1 # Pleroma: A lightweight social networking server
2 # Copyright © 2017-2019 Pleroma Authors <https://pleroma.social/>
3 # SPDX-License-Identifier: AGPL-3.0-only
5 defmodule Pleroma.Web.NodeInfoTest do
6 use Pleroma.Web.ConnCase
10 test "GET /.well-known/nodeinfo", %{conn: conn} do
13 |> get("/.well-known/nodeinfo")
15 |> Map.fetch!("links")
17 Enum.each(links, fn link ->
18 href = Map.fetch!(link, "href")
26 test "nodeinfo shows staff accounts", %{conn: conn} do
27 moderator = insert(:user, %{local: true, info: %{is_moderator: true}})
28 admin = insert(:user, %{local: true, info: %{is_admin: true}})
32 |> get("/nodeinfo/2.1.json")
34 assert result = json_response(conn, 200)
36 assert moderator.ap_id in result["metadata"]["staffAccounts"]
37 assert admin.ap_id in result["metadata"]["staffAccounts"]
40 test "nodeinfo shows restricted nicknames", %{conn: conn} do
43 |> get("/nodeinfo/2.1.json")
45 assert result = json_response(conn, 200)
47 assert Pleroma.Config.get([Pleroma.User, :restricted_nicknames]) ==
48 result["metadata"]["restrictedNicknames"]
51 test "returns software.repository field in nodeinfo 2.1", %{conn: conn} do
53 |> get("/.well-known/nodeinfo")
58 |> get("/nodeinfo/2.1.json")
60 assert result = json_response(conn, 200)
61 assert Pleroma.Application.repository() == result["software"]["repository"]
64 test "it returns the safe_dm_mentions feature if enabled", %{conn: conn} do
65 option = Pleroma.Config.get([:instance, :safe_dm_mentions])
66 Pleroma.Config.put([:instance, :safe_dm_mentions], true)
70 |> get("/nodeinfo/2.1.json")
73 assert "safe_dm_mentions" in response["metadata"]["features"]
75 Pleroma.Config.put([:instance, :safe_dm_mentions], false)
79 |> get("/nodeinfo/2.1.json")
82 refute "safe_dm_mentions" in response["metadata"]["features"]
84 Pleroma.Config.put([:instance, :safe_dm_mentions], option)
87 test "it shows MRF transparency data if enabled", %{conn: conn} do
88 config = Pleroma.Config.get([:instance, :rewrite_policy])
89 Pleroma.Config.put([:instance, :rewrite_policy], [Pleroma.Web.ActivityPub.MRF.SimplePolicy])
91 option = Pleroma.Config.get([:instance, :mrf_transparency])
92 Pleroma.Config.put([:instance, :mrf_transparency], true)
94 simple_config = %{"reject" => ["example.com"]}
95 Pleroma.Config.put(:mrf_simple, simple_config)
99 |> get("/nodeinfo/2.1.json")
100 |> json_response(:ok)
102 assert response["metadata"]["federation"]["mrf_simple"] == simple_config
104 Pleroma.Config.put([:instance, :rewrite_policy], config)
105 Pleroma.Config.put([:instance, :mrf_transparency], option)
106 Pleroma.Config.put(:mrf_simple, %{})
109 test "it performs exclusions from MRF transparency data if configured", %{conn: conn} do
110 config = Pleroma.Config.get([:instance, :rewrite_policy])
111 Pleroma.Config.put([:instance, :rewrite_policy], [Pleroma.Web.ActivityPub.MRF.SimplePolicy])
113 option = Pleroma.Config.get([:instance, :mrf_transparency])
114 Pleroma.Config.put([:instance, :mrf_transparency], true)
116 exclusions = Pleroma.Config.get([:instance, :mrf_transparency_exclusions])
117 Pleroma.Config.put([:instance, :mrf_transparency_exclusions], ["other.site"])
119 simple_config = %{"reject" => ["example.com", "other.site"]}
120 expected_config = %{"reject" => ["example.com"]}
122 Pleroma.Config.put(:mrf_simple, simple_config)
126 |> get("/nodeinfo/2.1.json")
127 |> json_response(:ok)
129 assert response["metadata"]["federation"]["mrf_simple"] == expected_config
130 assert response["metadata"]["federation"]["exclusions"] == true
132 Pleroma.Config.put([:instance, :rewrite_policy], config)
133 Pleroma.Config.put([:instance, :mrf_transparency], option)
134 Pleroma.Config.put([:instance, :mrf_transparency_exclusions], exclusions)
135 Pleroma.Config.put(:mrf_simple, %{})