make bulk user creation from admin works as a transaction
[akkoma] / test / web / salmon / salmon_test.exs
1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2018 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
4
5 defmodule Pleroma.Web.Salmon.SalmonTest do
6 use Pleroma.DataCase
7 alias Pleroma.Activity
8 alias Pleroma.Repo
9 alias Pleroma.User
10 alias Pleroma.Web.Federator.Publisher
11 alias Pleroma.Web.Salmon
12 import Mock
13 import Pleroma.Factory
14
15 @magickey "RSA.pu0s-halox4tu7wmES1FVSx6u-4wc0YrUFXcqWXZG4-27UmbCOpMQftRCldNRfyA-qLbz-eqiwQhh-1EwUvjsD4cYbAHNGHwTvDOyx5AKthQUP44ykPv7kjKGh3DWKySJvcs9tlUG87hlo7AvnMo9pwRS_Zz2CacQ-MKaXyDepk=.AQAB"
16
17 @wrong_magickey "RSA.pu0s-halox4tu7wmES1FVSx6u-4wc0YrUFXcqWXZG4-27UmbCOpMQftRCldNRfyA-qLbz-eqiwQhh-1EwUvjsD4cYbAHNGHwTvDOyx5AKthQUP44ykPv7kjKGh3DWKySJvcs9tlUG87hlo7AvnMo9pwRS_Zz2CacQ-MKaXyDepk=.AQAA"
18
19 @magickey_friendica "RSA.AMwa8FUs2fWEjX0xN7yRQgegQffhBpuKNC6fa5VNSVorFjGZhRrlPMn7TQOeihlc9lBz2OsHlIedbYn2uJ7yCs0.AQAB"
20
21 setup_all do
22 Tesla.Mock.mock_global(fn env -> apply(HttpRequestMock, :request, [env]) end)
23 :ok
24 end
25
26 test "decodes a salmon" do
27 {:ok, salmon} = File.read("test/fixtures/salmon.xml")
28 {:ok, doc} = Salmon.decode_and_validate(@magickey, salmon)
29 assert Regex.match?(~r/xml/, doc)
30 end
31
32 test "errors on wrong magic key" do
33 {:ok, salmon} = File.read("test/fixtures/salmon.xml")
34 assert Salmon.decode_and_validate(@wrong_magickey, salmon) == :error
35 end
36
37 test "generates an RSA private key pem" do
38 {:ok, key} = Salmon.generate_rsa_pem()
39 assert is_binary(key)
40 assert Regex.match?(~r/RSA/, key)
41 end
42
43 test "it encodes a magic key from a public key" do
44 key = Salmon.decode_key(@magickey)
45 magic_key = Salmon.encode_key(key)
46
47 assert @magickey == magic_key
48 end
49
50 test "it decodes a friendica public key" do
51 _key = Salmon.decode_key(@magickey_friendica)
52 end
53
54 test "returns a public and private key from a pem" do
55 pem = File.read!("test/fixtures/private_key.pem")
56 {:ok, private, public} = Salmon.keys_from_pem(pem)
57
58 assert elem(private, 0) == :RSAPrivateKey
59 assert elem(public, 0) == :RSAPublicKey
60 end
61
62 test "encodes an xml payload with a private key" do
63 doc = File.read!("test/fixtures/incoming_note_activity.xml")
64 pem = File.read!("test/fixtures/private_key.pem")
65 {:ok, private, public} = Salmon.keys_from_pem(pem)
66
67 # Let's try a roundtrip.
68 {:ok, salmon} = Salmon.encode(private, doc)
69 {:ok, decoded_doc} = Salmon.decode_and_validate(Salmon.encode_key(public), salmon)
70
71 assert doc == decoded_doc
72 end
73
74 test "it gets a magic key" do
75 salmon = File.read!("test/fixtures/salmon2.xml")
76 {:ok, key} = Salmon.fetch_magic_key(salmon)
77
78 assert key ==
79 "RSA.uzg6r1peZU0vXGADWxGJ0PE34WvmhjUmydbX5YYdOiXfODVLwCMi1umGoqUDm-mRu4vNEdFBVJU1CpFA7dKzWgIsqsa501i2XqElmEveXRLvNRWFB6nG03Q5OUY2as8eE54BJm0p20GkMfIJGwP6TSFb-ICp3QjzbatuSPJ6xCE=.AQAB"
80 end
81
82 test_with_mock "it pushes an activity to remote accounts it's addressed to",
83 Publisher,
84 [:passthrough],
85 [] do
86 user_data = %{
87 info: %{
88 salmon: "http://test-example.org/salmon"
89 },
90 local: false
91 }
92
93 mentioned_user = insert(:user, user_data)
94 note = insert(:note)
95
96 activity_data = %{
97 "id" => Pleroma.Web.ActivityPub.Utils.generate_activity_id(),
98 "type" => "Create",
99 "actor" => note.data["actor"],
100 "to" => note.data["to"] ++ [mentioned_user.ap_id],
101 "object" => note.data,
102 "published_at" => DateTime.utc_now() |> DateTime.to_iso8601(),
103 "context" => note.data["context"]
104 }
105
106 {:ok, activity} = Repo.insert(%Activity{data: activity_data, recipients: activity_data["to"]})
107 user = User.get_cached_by_ap_id(activity.data["actor"])
108 {:ok, user} = Pleroma.Web.WebFinger.ensure_keys_present(user)
109
110 Salmon.publish(user, activity)
111
112 assert called(Publisher.enqueue_one(Salmon, %{recipient: mentioned_user}))
113 end
114 end