Merge branch 'develop' into global-status-expiration
This commit is contained in:
commit
764b4f95a8
|
@ -19,6 +19,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/).
|
||||||
<summary>API Changes</summary>
|
<summary>API Changes</summary>
|
||||||
- Mastodon API: Support for `include_types` in `/api/v1/notifications`.
|
- Mastodon API: Support for `include_types` in `/api/v1/notifications`.
|
||||||
- Mastodon API: Added `/api/v1/notifications/:id/dismiss` endpoint.
|
- Mastodon API: Added `/api/v1/notifications/:id/dismiss` endpoint.
|
||||||
|
- Mastodon API: Add support for filtering replies in public and home timelines
|
||||||
- Admin API: endpoints for create/update/delete OAuth Apps.
|
- Admin API: endpoints for create/update/delete OAuth Apps.
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
|
|
@ -279,7 +279,7 @@ defp insert_activity("like", visibility, group, user, friends, non_friends, opts
|
||||||
actor = get_actor(group, user, friends, non_friends)
|
actor = get_actor(group, user, friends, non_friends)
|
||||||
|
|
||||||
with activity_id when not is_nil(activity_id) <- get_random_create_activity_id(),
|
with activity_id when not is_nil(activity_id) <- get_random_create_activity_id(),
|
||||||
{:ok, _activity, _object} <- CommonAPI.favorite(activity_id, actor) do
|
{:ok, _activity} <- CommonAPI.favorite(actor, activity_id) do
|
||||||
:ok
|
:ok
|
||||||
else
|
else
|
||||||
{:error, _} ->
|
{:error, _} ->
|
||||||
|
@ -313,7 +313,7 @@ defp insert_activity("simple_thread", visibility, group, user, friends, non_frie
|
||||||
tasks = get_reply_tasks(visibility, group)
|
tasks = get_reply_tasks(visibility, group)
|
||||||
|
|
||||||
{:ok, activity} =
|
{:ok, activity} =
|
||||||
CommonAPI.post(user, %{"status" => "Simple status", "visibility" => "unlisted"})
|
CommonAPI.post(user, %{"status" => "Simple status", "visibility" => visibility})
|
||||||
|
|
||||||
acc = {activity.id, ["@" <> actor.nickname, "reply to status"]}
|
acc = {activity.id, ["@" <> actor.nickname, "reply to status"]}
|
||||||
insert_replies(tasks, visibility, user, friends, non_friends, acc)
|
insert_replies(tasks, visibility, user, friends, non_friends, acc)
|
||||||
|
|
|
@ -41,6 +41,7 @@ defp fetch_timelines(user) do
|
||||||
fetch_notifications(user)
|
fetch_notifications(user)
|
||||||
fetch_favourites(user)
|
fetch_favourites(user)
|
||||||
fetch_long_thread(user)
|
fetch_long_thread(user)
|
||||||
|
fetch_timelines_with_reply_filtering(user)
|
||||||
end
|
end
|
||||||
|
|
||||||
defp render_views(user) do
|
defp render_views(user) do
|
||||||
|
@ -495,4 +496,58 @@ defp render_long_thread(user) do
|
||||||
formatters: formatters()
|
formatters: formatters()
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp fetch_timelines_with_reply_filtering(user) do
|
||||||
|
public_params = opts_for_public_timeline(user)
|
||||||
|
|
||||||
|
Benchee.run(
|
||||||
|
%{
|
||||||
|
"Public timeline without reply filtering" => fn ->
|
||||||
|
ActivityPub.fetch_public_activities(public_params)
|
||||||
|
end,
|
||||||
|
"Public timeline with reply filtering - following" => fn ->
|
||||||
|
public_params
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
end,
|
||||||
|
"Public timeline with reply filtering - self" => fn ->
|
||||||
|
public_params
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
end
|
||||||
|
},
|
||||||
|
formatters: formatters()
|
||||||
|
)
|
||||||
|
|
||||||
|
private_params = opts_for_home_timeline(user)
|
||||||
|
|
||||||
|
recipients = [user.ap_id | User.following(user)]
|
||||||
|
|
||||||
|
Benchee.run(
|
||||||
|
%{
|
||||||
|
"Home timeline without reply filtering" => fn ->
|
||||||
|
ActivityPub.fetch_activities(recipients, private_params)
|
||||||
|
end,
|
||||||
|
"Home timeline with reply filtering - following" => fn ->
|
||||||
|
private_params =
|
||||||
|
private_params
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|
||||||
|
ActivityPub.fetch_activities(recipients, private_params)
|
||||||
|
end,
|
||||||
|
"Home timeline with reply filtering - self" => fn ->
|
||||||
|
private_params =
|
||||||
|
private_params
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|
||||||
|
ActivityPub.fetch_activities(recipients, private_params)
|
||||||
|
end
|
||||||
|
},
|
||||||
|
formatters: formatters()
|
||||||
|
)
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -44,6 +44,7 @@ defmodule Mix.Tasks.Pleroma.LoadTesting do
|
||||||
]
|
]
|
||||||
|
|
||||||
def run(args) do
|
def run(args) do
|
||||||
|
Logger.configure(level: :error)
|
||||||
Mix.Pleroma.start_pleroma()
|
Mix.Pleroma.start_pleroma()
|
||||||
clean_tables()
|
clean_tables()
|
||||||
{opts, _} = OptionParser.parse!(args, strict: @switches, aliases: @aliases)
|
{opts, _} = OptionParser.parse!(args, strict: @switches, aliases: @aliases)
|
||||||
|
|
|
@ -14,6 +14,7 @@ Some apps operate under the assumption that no more than 4 attachments can be re
|
||||||
|
|
||||||
Adding the parameter `with_muted=true` to the timeline queries will also return activities by muted (not by blocked!) users.
|
Adding the parameter `with_muted=true` to the timeline queries will also return activities by muted (not by blocked!) users.
|
||||||
Adding the parameter `exclude_visibilities` to the timeline queries will exclude the statuses with the given visibilities. The parameter accepts an array of visibility types (`public`, `unlisted`, `private`, `direct`), e.g., `exclude_visibilities[]=direct&exclude_visibilities[]=private`.
|
Adding the parameter `exclude_visibilities` to the timeline queries will exclude the statuses with the given visibilities. The parameter accepts an array of visibility types (`public`, `unlisted`, `private`, `direct`), e.g., `exclude_visibilities[]=direct&exclude_visibilities[]=private`.
|
||||||
|
Adding the parameter `reply_visibility` to the public and home timelines queries will filter replies. Possible values: without parameter (default) shows all replies, `following` - replies directed to you or users you follow, `self` - replies directed to you.
|
||||||
|
|
||||||
## Statuses
|
## Statuses
|
||||||
|
|
||||||
|
|
|
@ -36,7 +36,7 @@ content-security-policy:
|
||||||
default-src 'none';
|
default-src 'none';
|
||||||
base-uri 'self';
|
base-uri 'self';
|
||||||
frame-ancestors 'none';
|
frame-ancestors 'none';
|
||||||
img-src 'self' data: https:;
|
img-src 'self' data: blob: https:;
|
||||||
media-src 'self' https:;
|
media-src 'self' https:;
|
||||||
style-src 'self' 'unsafe-inline';
|
style-src 'self' 'unsafe-inline';
|
||||||
font-src 'self';
|
font-src 'self';
|
||||||
|
|
|
@ -75,7 +75,7 @@ defp csp_string do
|
||||||
"default-src 'none'",
|
"default-src 'none'",
|
||||||
"base-uri 'self'",
|
"base-uri 'self'",
|
||||||
"frame-ancestors 'none'",
|
"frame-ancestors 'none'",
|
||||||
"img-src 'self' data: https:",
|
"img-src 'self' data: blob: https:",
|
||||||
"media-src 'self' https:",
|
"media-src 'self' https:",
|
||||||
"style-src 'self' 'unsafe-inline'",
|
"style-src 'self' 'unsafe-inline'",
|
||||||
"font-src 'self'",
|
"font-src 'self'",
|
||||||
|
|
|
@ -832,6 +832,7 @@ def set_cache({:error, err}), do: {:error, err}
|
||||||
def set_cache(%User{} = user) do
|
def set_cache(%User{} = user) do
|
||||||
Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
|
Cachex.put(:user_cache, "ap_id:#{user.ap_id}", user)
|
||||||
Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
|
Cachex.put(:user_cache, "nickname:#{user.nickname}", user)
|
||||||
|
Cachex.put(:user_cache, "friends_ap_ids:#{user.nickname}", get_user_friends_ap_ids(user))
|
||||||
{:ok, user}
|
{:ok, user}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -847,9 +848,22 @@ def update_and_set_cache(changeset) do
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
def get_user_friends_ap_ids(user) do
|
||||||
|
from(u in User.get_friends_query(user), select: u.ap_id)
|
||||||
|
|> Repo.all()
|
||||||
|
end
|
||||||
|
|
||||||
|
@spec get_cached_user_friends_ap_ids(User.t()) :: [String.t()]
|
||||||
|
def get_cached_user_friends_ap_ids(user) do
|
||||||
|
Cachex.fetch!(:user_cache, "friends_ap_ids:#{user.ap_id}", fn _ ->
|
||||||
|
get_user_friends_ap_ids(user)
|
||||||
|
end)
|
||||||
|
end
|
||||||
|
|
||||||
def invalidate_cache(user) do
|
def invalidate_cache(user) do
|
||||||
Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
|
Cachex.del(:user_cache, "ap_id:#{user.ap_id}")
|
||||||
Cachex.del(:user_cache, "nickname:#{user.nickname}")
|
Cachex.del(:user_cache, "nickname:#{user.nickname}")
|
||||||
|
Cachex.del(:user_cache, "friends_ap_ids:#{user.ap_id}")
|
||||||
end
|
end
|
||||||
|
|
||||||
@spec get_cached_by_ap_id(String.t()) :: User.t() | nil
|
@spec get_cached_by_ap_id(String.t()) :: User.t() | nil
|
||||||
|
|
|
@ -54,13 +54,13 @@ defmodule Pleroma.User.Query do
|
||||||
select: term(),
|
select: term(),
|
||||||
limit: pos_integer()
|
limit: pos_integer()
|
||||||
}
|
}
|
||||||
| %{}
|
| map()
|
||||||
|
|
||||||
@ilike_criteria [:nickname, :name, :query]
|
@ilike_criteria [:nickname, :name, :query]
|
||||||
@equal_criteria [:email]
|
@equal_criteria [:email]
|
||||||
@contains_criteria [:ap_id, :nickname]
|
@contains_criteria [:ap_id, :nickname]
|
||||||
|
|
||||||
@spec build(criteria()) :: Query.t()
|
@spec build(Query.t(), criteria()) :: Query.t()
|
||||||
def build(query \\ base_query(), criteria) do
|
def build(query \\ base_query(), criteria) do
|
||||||
prepare_query(query, criteria)
|
prepare_query(query, criteria)
|
||||||
end
|
end
|
||||||
|
|
|
@ -449,6 +449,7 @@ def announce(
|
||||||
|
|
||||||
defp do_announce(user, object, activity_id, local, public) do
|
defp do_announce(user, object, activity_id, local, public) do
|
||||||
with true <- is_announceable?(object, user, public),
|
with true <- is_announceable?(object, user, public),
|
||||||
|
object <- Object.get_by_id(object.id),
|
||||||
announce_data <- make_announce_data(user, object, activity_id, public),
|
announce_data <- make_announce_data(user, object, activity_id, public),
|
||||||
{:ok, activity} <- insert(announce_data, local),
|
{:ok, activity} <- insert(announce_data, local),
|
||||||
{:ok, object} <- add_announce_to_object(activity, object),
|
{:ok, object} <- add_announce_to_object(activity, object),
|
||||||
|
@ -1058,6 +1059,41 @@ defp restrict_replies(query, %{"exclude_replies" => val}) when val == "true" or
|
||||||
)
|
)
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp restrict_replies(query, %{
|
||||||
|
"reply_filtering_user" => user,
|
||||||
|
"reply_visibility" => "self"
|
||||||
|
}) do
|
||||||
|
from(
|
||||||
|
[activity, object] in query,
|
||||||
|
where:
|
||||||
|
fragment(
|
||||||
|
"?->>'inReplyTo' is null OR ? = ANY(?)",
|
||||||
|
object.data,
|
||||||
|
^user.ap_id,
|
||||||
|
activity.recipients
|
||||||
|
)
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
|
defp restrict_replies(query, %{
|
||||||
|
"reply_filtering_user" => user,
|
||||||
|
"reply_visibility" => "following"
|
||||||
|
}) do
|
||||||
|
from(
|
||||||
|
[activity, object] in query,
|
||||||
|
where:
|
||||||
|
fragment(
|
||||||
|
"?->>'inReplyTo' is null OR ? && array_remove(?, ?) OR ? = ?",
|
||||||
|
object.data,
|
||||||
|
^[user.ap_id | User.get_cached_user_friends_ap_ids(user)],
|
||||||
|
activity.recipients,
|
||||||
|
activity.actor,
|
||||||
|
activity.actor,
|
||||||
|
^user.ap_id
|
||||||
|
)
|
||||||
|
)
|
||||||
|
end
|
||||||
|
|
||||||
defp restrict_replies(query, _), do: query
|
defp restrict_replies(query, _), do: query
|
||||||
|
|
||||||
defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
|
defp restrict_reblogs(query, %{"exclude_reblogs" => val}) when val == "true" or val == "1" do
|
||||||
|
@ -1272,6 +1308,7 @@ def fetch_activities_query(recipients, opts \\ %{}) do
|
||||||
|> maybe_set_thread_muted_field(opts)
|
|> maybe_set_thread_muted_field(opts)
|
||||||
|> maybe_order(opts)
|
|> maybe_order(opts)
|
||||||
|> restrict_recipients(recipients, opts["user"])
|
|> restrict_recipients(recipients, opts["user"])
|
||||||
|
|> restrict_replies(opts)
|
||||||
|> restrict_tag(opts)
|
|> restrict_tag(opts)
|
||||||
|> restrict_tag_reject(opts)
|
|> restrict_tag_reject(opts)
|
||||||
|> restrict_tag_all(opts)
|
|> restrict_tag_all(opts)
|
||||||
|
@ -1286,7 +1323,6 @@ def fetch_activities_query(recipients, opts \\ %{}) do
|
||||||
|> restrict_media(opts)
|
|> restrict_media(opts)
|
||||||
|> restrict_visibility(opts)
|
|> restrict_visibility(opts)
|
||||||
|> restrict_thread_visibility(opts, config)
|
|> restrict_thread_visibility(opts, config)
|
||||||
|> restrict_replies(opts)
|
|
||||||
|> restrict_reblogs(opts)
|
|> restrict_reblogs(opts)
|
||||||
|> restrict_pinned(opts)
|
|> restrict_pinned(opts)
|
||||||
|> restrict_muted_reblogs(restrict_muted_reblogs_opts)
|
|> restrict_muted_reblogs(restrict_muted_reblogs_opts)
|
||||||
|
|
|
@ -8,15 +8,16 @@ defmodule Pleroma.Web.AdminAPI.StatusView do
|
||||||
require Pleroma.Constants
|
require Pleroma.Constants
|
||||||
|
|
||||||
alias Pleroma.User
|
alias Pleroma.User
|
||||||
|
alias Pleroma.Web.MastodonAPI.StatusView
|
||||||
|
|
||||||
def render("index.json", opts) do
|
def render("index.json", opts) do
|
||||||
safe_render_many(opts.activities, __MODULE__, "show.json", opts)
|
safe_render_many(opts.activities, __MODULE__, "show.json", opts)
|
||||||
end
|
end
|
||||||
|
|
||||||
def render("show.json", %{activity: %{data: %{"object" => _object}} = activity} = opts) do
|
def render("show.json", %{activity: %{data: %{"object" => _object}} = activity} = opts) do
|
||||||
user = get_user(activity.data["actor"])
|
user = StatusView.get_user(activity.data["actor"])
|
||||||
|
|
||||||
Pleroma.Web.MastodonAPI.StatusView.render("show.json", opts)
|
StatusView.render("show.json", opts)
|
||||||
|> Map.merge(%{account: merge_account_views(user)})
|
|> Map.merge(%{account: merge_account_views(user)})
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -26,17 +27,4 @@ defp merge_account_views(%User{} = user) do
|
||||||
end
|
end
|
||||||
|
|
||||||
defp merge_account_views(_), do: %{}
|
defp merge_account_views(_), do: %{}
|
||||||
|
|
||||||
defp get_user(ap_id) do
|
|
||||||
cond do
|
|
||||||
user = User.get_cached_by_ap_id(ap_id) ->
|
|
||||||
user
|
|
||||||
|
|
||||||
user = User.get_by_guessed_nickname(ap_id) ->
|
|
||||||
user
|
|
||||||
|
|
||||||
true ->
|
|
||||||
User.error_user(ap_id)
|
|
||||||
end
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -6,8 +6,6 @@ defmodule Pleroma.Web.ApiSpec.AppOperation do
|
||||||
alias OpenApiSpex.Operation
|
alias OpenApiSpex.Operation
|
||||||
alias OpenApiSpex.Schema
|
alias OpenApiSpex.Schema
|
||||||
alias Pleroma.Web.ApiSpec.Helpers
|
alias Pleroma.Web.ApiSpec.Helpers
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.AppCreateRequest
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.AppCreateResponse
|
|
||||||
|
|
||||||
@spec open_api_operation(atom) :: Operation.t()
|
@spec open_api_operation(atom) :: Operation.t()
|
||||||
def open_api_operation(action) do
|
def open_api_operation(action) do
|
||||||
|
@ -22,9 +20,9 @@ def create_operation do
|
||||||
summary: "Create an application",
|
summary: "Create an application",
|
||||||
description: "Create a new application to obtain OAuth2 credentials",
|
description: "Create a new application to obtain OAuth2 credentials",
|
||||||
operationId: "AppController.create",
|
operationId: "AppController.create",
|
||||||
requestBody: Helpers.request_body("Parameters", AppCreateRequest, required: true),
|
requestBody: Helpers.request_body("Parameters", create_request(), required: true),
|
||||||
responses: %{
|
responses: %{
|
||||||
200 => Operation.response("App", "application/json", AppCreateResponse),
|
200 => Operation.response("App", "application/json", create_response()),
|
||||||
422 =>
|
422 =>
|
||||||
Operation.response(
|
Operation.response(
|
||||||
"Unprocessable Entity",
|
"Unprocessable Entity",
|
||||||
|
@ -93,4 +91,58 @@ def verify_credentials_operation do
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp create_request do
|
||||||
|
%Schema{
|
||||||
|
title: "AppCreateRequest",
|
||||||
|
description: "POST body for creating an app",
|
||||||
|
type: :object,
|
||||||
|
properties: %{
|
||||||
|
client_name: %Schema{type: :string, description: "A name for your application."},
|
||||||
|
redirect_uris: %Schema{
|
||||||
|
type: :string,
|
||||||
|
description:
|
||||||
|
"Where the user should be redirected after authorization. To display the authorization code to the user instead of redirecting to a web page, use `urn:ietf:wg:oauth:2.0:oob` in this parameter."
|
||||||
|
},
|
||||||
|
scopes: %Schema{
|
||||||
|
type: :string,
|
||||||
|
description: "Space separated list of scopes",
|
||||||
|
default: "read"
|
||||||
|
},
|
||||||
|
website: %Schema{type: :string, description: "A URL to the homepage of your app"}
|
||||||
|
},
|
||||||
|
required: [:client_name, :redirect_uris],
|
||||||
|
example: %{
|
||||||
|
"client_name" => "My App",
|
||||||
|
"redirect_uris" => "https://myapp.com/auth/callback",
|
||||||
|
"website" => "https://myapp.com/"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end
|
||||||
|
|
||||||
|
defp create_response do
|
||||||
|
%Schema{
|
||||||
|
title: "AppCreateResponse",
|
||||||
|
description: "Response schema for an app",
|
||||||
|
type: :object,
|
||||||
|
properties: %{
|
||||||
|
id: %Schema{type: :string},
|
||||||
|
name: %Schema{type: :string},
|
||||||
|
client_id: %Schema{type: :string},
|
||||||
|
client_secret: %Schema{type: :string},
|
||||||
|
redirect_uri: %Schema{type: :string},
|
||||||
|
vapid_key: %Schema{type: :string},
|
||||||
|
website: %Schema{type: :string, nullable: true}
|
||||||
|
},
|
||||||
|
example: %{
|
||||||
|
"id" => "123",
|
||||||
|
"name" => "My App",
|
||||||
|
"client_id" => "TWhM-tNSuncnqN7DBJmoyeLnk6K3iJJ71KKXxgL1hPM",
|
||||||
|
"client_secret" => "ZEaFUFmF0umgBX1qKJDjaU99Q31lDkOU8NutzTOoliw",
|
||||||
|
"vapid_key" =>
|
||||||
|
"BCk-QqERU0q-CfYZjcuB6lnyyOYfJ2AifKqfeGIm7Z-HiTU5T9eTG5GxVA0_OH5mMlI4UkkDTpaZwozy0TzdZ2M=",
|
||||||
|
"website" => "https://myapp.com/"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -4,7 +4,8 @@
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.CustomEmojiOperation do
|
defmodule Pleroma.Web.ApiSpec.CustomEmojiOperation do
|
||||||
alias OpenApiSpex.Operation
|
alias OpenApiSpex.Operation
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.CustomEmojisResponse
|
alias OpenApiSpex.Schema
|
||||||
|
alias Pleroma.Web.ApiSpec.Schemas.CustomEmoji
|
||||||
|
|
||||||
def open_api_operation(action) do
|
def open_api_operation(action) do
|
||||||
operation = String.to_existing_atom("#{action}_operation")
|
operation = String.to_existing_atom("#{action}_operation")
|
||||||
|
@ -18,8 +19,43 @@ def index_operation do
|
||||||
description: "Returns custom emojis that are available on the server.",
|
description: "Returns custom emojis that are available on the server.",
|
||||||
operationId: "CustomEmojiController.index",
|
operationId: "CustomEmojiController.index",
|
||||||
responses: %{
|
responses: %{
|
||||||
200 => Operation.response("Custom Emojis", "application/json", CustomEmojisResponse)
|
200 => Operation.response("Custom Emojis", "application/json", custom_emojis_resposnse())
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp custom_emojis_resposnse do
|
||||||
|
%Schema{
|
||||||
|
title: "CustomEmojisResponse",
|
||||||
|
description: "Response schema for custom emojis",
|
||||||
|
type: :array,
|
||||||
|
items: CustomEmoji,
|
||||||
|
example: [
|
||||||
|
%{
|
||||||
|
"category" => "Fun",
|
||||||
|
"shortcode" => "blank",
|
||||||
|
"static_url" => "https://lain.com/emoji/blank.png",
|
||||||
|
"tags" => ["Fun"],
|
||||||
|
"url" => "https://lain.com/emoji/blank.png",
|
||||||
|
"visible_in_picker" => false
|
||||||
|
},
|
||||||
|
%{
|
||||||
|
"category" => "Gif,Fun",
|
||||||
|
"shortcode" => "firefox",
|
||||||
|
"static_url" => "https://lain.com/emoji/Firefox.gif",
|
||||||
|
"tags" => ["Gif", "Fun"],
|
||||||
|
"url" => "https://lain.com/emoji/Firefox.gif",
|
||||||
|
"visible_in_picker" => true
|
||||||
|
},
|
||||||
|
%{
|
||||||
|
"category" => "pack:mixed",
|
||||||
|
"shortcode" => "sadcat",
|
||||||
|
"static_url" => "https://lain.com/emoji/mixed/sadcat.png",
|
||||||
|
"tags" => ["pack:mixed"],
|
||||||
|
"url" => "https://lain.com/emoji/mixed/sadcat.png",
|
||||||
|
"visible_in_picker" => true
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -6,8 +6,6 @@ defmodule Pleroma.Web.ApiSpec.DomainBlockOperation do
|
||||||
alias OpenApiSpex.Operation
|
alias OpenApiSpex.Operation
|
||||||
alias OpenApiSpex.Schema
|
alias OpenApiSpex.Schema
|
||||||
alias Pleroma.Web.ApiSpec.Helpers
|
alias Pleroma.Web.ApiSpec.Helpers
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.DomainBlockRequest
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.DomainBlocksResponse
|
|
||||||
|
|
||||||
def open_api_operation(action) do
|
def open_api_operation(action) do
|
||||||
operation = String.to_existing_atom("#{action}_operation")
|
operation = String.to_existing_atom("#{action}_operation")
|
||||||
|
@ -22,7 +20,13 @@ def index_operation do
|
||||||
security: [%{"oAuth" => ["follow", "read:blocks"]}],
|
security: [%{"oAuth" => ["follow", "read:blocks"]}],
|
||||||
operationId: "DomainBlockController.index",
|
operationId: "DomainBlockController.index",
|
||||||
responses: %{
|
responses: %{
|
||||||
200 => Operation.response("Domain blocks", "application/json", DomainBlocksResponse)
|
200 =>
|
||||||
|
Operation.response("Domain blocks", "application/json", %Schema{
|
||||||
|
description: "Response schema for domain blocks",
|
||||||
|
type: :array,
|
||||||
|
items: %Schema{type: :string},
|
||||||
|
example: ["google.com", "facebook.com"]
|
||||||
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
@ -40,7 +44,7 @@ def create_operation do
|
||||||
- prevent following new users from it (but does not remove existing follows)
|
- prevent following new users from it (but does not remove existing follows)
|
||||||
""",
|
""",
|
||||||
operationId: "DomainBlockController.create",
|
operationId: "DomainBlockController.create",
|
||||||
requestBody: Helpers.request_body("Parameters", DomainBlockRequest, required: true),
|
requestBody: domain_block_request(),
|
||||||
security: [%{"oAuth" => ["follow", "write:blocks"]}],
|
security: [%{"oAuth" => ["follow", "write:blocks"]}],
|
||||||
responses: %{
|
responses: %{
|
||||||
200 => Operation.response("Empty object", "application/json", %Schema{type: :object})
|
200 => Operation.response("Empty object", "application/json", %Schema{type: :object})
|
||||||
|
@ -54,11 +58,28 @@ def delete_operation do
|
||||||
summary: "Unblock a domain",
|
summary: "Unblock a domain",
|
||||||
description: "Remove a domain block, if it exists in the user's array of blocked domains.",
|
description: "Remove a domain block, if it exists in the user's array of blocked domains.",
|
||||||
operationId: "DomainBlockController.delete",
|
operationId: "DomainBlockController.delete",
|
||||||
requestBody: Helpers.request_body("Parameters", DomainBlockRequest, required: true),
|
requestBody: domain_block_request(),
|
||||||
security: [%{"oAuth" => ["follow", "write:blocks"]}],
|
security: [%{"oAuth" => ["follow", "write:blocks"]}],
|
||||||
responses: %{
|
responses: %{
|
||||||
200 => Operation.response("Empty object", "application/json", %Schema{type: :object})
|
200 => Operation.response("Empty object", "application/json", %Schema{type: :object})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp domain_block_request do
|
||||||
|
Helpers.request_body(
|
||||||
|
"Parameters",
|
||||||
|
%Schema{
|
||||||
|
type: :object,
|
||||||
|
properties: %{
|
||||||
|
domain: %Schema{type: :string}
|
||||||
|
},
|
||||||
|
required: [:domain]
|
||||||
|
},
|
||||||
|
required: true,
|
||||||
|
example: %{
|
||||||
|
"domain" => "facebook.com"
|
||||||
|
}
|
||||||
|
)
|
||||||
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -1,33 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.Schemas.AppCreateRequest do
|
|
||||||
alias OpenApiSpex.Schema
|
|
||||||
require OpenApiSpex
|
|
||||||
|
|
||||||
OpenApiSpex.schema(%{
|
|
||||||
title: "AppCreateRequest",
|
|
||||||
description: "POST body for creating an app",
|
|
||||||
type: :object,
|
|
||||||
properties: %{
|
|
||||||
client_name: %Schema{type: :string, description: "A name for your application."},
|
|
||||||
redirect_uris: %Schema{
|
|
||||||
type: :string,
|
|
||||||
description:
|
|
||||||
"Where the user should be redirected after authorization. To display the authorization code to the user instead of redirecting to a web page, use `urn:ietf:wg:oauth:2.0:oob` in this parameter."
|
|
||||||
},
|
|
||||||
scopes: %Schema{
|
|
||||||
type: :string,
|
|
||||||
description: "Space separated list of scopes. If none is provided, defaults to `read`."
|
|
||||||
},
|
|
||||||
website: %Schema{type: :string, description: "A URL to the homepage of your app"}
|
|
||||||
},
|
|
||||||
required: [:client_name, :redirect_uris],
|
|
||||||
example: %{
|
|
||||||
"client_name" => "My App",
|
|
||||||
"redirect_uris" => "https://myapp.com/auth/callback",
|
|
||||||
"website" => "https://myapp.com/"
|
|
||||||
}
|
|
||||||
})
|
|
||||||
end
|
|
|
@ -1,33 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.Schemas.AppCreateResponse do
|
|
||||||
alias OpenApiSpex.Schema
|
|
||||||
|
|
||||||
require OpenApiSpex
|
|
||||||
|
|
||||||
OpenApiSpex.schema(%{
|
|
||||||
title: "AppCreateResponse",
|
|
||||||
description: "Response schema for an app",
|
|
||||||
type: :object,
|
|
||||||
properties: %{
|
|
||||||
id: %Schema{type: :string},
|
|
||||||
name: %Schema{type: :string},
|
|
||||||
client_id: %Schema{type: :string},
|
|
||||||
client_secret: %Schema{type: :string},
|
|
||||||
redirect_uri: %Schema{type: :string},
|
|
||||||
vapid_key: %Schema{type: :string},
|
|
||||||
website: %Schema{type: :string, nullable: true}
|
|
||||||
},
|
|
||||||
example: %{
|
|
||||||
"id" => "123",
|
|
||||||
"name" => "My App",
|
|
||||||
"client_id" => "TWhM-tNSuncnqN7DBJmoyeLnk6K3iJJ71KKXxgL1hPM",
|
|
||||||
"client_secret" => "ZEaFUFmF0umgBX1qKJDjaU99Q31lDkOU8NutzTOoliw",
|
|
||||||
"vapid_key" =>
|
|
||||||
"BCk-QqERU0q-CfYZjcuB6lnyyOYfJ2AifKqfeGIm7Z-HiTU5T9eTG5GxVA0_OH5mMlI4UkkDTpaZwozy0TzdZ2M=",
|
|
||||||
"website" => "https://myapp.com/"
|
|
||||||
}
|
|
||||||
})
|
|
||||||
end
|
|
|
@ -1,42 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.Schemas.CustomEmojisResponse do
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.CustomEmoji
|
|
||||||
|
|
||||||
require OpenApiSpex
|
|
||||||
|
|
||||||
OpenApiSpex.schema(%{
|
|
||||||
title: "CustomEmojisResponse",
|
|
||||||
description: "Response schema for custom emojis",
|
|
||||||
type: :array,
|
|
||||||
items: CustomEmoji,
|
|
||||||
example: [
|
|
||||||
%{
|
|
||||||
"category" => "Fun",
|
|
||||||
"shortcode" => "blank",
|
|
||||||
"static_url" => "https://lain.com/emoji/blank.png",
|
|
||||||
"tags" => ["Fun"],
|
|
||||||
"url" => "https://lain.com/emoji/blank.png",
|
|
||||||
"visible_in_picker" => true
|
|
||||||
},
|
|
||||||
%{
|
|
||||||
"category" => "Gif,Fun",
|
|
||||||
"shortcode" => "firefox",
|
|
||||||
"static_url" => "https://lain.com/emoji/Firefox.gif",
|
|
||||||
"tags" => ["Gif", "Fun"],
|
|
||||||
"url" => "https://lain.com/emoji/Firefox.gif",
|
|
||||||
"visible_in_picker" => true
|
|
||||||
},
|
|
||||||
%{
|
|
||||||
"category" => "pack:mixed",
|
|
||||||
"shortcode" => "sadcat",
|
|
||||||
"static_url" => "https://lain.com/emoji/mixed/sadcat.png",
|
|
||||||
"tags" => ["pack:mixed"],
|
|
||||||
"url" => "https://lain.com/emoji/mixed/sadcat.png",
|
|
||||||
"visible_in_picker" => true
|
|
||||||
}
|
|
||||||
]
|
|
||||||
})
|
|
||||||
end
|
|
|
@ -1,20 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.Schemas.DomainBlockRequest do
|
|
||||||
alias OpenApiSpex.Schema
|
|
||||||
require OpenApiSpex
|
|
||||||
|
|
||||||
OpenApiSpex.schema(%{
|
|
||||||
title: "DomainBlockRequest",
|
|
||||||
type: :object,
|
|
||||||
properties: %{
|
|
||||||
domain: %Schema{type: :string}
|
|
||||||
},
|
|
||||||
required: [:domain],
|
|
||||||
example: %{
|
|
||||||
"domain" => "facebook.com"
|
|
||||||
}
|
|
||||||
})
|
|
||||||
end
|
|
|
@ -1,16 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.Schemas.DomainBlocksResponse do
|
|
||||||
require OpenApiSpex
|
|
||||||
alias OpenApiSpex.Schema
|
|
||||||
|
|
||||||
OpenApiSpex.schema(%{
|
|
||||||
title: "DomainBlocksResponse",
|
|
||||||
description: "Response schema for domain blocks",
|
|
||||||
type: :array,
|
|
||||||
items: %Schema{type: :string},
|
|
||||||
example: ["google.com", "facebook.com"]
|
|
||||||
})
|
|
||||||
end
|
|
|
@ -84,14 +84,18 @@ defp attachments(%{params: params} = draft) do
|
||||||
%__MODULE__{draft | attachments: attachments}
|
%__MODULE__{draft | attachments: attachments}
|
||||||
end
|
end
|
||||||
|
|
||||||
defp in_reply_to(draft) do
|
defp in_reply_to(%{params: %{"in_reply_to_status_id" => ""}} = draft), do: draft
|
||||||
case Map.get(draft.params, "in_reply_to_status_id") do
|
|
||||||
"" -> draft
|
defp in_reply_to(%{params: %{"in_reply_to_status_id" => id}} = draft) when is_binary(id) do
|
||||||
nil -> draft
|
%__MODULE__{draft | in_reply_to: Activity.get_by_id(id)}
|
||||||
id -> %__MODULE__{draft | in_reply_to: Activity.get_by_id(id)}
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp in_reply_to(%{params: %{"in_reply_to_status_id" => %Activity{} = in_reply_to}} = draft) do
|
||||||
|
%__MODULE__{draft | in_reply_to: in_reply_to}
|
||||||
|
end
|
||||||
|
|
||||||
|
defp in_reply_to(draft), do: draft
|
||||||
|
|
||||||
defp in_reply_to_conversation(draft) do
|
defp in_reply_to_conversation(draft) do
|
||||||
in_reply_to_conversation = Participation.get(draft.params["in_reply_to_conversation_id"])
|
in_reply_to_conversation = Participation.get(draft.params["in_reply_to_conversation_id"])
|
||||||
%__MODULE__{draft | in_reply_to_conversation: in_reply_to_conversation}
|
%__MODULE__{draft | in_reply_to_conversation: in_reply_to_conversation}
|
||||||
|
|
|
@ -37,6 +37,7 @@ def home(%{assigns: %{user: user}} = conn, params) do
|
||||||
|> Map.put("type", ["Create", "Announce"])
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|> Map.put("blocking_user", user)
|
|> Map.put("blocking_user", user)
|
||||||
|> Map.put("muting_user", user)
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|> Map.put("user", user)
|
|> Map.put("user", user)
|
||||||
|
|
||||||
recipients = [user.ap_id | User.following(user)]
|
recipients = [user.ap_id | User.following(user)]
|
||||||
|
@ -100,6 +101,7 @@ def public(%{assigns: %{user: user}} = conn, params) do
|
||||||
|> Map.put("local_only", local_only)
|
|> Map.put("local_only", local_only)
|
||||||
|> Map.put("blocking_user", user)
|
|> Map.put("blocking_user", user)
|
||||||
|> Map.put("muting_user", user)
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|> ActivityPub.fetch_public_activities()
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|
||||||
conn
|
conn
|
||||||
|
|
|
@ -45,7 +45,7 @@ defp get_replied_to_activities(activities) do
|
||||||
end)
|
end)
|
||||||
end
|
end
|
||||||
|
|
||||||
defp get_user(ap_id) do
|
def get_user(ap_id, fake_record_fallback \\ true) do
|
||||||
cond do
|
cond do
|
||||||
user = User.get_cached_by_ap_id(ap_id) ->
|
user = User.get_cached_by_ap_id(ap_id) ->
|
||||||
user
|
user
|
||||||
|
@ -53,8 +53,12 @@ defp get_user(ap_id) do
|
||||||
user = User.get_by_guessed_nickname(ap_id) ->
|
user = User.get_by_guessed_nickname(ap_id) ->
|
||||||
user
|
user
|
||||||
|
|
||||||
true ->
|
fake_record_fallback ->
|
||||||
|
# TODO: refactor (fake records is never a good idea)
|
||||||
User.error_user(ap_id)
|
User.error_user(ap_id)
|
||||||
|
|
||||||
|
true ->
|
||||||
|
nil
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -97,7 +101,11 @@ def render("index.json", opts) do
|
||||||
UserRelationship.view_relationships_option(nil, [])
|
UserRelationship.view_relationships_option(nil, [])
|
||||||
|
|
||||||
true ->
|
true ->
|
||||||
actors = Enum.map(activities ++ parent_activities, &get_user(&1.data["actor"]))
|
# Note: unresolved users are filtered out
|
||||||
|
actors =
|
||||||
|
(activities ++ parent_activities)
|
||||||
|
|> Enum.map(&get_user(&1.data["actor"], false))
|
||||||
|
|> Enum.filter(& &1)
|
||||||
|
|
||||||
UserRelationship.view_relationships_option(reading_user, actors,
|
UserRelationship.view_relationships_option(reading_user, actors,
|
||||||
source_mutes_only: opts[:skip_relationships]
|
source_mutes_only: opts[:skip_relationships]
|
||||||
|
|
|
@ -14,7 +14,7 @@ defmodule Pleroma.Web.MongooseIM.MongooseIMController do
|
||||||
plug(RateLimiter, [name: :authentication, params: ["user"]] when action == :check_password)
|
plug(RateLimiter, [name: :authentication, params: ["user"]] when action == :check_password)
|
||||||
|
|
||||||
def user_exists(conn, %{"user" => username}) do
|
def user_exists(conn, %{"user" => username}) do
|
||||||
with %User{} <- Repo.get_by(User, nickname: username, local: true) do
|
with %User{} <- Repo.get_by(User, nickname: username, local: true, deactivated: false) do
|
||||||
conn
|
conn
|
||||||
|> json(true)
|
|> json(true)
|
||||||
else
|
else
|
||||||
|
@ -26,7 +26,7 @@ def user_exists(conn, %{"user" => username}) do
|
||||||
end
|
end
|
||||||
|
|
||||||
def check_password(conn, %{"user" => username, "pass" => password}) do
|
def check_password(conn, %{"user" => username, "pass" => password}) do
|
||||||
with %User{password_hash: password_hash} <-
|
with %User{password_hash: password_hash, deactivated: false} <-
|
||||||
Repo.get_by(User, nickname: username, local: true),
|
Repo.get_by(User, nickname: username, local: true),
|
||||||
true <- Pbkdf2.checkpw(password, password_hash) do
|
true <- Pbkdf2.checkpw(password, password_hash) do
|
||||||
conn
|
conn
|
||||||
|
|
|
@ -17,12 +17,8 @@ defmodule Pleroma.Web.OAuth.Scopes do
|
||||||
"""
|
"""
|
||||||
@spec fetch_scopes(map() | struct(), list()) :: list()
|
@spec fetch_scopes(map() | struct(), list()) :: list()
|
||||||
|
|
||||||
def fetch_scopes(%Pleroma.Web.ApiSpec.Schemas.AppCreateRequest{scopes: scopes}, default) do
|
|
||||||
parse_scopes(scopes, default)
|
|
||||||
end
|
|
||||||
|
|
||||||
def fetch_scopes(params, default) do
|
def fetch_scopes(params, default) do
|
||||||
parse_scopes(params["scope"] || params["scopes"], default)
|
parse_scopes(params["scope"] || params["scopes"] || params[:scopes], default)
|
||||||
end
|
end
|
||||||
|
|
||||||
def parse_scopes(scopes, _default) when is_list(scopes) do
|
def parse_scopes(scopes, _default) when is_list(scopes) do
|
||||||
|
|
|
@ -0,0 +1,57 @@
|
||||||
|
# Pleroma: A lightweight social networking server
|
||||||
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
||||||
|
# SPDX-License-Identifier: AGPL-3.0-only
|
||||||
|
|
||||||
|
defmodule Pleroma.Tests.ApiSpecHelpers do
|
||||||
|
@moduledoc """
|
||||||
|
OpenAPI spec test helpers
|
||||||
|
"""
|
||||||
|
|
||||||
|
import ExUnit.Assertions
|
||||||
|
|
||||||
|
alias OpenApiSpex.Cast.Error
|
||||||
|
alias OpenApiSpex.Reference
|
||||||
|
alias OpenApiSpex.Schema
|
||||||
|
|
||||||
|
def assert_schema(value, schema) do
|
||||||
|
api_spec = Pleroma.Web.ApiSpec.spec()
|
||||||
|
|
||||||
|
case OpenApiSpex.cast_value(value, schema, api_spec) do
|
||||||
|
{:ok, data} ->
|
||||||
|
data
|
||||||
|
|
||||||
|
{:error, errors} ->
|
||||||
|
errors =
|
||||||
|
Enum.map(errors, fn error ->
|
||||||
|
message = Error.message(error)
|
||||||
|
path = Error.path_to_string(error)
|
||||||
|
"#{message} at #{path}"
|
||||||
|
end)
|
||||||
|
|
||||||
|
flunk(
|
||||||
|
"Value does not conform to schema #{schema.title}: #{Enum.join(errors, "\n")}\n#{
|
||||||
|
inspect(value)
|
||||||
|
}"
|
||||||
|
)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
def resolve_schema(%Schema{} = schema), do: schema
|
||||||
|
|
||||||
|
def resolve_schema(%Reference{} = ref) do
|
||||||
|
schemas = Pleroma.Web.ApiSpec.spec().components.schemas
|
||||||
|
Reference.resolve_schema(ref, schemas)
|
||||||
|
end
|
||||||
|
|
||||||
|
def api_operations do
|
||||||
|
paths = Pleroma.Web.ApiSpec.spec().paths
|
||||||
|
|
||||||
|
Enum.flat_map(paths, fn {_, path_item} ->
|
||||||
|
path_item
|
||||||
|
|> Map.take([:delete, :get, :head, :options, :patch, :post, :put, :trace])
|
||||||
|
|> Map.values()
|
||||||
|
|> Enum.reject(&is_nil/1)
|
||||||
|
|> Enum.uniq()
|
||||||
|
end)
|
||||||
|
end
|
||||||
|
end
|
|
@ -51,6 +51,42 @@ defp oauth_access(scopes, opts \\ []) do
|
||||||
%{user: user, token: token, conn: conn}
|
%{user: user, token: token, conn: conn}
|
||||||
end
|
end
|
||||||
|
|
||||||
|
defp json_response_and_validate_schema(conn, status \\ nil) do
|
||||||
|
content_type =
|
||||||
|
conn
|
||||||
|
|> Plug.Conn.get_resp_header("content-type")
|
||||||
|
|> List.first()
|
||||||
|
|> String.split(";")
|
||||||
|
|> List.first()
|
||||||
|
|
||||||
|
status = status || conn.status
|
||||||
|
|
||||||
|
%{private: %{open_api_spex: %{operation_id: op_id, operation_lookup: lookup, spec: spec}}} =
|
||||||
|
conn
|
||||||
|
|
||||||
|
schema = lookup[op_id].responses[status].content[content_type].schema
|
||||||
|
json = json_response(conn, status)
|
||||||
|
|
||||||
|
case OpenApiSpex.cast_value(json, schema, spec) do
|
||||||
|
{:ok, _data} ->
|
||||||
|
json
|
||||||
|
|
||||||
|
{:error, errors} ->
|
||||||
|
errors =
|
||||||
|
Enum.map(errors, fn error ->
|
||||||
|
message = OpenApiSpex.Cast.Error.message(error)
|
||||||
|
path = OpenApiSpex.Cast.Error.path_to_string(error)
|
||||||
|
"#{message} at #{path}"
|
||||||
|
end)
|
||||||
|
|
||||||
|
flunk(
|
||||||
|
"Response does not conform to schema of #{op_id} operation: #{
|
||||||
|
Enum.join(errors, "\n")
|
||||||
|
}\n#{inspect(json)}"
|
||||||
|
)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
defp ensure_federating_or_authenticated(conn, url, user) do
|
defp ensure_federating_or_authenticated(conn, url, user) do
|
||||||
initial_setting = Config.get([:instance, :federating])
|
initial_setting = Config.get([:instance, :federating])
|
||||||
on_exit(fn -> Config.put([:instance, :federating], initial_setting) end)
|
on_exit(fn -> Config.put([:instance, :federating], initial_setting) end)
|
||||||
|
|
|
@ -1911,6 +1911,499 @@ test "old user must be in the new user's `also_known_as` list" do
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
||||||
|
test "doesn't retrieve replies activities with exclude_replies" do
|
||||||
|
user = insert(:user)
|
||||||
|
|
||||||
|
{:ok, activity} = CommonAPI.post(user, %{"status" => "yeah"})
|
||||||
|
|
||||||
|
{:ok, _reply} =
|
||||||
|
CommonAPI.post(user, %{"status" => "yeah", "in_reply_to_status_id" => activity.id})
|
||||||
|
|
||||||
|
[result] = ActivityPub.fetch_public_activities(%{"exclude_replies" => "true"})
|
||||||
|
|
||||||
|
assert result.id == activity.id
|
||||||
|
|
||||||
|
assert length(ActivityPub.fetch_public_activities()) == 2
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "replies filtering with public messages" do
|
||||||
|
setup :public_messages
|
||||||
|
|
||||||
|
test "public timeline", %{users: %{u1: user}} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 16
|
||||||
|
end
|
||||||
|
|
||||||
|
test "public timeline with reply_visibility `following`", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4,
|
||||||
|
activities: activities
|
||||||
|
} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 14
|
||||||
|
|
||||||
|
visible_ids =
|
||||||
|
Map.values(u1) ++ Map.values(u2) ++ Map.values(u4) ++ Map.values(activities) ++ [u3[:r1]]
|
||||||
|
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
|
||||||
|
test "public timeline with reply_visibility `self`", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4,
|
||||||
|
activities: activities
|
||||||
|
} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 10
|
||||||
|
visible_ids = Map.values(u1) ++ [u2[:r1], u3[:r1], u4[:r1]] ++ Map.values(activities)
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
activities: activities,
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4
|
||||||
|
} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 13
|
||||||
|
|
||||||
|
visible_ids =
|
||||||
|
Map.values(u1) ++
|
||||||
|
Map.values(u3) ++
|
||||||
|
[
|
||||||
|
activities[:a1],
|
||||||
|
activities[:a2],
|
||||||
|
activities[:a4],
|
||||||
|
u2[:r1],
|
||||||
|
u2[:r3],
|
||||||
|
u4[:r1],
|
||||||
|
u4[:r2]
|
||||||
|
]
|
||||||
|
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline with reply_visibility `following`", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
activities: activities,
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4
|
||||||
|
} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 11
|
||||||
|
|
||||||
|
visible_ids =
|
||||||
|
Map.values(u1) ++
|
||||||
|
[
|
||||||
|
activities[:a1],
|
||||||
|
activities[:a2],
|
||||||
|
activities[:a4],
|
||||||
|
u2[:r1],
|
||||||
|
u2[:r3],
|
||||||
|
u3[:r1],
|
||||||
|
u4[:r1],
|
||||||
|
u4[:r2]
|
||||||
|
]
|
||||||
|
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline with reply_visibility `self`", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
activities: activities,
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4
|
||||||
|
} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 9
|
||||||
|
|
||||||
|
visible_ids =
|
||||||
|
Map.values(u1) ++
|
||||||
|
[
|
||||||
|
activities[:a1],
|
||||||
|
activities[:a2],
|
||||||
|
activities[:a4],
|
||||||
|
u2[:r1],
|
||||||
|
u3[:r1],
|
||||||
|
u4[:r1]
|
||||||
|
]
|
||||||
|
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
describe "replies filtering with private messages" do
|
||||||
|
setup :private_messages
|
||||||
|
|
||||||
|
test "public timeline", %{users: %{u1: user}} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert activities_ids == []
|
||||||
|
end
|
||||||
|
|
||||||
|
test "public timeline with default reply_visibility `following`", %{users: %{u1: user}} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert activities_ids == []
|
||||||
|
end
|
||||||
|
|
||||||
|
test "public timeline with default reply_visibility `self`", %{users: %{u1: user}} do
|
||||||
|
activities_ids =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("local_only", false)
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> ActivityPub.fetch_public_activities()
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert activities_ids == []
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline", %{users: %{u1: user}} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 12
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline with default reply_visibility `following`", %{users: %{u1: user}} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> Map.put("reply_visibility", "following")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 12
|
||||||
|
end
|
||||||
|
|
||||||
|
test "home timeline with default reply_visibility `self`", %{
|
||||||
|
users: %{u1: user},
|
||||||
|
activities: activities,
|
||||||
|
u1: u1,
|
||||||
|
u2: u2,
|
||||||
|
u3: u3,
|
||||||
|
u4: u4
|
||||||
|
} do
|
||||||
|
params =
|
||||||
|
%{}
|
||||||
|
|> Map.put("type", ["Create", "Announce"])
|
||||||
|
|> Map.put("blocking_user", user)
|
||||||
|
|> Map.put("muting_user", user)
|
||||||
|
|> Map.put("user", user)
|
||||||
|
|> Map.put("reply_visibility", "self")
|
||||||
|
|> Map.put("reply_filtering_user", user)
|
||||||
|
|
||||||
|
activities_ids =
|
||||||
|
ActivityPub.fetch_activities([user.ap_id | User.following(user)], params)
|
||||||
|
|> Enum.map(& &1.id)
|
||||||
|
|
||||||
|
assert length(activities_ids) == 10
|
||||||
|
|
||||||
|
visible_ids =
|
||||||
|
Map.values(u1) ++ Map.values(u4) ++ [u2[:r1], u3[:r1]] ++ Map.values(activities)
|
||||||
|
|
||||||
|
assert Enum.all?(visible_ids, &(&1 in activities_ids))
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
defp public_messages(_) do
|
||||||
|
[u1, u2, u3, u4] = insert_list(4, :user)
|
||||||
|
{:ok, u1} = User.follow(u1, u2)
|
||||||
|
{:ok, u2} = User.follow(u2, u1)
|
||||||
|
{:ok, u1} = User.follow(u1, u4)
|
||||||
|
{:ok, u4} = User.follow(u4, u1)
|
||||||
|
|
||||||
|
{:ok, u2} = User.follow(u2, u3)
|
||||||
|
{:ok, u3} = User.follow(u3, u2)
|
||||||
|
|
||||||
|
{:ok, a1} = CommonAPI.post(u1, %{"status" => "Status"})
|
||||||
|
|
||||||
|
{:ok, r1_1} =
|
||||||
|
CommonAPI.post(u2, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u2 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r1_2} =
|
||||||
|
CommonAPI.post(u3, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u3 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r1_3} =
|
||||||
|
CommonAPI.post(u4, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u4 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a2} = CommonAPI.post(u2, %{"status" => "Status"})
|
||||||
|
|
||||||
|
{:ok, r2_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u2.nickname} reply from u1 to u2",
|
||||||
|
"in_reply_to_status_id" => a2.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r2_2} =
|
||||||
|
CommonAPI.post(u3, %{
|
||||||
|
"status" => "@#{u2.nickname} reply from u3 to u2",
|
||||||
|
"in_reply_to_status_id" => a2.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r2_3} =
|
||||||
|
CommonAPI.post(u4, %{
|
||||||
|
"status" => "@#{u2.nickname} reply from u4 to u2",
|
||||||
|
"in_reply_to_status_id" => a2.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a3} = CommonAPI.post(u3, %{"status" => "Status"})
|
||||||
|
|
||||||
|
{:ok, r3_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u3.nickname} reply from u1 to u3",
|
||||||
|
"in_reply_to_status_id" => a3.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r3_2} =
|
||||||
|
CommonAPI.post(u2, %{
|
||||||
|
"status" => "@#{u3.nickname} reply from u2 to u3",
|
||||||
|
"in_reply_to_status_id" => a3.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r3_3} =
|
||||||
|
CommonAPI.post(u4, %{
|
||||||
|
"status" => "@#{u3.nickname} reply from u4 to u3",
|
||||||
|
"in_reply_to_status_id" => a3.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a4} = CommonAPI.post(u4, %{"status" => "Status"})
|
||||||
|
|
||||||
|
{:ok, r4_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u4.nickname} reply from u1 to u4",
|
||||||
|
"in_reply_to_status_id" => a4.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r4_2} =
|
||||||
|
CommonAPI.post(u2, %{
|
||||||
|
"status" => "@#{u4.nickname} reply from u2 to u4",
|
||||||
|
"in_reply_to_status_id" => a4.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r4_3} =
|
||||||
|
CommonAPI.post(u3, %{
|
||||||
|
"status" => "@#{u4.nickname} reply from u3 to u4",
|
||||||
|
"in_reply_to_status_id" => a4.id
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok,
|
||||||
|
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
|
||||||
|
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
|
||||||
|
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
|
||||||
|
u2: %{r1: r2_1.id, r2: r2_2.id, r3: r2_3.id},
|
||||||
|
u3: %{r1: r3_1.id, r2: r3_2.id, r3: r3_3.id},
|
||||||
|
u4: %{r1: r4_1.id, r2: r4_2.id, r3: r4_3.id}}
|
||||||
|
end
|
||||||
|
|
||||||
|
defp private_messages(_) do
|
||||||
|
[u1, u2, u3, u4] = insert_list(4, :user)
|
||||||
|
{:ok, u1} = User.follow(u1, u2)
|
||||||
|
{:ok, u2} = User.follow(u2, u1)
|
||||||
|
{:ok, u1} = User.follow(u1, u3)
|
||||||
|
{:ok, u3} = User.follow(u3, u1)
|
||||||
|
{:ok, u1} = User.follow(u1, u4)
|
||||||
|
{:ok, u4} = User.follow(u4, u1)
|
||||||
|
|
||||||
|
{:ok, u2} = User.follow(u2, u3)
|
||||||
|
{:ok, u3} = User.follow(u3, u2)
|
||||||
|
|
||||||
|
{:ok, a1} = CommonAPI.post(u1, %{"status" => "Status", "visibility" => "private"})
|
||||||
|
|
||||||
|
{:ok, r1_1} =
|
||||||
|
CommonAPI.post(u2, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u2 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r1_2} =
|
||||||
|
CommonAPI.post(u3, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u3 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r1_3} =
|
||||||
|
CommonAPI.post(u4, %{
|
||||||
|
"status" => "@#{u1.nickname} reply from u4 to u1",
|
||||||
|
"in_reply_to_status_id" => a1.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a2} = CommonAPI.post(u2, %{"status" => "Status", "visibility" => "private"})
|
||||||
|
|
||||||
|
{:ok, r2_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u2.nickname} reply from u1 to u2",
|
||||||
|
"in_reply_to_status_id" => a2.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r2_2} =
|
||||||
|
CommonAPI.post(u3, %{
|
||||||
|
"status" => "@#{u2.nickname} reply from u3 to u2",
|
||||||
|
"in_reply_to_status_id" => a2.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a3} = CommonAPI.post(u3, %{"status" => "Status", "visibility" => "private"})
|
||||||
|
|
||||||
|
{:ok, r3_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u3.nickname} reply from u1 to u3",
|
||||||
|
"in_reply_to_status_id" => a3.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, r3_2} =
|
||||||
|
CommonAPI.post(u2, %{
|
||||||
|
"status" => "@#{u3.nickname} reply from u2 to u3",
|
||||||
|
"in_reply_to_status_id" => a3.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok, a4} = CommonAPI.post(u4, %{"status" => "Status", "visibility" => "private"})
|
||||||
|
|
||||||
|
{:ok, r4_1} =
|
||||||
|
CommonAPI.post(u1, %{
|
||||||
|
"status" => "@#{u4.nickname} reply from u1 to u4",
|
||||||
|
"in_reply_to_status_id" => a4.id,
|
||||||
|
"visibility" => "private"
|
||||||
|
})
|
||||||
|
|
||||||
|
{:ok,
|
||||||
|
users: %{u1: u1, u2: u2, u3: u3, u4: u4},
|
||||||
|
activities: %{a1: a1.id, a2: a2.id, a3: a3.id, a4: a4.id},
|
||||||
|
u1: %{r1: r1_1.id, r2: r1_2.id, r3: r1_3.id},
|
||||||
|
u2: %{r1: r2_1.id, r2: r2_2.id},
|
||||||
|
u3: %{r1: r3_1.id, r2: r3_2.id},
|
||||||
|
u4: %{r1: r4_1.id}}
|
||||||
|
end
|
||||||
|
|
||||||
describe "global activity expiration" do
|
describe "global activity expiration" do
|
||||||
setup do: clear_config([:instance, :rewrite_policy])
|
setup do: clear_config([:instance, :rewrite_policy])
|
||||||
|
|
||||||
|
|
|
@ -1,45 +0,0 @@
|
||||||
# Pleroma: A lightweight social networking server
|
|
||||||
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
|
||||||
# SPDX-License-Identifier: AGPL-3.0-only
|
|
||||||
|
|
||||||
defmodule Pleroma.Web.ApiSpec.AppOperationTest do
|
|
||||||
use Pleroma.Web.ConnCase, async: true
|
|
||||||
|
|
||||||
alias Pleroma.Web.ApiSpec
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.AppCreateRequest
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.AppCreateResponse
|
|
||||||
|
|
||||||
import OpenApiSpex.TestAssertions
|
|
||||||
import Pleroma.Factory
|
|
||||||
|
|
||||||
test "AppCreateRequest example matches schema" do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
schema = AppCreateRequest.schema()
|
|
||||||
assert_schema(schema.example, "AppCreateRequest", api_spec)
|
|
||||||
end
|
|
||||||
|
|
||||||
test "AppCreateResponse example matches schema" do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
schema = AppCreateResponse.schema()
|
|
||||||
assert_schema(schema.example, "AppCreateResponse", api_spec)
|
|
||||||
end
|
|
||||||
|
|
||||||
test "AppController produces a AppCreateResponse", %{conn: conn} do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
app_attrs = build(:oauth_app)
|
|
||||||
|
|
||||||
json =
|
|
||||||
conn
|
|
||||||
|> put_req_header("content-type", "application/json")
|
|
||||||
|> post(
|
|
||||||
"/api/v1/apps",
|
|
||||||
Jason.encode!(%{
|
|
||||||
client_name: app_attrs.client_name,
|
|
||||||
redirect_uris: app_attrs.redirect_uris
|
|
||||||
})
|
|
||||||
)
|
|
||||||
|> json_response(200)
|
|
||||||
|
|
||||||
assert_schema(json, "AppCreateResponse", api_spec)
|
|
||||||
end
|
|
||||||
end
|
|
|
@ -0,0 +1,43 @@
|
||||||
|
# Pleroma: A lightweight social networking server
|
||||||
|
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
|
||||||
|
# SPDX-License-Identifier: AGPL-3.0-only
|
||||||
|
|
||||||
|
defmodule Pleroma.Web.ApiSpec.SchemaExamplesTest do
|
||||||
|
use ExUnit.Case, async: true
|
||||||
|
import Pleroma.Tests.ApiSpecHelpers
|
||||||
|
|
||||||
|
@content_type "application/json"
|
||||||
|
|
||||||
|
for operation <- api_operations() do
|
||||||
|
describe operation.operationId <> " Request Body" do
|
||||||
|
if operation.requestBody do
|
||||||
|
@media_type operation.requestBody.content[@content_type]
|
||||||
|
@schema resolve_schema(@media_type.schema)
|
||||||
|
|
||||||
|
if @media_type.example do
|
||||||
|
test "request body media type example matches schema" do
|
||||||
|
assert_schema(@media_type.example, @schema)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
if @schema.example do
|
||||||
|
test "request body schema example matches schema" do
|
||||||
|
assert_schema(@schema.example, @schema)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
for {status, response} <- operation.responses do
|
||||||
|
describe "#{operation.operationId} - #{status} Response" do
|
||||||
|
@schema resolve_schema(response.content[@content_type].schema)
|
||||||
|
|
||||||
|
if @schema.example do
|
||||||
|
test "example matches schema" do
|
||||||
|
assert_schema(@schema.example, @schema)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
||||||
|
end
|
|
@ -48,6 +48,33 @@ test "favoriting race condition" do
|
||||||
assert object.data["like_count"] == 20
|
assert object.data["like_count"] == 20
|
||||||
end
|
end
|
||||||
|
|
||||||
|
test "repeating race condition" do
|
||||||
|
user = insert(:user)
|
||||||
|
users_serial = insert_list(10, :user)
|
||||||
|
users = insert_list(10, :user)
|
||||||
|
|
||||||
|
{:ok, activity} = CommonAPI.post(user, %{"status" => "."})
|
||||||
|
|
||||||
|
users_serial
|
||||||
|
|> Enum.map(fn user ->
|
||||||
|
CommonAPI.repeat(activity.id, user)
|
||||||
|
end)
|
||||||
|
|
||||||
|
object = Object.get_by_ap_id(activity.data["object"])
|
||||||
|
assert object.data["announcement_count"] == 10
|
||||||
|
|
||||||
|
users
|
||||||
|
|> Enum.map(fn user ->
|
||||||
|
Task.async(fn ->
|
||||||
|
CommonAPI.repeat(activity.id, user)
|
||||||
|
end)
|
||||||
|
end)
|
||||||
|
|> Enum.map(&Task.await/1)
|
||||||
|
|
||||||
|
object = Object.get_by_ap_id(activity.data["object"])
|
||||||
|
assert object.data["announcement_count"] == 20
|
||||||
|
end
|
||||||
|
|
||||||
test "when replying to a conversation / participation, it will set the correct context id even if no explicit reply_to is given" do
|
test "when replying to a conversation / participation, it will set the correct context id even if no explicit reply_to is given" do
|
||||||
user = insert(:user)
|
user = insert(:user)
|
||||||
{:ok, activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"})
|
{:ok, activity} = CommonAPI.post(user, %{"status" => ".", "visibility" => "direct"})
|
||||||
|
|
|
@ -27,7 +27,7 @@ test "apps/verify_credentials", %{conn: conn} do
|
||||||
"vapid_key" => Push.vapid_config() |> Keyword.get(:public_key)
|
"vapid_key" => Push.vapid_config() |> Keyword.get(:public_key)
|
||||||
}
|
}
|
||||||
|
|
||||||
assert expected == json_response(conn, 200)
|
assert expected == json_response_and_validate_schema(conn, 200)
|
||||||
end
|
end
|
||||||
|
|
||||||
test "creates an oauth app", %{conn: conn} do
|
test "creates an oauth app", %{conn: conn} do
|
||||||
|
@ -55,6 +55,6 @@ test "creates an oauth app", %{conn: conn} do
|
||||||
"vapid_key" => Push.vapid_config() |> Keyword.get(:public_key)
|
"vapid_key" => Push.vapid_config() |> Keyword.get(:public_key)
|
||||||
}
|
}
|
||||||
|
|
||||||
assert expected == json_response(conn, 200)
|
assert expected == json_response_and_validate_schema(conn, 200)
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -5,15 +5,13 @@
|
||||||
defmodule Pleroma.Web.MastodonAPI.CustomEmojiControllerTest do
|
defmodule Pleroma.Web.MastodonAPI.CustomEmojiControllerTest do
|
||||||
use Pleroma.Web.ConnCase, async: true
|
use Pleroma.Web.ConnCase, async: true
|
||||||
alias Pleroma.Web.ApiSpec
|
alias Pleroma.Web.ApiSpec
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.CustomEmoji
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.CustomEmojisResponse
|
|
||||||
import OpenApiSpex.TestAssertions
|
import OpenApiSpex.TestAssertions
|
||||||
|
|
||||||
test "with tags", %{conn: conn} do
|
test "with tags", %{conn: conn} do
|
||||||
assert resp =
|
assert resp =
|
||||||
conn
|
conn
|
||||||
|> get("/api/v1/custom_emojis")
|
|> get("/api/v1/custom_emojis")
|
||||||
|> json_response(200)
|
|> json_response_and_validate_schema(200)
|
||||||
|
|
||||||
assert [emoji | _body] = resp
|
assert [emoji | _body] = resp
|
||||||
assert Map.has_key?(emoji, "shortcode")
|
assert Map.has_key?(emoji, "shortcode")
|
||||||
|
@ -23,19 +21,6 @@ test "with tags", %{conn: conn} do
|
||||||
assert Map.has_key?(emoji, "category")
|
assert Map.has_key?(emoji, "category")
|
||||||
assert Map.has_key?(emoji, "url")
|
assert Map.has_key?(emoji, "url")
|
||||||
assert Map.has_key?(emoji, "visible_in_picker")
|
assert Map.has_key?(emoji, "visible_in_picker")
|
||||||
assert_schema(resp, "CustomEmojisResponse", ApiSpec.spec())
|
|
||||||
assert_schema(emoji, "CustomEmoji", ApiSpec.spec())
|
assert_schema(emoji, "CustomEmoji", ApiSpec.spec())
|
||||||
end
|
end
|
||||||
|
|
||||||
test "CustomEmoji example matches schema" do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
schema = CustomEmoji.schema()
|
|
||||||
assert_schema(schema.example, "CustomEmoji", api_spec)
|
|
||||||
end
|
|
||||||
|
|
||||||
test "CustomEmojisResponse example matches schema" do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
schema = CustomEmojisResponse.schema()
|
|
||||||
assert_schema(schema.example, "CustomEmojisResponse", api_spec)
|
|
||||||
end
|
|
||||||
end
|
end
|
||||||
|
|
|
@ -6,11 +6,8 @@ defmodule Pleroma.Web.MastodonAPI.DomainBlockControllerTest do
|
||||||
use Pleroma.Web.ConnCase
|
use Pleroma.Web.ConnCase
|
||||||
|
|
||||||
alias Pleroma.User
|
alias Pleroma.User
|
||||||
alias Pleroma.Web.ApiSpec
|
|
||||||
alias Pleroma.Web.ApiSpec.Schemas.DomainBlocksResponse
|
|
||||||
|
|
||||||
import Pleroma.Factory
|
import Pleroma.Factory
|
||||||
import OpenApiSpex.TestAssertions
|
|
||||||
|
|
||||||
test "blocking / unblocking a domain" do
|
test "blocking / unblocking a domain" do
|
||||||
%{user: user, conn: conn} = oauth_access(["write:blocks"])
|
%{user: user, conn: conn} = oauth_access(["write:blocks"])
|
||||||
|
@ -21,7 +18,7 @@ test "blocking / unblocking a domain" do
|
||||||
|> put_req_header("content-type", "application/json")
|
|> put_req_header("content-type", "application/json")
|
||||||
|> post("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"})
|
|> post("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"})
|
||||||
|
|
||||||
assert %{} = json_response(ret_conn, 200)
|
assert %{} == json_response_and_validate_schema(ret_conn, 200)
|
||||||
user = User.get_cached_by_ap_id(user.ap_id)
|
user = User.get_cached_by_ap_id(user.ap_id)
|
||||||
assert User.blocks?(user, other_user)
|
assert User.blocks?(user, other_user)
|
||||||
|
|
||||||
|
@ -30,7 +27,7 @@ test "blocking / unblocking a domain" do
|
||||||
|> put_req_header("content-type", "application/json")
|
|> put_req_header("content-type", "application/json")
|
||||||
|> delete("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"})
|
|> delete("/api/v1/domain_blocks", %{"domain" => "dogwhistle.zone"})
|
||||||
|
|
||||||
assert %{} = json_response(ret_conn, 200)
|
assert %{} == json_response_and_validate_schema(ret_conn, 200)
|
||||||
user = User.get_cached_by_ap_id(user.ap_id)
|
user = User.get_cached_by_ap_id(user.ap_id)
|
||||||
refute User.blocks?(user, other_user)
|
refute User.blocks?(user, other_user)
|
||||||
end
|
end
|
||||||
|
@ -41,21 +38,10 @@ test "getting a list of domain blocks" do
|
||||||
{:ok, user} = User.block_domain(user, "bad.site")
|
{:ok, user} = User.block_domain(user, "bad.site")
|
||||||
{:ok, user} = User.block_domain(user, "even.worse.site")
|
{:ok, user} = User.block_domain(user, "even.worse.site")
|
||||||
|
|
||||||
conn =
|
assert ["even.worse.site", "bad.site"] ==
|
||||||
conn
|
conn
|
||||||
|> assign(:user, user)
|
|> assign(:user, user)
|
||||||
|> get("/api/v1/domain_blocks")
|
|> get("/api/v1/domain_blocks")
|
||||||
|
|> json_response_and_validate_schema(200)
|
||||||
domain_blocks = json_response(conn, 200)
|
|
||||||
|
|
||||||
assert "bad.site" in domain_blocks
|
|
||||||
assert "even.worse.site" in domain_blocks
|
|
||||||
assert_schema(domain_blocks, "DomainBlocksResponse", ApiSpec.spec())
|
|
||||||
end
|
|
||||||
|
|
||||||
test "DomainBlocksResponse example matches schema" do
|
|
||||||
api_spec = ApiSpec.spec()
|
|
||||||
schema = DomainBlocksResponse.schema()
|
|
||||||
assert_schema(schema.example, "DomainBlocksResponse", api_spec)
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|
|
@ -9,6 +9,7 @@ defmodule Pleroma.Web.MongooseIMController do
|
||||||
test "/user_exists", %{conn: conn} do
|
test "/user_exists", %{conn: conn} do
|
||||||
_user = insert(:user, nickname: "lain")
|
_user = insert(:user, nickname: "lain")
|
||||||
_remote_user = insert(:user, nickname: "alice", local: false)
|
_remote_user = insert(:user, nickname: "alice", local: false)
|
||||||
|
_deactivated_user = insert(:user, nickname: "konata", deactivated: true)
|
||||||
|
|
||||||
res =
|
res =
|
||||||
conn
|
conn
|
||||||
|
@ -30,11 +31,25 @@ test "/user_exists", %{conn: conn} do
|
||||||
|> json_response(404)
|
|> json_response(404)
|
||||||
|
|
||||||
assert res == false
|
assert res == false
|
||||||
|
|
||||||
|
res =
|
||||||
|
conn
|
||||||
|
|> get(mongoose_im_path(conn, :user_exists), user: "konata")
|
||||||
|
|> json_response(404)
|
||||||
|
|
||||||
|
assert res == false
|
||||||
end
|
end
|
||||||
|
|
||||||
test "/check_password", %{conn: conn} do
|
test "/check_password", %{conn: conn} do
|
||||||
user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt("cool"))
|
user = insert(:user, password_hash: Comeonin.Pbkdf2.hashpwsalt("cool"))
|
||||||
|
|
||||||
|
_deactivated_user =
|
||||||
|
insert(:user,
|
||||||
|
nickname: "konata",
|
||||||
|
deactivated: true,
|
||||||
|
password_hash: Comeonin.Pbkdf2.hashpwsalt("cool")
|
||||||
|
)
|
||||||
|
|
||||||
res =
|
res =
|
||||||
conn
|
conn
|
||||||
|> get(mongoose_im_path(conn, :check_password), user: user.nickname, pass: "cool")
|
|> get(mongoose_im_path(conn, :check_password), user: user.nickname, pass: "cool")
|
||||||
|
@ -49,6 +64,13 @@ test "/check_password", %{conn: conn} do
|
||||||
|
|
||||||
assert res == false
|
assert res == false
|
||||||
|
|
||||||
|
res =
|
||||||
|
conn
|
||||||
|
|> get(mongoose_im_path(conn, :check_password), user: "konata", pass: "cool")
|
||||||
|
|> json_response(404)
|
||||||
|
|
||||||
|
assert res == false
|
||||||
|
|
||||||
res =
|
res =
|
||||||
conn
|
conn
|
||||||
|> get(mongoose_im_path(conn, :check_password), user: "nobody", pass: "cool")
|
|> get(mongoose_im_path(conn, :check_password), user: "nobody", pass: "cool")
|
||||||
|
|
Loading…
Reference in New Issue