2019-10-01 07:36:35 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2022-02-26 06:11:42 +00:00
|
|
|
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
|
2019-10-01 07:36:35 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
|
|
|
defmodule Pleroma.Web.MastodonAPI.MediaControllerTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
|
|
|
|
2021-06-22 10:25:25 +00:00
|
|
|
import ExUnit.CaptureLog
|
2023-12-11 05:48:34 +00:00
|
|
|
import Mox
|
2021-06-22 10:25:25 +00:00
|
|
|
|
2019-10-01 07:36:35 +00:00
|
|
|
alias Pleroma.Object
|
2023-12-11 05:48:34 +00:00
|
|
|
alias Pleroma.UnstubbedConfigMock, as: ConfigMock
|
2019-10-01 07:36:35 +00:00
|
|
|
alias Pleroma.User
|
|
|
|
alias Pleroma.Web.ActivityPub.ActivityPub
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
describe "Upload media" do
|
2020-05-17 05:46:43 +00:00
|
|
|
setup do: oauth_access(["write:media"])
|
|
|
|
|
2019-10-01 07:36:35 +00:00
|
|
|
setup do
|
2023-12-11 05:48:34 +00:00
|
|
|
ConfigMock
|
|
|
|
|> stub_with(Pleroma.Test.StaticConfig)
|
|
|
|
|
2019-10-01 07:36:35 +00:00
|
|
|
image = %Plug.Upload{
|
2020-10-13 15:37:24 +00:00
|
|
|
content_type: "image/jpeg",
|
2019-10-01 07:36:35 +00:00
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
|
|
|
|
2019-12-19 14:23:27 +00:00
|
|
|
[image: image]
|
2019-10-01 07:36:35 +00:00
|
|
|
end
|
|
|
|
|
2020-03-20 15:33:00 +00:00
|
|
|
setup do: clear_config([:media_proxy])
|
|
|
|
setup do: clear_config([Pleroma.Upload])
|
2019-10-01 07:36:35 +00:00
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
test "/api/v1/media", %{conn: conn, image: image} do
|
2019-10-01 07:36:35 +00:00
|
|
|
desc = "Description of the image"
|
|
|
|
|
|
|
|
media =
|
|
|
|
conn
|
2020-05-14 12:18:30 +00:00
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
2019-10-01 07:36:35 +00:00
|
|
|
|> post("/api/v1/media", %{"file" => image, "description" => desc})
|
2020-05-14 12:18:30 +00:00
|
|
|
|> json_response_and_validate_schema(:ok)
|
2019-10-01 07:36:35 +00:00
|
|
|
|
|
|
|
assert media["type"] == "image"
|
|
|
|
assert media["description"] == desc
|
|
|
|
assert media["id"]
|
|
|
|
|
|
|
|
object = Object.get_by_id(media["id"])
|
|
|
|
assert object.data["actor"] == User.ap_id(conn.assigns[:user])
|
|
|
|
end
|
2020-04-29 15:38:14 +00:00
|
|
|
|
2020-05-17 05:46:43 +00:00
|
|
|
test "/api/v2/media", %{conn: conn, user: user, image: image} do
|
2020-04-29 15:38:14 +00:00
|
|
|
desc = "Description of the image"
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2020-05-14 12:18:30 +00:00
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
2020-04-29 15:38:14 +00:00
|
|
|
|> post("/api/v2/media", %{"file" => image, "description" => desc})
|
2020-05-14 12:18:30 +00:00
|
|
|
|> json_response_and_validate_schema(202)
|
2020-04-29 15:38:14 +00:00
|
|
|
|
|
|
|
assert media_id = response["id"]
|
|
|
|
|
2020-05-17 05:46:43 +00:00
|
|
|
%{conn: conn} = oauth_access(["read:media"], user: user)
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
media =
|
|
|
|
conn
|
|
|
|
|> get("/api/v1/media/#{media_id}")
|
2020-05-14 12:18:30 +00:00
|
|
|
|> json_response_and_validate_schema(200)
|
2020-04-29 15:38:14 +00:00
|
|
|
|
|
|
|
assert media["type"] == "image"
|
|
|
|
assert media["description"] == desc
|
|
|
|
assert media["id"]
|
2020-05-17 05:46:43 +00:00
|
|
|
|
2020-05-18 06:51:53 +00:00
|
|
|
object = Object.get_by_id(media["id"])
|
|
|
|
assert object.data["actor"] == user.ap_id
|
2020-04-29 15:38:14 +00:00
|
|
|
end
|
2021-06-22 10:25:25 +00:00
|
|
|
|
|
|
|
test "/api/v2/media, upload_limit", %{conn: conn, user: user} do
|
|
|
|
desc = "Description of the binary"
|
|
|
|
|
|
|
|
upload_limit = Config.get([:instance, :upload_limit]) * 8 + 8
|
|
|
|
|
|
|
|
assert :ok ==
|
|
|
|
File.write(Path.absname("test/tmp/large_binary.data"), <<0::size(upload_limit)>>)
|
|
|
|
|
|
|
|
large_binary = %Plug.Upload{
|
|
|
|
content_type: nil,
|
|
|
|
path: Path.absname("test/tmp/large_binary.data"),
|
|
|
|
filename: "large_binary.data"
|
|
|
|
}
|
|
|
|
|
|
|
|
assert capture_log(fn ->
|
|
|
|
assert %{"error" => "file_too_large"} =
|
|
|
|
conn
|
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
|
|
|
|> post("/api/v2/media", %{
|
|
|
|
"file" => large_binary,
|
|
|
|
"description" => desc
|
|
|
|
})
|
|
|
|
|> json_response_and_validate_schema(400)
|
|
|
|
end) =~
|
|
|
|
"[error] Elixir.Pleroma.Upload store (using Pleroma.Uploaders.Local) failed: :file_too_large"
|
|
|
|
|
|
|
|
clear_config([:instance, :upload_limit], upload_limit)
|
|
|
|
|
|
|
|
assert response =
|
|
|
|
conn
|
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
|
|
|
|> post("/api/v2/media", %{
|
|
|
|
"file" => large_binary,
|
|
|
|
"description" => desc
|
|
|
|
})
|
|
|
|
|> json_response_and_validate_schema(202)
|
|
|
|
|
|
|
|
assert media_id = response["id"]
|
|
|
|
|
|
|
|
%{conn: conn} = oauth_access(["read:media"], user: user)
|
|
|
|
|
|
|
|
media =
|
|
|
|
conn
|
|
|
|
|> get("/api/v1/media/#{media_id}")
|
|
|
|
|> json_response_and_validate_schema(200)
|
|
|
|
|
|
|
|
assert media["type"] == "unknown"
|
|
|
|
assert media["description"] == desc
|
|
|
|
assert media["id"]
|
|
|
|
|
|
|
|
assert :ok == File.rm(Path.absname("test/tmp/large_binary.data"))
|
|
|
|
end
|
2022-12-29 19:33:46 +00:00
|
|
|
|
|
|
|
test "Do not allow nested filename", %{conn: conn, image: image} do
|
|
|
|
image = %Plug.Upload{
|
|
|
|
image
|
|
|
|
| filename: "../../../../../nested/file.jpg"
|
|
|
|
}
|
|
|
|
|
|
|
|
desc = "Description of the image"
|
|
|
|
|
|
|
|
media =
|
|
|
|
conn
|
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
|
|
|
|> post("/api/v1/media", %{"file" => image, "description" => desc})
|
|
|
|
|> json_response_and_validate_schema(:ok)
|
|
|
|
|
|
|
|
refute Regex.match?(~r"/nested/", media["url"])
|
|
|
|
end
|
2019-10-01 07:36:35 +00:00
|
|
|
end
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
describe "Update media description" do
|
2020-05-17 05:46:43 +00:00
|
|
|
setup do: oauth_access(["write:media"])
|
|
|
|
|
2019-12-19 14:23:27 +00:00
|
|
|
setup %{user: actor} do
|
2023-12-11 05:48:34 +00:00
|
|
|
ConfigMock
|
|
|
|
|> stub_with(Pleroma.Test.StaticConfig)
|
|
|
|
|
2019-10-01 07:36:35 +00:00
|
|
|
file = %Plug.Upload{
|
2020-10-13 15:37:24 +00:00
|
|
|
content_type: "image/jpeg",
|
2019-10-01 07:36:35 +00:00
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Object{} = object} =
|
|
|
|
ActivityPub.upload(
|
|
|
|
file,
|
|
|
|
actor: User.ap_id(actor),
|
|
|
|
description: "test-m"
|
|
|
|
)
|
|
|
|
|
2019-12-19 14:23:27 +00:00
|
|
|
[object: object]
|
2019-10-01 07:36:35 +00:00
|
|
|
end
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
test "/api/v1/media/:id good request", %{conn: conn, object: object} do
|
2019-10-01 07:36:35 +00:00
|
|
|
media =
|
|
|
|
conn
|
2020-05-14 12:18:30 +00:00
|
|
|
|> put_req_header("content-type", "multipart/form-data")
|
2019-10-01 07:36:35 +00:00
|
|
|
|> put("/api/v1/media/#{object.id}", %{"description" => "test-media"})
|
2020-05-14 12:18:30 +00:00
|
|
|
|> json_response_and_validate_schema(:ok)
|
2019-10-01 07:36:35 +00:00
|
|
|
|
|
|
|
assert media["description"] == "test-media"
|
|
|
|
assert refresh_record(object).data["name"] == "test-media"
|
|
|
|
end
|
|
|
|
end
|
2020-04-29 15:38:14 +00:00
|
|
|
|
2020-05-18 06:51:53 +00:00
|
|
|
describe "Get media by id (/api/v1/media/:id)" do
|
2020-05-17 05:46:43 +00:00
|
|
|
setup do: oauth_access(["read:media"])
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
setup %{user: actor} do
|
2023-12-11 05:48:34 +00:00
|
|
|
ConfigMock
|
|
|
|
|> stub_with(Pleroma.Test.StaticConfig)
|
|
|
|
|
2020-04-29 15:38:14 +00:00
|
|
|
file = %Plug.Upload{
|
2020-10-13 15:37:24 +00:00
|
|
|
content_type: "image/jpeg",
|
2020-04-29 15:38:14 +00:00
|
|
|
path: Path.absname("test/fixtures/image.jpg"),
|
|
|
|
filename: "an_image.jpg"
|
|
|
|
}
|
|
|
|
|
|
|
|
{:ok, %Object{} = object} =
|
|
|
|
ActivityPub.upload(
|
|
|
|
file,
|
|
|
|
actor: User.ap_id(actor),
|
|
|
|
description: "test-media"
|
|
|
|
)
|
|
|
|
|
|
|
|
[object: object]
|
|
|
|
end
|
|
|
|
|
2020-05-18 06:51:53 +00:00
|
|
|
test "it returns media object when requested by owner", %{conn: conn, object: object} do
|
2020-04-29 15:38:14 +00:00
|
|
|
media =
|
|
|
|
conn
|
|
|
|
|> get("/api/v1/media/#{object.id}")
|
2020-05-14 12:18:30 +00:00
|
|
|
|> json_response_and_validate_schema(:ok)
|
2020-04-29 15:38:14 +00:00
|
|
|
|
|
|
|
assert media["description"] == "test-media"
|
|
|
|
assert media["type"] == "image"
|
|
|
|
assert media["id"]
|
|
|
|
end
|
2020-05-18 06:51:53 +00:00
|
|
|
|
|
|
|
test "it returns 403 if media object requested by non-owner", %{object: object, user: user} do
|
|
|
|
%{conn: conn, user: other_user} = oauth_access(["read:media"])
|
|
|
|
|
|
|
|
assert object.data["actor"] == user.ap_id
|
|
|
|
refute user.id == other_user.id
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> get("/api/v1/media/#{object.id}")
|
2021-02-16 22:37:16 +00:00
|
|
|
|> json_response_and_validate_schema(403)
|
2020-05-18 06:51:53 +00:00
|
|
|
end
|
2020-04-29 15:38:14 +00:00
|
|
|
end
|
2019-10-01 07:36:35 +00:00
|
|
|
end
|