Merge branch 'feature/help-test' into 'develop'
[akkoma] / test / web / twitter_api / twitter_api_controller_test.exs
1 defmodule Pleroma.Web.TwitterAPI.ControllerTest do
2 use Pleroma.Web.ConnCase
3 alias Pleroma.Web.TwitterAPI.Representers.{UserRepresenter, ActivityRepresenter}
4 alias Pleroma.Builders.{ActivityBuilder, UserBuilder}
5 alias Pleroma.{Repo, Activity, User, Object}
6 alias Pleroma.Web.ActivityPub.ActivityPub
7
8 import Pleroma.Factory
9
10 describe "POST /api/account/verify_credentials" do
11 setup [:valid_user]
12 test "without valid credentials", %{conn: conn} do
13 conn = post conn, "/api/account/verify_credentials.json"
14 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
15 end
16
17 test "with credentials", %{conn: conn, user: user} do
18 conn = conn
19 |> with_credentials(user.nickname, "test")
20 |> post("/api/account/verify_credentials.json")
21
22 assert json_response(conn, 200) == UserRepresenter.to_map(user)
23 end
24 end
25
26 describe "POST /statuses/update.json" do
27 setup [:valid_user]
28 test "without valid credentials", %{conn: conn} do
29 conn = post conn, "/api/statuses/update.json"
30 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
31 end
32
33 test "with credentials", %{conn: conn, user: user} do
34 conn = conn
35 |> with_credentials(user.nickname, "test")
36 |> post("/api/statuses/update.json", %{ status: "Nice meme." })
37
38 assert json_response(conn, 200) == ActivityRepresenter.to_map(Repo.one(Activity), %{user: user})
39 end
40 end
41
42 describe "GET /statuses/public_timeline.json" do
43 test "returns statuses", %{conn: conn} do
44 {:ok, user} = UserBuilder.insert
45 activities = ActivityBuilder.insert_list(30, %{}, %{user: user})
46 ActivityBuilder.insert_list(10, %{}, %{user: user})
47 since_id = List.last(activities).id
48
49 conn = conn
50 |> get("/api/statuses/public_timeline.json", %{since_id: since_id})
51
52 response = json_response(conn, 200)
53
54 assert length(response) == 10
55 end
56 end
57
58 describe "GET /statuses/show/:id.json" do
59 test "returns one status", %{conn: conn} do
60 {:ok, user} = UserBuilder.insert
61 {:ok, activity} = ActivityBuilder.insert(%{}, %{user: user})
62 actor = Repo.get_by!(User, ap_id: activity.data["actor"])
63
64 conn = conn
65 |> get("/api/statuses/show/#{activity.id}.json")
66
67 response = json_response(conn, 200)
68
69 assert response == ActivityRepresenter.to_map(activity, %{user: actor})
70 end
71 end
72
73 describe "GET /statusnet/conversation/:id.json" do
74 test "returns the statuses in the conversation", %{conn: conn} do
75 {:ok, _user} = UserBuilder.insert
76 {:ok, _activity} = ActivityBuilder.insert(%{"statusnetConversationId" => 1, "context" => "2hu"})
77 {:ok, _activity_two} = ActivityBuilder.insert(%{"statusnetConversationId" => 1,"context" => "2hu"})
78 {:ok, _activity_three} = ActivityBuilder.insert(%{"context" => "3hu"})
79
80 conn = conn
81 |> get("/api/statusnet/conversation/1.json")
82
83 response = json_response(conn, 200)
84
85 assert length(response) == 2
86 end
87 end
88
89 describe "GET /statuses/friends_timeline.json" do
90 setup [:valid_user]
91 test "without valid credentials", %{conn: conn} do
92 conn = get conn, "/api/statuses/friends_timeline.json"
93 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
94 end
95
96 test "with credentials", %{conn: conn, user: current_user} do
97 user = insert(:user)
98 activities = ActivityBuilder.insert_list(30, %{"to" => [User.ap_followers(user)]}, %{user: user})
99 returned_activities = ActivityBuilder.insert_list(10, %{"to" => [User.ap_followers(user)]}, %{user: user})
100 other_user = insert(:user)
101 ActivityBuilder.insert_list(10, %{}, %{user: other_user})
102 since_id = List.last(activities).id
103
104 current_user = Ecto.Changeset.change(current_user, following: [User.ap_followers(user)]) |> Repo.update!
105
106 conn = conn
107 |> with_credentials(current_user.nickname, "test")
108 |> get("/api/statuses/friends_timeline.json", %{since_id: since_id})
109
110 response = json_response(conn, 200)
111
112 assert length(response) == 10
113 assert response == Enum.map(returned_activities, fn (activity) -> ActivityRepresenter.to_map(activity, %{user: User.get_cached_by_ap_id(activity.data["actor"]), for: current_user}) end)
114 end
115 end
116
117 describe "POST /friendships/create.json" do
118 setup [:valid_user]
119 test "without valid credentials", %{conn: conn} do
120 conn = post conn, "/api/friendships/create.json"
121 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
122 end
123
124 test "with credentials", %{conn: conn, user: current_user} do
125 followed = insert(:user)
126
127 conn = conn
128 |> with_credentials(current_user.nickname, "test")
129 |> post("/api/friendships/create.json", %{user_id: followed.id})
130
131 current_user = Repo.get(User, current_user.id)
132 assert current_user.following == [User.ap_followers(followed)]
133 assert json_response(conn, 200) == UserRepresenter.to_map(followed, %{for: current_user})
134 end
135 end
136
137 describe "POST /friendships/destroy.json" do
138 setup [:valid_user]
139 test "without valid credentials", %{conn: conn} do
140 conn = post conn, "/api/friendships/destroy.json"
141 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
142 end
143
144 test "with credentials", %{conn: conn, user: current_user} do
145 followed = insert(:user)
146
147 {:ok, current_user} = User.follow(current_user, followed)
148 assert current_user.following == [User.ap_followers(followed)]
149
150 conn = conn
151 |> with_credentials(current_user.nickname, "test")
152 |> post("/api/friendships/destroy.json", %{user_id: followed.id})
153
154 current_user = Repo.get(User, current_user.id)
155 assert current_user.following == []
156 assert json_response(conn, 200) == UserRepresenter.to_map(followed, %{for: current_user})
157 end
158 end
159
160 describe "GET /help/test.json" do
161 test "returns \"ok\"", %{conn: conn} do
162 conn = get conn, "/api/help/test.json"
163 assert json_response(conn, 200) == "ok"
164 end
165
166 describe "POST /api/qvitter/update_avatar.json" do
167 setup [:valid_user]
168 test "without valid credentials", %{conn: conn} do
169 conn = post conn, "/api/qvitter/update_avatar.json"
170 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
171 end
172
173 test "with credentials", %{conn: conn, user: current_user} do
174 conn = conn
175 |> with_credentials(current_user.nickname, "test")
176 |> post("/api/qvitter/update_avatar.json", %{img: Pleroma.Web.ActivityPub.ActivityPubTest.data_uri})
177
178 current_user = Repo.get(User, current_user.id)
179 assert is_map(current_user.avatar)
180 assert json_response(conn, 200) == UserRepresenter.to_map(current_user, %{for: current_user})
181 end
182 end
183
184 describe "POST /api/favorites/create/:id" do
185 setup [:valid_user]
186 test "without valid credentials", %{conn: conn} do
187 note_activity = insert(:note_activity)
188 conn = post conn, "/api/favorites/create/#{note_activity.id}.json"
189 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
190 end
191
192 test "with credentials", %{conn: conn, user: current_user} do
193 note_activity = insert(:note_activity)
194
195 conn = conn
196 |> with_credentials(current_user.nickname, "test")
197 |> post("/api/favorites/create/#{note_activity.id}.json")
198
199 assert json_response(conn, 200)
200 end
201 end
202
203 describe "POST /api/favorites/destroy/:id" do
204 setup [:valid_user]
205 test "without valid credentials", %{conn: conn} do
206 note_activity = insert(:note_activity)
207 conn = post conn, "/api/favorites/destroy/#{note_activity.id}.json"
208 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
209 end
210
211 test "with credentials", %{conn: conn, user: current_user} do
212 note_activity = insert(:note_activity)
213 object = Object.get_by_ap_id(note_activity.data["object"]["id"])
214 ActivityPub.like(current_user, object)
215
216 conn = conn
217 |> with_credentials(current_user.nickname, "test")
218 |> post("/api/favorites/destroy/#{note_activity.id}.json")
219
220 assert json_response(conn, 200)
221 end
222 end
223
224 describe "POST /api/statuses/retweet/:id" do
225 setup [:valid_user]
226 test "without valid credentials", %{conn: conn} do
227 note_activity = insert(:note_activity)
228 conn = post conn, "/api/statuses/retweet/#{note_activity.id}.json"
229 assert json_response(conn, 403) == %{"error" => "Invalid credentials."}
230 end
231
232 test "with credentials", %{conn: conn, user: current_user} do
233 note_activity = insert(:note_activity)
234
235 conn = conn
236 |> with_credentials(current_user.nickname, "test")
237 |> post("/api/statuses/retweet/#{note_activity.id}.json")
238
239 assert json_response(conn, 200)
240 end
241 end
242
243 describe "POST /api/account/register" do
244 test "it creates a new user", %{conn: conn} do
245 data = %{
246 "nickname" => "lain",
247 "email" => "lain@wired.jp",
248 "fullname" => "lain iwakura",
249 "bio" => "close the world.",
250 "password" => "bear",
251 "confirm" => "bear"
252 }
253
254 conn = conn
255 |> post("/api/account/register", data)
256
257 user = json_response(conn, 200)
258
259 fetched_user = Repo.get_by(User, nickname: "lain")
260 assert user == UserRepresenter.to_map(fetched_user)
261 end
262
263 test "it returns errors on a problem", %{conn: conn} do
264 data = %{
265 "email" => "lain@wired.jp",
266 "fullname" => "lain iwakura",
267 "bio" => "close the world.",
268 "password" => "bear",
269 "confirm" => "bear"
270 }
271
272 conn = conn
273 |> post("/api/account/register", data)
274
275 errors = json_response(conn, 400)
276
277 assert is_binary(errors["error"])
278 end
279 end
280
281 defp valid_user(_context) do
282 { :ok, user } = UserBuilder.insert(%{nickname: "lambda", ap_id: "lambda"})
283 [user: user]
284 end
285
286 defp with_credentials(conn, username, password) do
287 header_content = "Basic " <> Base.encode64("#{username}:#{password}")
288 put_req_header(conn, "authorization", header_content)
289 end
290
291 setup do
292 Supervisor.terminate_child(Pleroma.Supervisor, ConCache)
293 Supervisor.restart_child(Pleroma.Supervisor, ConCache)
294 :ok
295 end
296 end