1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Object.FetcherTest do
10 alias Pleroma.Object.Fetcher
17 %{method: :get, url: "https://mastodon.example.org/users/userisgone"} ->
18 %Tesla.Env{status: 410}
20 %{method: :get, url: "https://mastodon.example.org/users/userisgone404"} ->
21 %Tesla.Env{status: 404}
26 "https://patch.cx/media/03ca3c8b4ac3ddd08bf0f84be7885f2f88de0f709112131a22d83650819e36c2.json"
30 headers: [{"content-type", "application/json"}],
31 body: File.read!("test/fixtures/spoofed-object.json")
35 apply(HttpRequestMock, :request, [env])
41 describe "error cases" do
44 %{method: :get, url: "https://social.sakamoto.gq/notice/9wTkLEnuq47B25EehM"} ->
47 body: File.read!("test/fixtures/fetch_mocks/9wTkLEnuq47B25EehM.json"),
48 headers: HttpRequestMock.activitypub_object_headers()
51 %{method: :get, url: "https://social.sakamoto.gq/users/eal"} ->
54 body: File.read!("test/fixtures/fetch_mocks/eal.json"),
55 headers: HttpRequestMock.activitypub_object_headers()
58 %{method: :get, url: "https://busshi.moe/users/tuxcrafting/statuses/104410921027210069"} ->
61 body: File.read!("test/fixtures/fetch_mocks/104410921027210069.json"),
62 headers: HttpRequestMock.activitypub_object_headers()
65 %{method: :get, url: "https://busshi.moe/users/tuxcrafting"} ->
72 url: "https://stereophonic.space/objects/02997b83-3ea7-4b63-94af-ef3aa2d4ed17"
82 @tag capture_log: true
83 test "it works when fetching the OP actor errors out" do
84 # Here we simulate a case where the author of the OP can't be read
86 Fetcher.fetch_object_from_id(
87 "https://social.sakamoto.gq/notice/9wTkLEnuq47B25EehM"
92 describe "max thread distance restriction" do
93 @ap_id "http://mastodon.example.org/@admin/99541947525187367"
94 setup do: clear_config([:instance, :federation_incoming_replies_max_depth])
96 test "it returns thread depth exceeded error if thread depth is exceeded" do
97 clear_config([:instance, :federation_incoming_replies_max_depth], 0)
99 assert {:error, "Max thread distance exceeded."} =
100 Fetcher.fetch_object_from_id(@ap_id, depth: 1)
103 test "it fetches object if max thread depth is restricted to 0 and depth is not specified" do
104 clear_config([:instance, :federation_incoming_replies_max_depth], 0)
106 assert {:ok, _} = Fetcher.fetch_object_from_id(@ap_id)
109 test "it fetches object if requested depth does not exceed max thread depth" do
110 clear_config([:instance, :federation_incoming_replies_max_depth], 10)
112 assert {:ok, _} = Fetcher.fetch_object_from_id(@ap_id, depth: 10)
116 describe "actor origin containment" do
117 test "it rejects objects with a bogus origin" do
118 {:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity.json")
121 test "it rejects objects when attributedTo is wrong (variant 1)" do
122 {:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity2.json")
125 test "it rejects objects when attributedTo is wrong (variant 2)" do
126 {:error, _} = Fetcher.fetch_object_from_id("https://info.pleroma.site/activity3.json")
130 describe "fetching an object" do
131 test "it fetches an object" do
133 Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
135 assert _activity = Activity.get_create_by_object_ap_id(object.data["id"])
137 {:ok, object_again} =
138 Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
140 assert [attachment] = object.data["attachment"]
141 assert is_list(attachment["url"])
143 assert object == object_again
146 test "Return MRF reason when fetched status is rejected by one" do
147 clear_config([:mrf_keyword, :reject], ["yeah"])
148 clear_config([:mrf, :policies], [Pleroma.Web.ActivityPub.MRF.KeywordPolicy])
150 assert {:reject, "[KeywordPolicy] Matches with rejected keyword"} ==
151 Fetcher.fetch_object_from_id(
152 "http://mastodon.example.org/@admin/99541947525187367"
156 test "it does not fetch a spoofed object uploaded on an instance as an attachment" do
158 Fetcher.fetch_object_from_id(
159 "https://patch.cx/media/03ca3c8b4ac3ddd08bf0f84be7885f2f88de0f709112131a22d83650819e36c2.json"
164 describe "implementation quirks" do
165 test "it can fetch plume articles" do
167 Fetcher.fetch_object_from_id(
168 "https://baptiste.gelez.xyz/~/PlumeDevelopment/this-month-in-plume-june-2018/"
174 test "it can fetch peertube videos" do
176 Fetcher.fetch_object_from_id(
177 "https://peertube.moe/videos/watch/df5f464b-be8d-46fb-ad81-2d4c2d1630e3"
183 test "it can fetch Mobilizon events" do
185 Fetcher.fetch_object_from_id(
186 "https://mobilizon.org/events/252d5816-00a3-4a89-a66f-15bf65c33e39"
192 test "it can fetch wedistribute articles" do
194 Fetcher.fetch_object_from_id("https://wedistribute.org/wp-json/pterotype/v1/object/85810")
199 test "all objects with fake directions are rejected by the object fetcher" do
201 Fetcher.fetch_and_contain_remote_object_from_id(
202 "https://info.pleroma.site/activity4.json"
206 test "handle HTTP 410 Gone response" do
207 assert {:error, "Object has been deleted"} ==
208 Fetcher.fetch_and_contain_remote_object_from_id(
209 "https://mastodon.example.org/users/userisgone"
213 test "handle HTTP 404 response" do
214 assert {:error, "Object has been deleted"} ==
215 Fetcher.fetch_and_contain_remote_object_from_id(
216 "https://mastodon.example.org/users/userisgone404"
220 test "it can fetch pleroma polls with attachments" do
222 Fetcher.fetch_object_from_id("https://patch.cx/objects/tesla_mock/poll_attachment")
228 describe "pruning" do
229 test "it can refetch pruned objects" do
230 object_id = "http://mastodon.example.org/@admin/99541947525187367"
232 {:ok, object} = Fetcher.fetch_object_from_id(object_id)
236 {:ok, _object} = Object.prune(object)
238 refute Object.get_by_ap_id(object_id)
240 {:ok, %Object{} = object_two} = Fetcher.fetch_object_from_id(object_id)
242 assert object.data["id"] == object_two.data["id"]
243 assert object.id != object_two.id
247 describe "signed fetches" do
248 setup do: clear_config([:activitypub, :sign_object_fetches])
250 test_with_mock "it signs fetches when configured to do so",
254 clear_config([:activitypub, :sign_object_fetches], true)
256 Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
258 assert called(Pleroma.Signature.sign(:_, :_))
261 test_with_mock "it doesn't sign fetches when not configured to do so",
265 clear_config([:activitypub, :sign_object_fetches], false)
267 Fetcher.fetch_object_from_id("http://mastodon.example.org/@admin/99541947525187367")
269 refute called(Pleroma.Signature.sign(:_, :_))
273 describe "refetching" do
276 "id" => "https://mastodon.social/1",
277 "actor" => "https://mastodon.social/users/emelie",
278 "attributedTo" => "https://mastodon.social/users/emelie",
280 "content" => "test 1",
289 "id" => "https://mastodon.social/2",
290 "actor" => "https://mastodon.social/users/emelie",
291 "attributedTo" => "https://mastodon.social/users/emelie",
293 "content" => "test 2",
299 "formerRepresentations" => %{
300 "type" => "OrderedCollection",
304 "content" => "orig 2",
305 "actor" => "https://mastodon.social/users/emelie",
306 "attributedTo" => "https://mastodon.social/users/emelie",
321 url: "https://mastodon.social/1"
325 headers: [{"content-type", "application/activity+json"}],
326 body: Jason.encode!(object1)
331 url: "https://mastodon.social/2"
335 headers: [{"content-type", "application/activity+json"}],
336 body: Jason.encode!(object2)
341 url: "https://mastodon.social/users/emelie/collections/featured"
345 headers: [{"content-type", "application/activity+json"}],
348 "id" => "https://mastodon.social/users/emelie/collections/featured",
349 "type" => "OrderedCollection",
350 "actor" => "https://mastodon.social/users/emelie",
351 "attributedTo" => "https://mastodon.social/users/emelie",
352 "orderedItems" => [],
358 apply(HttpRequestMock, :request, [env])
361 %{object1: object1, object2: object2}
364 test "it keeps formerRepresentations if remote does not have this attr", %{object1: object1} do
368 "formerRepresentations" => %{
369 "type" => "OrderedCollection",
373 "content" => "orig 2",
374 "actor" => "https://mastodon.social/users/emelie",
375 "attributedTo" => "https://mastodon.social/users/emelie",
387 {:ok, o} = Object.create(full_object1)
389 assert {:ok, refetched} = Fetcher.refetch_object(o)
391 assert %{"formerRepresentations" => %{"orderedItems" => [%{"content" => "orig 2"}]}} =
395 test "it uses formerRepresentations from remote if possible", %{object2: object2} do
396 {:ok, o} = Object.create(object2)
398 assert {:ok, refetched} = Fetcher.refetch_object(o)
400 assert %{"formerRepresentations" => %{"orderedItems" => [%{"content" => "orig 2"}]}} =
404 test "it replaces formerRepresentations with the one from remote", %{object2: object2} do
408 "content" => "mew mew #def",
409 "formerRepresentations" => %{
410 "type" => "OrderedCollection",
412 %{"type" => "Note", "content" => "mew mew 2"}
418 {:ok, o} = Object.create(full_object2)
420 assert {:ok, refetched} = Fetcher.refetch_object(o)
423 "content" => "test 2",
424 "formerRepresentations" => %{"orderedItems" => [%{"content" => "orig 2"}]}
428 test "it adds to formerRepresentations if the remote does not have one and the object has changed",
429 %{object1: object1} do
433 "content" => "mew mew #def",
434 "formerRepresentations" => %{
435 "type" => "OrderedCollection",
437 %{"type" => "Note", "content" => "mew mew 1"}
443 {:ok, o} = Object.create(full_object1)
445 assert {:ok, refetched} = Fetcher.refetch_object(o)
448 "content" => "test 1",
449 "formerRepresentations" => %{
451 %{"content" => "mew mew #def"},
452 %{"content" => "mew mew 1"}
460 describe "fetch with history" do
463 "id" => "https://mastodon.social/2",
464 "actor" => "https://mastodon.social/users/emelie",
465 "attributedTo" => "https://mastodon.social/users/emelie",
467 "content" => "test 2",
470 "cc" => ["https://mastodon.social/users/emelie/followers"],
473 "formerRepresentations" => %{
474 "type" => "OrderedCollection",
478 "content" => "orig 2",
479 "actor" => "https://mastodon.social/users/emelie",
480 "attributedTo" => "https://mastodon.social/users/emelie",
483 "cc" => ["https://mastodon.social/users/emelie/followers"],
495 url: "https://mastodon.social/2"
499 headers: [{"content-type", "application/activity+json"}],
500 body: Jason.encode!(object2)
505 url: "https://mastodon.social/users/emelie/collections/featured"
509 headers: [{"content-type", "application/activity+json"}],
512 "id" => "https://mastodon.social/users/emelie/collections/featured",
513 "type" => "OrderedCollection",
514 "actor" => "https://mastodon.social/users/emelie",
515 "attributedTo" => "https://mastodon.social/users/emelie",
516 "orderedItems" => [],
522 apply(HttpRequestMock, :request, [env])
528 test "it gets history", %{object2: object2} do
529 {:ok, object} = Fetcher.fetch_object_from_id(object2["id"])
532 "formerRepresentations" => %{
533 "type" => "OrderedCollection",
534 "orderedItems" => [%{}]