1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.PleromaAPI.UserImportControllerTest do
6 use Pleroma.Web.ConnCase
7 use Oban.Testing, repo: Pleroma.Repo
10 alias Pleroma.Tests.ObanHelpers
12 import Pleroma.Factory
16 Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
20 describe "POST /api/pleroma/follow_import" do
21 setup do: oauth_access(["follow"])
23 test "it returns HTTP 200", %{conn: conn} do
26 assert "job started" ==
28 |> put_req_header("content-type", "application/json")
29 |> post("/api/pleroma/follow_import", %{"list" => "#{user2.ap_id}"})
30 |> json_response_and_validate_schema(200)
33 test "it imports follow lists from file", %{conn: conn} do
38 read!: fn "follow_list.txt" ->
39 "Account address,Show boosts\n#{user2.ap_id},true"
42 assert "job started" ==
44 |> put_req_header("content-type", "application/json")
45 |> post("/api/pleroma/follow_import", %{
46 "list" => %Plug.Upload{path: "follow_list.txt"}
48 |> json_response_and_validate_schema(200)
50 assert [{:ok, job_result}] = ObanHelpers.perform_all()
51 assert job_result == [user2]
55 test "it imports new-style mastodon follow lists", %{conn: conn} do
60 |> put_req_header("content-type", "application/json")
61 |> post("/api/pleroma/follow_import", %{
62 "list" => "Account address,Show boosts\n#{user2.ap_id},true"
64 |> json_response_and_validate_schema(200)
66 assert response == "job started"
69 test "requires 'follow' or 'write:follows' permissions" do
70 token1 = insert(:oauth_token, scopes: ["read", "write"])
71 token2 = insert(:oauth_token, scopes: ["follow"])
72 token3 = insert(:oauth_token, scopes: ["something"])
73 another_user = insert(:user)
75 for token <- [token1, token2, token3] do
78 |> put_req_header("authorization", "Bearer #{token.token}")
79 |> put_req_header("content-type", "application/json")
80 |> post("/api/pleroma/follow_import", %{"list" => "#{another_user.ap_id}"})
83 assert %{"error" => "Insufficient permissions: follow | write:follows."} ==
84 json_response(conn, 403)
86 assert json_response(conn, 200)
91 test "it imports follows with different nickname variations", %{conn: conn} do
92 users = [user2, user3, user4, user5, user6] = insert_list(5, :user)
99 "@" <> user4.nickname,
100 user5.nickname <> "@localhost",
101 "@" <> user6.nickname <> "@localhost"
105 assert "job started" ==
107 |> put_req_header("content-type", "application/json")
108 |> post("/api/pleroma/follow_import", %{"list" => identifiers})
109 |> json_response_and_validate_schema(200)
111 assert [{:ok, job_result}] = ObanHelpers.perform_all()
112 assert job_result == users
116 describe "POST /api/pleroma/blocks_import" do
117 # Note: "follow" or "write:blocks" permission is required
118 setup do: oauth_access(["write:blocks"])
120 test "it returns HTTP 200", %{conn: conn} do
121 user2 = insert(:user)
123 assert "job started" ==
125 |> put_req_header("content-type", "application/json")
126 |> post("/api/pleroma/blocks_import", %{"list" => "#{user2.ap_id}"})
127 |> json_response_and_validate_schema(200)
130 test "it imports blocks users from file", %{conn: conn} do
131 users = [user2, user3] = insert_list(2, :user)
134 {File, [], read!: fn "blocks_list.txt" -> "#{user2.ap_id} #{user3.ap_id}" end}
136 assert "job started" ==
138 |> put_req_header("content-type", "application/json")
139 |> post("/api/pleroma/blocks_import", %{
140 "list" => %Plug.Upload{path: "blocks_list.txt"}
142 |> json_response_and_validate_schema(200)
144 assert [{:ok, job_result}] = ObanHelpers.perform_all()
145 assert job_result == users
149 test "it imports blocks with different nickname variations", %{conn: conn} do
150 users = [user2, user3, user4, user5, user6] = insert_list(5, :user)
156 "@" <> user4.nickname,
157 user5.nickname <> "@localhost",
158 "@" <> user6.nickname <> "@localhost"
162 assert "job started" ==
164 |> put_req_header("content-type", "application/json")
165 |> post("/api/pleroma/blocks_import", %{"list" => identifiers})
166 |> json_response_and_validate_schema(200)
168 assert [{:ok, job_result}] = ObanHelpers.perform_all()
169 assert job_result == users
173 describe "POST /api/pleroma/mutes_import" do
174 # Note: "follow" or "write:mutes" permission is required
175 setup do: oauth_access(["write:mutes"])
177 test "it returns HTTP 200", %{user: user, conn: conn} do
178 user2 = insert(:user)
180 assert "job started" ==
182 |> put_req_header("content-type", "application/json")
183 |> post("/api/pleroma/mutes_import", %{"list" => "#{user2.ap_id}"})
184 |> json_response_and_validate_schema(200)
186 assert [{:ok, job_result}] = ObanHelpers.perform_all()
187 assert job_result == [user2]
188 assert Pleroma.User.mutes?(user, user2)
191 test "it imports mutes users from file", %{user: user, conn: conn} do
192 users = [user2, user3] = insert_list(2, :user)
195 {File, [], read!: fn "mutes_list.txt" -> "#{user2.ap_id} #{user3.ap_id}" end}
197 assert "job started" ==
199 |> put_req_header("content-type", "application/json")
200 |> post("/api/pleroma/mutes_import", %{
201 "list" => %Plug.Upload{path: "mutes_list.txt"}
203 |> json_response_and_validate_schema(200)
205 assert [{:ok, job_result}] = ObanHelpers.perform_all()
206 assert job_result == users
207 assert Enum.all?(users, &Pleroma.User.mutes?(user, &1))
211 test "it imports mutes with different nickname variations", %{user: user, conn: conn} do
212 users = [user2, user3, user4, user5, user6] = insert_list(5, :user)
218 "@" <> user4.nickname,
219 user5.nickname <> "@localhost",
220 "@" <> user6.nickname <> "@localhost"
224 assert "job started" ==
226 |> put_req_header("content-type", "application/json")
227 |> post("/api/pleroma/mutes_import", %{"list" => identifiers})
228 |> json_response_and_validate_schema(200)
230 assert [{:ok, job_result}] = ObanHelpers.perform_all()
231 assert job_result == users
232 assert Enum.all?(users, &Pleroma.User.mutes?(user, &1))