spc-pleroma/test/pleroma/web/mastodon_api/controllers/media_controller_test.exs

230 lines
6.6 KiB
Elixir
Raw Normal View History

# Pleroma: A lightweight social networking server
2022-02-26 06:11:42 +00:00
# Copyright © 2017-2022 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only
defmodule Pleroma.Web.MastodonAPI.MediaControllerTest do
use Pleroma.Web.ConnCase
import ExUnit.CaptureLog
2023-12-11 05:48:34 +00:00
import Mox
alias Pleroma.Object
2023-12-11 05:48:34 +00:00
alias Pleroma.UnstubbedConfigMock, as: ConfigMock
alias Pleroma.User
alias Pleroma.Web.ActivityPub.ActivityPub
2020-04-29 15:38:14 +00:00
describe "Upload media" do
setup do: oauth_access(["write:media"])
setup do
2023-12-11 05:48:34 +00:00
ConfigMock
|> stub_with(Pleroma.Test.StaticConfig)
image = %Plug.Upload{
2020-10-13 15:37:24 +00:00
content_type: "image/jpeg",
path: Path.absname("test/fixtures/image.jpg"),
filename: "an_image.jpg"
}
[image: image]
end
setup do: clear_config([:media_proxy])
setup do: clear_config([Pleroma.Upload])
2020-04-29 15:38:14 +00:00
test "/api/v1/media", %{conn: conn, image: image} do
desc = "Description of the image"
media =
conn
2020-05-14 12:18:30 +00:00
|> put_req_header("content-type", "multipart/form-data")
|> post("/api/v1/media", %{"file" => image, "description" => desc})
2020-05-14 12:18:30 +00:00
|> json_response_and_validate_schema(:ok)
assert media["type"] == "image"
assert media["description"] == desc
assert media["id"]
object = Object.get_by_id(media["id"])
assert object.data["actor"] == User.ap_id(conn.assigns[:user])
end
2020-04-29 15:38:14 +00:00
test "/api/v2/media", %{conn: conn, user: user, image: image} do
2020-04-29 15:38:14 +00:00
desc = "Description of the image"
response =
conn
2020-05-14 12:18:30 +00:00
|> put_req_header("content-type", "multipart/form-data")
2020-04-29 15:38:14 +00:00
|> post("/api/v2/media", %{"file" => image, "description" => desc})
2020-05-14 12:18:30 +00:00
|> json_response_and_validate_schema(202)
2020-04-29 15:38:14 +00:00
assert media_id = response["id"]
%{conn: conn} = oauth_access(["read:media"], user: user)
2020-04-29 15:38:14 +00:00
media =
conn
|> get("/api/v1/media/#{media_id}")
2020-05-14 12:18:30 +00:00
|> json_response_and_validate_schema(200)
2020-04-29 15:38:14 +00:00
assert media["type"] == "image"
assert media["description"] == desc
assert media["id"]
object = Object.get_by_id(media["id"])
assert object.data["actor"] == user.ap_id
2020-04-29 15:38:14 +00:00
end
test "/api/v2/media, upload_limit", %{conn: conn, user: user} do
desc = "Description of the binary"
upload_limit = Config.get([:instance, :upload_limit]) * 8 + 8
assert :ok ==
File.write(Path.absname("test/tmp/large_binary.data"), <<0::size(upload_limit)>>)
large_binary = %Plug.Upload{
content_type: nil,
path: Path.absname("test/tmp/large_binary.data"),
filename: "large_binary.data"
}
assert capture_log(fn ->
assert %{"error" => "file_too_large"} =
conn
|> put_req_header("content-type", "multipart/form-data")
|> post("/api/v2/media", %{
"file" => large_binary,
"description" => desc
})
|> json_response_and_validate_schema(400)
end) =~
"[error] Elixir.Pleroma.Upload store (using Pleroma.Uploaders.Local) failed: :file_too_large"
clear_config([:instance, :upload_limit], upload_limit)
assert response =
conn
|> put_req_header("content-type", "multipart/form-data")
|> post("/api/v2/media", %{
"file" => large_binary,
"description" => desc
})
|> json_response_and_validate_schema(202)
assert media_id = response["id"]
%{conn: conn} = oauth_access(["read:media"], user: user)
media =
conn
|> get("/api/v1/media/#{media_id}")
|> json_response_and_validate_schema(200)
assert media["type"] == "unknown"
assert media["description"] == desc
assert media["id"]
assert :ok == File.rm(Path.absname("test/tmp/large_binary.data"))
end
2022-12-29 19:33:46 +00:00
test "Do not allow nested filename", %{conn: conn, image: image} do
image = %Plug.Upload{
image
| filename: "../../../../../nested/file.jpg"
}
desc = "Description of the image"
media =
conn
|> put_req_header("content-type", "multipart/form-data")
|> post("/api/v1/media", %{"file" => image, "description" => desc})
|> json_response_and_validate_schema(:ok)
refute Regex.match?(~r"/nested/", media["url"])
end
end
2020-04-29 15:38:14 +00:00
describe "Update media description" do
setup do: oauth_access(["write:media"])
setup %{user: actor} do
2023-12-11 05:48:34 +00:00
ConfigMock
|> stub_with(Pleroma.Test.StaticConfig)
file = %Plug.Upload{
2020-10-13 15:37:24 +00:00
content_type: "image/jpeg",
path: Path.absname("test/fixtures/image.jpg"),
filename: "an_image.jpg"
}
{:ok, %Object{} = object} =
ActivityPub.upload(
file,
actor: User.ap_id(actor),
description: "test-m"
)
[object: object]
end
2020-04-29 15:38:14 +00:00
test "/api/v1/media/:id good request", %{conn: conn, object: object} do
media =
conn
2020-05-14 12:18:30 +00:00
|> put_req_header("content-type", "multipart/form-data")
|> put("/api/v1/media/#{object.id}", %{"description" => "test-media"})
2020-05-14 12:18:30 +00:00
|> json_response_and_validate_schema(:ok)
assert media["description"] == "test-media"
assert refresh_record(object).data["name"] == "test-media"
end
end
2020-04-29 15:38:14 +00:00
describe "Get media by id (/api/v1/media/:id)" do
setup do: oauth_access(["read:media"])
2020-04-29 15:38:14 +00:00
setup %{user: actor} do
2023-12-11 05:48:34 +00:00
ConfigMock
|> stub_with(Pleroma.Test.StaticConfig)
2020-04-29 15:38:14 +00:00
file = %Plug.Upload{
2020-10-13 15:37:24 +00:00
content_type: "image/jpeg",
2020-04-29 15:38:14 +00:00
path: Path.absname("test/fixtures/image.jpg"),
filename: "an_image.jpg"
}
{:ok, %Object{} = object} =
ActivityPub.upload(
file,
actor: User.ap_id(actor),
description: "test-media"
)
[object: object]
end
test "it returns media object when requested by owner", %{conn: conn, object: object} do
2020-04-29 15:38:14 +00:00
media =
conn
|> get("/api/v1/media/#{object.id}")
2020-05-14 12:18:30 +00:00
|> json_response_and_validate_schema(:ok)
2020-04-29 15:38:14 +00:00
assert media["description"] == "test-media"
assert media["type"] == "image"
assert media["id"]
end
test "it returns 403 if media object requested by non-owner", %{object: object, user: user} do
%{conn: conn, user: other_user} = oauth_access(["read:media"])
assert object.data["actor"] == user.ap_id
refute user.id == other_user.id
conn
|> get("/api/v1/media/#{object.id}")
2021-02-16 22:37:16 +00:00
|> json_response_and_validate_schema(403)
end
2020-04-29 15:38:14 +00:00
end
end