, 200)
193 test "replying to a status", %{user: user, conn: conn} do
194 {:ok, replied_to} = CommonAPI.post(user, %{status: "cofe"})
198 |> put_req_header("content-type", "application/json")
199 |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id})
201 assert %{"content" => "xD", "id" => id} = json_response_and_validate_schema(conn, 200)
203 activity = Activity.get_by_id(id)
205 assert activity.data["context"] == replied_to.data["context"]
206 assert Activity.get_in_reply_to_activity(activity).id == replied_to.id
209 test "replying to a direct message with visibility other than direct", %{
213 {:ok, replied_to} = CommonAPI.post(user, %{status: "suya..", visibility: "direct"})
215 Enum.each(["public", "private", "unlisted"], fn visibility ->
218 |> put_req_header("content-type", "application/json")
219 |> post("/api/v1/statuses", %{
220 "status" => "@#{user.nickname} hey",
221 "in_reply_to_id" => replied_to.id,
222 "visibility" => visibility
225 assert json_response_and_validate_schema(conn, 422) == %{
226 "error" => "The message visibility must be direct"
231 test "posting a status with an invalid in_reply_to_id", %{conn: conn} do
234 |> put_req_header("content-type", "application/json")
235 |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => ""})
237 assert %{"content" => "xD", "id" => id} = json_response_and_validate_schema(conn, 200)
238 assert Activity.get_by_id(id)
241 test "posting a sensitive status", %{conn: conn} do
244 |> put_req_header("content-type", "application/json")
245 |> post("/api/v1/statuses", %{"status" => "cofe", "sensitive" => true})
247 assert %{"content" => "cofe", "id" => id, "sensitive" => true} =
248 json_response_and_validate_schema(conn, 200)
250 assert Activity.get_by_id(id)
253 test "posting a fake status", %{conn: conn} do
256 |> put_req_header("content-type", "application/json")
257 |> post("/api/v1/statuses", %{
259 "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it"
262 real_status = json_response_and_validate_schema(real_conn, 200)
265 assert Object.get_by_ap_id(real_status["uri"])
269 |> Map.put("id", nil)
270 |> Map.put("url", nil)
271 |> Map.put("uri", nil)
272 |> Map.put("created_at", nil)
273 |> Kernel.put_in(["pleroma", "conversation_id"], nil)
277 |> put_req_header("content-type", "application/json")
278 |> post("/api/v1/statuses", %{
280 "\"Tenshi Eating a Corndog\" is a much discussed concept on /jp/. The significance of it is disputed, so I will focus on one core concept: the symbolism behind it",
284 fake_status = json_response_and_validate_schema(fake_conn, 200)
287 refute Object.get_by_ap_id(fake_status["uri"])
291 |> Map.put("id", nil)
292 |> Map.put("url", nil)
293 |> Map.put("uri", nil)
294 |> Map.put("created_at", nil)
295 |> Kernel.put_in(["pleroma", "conversation_id"], nil)
297 assert real_status == fake_status
300 test "posting a status with OGP link preview", %{conn: conn} do
301 Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
302 Config.put([:rich_media, :enabled], true)
306 |> put_req_header("content-type", "application/json")
307 |> post("/api/v1/statuses", %{
308 "status" => "https://example.com/ogp"
311 assert %{"id" => id, "card" => %{"title" => "The Rock"}} =
312 json_response_and_validate_schema(conn, 200)
314 assert Activity.get_by_id(id)
317 test "posting a direct status", %{conn: conn} do
318 user2 = insert(:user)
319 content = "direct cofe @#{user2.nickname}"
323 |> put_req_header("content-type", "application/json")
324 |> post("api/v1/statuses", %{"status" => content, "visibility" => "direct"})
326 assert %{"id" => id} = response = json_response_and_validate_schema(conn, 200)
327 assert response["visibility"] == "direct"
328 assert response["pleroma"]["direct_conversation_id"]
329 assert activity = Activity.get_by_id(id)
330 assert activity.recipients == [user2.ap_id, conn.assigns[:user].ap_id]
331 assert activity.data["to"] == [user2.ap_id]
332 assert activity.data["cc"] == []
336 describe "posting scheduled statuses" do
337 setup do: oauth_access(["write:statuses"])
339 test "creates a scheduled activity", %{conn: conn} do
341 NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(120), :millisecond)
342 |> NaiveDateTime.to_iso8601()
347 |> put_req_header("content-type", "application/json")
348 |> post("/api/v1/statuses", %{
349 "status" => "scheduled",
350 "scheduled_at" => scheduled_at
353 assert %{"scheduled_at" => expected_scheduled_at} =
354 json_response_and_validate_schema(conn, 200)
356 assert expected_scheduled_at == CommonAPI.Utils.to_masto_date(scheduled_at)
357 assert [] == Repo.all(Activity)
360 test "ignores nil values", %{conn: conn} do
363 |> put_req_header("content-type", "application/json")
364 |> post("/api/v1/statuses", %{
365 "status" => "not scheduled",
366 "scheduled_at" => nil
369 assert result = json_response_and_validate_schema(conn, 200)
370 assert Activity.get_by_id(result["id"])
373 test "creates a scheduled activity with a media attachment", %{user: user, conn: conn} do
375 NaiveDateTime.utc_now()
376 |> NaiveDateTime.add(:timer.minutes(120), :millisecond)
377 |> NaiveDateTime.to_iso8601()
381 content_type: "image/jpg",
382 path: Path.absname("test/fixtures/image.jpg"),
383 filename: "an_image.jpg"
386 {:ok, upload} = ActivityPub.upload(file, actor: user.ap_id)
390 |> put_req_header("content-type", "application/json")
391 |> post("/api/v1/statuses", %{
392 "media_ids" => [to_string(upload.id)],
393 "status" => "scheduled",
394 "scheduled_at" => scheduled_at
397 assert %{"media_attachments" => [media_attachment]} =
398 json_response_and_validate_schema(conn, 200)
400 assert %{"type" => "image"} = media_attachment
403 test "skips the scheduling and creates the activity if scheduled_at is earlier than 5 minutes from now",
406 NaiveDateTime.add(NaiveDateTime.utc_now(), :timer.minutes(5) - 1, :millisecond)
407 |> NaiveDateTime.to_iso8601()
412 |> put_req_header("content-type", "application/json")
413 |> post("/api/v1/statuses", %{
414 "status" => "not scheduled",
415 "scheduled_at" => scheduled_at
418 assert %{"content" => "not scheduled"} = json_response_and_validate_schema(conn, 200)
419 assert [] == Repo.all(ScheduledActivity)
422 test "returns error when daily user limit is exceeded", %{user: user, conn: conn} do
424 NaiveDateTime.utc_now()
425 |> NaiveDateTime.add(:timer.minutes(6), :millisecond)
426 |> NaiveDateTime.to_iso8601()
430 attrs = %{params: %{}, scheduled_at: today}
431 {:ok, _} = ScheduledActivity.create(user, attrs)
432 {:ok, _} = ScheduledActivity.create(user, attrs)
436 |> put_req_header("content-type", "application/json")
437 |> post("/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => today})
439 assert %{"error" => "daily limit exceeded"} == json_response_and_validate_schema(conn, 422)
442 test "returns error when total user limit is exceeded", %{user: user, conn: conn} do
444 NaiveDateTime.utc_now()
445 |> NaiveDateTime.add(:timer.minutes(6), :millisecond)
446 |> NaiveDateTime.to_iso8601()
450 NaiveDateTime.utc_now()
451 |> NaiveDateTime.add(:timer.hours(36), :millisecond)
452 |> NaiveDateTime.to_iso8601()
455 attrs = %{params: %{}, scheduled_at: today}
456 {:ok, _} = ScheduledActivity.create(user, attrs)
457 {:ok, _} = ScheduledActivity.create(user, attrs)
458 {:ok, _} = ScheduledActivity.create(user, %{params: %{}, scheduled_at: tomorrow})
462 |> put_req_header("content-type", "application/json")
463 |> post("/api/v1/statuses", %{"status" => "scheduled", "scheduled_at" => tomorrow})
465 assert %{"error" => "total limit exceeded"} == json_response_and_validate_schema(conn, 422)
469 describe "posting polls" do
470 setup do: oauth_access(["write:statuses"])
472 test "posting a poll", %{conn: conn} do
473 time = NaiveDateTime.utc_now()
477 |> put_req_header("content-type", "application/json")
478 |> post("/api/v1/statuses", %{
479 "status" => "Who is the #bestgrill?",
481 "options" => ["Rei", "Asuka", "Misato"],
486 response = json_response_and_validate_schema(conn, 200)
488 assert Enum.all?(response["poll"]["options"], fn %{"title" => title} ->
489 title in ["Rei", "Asuka", "Misato"]
492 assert NaiveDateTime.diff(NaiveDateTime.from_iso8601!(response["poll"]["expires_at"]), time) in 420..430
493 refute response["poll"]["expred"]
495 question = Object.get_by_id(response["poll"]["id"])
497 # closed contains utc timezone
498 assert question.data["closed"] =~ "Z"
501 test "option limit is enforced", %{conn: conn} do
502 limit = Config.get([:instance, :poll_limits, :max_options])
506 |> put_req_header("content-type", "application/json")
507 |> post("/api/v1/statuses", %{
509 "poll" => %{"options" => Enum.map(0..limit, fn _ -> "desu" end), "expires_in" => 1}
512 %{"error" => error} = json_response_and_validate_schema(conn, 422)
513 assert error == "Poll can't contain more than #{limit} options"
516 test "option character limit is enforced", %{conn: conn} do
517 limit = Config.get([:instance, :poll_limits, :max_option_chars])
521 |> put_req_header("content-type", "application/json")
522 |> post("/api/v1/statuses", %{
525 "options" => [Enum.reduce(0..limit, "", fn _, acc -> acc <> "." end)],
530 %{"error" => error} = json_response_and_validate_schema(conn, 422)
531 assert error == "Poll options cannot be longer than #{limit} characters each"
534 test "minimal date limit is enforced", %{conn: conn} do
535 limit = Config.get([:instance, :poll_limits, :min_expiration])
539 |> put_req_header("content-type", "application/json")
540 |> post("/api/v1/statuses", %{
541 "status" => "imagine arbitrary limits",
543 "options" => ["this post was made by pleroma gang"],
544 "expires_in" => limit - 1
548 %{"error" => error} = json_response_and_validate_schema(conn, 422)
549 assert error == "Expiration date is too soon"
552 test "maximum date limit is enforced", %{conn: conn} do
553 limit = Config.get([:instance, :poll_limits, :max_expiration])
557 |> put_req_header("content-type", "application/json")
558 |> post("/api/v1/statuses", %{
559 "status" => "imagine arbitrary limits",
561 "options" => ["this post was made by pleroma gang"],
562 "expires_in" => limit + 1
566 %{"error" => error} = json_response_and_validate_schema(conn, 422)
567 assert error == "Expiration date is too far in the future"
571 test "get a status" do
572 %{conn: conn} = oauth_access(["read:statuses"])
573 activity = insert(:note_activity)
575 conn = get(conn, "/api/v1/statuses/#{activity.id}")
577 assert %{"id" => id} = json_response_and_validate_schema(conn, 200)
578 assert id == to_string(activity.id)
581 defp local_and_remote_activities do
582 local = insert(:note_activity)
583 remote = insert(:note_activity, local: false)
584 {:ok, local: local, remote: remote}
587 describe "status with restrict unauthenticated activities for local and remote" do
588 setup do: local_and_remote_activities()
590 setup do: clear_config([:restrict_unauthenticated, :activities, :local], true)
592 setup do: clear_config([:restrict_unauthenticated, :activities, :remote], true)
594 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
595 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
597 assert json_response_and_validate_schema(res_conn, :not_found) == %{
598 "error" => "Record not found"
601 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
603 assert json_response_and_validate_schema(res_conn, :not_found) == %{
604 "error" => "Record not found"
608 test "if user is authenticated", %{local: local, remote: remote} do
609 %{conn: conn} = oauth_access(["read"])
610 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
611 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
613 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
614 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
618 describe "status with restrict unauthenticated activities for local" do
619 setup do: local_and_remote_activities()
621 setup do: clear_config([:restrict_unauthenticated, :activities, :local], true)
623 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
624 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
626 assert json_response_and_validate_schema(res_conn, :not_found) == %{
627 "error" => "Record not found"
630 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
631 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
634 test "if user is authenticated", %{local: local, remote: remote} do
635 %{conn: conn} = oauth_access(["read"])
636 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
637 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
639 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
640 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
644 describe "status with restrict unauthenticated activities for remote" do
645 setup do: local_and_remote_activities()
647 setup do: clear_config([:restrict_unauthenticated, :activities, :remote], true)
649 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
650 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
651 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
653 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
655 assert json_response_and_validate_schema(res_conn, :not_found) == %{
656 "error" => "Record not found"
660 test "if user is authenticated", %{local: local, remote: remote} do
661 %{conn: conn} = oauth_access(["read"])
662 res_conn = get(conn, "/api/v1/statuses/#{local.id}")
663 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
665 res_conn = get(conn, "/api/v1/statuses/#{remote.id}")
666 assert %{"id" => _} = json_response_and_validate_schema(res_conn, 200)
670 test "getting a status that doesn't exist returns 404" do
671 %{conn: conn} = oauth_access(["read:statuses"])
672 activity = insert(:note_activity)
674 conn = get(conn, "/api/v1/statuses/#{String.downcase(activity.id)}")
676 assert json_response_and_validate_schema(conn, 404) == %{"error" => "Record not found"}
679 test "get a direct status" do
680 %{user: user, conn: conn} = oauth_access(["read:statuses"])
681 other_user = insert(:user)
684 CommonAPI.post(user, %{status: "@#{other_user.nickname}", visibility: "direct"})
688 |> assign(:user, user)
689 |> get("/api/v1/statuses/#{activity.id}")
691 [participation] = Participation.for_user(user)
693 res = json_response_and_validate_schema(conn, 200)
694 assert res["pleroma"]["direct_conversation_id"] == participation.id
697 test "get statuses by IDs" do
698 %{conn: conn} = oauth_access(["read:statuses"])
699 %{id: id1} = insert(:note_activity)
700 %{id: id2} = insert(:note_activity)
702 query_string = "ids[]=#{id1}&ids[]=#{id2}"
703 conn = get(conn, "/api/v1/statuses/?#{query_string}")
705 assert [%{"id" => ^id1}, %{"id" => ^id2}] =
706 Enum.sort_by(json_response_and_validate_schema(conn, :ok), & &1["id"])
709 describe "getting statuses by ids with restricted unauthenticated for local and remote" do
710 setup do: local_and_remote_activities()
712 setup do: clear_config([:restrict_unauthenticated, :activities, :local], true)
714 setup do: clear_config([:restrict_unauthenticated, :activities, :remote], true)
716 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
717 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
719 assert json_response_and_validate_schema(res_conn, 200) == []
722 test "if user is authenticated", %{local: local, remote: remote} do
723 %{conn: conn} = oauth_access(["read"])
725 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
727 assert length(json_response_and_validate_schema(res_conn, 200)) == 2
731 describe "getting statuses by ids with restricted unauthenticated for local" do
732 setup do: local_and_remote_activities()
734 setup do: clear_config([:restrict_unauthenticated, :activities, :local], true)
736 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
737 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
739 remote_id = remote.id
740 assert [%{"id" => ^remote_id}] = json_response_and_validate_schema(res_conn, 200)
743 test "if user is authenticated", %{local: local, remote: remote} do
744 %{conn: conn} = oauth_access(["read"])
746 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
748 assert length(json_response_and_validate_schema(res_conn, 200)) == 2
752 describe "getting statuses by ids with restricted unauthenticated for remote" do
753 setup do: local_and_remote_activities()
755 setup do: clear_config([:restrict_unauthenticated, :activities, :remote], true)
757 test "if user is unauthenticated", %{conn: conn, local: local, remote: remote} do
758 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
761 assert [%{"id" => ^local_id}] = json_response_and_validate_schema(res_conn, 200)
764 test "if user is authenticated", %{local: local, remote: remote} do
765 %{conn: conn} = oauth_access(["read"])
767 res_conn = get(conn, "/api/v1/statuses?ids[]=#{local.id}&ids[]=#{remote.id}")
769 assert length(json_response_and_validate_schema(res_conn, 200)) == 2
773 describe "deleting a status" do
774 test "when you created it" do
775 %{user: author, conn: conn} = oauth_access(["write:statuses"])
776 activity = insert(:note_activity, user: author)
777 object = Object.normalize(activity)
779 content = object.data["content"]
780 source = object.data["source"]
784 |> assign(:user, author)
785 |> delete("/api/v1/statuses/#{activity.id}")
786 |> json_response_and_validate_schema(200)
788 assert match?(%{"content" => ^content, "text" => ^source}, result)
790 refute Activity.get_by_id(activity.id)
793 test "when it doesn't exist" do
794 %{user: author, conn: conn} = oauth_access(["write:statuses"])
795 activity = insert(:note_activity, user: author)
799 |> assign(:user, author)
800 |> delete("/api/v1/statuses/#{String.downcase(activity.id)}")
802 assert %{"error" => "Record not found"} == json_response_and_validate_schema(conn, 404)
805 test "when you didn't create it" do
806 %{conn: conn} = oauth_access(["write:statuses"])
807 activity = insert(:note_activity)
809 conn = delete(conn, "/api/v1/statuses/#{activity.id}")
811 assert %{"error" => "Record not found"} == json_response_and_validate_schema(conn, 404)
813 assert Activity.get_by_id(activity.id) == activity
816 test "when you're an admin or moderator", %{conn: conn} do
817 activity1 = insert(:note_activity)
818 activity2 = insert(:note_activity)
819 admin = insert(:user, is_admin: true)
820 moderator = insert(:user, is_moderator: true)
824 |> assign(:user, admin)
825 |> assign(:token, insert(:oauth_token, user: admin, scopes: ["write:statuses"]))
826 |> delete("/api/v1/statuses/#{activity1.id}")
828 assert %{} = json_response_and_validate_schema(res_conn, 200)
832 |> assign(:user, moderator)
833 |> assign(:token, insert(:oauth_token, user: moderator, scopes: ["write:statuses"]))
834 |> delete("/api/v1/statuses/#{activity2.id}")
836 assert %{} = json_response_and_validate_schema(res_conn, 200)
838 refute Activity.get_by_id(activity1.id)
839 refute Activity.get_by_id(activity2.id)
843 describe "reblogging" do
844 setup do: oauth_access(["write:statuses"])
846 test "reblogs and returns the reblogged status", %{conn: conn} do
847 activity = insert(:note_activity)
851 |> put_req_header("content-type", "application/json")
852 |> post("/api/v1/statuses/#{activity.id}/reblog")
855 "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1},
857 } = json_response_and_validate_schema(conn, 200)
859 assert to_string(activity.id) == id
862 test "returns 404 if the reblogged status doesn't exist", %{conn: conn} do
863 activity = insert(:note_activity)
867 |> put_req_header("content-type", "application/json")
868 |> post("/api/v1/statuses/#{String.downcase(activity.id)}/reblog")
870 assert %{"error" => "Record not found"} = json_response_and_validate_schema(conn, 404)
873 test "reblogs privately and returns the reblogged status", %{conn: conn} do
874 activity = insert(:note_activity)
878 |> put_req_header("content-type", "application/json")
880 "/api/v1/statuses/#{activity.id}/reblog",
881 %{"visibility" => "private"}
885 "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1},
887 "visibility" => "private"
888 } = json_response_and_validate_schema(conn, 200)
890 assert to_string(activity.id) == id
893 test "reblogged status for another user" do
894 activity = insert(:note_activity)
895 user1 = insert(:user)
896 user2 = insert(:user)
897 user3 = insert(:user)
898 {:ok, _} = CommonAPI.favorite(user2, activity.id)
899 {:ok, _bookmark} = Pleroma.Bookmark.create(user2.id, activity.id)
900 {:ok, reblog_activity1} = CommonAPI.repeat(activity.id, user1)
901 {:ok, _} = CommonAPI.repeat(activity.id, user2)
905 |> assign(:user, user3)
906 |> assign(:token, insert(:oauth_token, user: user3, scopes: ["read:statuses"]))
907 |> get("/api/v1/statuses/#{reblog_activity1.id}")
910 "reblog" => %{"id" => id, "reblogged" => false, "reblogs_count" => 2},
911 "reblogged" => false,
912 "favourited" => false,
913 "bookmarked" => false
914 } = json_response_and_validate_schema(conn_res, 200)
918 |> assign(:user, user2)
919 |> assign(:token, insert(:oauth_token, user: user2, scopes: ["read:statuses"]))
920 |> get("/api/v1/statuses/#{reblog_activity1.id}")
923 "reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 2},
925 "favourited" => true,
927 } = json_response_and_validate_schema(conn_res, 200)
929 assert to_string(activity.id) == id
933 describe "unreblogging" do
934 setup do: oauth_access(["write:statuses"])
936 test "unreblogs and returns the unreblogged status", %{user: user, conn: conn} do
937 activity = insert(:note_activity)
939 {:ok, _} = CommonAPI.repeat(activity.id, user)
943 |> put_req_header("content-type", "application/json")
944 |> post("/api/v1/statuses/#{activity.id}/unreblog")
946 assert %{"id" => id, "reblogged" => false, "reblogs_count" => 0} =
947 json_response_and_validate_schema(conn, 200)
949 assert to_string(activity.id) == id
952 test "returns 404 error when activity does not exist", %{conn: conn} do
955 |> put_req_header("content-type", "application/json")
956 |> post("/api/v1/statuses/foo/unreblog")
958 assert json_response_and_validate_schema(conn, 404) == %{"error" => "Record not found"}
962 describe "favoriting" do
963 setup do: oauth_access(["write:favourites"])
965 test "favs a status and returns it", %{conn: conn} do
966 activity = insert(:note_activity)
970 |> put_req_header("content-type", "application/json")
971 |> post("/api/v1/statuses/#{activity.id}/favourite")
973 assert %{"id" => id, "favourites_count" => 1, "favourited" => true} =
974 json_response_and_validate_schema(conn, 200)
976 assert to_string(activity.id) == id
979 test "favoriting twice will just return 200", %{conn: conn} do
980 activity = insert(:note_activity)
983 |> put_req_header("content-type", "application/json")
984 |> post("/api/v1/statuses/#{activity.id}/favourite")
987 |> put_req_header("content-type", "application/json")
988 |> post("/api/v1/statuses/#{activity.id}/favourite")
989 |> json_response_and_validate_schema(200)
992 test "returns 404 error for a wrong id", %{conn: conn} do
995 |> put_req_header("content-type", "application/json")
996 |> post("/api/v1/statuses/1/favourite")
998 assert json_response_and_validate_schema(conn, 404) == %{"error" => "Record not found"}
1002 describe "unfavoriting" do
1003 setup do: oauth_access(["write:favourites"])
1005 test "unfavorites a status and returns it", %{user: user, conn: conn} do
1006 activity = insert(:note_activity)
1008 {:ok, _} = CommonAPI.favorite(user, activity.id)
1012 |> put_req_header("content-type", "application/json")
1013 |> post("/api/v1/statuses/#{activity.id}/unfavourite")
1015 assert %{"id" => id, "favourites_count" => 0, "favourited" => false} =
1016 json_response_and_validate_schema(conn, 200)
1018 assert to_string(activity.id) == id
1021 test "returns 404 error for a wrong id", %{conn: conn} do
1024 |> put_req_header("content-type", "application/json")
1025 |> post("/api/v1/statuses/1/unfavourite")
1027 assert json_response_and_validate_schema(conn, 404) == %{"error" => "Record not found"}
1031 describe "pinned statuses" do
1032 setup do: oauth_access(["write:accounts"])
1034 setup %{user: user} do
1035 {:ok, activity} = CommonAPI.post(user, %{status: "HI!!!"})
1037 %{activity: activity}
1040 setup do: clear_config([:instance, :max_pinned_statuses], 1)
1042 test "pin status", %{conn: conn, user: user, activity: activity} do
1043 id_str = to_string(activity.id)
1045 assert %{"id" => ^id_str, "pinned" => true} =
1047 |> put_req_header("content-type", "application/json")
1048 |> post("/api/v1/statuses/#{activity.id}/pin")
1049 |> json_response_and_validate_schema(200)
1051 assert [%{"id" => ^id_str, "pinned" => true}] =
1053 |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true")
1054 |> json_response_and_validate_schema(200)
1057 test "/pin: returns 400 error when activity is not public", %{conn: conn, user: user} do
1058 {:ok, dm} = CommonAPI.post(user, %{status: "test", visibility: "direct"})
1062 |> put_req_header("content-type", "application/json")
1063 |> post("/api/v1/statuses/#{dm.id}/pin")
1065 assert json_response_and_validate_schema(conn, 400) == %{"error" => "Could not pin"}
1068 test "unpin status", %{conn: conn, user: user, activity: activity} do
1069 {:ok, _} = CommonAPI.pin(activity.id, user)
1070 user = refresh_record(user)
1072 id_str = to_string(activity.id)
1074 assert %{"id" => ^id_str, "pinned" => false} =
1076 |> assign(:user, user)
1077 |> post("/api/v1/statuses/#{activity.id}/unpin")
1078 |> json_response_and_validate_schema(200)
1082 |> get("/api/v1/accounts/#{user.id}/statuses?pinned=true")
1083 |> json_response_and_validate_schema(200)
1086 test "/unpin: returns 400 error when activity is not exist", %{conn: conn} do
1089 |> put_req_header("content-type", "application/json")
1090 |> post("/api/v1/statuses/1/unpin")
1092 assert json_response_and_validate_schema(conn, 400) == %{"error" => "Could not unpin"}
1095 test "max pinned statuses", %{conn: conn, user: user, activity: activity_one} do
1096 {:ok, activity_two} = CommonAPI.post(user, %{status: "HI!!!"})
1098 id_str_one = to_string(activity_one.id)
1100 assert %{"id" => ^id_str_one, "pinned" => true} =
1102 |> put_req_header("content-type", "application/json")
1103 |> post("/api/v1/statuses/#{id_str_one}/pin")
1104 |> json_response_and_validate_schema(200)
1106 user = refresh_record(user)
1108 assert %{"error" => "You have already pinned the maximum number of statuses"} =
1110 |> assign(:user, user)
1111 |> post("/api/v1/statuses/#{activity_two.id}/pin")
1112 |> json_response_and_validate_schema(400)
1118 Config.put([:rich_media, :enabled], true)
1120 oauth_access(["read:statuses"])
1123 test "returns rich-media card", %{conn: conn, user: user} do
1124 Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
1126 {:ok, activity} = CommonAPI.post(user, %{status: "https://example.com/ogp"})
1129 "image" => "http://ia.media-imdb.com/images/rock.jpg",
1130 "provider_name" => "example.com",
1131 "provider_url" => "https://example.com",
1132 "title" => "The Rock",
1134 "url" => "https://example.com/ogp",
1136 "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer.",
1139 "image" => "http://ia.media-imdb.com/images/rock.jpg",
1140 "title" => "The Rock",
1141 "type" => "video.movie",
1142 "url" => "https://example.com/ogp",
1144 "Directed by Michael Bay. With Sean Connery, Nicolas Cage, Ed Harris, John Spencer."
1151 |> get("/api/v1/statuses/#{activity.id}/card")
1152 |> json_response_and_validate_schema(200)
1154 assert response == card_data
1156 # works with private posts
1158 CommonAPI.post(user, %{status: "https://example.com/ogp", visibility: "direct"})
1162 |> get("/api/v1/statuses/#{activity.id}/card")
1163 |> json_response_and_validate_schema(200)
1165 assert response_two == card_data
1168 test "replaces missing description with an empty string", %{conn: conn, user: user} do
1169 Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
1171 {:ok, activity} = CommonAPI.post(user, %{status: "https://example.com/ogp-missing-data"})
1175 |> get("/api/v1/statuses/#{activity.id}/card")
1176 |> json_response_and_validate_schema(:ok)
1178 assert response == %{
1180 "title" => "Pleroma",
1181 "description" => "",
1183 "provider_name" => "example.com",
1184 "provider_url" => "https://example.com",
1185 "url" => "https://example.com/ogp-missing-data",
1188 "title" => "Pleroma",
1189 "type" => "website",
1190 "url" => "https://example.com/ogp-missing-data"
1198 bookmarks_uri = "/api/v1/bookmarks"
1200 %{conn: conn} = oauth_access(["write:bookmarks", "read:bookmarks"])
1201 author = insert(:user)
1203 {:ok, activity1} = CommonAPI.post(author, %{status: "heweoo?"})
1204 {:ok, activity2} = CommonAPI.post(author, %{status: "heweoo!"})
1208 |> put_req_header("content-type", "application/json")
1209 |> post("/api/v1/statuses/#{activity1.id}/bookmark")
1211 assert json_response_and_validate_schema(response1, 200)["bookmarked"] == true
1215 |> put_req_header("content-type", "application/json")
1216 |> post("/api/v1/statuses/#{activity2.id}/bookmark")
1218 assert json_response_and_validate_schema(response2, 200)["bookmarked"] == true
1220 bookmarks = get(conn, bookmarks_uri)
1223 json_response_and_validate_schema(response2, 200),
1224 json_response_and_validate_schema(response1, 200)
1226 json_response_and_validate_schema(bookmarks, 200)
1230 |> put_req_header("content-type", "application/json")
1231 |> post("/api/v1/statuses/#{activity1.id}/unbookmark")
1233 assert json_response_and_validate_schema(response1, 200)["bookmarked"] == false
1235 bookmarks = get(conn, bookmarks_uri)
1237 assert [json_response_and_validate_schema(response2, 200)] ==
1238 json_response_and_validate_schema(bookmarks, 200)
1241 describe "conversation muting" do
1242 setup do: oauth_access(["write:mutes"])
1245 post_user = insert(:user)
1246 {:ok, activity} = CommonAPI.post(post_user, %{status: "HIE"})
1247 %{activity: activity}
1250 test "mute conversation", %{conn: conn, activity: activity} do
1251 id_str = to_string(activity.id)
1253 assert %{"id" => ^id_str, "muted" => true} =
1255 |> put_req_header("content-type", "application/json")
1256 |> post("/api/v1/statuses/#{activity.id}/mute")
1257 |> json_response_and_validate_schema(200)
1260 test "cannot mute already muted conversation", %{conn: conn, user: user, activity: activity} do
1261 {:ok, _} = CommonAPI.add_mute(user, activity)
1265 |> put_req_header("content-type", "application/json")
1266 |> post("/api/v1/statuses/#{activity.id}/mute")
1268 assert json_response_and_validate_schema(conn, 400) == %{
1269 "error" => "conversation is already muted"
1273 test "unmute conversation", %{conn: conn, user: user, activity: activity} do
1274 {:ok, _} = CommonAPI.add_mute(user, activity)
1276 id_str = to_string(activity.id)
1278 assert %{"id" => ^id_str, "muted" => false} =
1280 # |> assign(:user, user)
1281 |> post("/api/v1/statuses/#{activity.id}/unmute")
1282 |> json_response_and_validate_schema(200)
1286 test "Repeated posts that are replies incorrectly have in_reply_to_id null", %{conn: conn} do
1287 user1 = insert(:user)
1288 user2 = insert(:user)
1289 user3 = insert(:user)
1291 {:ok, replied_to} = CommonAPI.post(user1, %{status: "cofe"})
1293 # Reply to status from another user
1296 |> assign(:user, user2)
1297 |> assign(:token, insert(:oauth_token, user: user2, scopes: ["write:statuses"]))
1298 |> put_req_header("content-type", "application/json")
1299 |> post("/api/v1/statuses", %{"status" => "xD", "in_reply_to_id" => replied_to.id})
1301 assert %{"content" => "xD", "id" => id} = json_response_and_validate_schema(conn1, 200)
1303 activity = Activity.get_by_id_with_object(id)
1305 assert Object.normalize(activity).data["inReplyTo"] == Object.normalize(replied_to).data["id"]
1306 assert Activity.get_in_reply_to_activity(activity).id == replied_to.id
1308 # Reblog from the third user
1311 |> assign(:user, user3)
1312 |> assign(:token, insert(:oauth_token, user: user3, scopes: ["write:statuses"]))
1313 |> put_req_header("content-type", "application/json")
1314 |> post("/api/v1/statuses/#{activity.id}/reblog")
1316 assert %{"reblog" => %{"id" => id, "reblogged" => true, "reblogs_count" => 1}} =
1317 json_response_and_validate_schema(conn2, 200)
1319 assert to_string(activity.id) == id
1321 # Getting third user status
1324 |> assign(:user, user3)
1325 |> assign(:token, insert(:oauth_token, user: user3, scopes: ["read:statuses"]))
1326 |> get("api/v1/timelines/home")
1328 [reblogged_activity] = json_response(conn3, 200)
1330 assert reblogged_activity["reblog"]["in_reply_to_id"] == replied_to.id
1332 replied_to_user = User.get_by_ap_id(replied_to.data["actor"])
1333 assert reblogged_activity["reblog"]["in_reply_to_account_id"] == replied_to_user.id
1336 describe "GET /api/v1/statuses/:id/favourited_by" do
1337 setup do: oauth_access(["read:accounts"])
1339 setup %{user: user} do
1340 {:ok, activity} = CommonAPI.post(user, %{status: "test"})
1342 %{activity: activity}
1345 test "returns users who have favorited the status", %{conn: conn, activity: activity} do
1346 other_user = insert(:user)
1347 {:ok, _} = CommonAPI.favorite(other_user, activity.id)
1351 |> get("/api/v1/statuses/#{activity.id}/favourited_by")
1352 |> json_response_and_validate_schema(:ok)
1354 [%{"id" => id}] = response
1356 assert id == other_user.id
1359 test "returns empty array when status has not been favorited yet", %{
1365 |> get("/api/v1/statuses/#{activity.id}/favourited_by")
1366 |> json_response_and_validate_schema(:ok)
1368 assert Enum.empty?(response)
1371 test "does not return users who have favorited the status but are blocked", %{
1372 conn: %{assigns: %{user: user}} = conn,
1375 other_user = insert(:user)
1376 {:ok, _user_relationship} = User.block(user, other_user)
1378 {:ok, _} = CommonAPI.favorite(other_user, activity.id)
1382 |> get("/api/v1/statuses/#{activity.id}/favourited_by")
1383 |> json_response_and_validate_schema(:ok)
1385 assert Enum.empty?(response)
1388 test "does not fail on an unauthenticated request", %{activity: activity} do
1389 other_user = insert(:user)
1390 {:ok, _} = CommonAPI.favorite(other_user, activity.id)
1394 |> get("/api/v1/statuses/#{activity.id}/favourited_by")
1395 |> json_response_and_validate_schema(:ok)
1397 [%{"id" => id}] = response
1398 assert id == other_user.id
1401 test "requires authentication for private posts", %{user: user} do
1402 other_user = insert(:user)
1405 CommonAPI.post(user, %{
1406 status: "@#{other_user.nickname} wanna get some #cofe together?",
1407 visibility: "direct"
1410 {:ok, _} = CommonAPI.favorite(other_user, activity.id)
1412 favourited_by_url = "/api/v1/statuses/#{activity.id}/favourited_by"
1415 |> get(favourited_by_url)
1416 |> json_response_and_validate_schema(404)
1420 |> assign(:user, other_user)
1421 |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"]))
1424 |> assign(:token, nil)
1425 |> get(favourited_by_url)
1426 |> json_response_and_validate_schema(404)
1430 |> get(favourited_by_url)
1431 |> json_response_and_validate_schema(200)
1433 [%{"id" => id}] = response
1434 assert id == other_user.id
1437 test "returns empty array when :show_reactions is disabled", %{conn: conn, activity: activity} do
1438 Pleroma.Config.put([:instance, :show_reactions], false)
1440 other_user = insert(:user)
1441 {:ok, _} = CommonAPI.favorite(other_user, activity.id)
1445 |> get("/api/v1/statuses/#{activity.id}/favourited_by")
1446 |> json_response_and_validate_schema(:ok)
1448 assert Enum.empty?(response)
1452 describe "GET /api/v1/statuses/:id/reblogged_by" do
1453 setup do: oauth_access(["read:accounts"])
1455 setup %{user: user} do
1456 {:ok, activity} = CommonAPI.post(user, %{status: "test"})
1458 %{activity: activity}
1461 test "returns users who have reblogged the status", %{conn: conn, activity: activity} do
1462 other_user = insert(:user)
1463 {:ok, _} = CommonAPI.repeat(activity.id, other_user)
1467 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1468 |> json_response_and_validate_schema(:ok)
1470 [%{"id" => id}] = response
1472 assert id == other_user.id
1475 test "returns empty array when status has not been reblogged yet", %{
1481 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1482 |> json_response_and_validate_schema(:ok)
1484 assert Enum.empty?(response)
1487 test "does not return users who have reblogged the status but are blocked", %{
1488 conn: %{assigns: %{user: user}} = conn,
1491 other_user = insert(:user)
1492 {:ok, _user_relationship} = User.block(user, other_user)
1494 {:ok, _} = CommonAPI.repeat(activity.id, other_user)
1498 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1499 |> json_response_and_validate_schema(:ok)
1501 assert Enum.empty?(response)
1504 test "does not return users who have reblogged the status privately", %{
1507 other_user = insert(:user)
1508 {:ok, activity} = CommonAPI.post(other_user, %{status: "my secret post"})
1510 {:ok, _} = CommonAPI.repeat(activity.id, other_user, %{visibility: "private"})
1514 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1515 |> json_response_and_validate_schema(:ok)
1517 assert Enum.empty?(response)
1520 test "does not fail on an unauthenticated request", %{activity: activity} do
1521 other_user = insert(:user)
1522 {:ok, _} = CommonAPI.repeat(activity.id, other_user)
1526 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1527 |> json_response_and_validate_schema(:ok)
1529 [%{"id" => id}] = response
1530 assert id == other_user.id
1533 test "requires authentication for private posts", %{user: user} do
1534 other_user = insert(:user)
1537 CommonAPI.post(user, %{
1538 status: "@#{other_user.nickname} wanna get some #cofe together?",
1539 visibility: "direct"
1543 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1544 |> json_response_and_validate_schema(404)
1548 |> assign(:user, other_user)
1549 |> assign(:token, insert(:oauth_token, user: other_user, scopes: ["read:accounts"]))
1550 |> get("/api/v1/statuses/#{activity.id}/reblogged_by")
1551 |> json_response_and_validate_schema(200)
1553 assert [] == response
1558 user = insert(:user)
1560 {:ok, %{id: id1}} = CommonAPI.post(user, %{status: "1"})
1561 {:ok, %{id: id2}} = CommonAPI.post(user, %{status: "2", in_reply_to_status_id: id1})
1562 {:ok, %{id: id3}} = CommonAPI.post(user, %{status: "3", in_reply_to_status_id: id2})
1563 {:ok, %{id: id4}} = CommonAPI.post(user, %{status: "4", in_reply_to_status_id: id3})
1564 {:ok, %{id: id5}} = CommonAPI.post(user, %{status: "5", in_reply_to_status_id: id4})
1568 |> get("/api/v1/statuses/#{id3}/context")
1569 |> json_response_and_validate_schema(:ok)
1572 "ancestors" => [%{"id" => ^id1}, %{"id" => ^id2}],
1573 "descendants" => [%{"id" => ^id4}, %{"id" => ^id5}]
1577 test "favorites paginate correctly" do
1578 %{user: user, conn: conn} = oauth_access(["read:favourites"])
1579 other_user = insert(:user)
1580 {:ok, first_post} = CommonAPI.post(other_user, %{status: "bla"})
1581 {:ok, second_post} = CommonAPI.post(other_user, %{status: "bla"})
1582 {:ok, third_post} = CommonAPI.post(other_user, %{status: "bla"})
1584 {:ok, _first_favorite} = CommonAPI.favorite(user, third_post.id)
1585 {:ok, _second_favorite} = CommonAPI.favorite(user, first_post.id)
1586 {:ok, third_favorite} = CommonAPI.favorite(user, second_post.id)
1590 |> get("/api/v1/favourites?limit=1")
1592 assert [%{"id" => post_id}] = json_response_and_validate_schema(result, 200)
1593 assert post_id == second_post.id
1595 # Using the header for pagination works correctly
1596 [next, _] = get_resp_header(result, "link") |> hd() |> String.split(", ")
1597 [_, max_id] = Regex.run(~r/max_id=([^&]+)/, next)
1599 assert max_id == third_favorite.id
1603 |> get("/api/v1/favourites?max_id=#{max_id}")
1605 assert [%{"id" => first_post_id}, %{"id" => third_post_id}] =
1606 json_response_and_validate_schema(result, 200)
1608 assert first_post_id == first_post.id
1609 assert third_post_id == third_post.id
1612 test "returns the favorites of a user" do
1613 %{user: user, conn: conn} = oauth_access(["read:favourites"])
1614 other_user = insert(:user)
1616 {:ok, _} = CommonAPI.post(other_user, %{status: "bla"})
1617 {:ok, activity} = CommonAPI.post(other_user, %{status: "trees are happy"})
1619 {:ok, last_like} = CommonAPI.favorite(user, activity.id)
1621 first_conn = get(conn, "/api/v1/favourites")
1623 assert [status] = json_response_and_validate_schema(first_conn, 200)
1624 assert status["id"] == to_string(activity.id)
1626 assert [{"link", _link_header}] =
1627 Enum.filter(first_conn.resp_headers, fn element -> match?({"link", _}, element) end)
1629 # Honours query params
1630 {:ok, second_activity} =
1631 CommonAPI.post(other_user, %{
1632 status: "Trees Are Never Sad Look At Them Every Once In Awhile They're Quite Beautiful."
1635 {:ok, _} = CommonAPI.favorite(user, second_activity.id)
1637 second_conn = get(conn, "/api/v1/favourites?since_id=#{last_like.id}")
1639 assert [second_status] = json_response_and_validate_schema(second_conn, 200)
1640 assert second_status["id"] == to_string(second_activity.id)
1642 third_conn = get(conn, "/api/v1/favourites?limit=0")
1644 assert [] = json_response_and_validate_schema(third_conn, 200)
1647 test "expires_at is nil for another user" do
1648 %{conn: conn, user: user} = oauth_access(["read:statuses"])
1649 {:ok, activity} = CommonAPI.post(user, %{status: "foobar", expires_in: 1_000_000})
1653 |> ActivityExpiration.get_by_activity_id()
1654 |> Map.get(:scheduled_at)
1655 |> NaiveDateTime.to_iso8601()
1657 assert %{"pleroma" => %{"expires_at" => ^expires_at}} =
1659 |> get("/api/v1/statuses/#{activity.id}")
1660 |> json_response_and_validate_schema(:ok)
1662 %{conn: conn} = oauth_access(["read:statuses"])
1664 assert %{"pleroma" => %{"expires_at" => nil}} =
1666 |> get("/api/v1/statuses/#{activity.id}")
1667 |> json_response_and_validate_schema(:ok)