
In theory a pedantic reading of the spec indeed suggests DMs must only be delivered to personal inboxes. However, in practice the normative force of real-world implementations disagrees. Mastodon, Iceshrimp.NET and GtS (the latter notably has a config option to never use sharedInboxes) all unconditionally prefer sharedInbox for everything without ill effect. This saves on duplicate deliveries on the sending and processing on the receiving end. (Typically the receiving side ends up rejecting all but the first copy as duplicates) Furthermore current determine_inbox logic also actually needs up forcing personal inboxes for follower-only posts, unless they additionally explicitly address at least one specific actor. This is even much wasteful and directly contradicts the explicit intent of the spec. There’s one part where the use of sharedInbox falls apart, namely spec-compliant bcc and bto addressing. AP spec requires bcc/bto fields to be stripped before delivery and then implicitly reconstructed by the receiver based on the addressed personal inbox. In practice however, this addressing mode is almost unused. Neither of the three implementations brought up above supports it and while *oma does use bcc for list addressing, it does not use it in a spec-compliant way and even copies same-host recipients into cc before delivery. Messages with bcc addressing are handled in another function clause, always force personal inboxes for every recipient and not affected by this commit. In theory it would be beneficial to use sharedInbox there too for all but bcc recipients. But in practice list addressing has been broken for quite some time already and is not actually exposed in any frontend, as discussed in https://akkoma.dev/AkkomaGang/akkoma/issues/812. Therefore any changes here have virtually no effect anyway and all code concerning it may just be outright removed.
468 lines
14 KiB
Elixir
468 lines
14 KiB
Elixir
# Pleroma: A lightweight social networking server
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
defmodule Pleroma.Web.ActivityPub.PublisherTest do
|
|
use Pleroma.Web.ConnCase, async: false
|
|
@moduletag :mocked
|
|
|
|
import ExUnit.CaptureLog
|
|
import Pleroma.Factory
|
|
import Tesla.Mock
|
|
import Mock
|
|
|
|
alias Pleroma.Instances
|
|
alias Pleroma.Object
|
|
alias Pleroma.Web.ActivityPub.Publisher
|
|
alias Pleroma.Web.CommonAPI
|
|
|
|
@as_public "https://www.w3.org/ns/activitystreams#Public"
|
|
|
|
setup do
|
|
mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
|
|
:ok
|
|
end
|
|
|
|
setup_all do
|
|
clear_config([:instance, :federating], true)
|
|
clear_config([:instance, :quarantined_instances], [])
|
|
clear_config([:mrf_simple, :reject], [])
|
|
end
|
|
|
|
describe "gather_webfinger_links/1" do
|
|
test "it returns links" do
|
|
user = insert(:user)
|
|
|
|
expected_links = [
|
|
%{"href" => user.ap_id, "rel" => "self", "type" => "application/activity+json"},
|
|
%{
|
|
"href" => user.ap_id,
|
|
"rel" => "self",
|
|
"type" => "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\""
|
|
},
|
|
%{
|
|
"rel" => "http://ostatus.org/schema/1.0/subscribe",
|
|
"template" => "#{Pleroma.Web.Endpoint.url()}/ostatus_subscribe?acct={uri}"
|
|
}
|
|
]
|
|
|
|
assert expected_links == Publisher.gather_webfinger_links(user)
|
|
end
|
|
end
|
|
|
|
describe "publish_one/1" do
|
|
test "publish to url with with different ports" do
|
|
inbox80 = "http://42.site/users/nick1/inbox"
|
|
inbox42 = "http://42.site:42/users/nick1/inbox"
|
|
|
|
mock(fn
|
|
%{method: :post, url: "http://42.site:42/users/nick1/inbox"} ->
|
|
{:ok, %Tesla.Env{status: 200, body: "port 42"}}
|
|
|
|
%{method: :post, url: "http://42.site/users/nick1/inbox"} ->
|
|
{:ok, %Tesla.Env{status: 200, body: "port 80"}}
|
|
end)
|
|
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
assert {:ok, %{body: "port 42"}} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox42,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1,
|
|
"unreachable_since" => true
|
|
})
|
|
|
|
assert {:ok, %{body: "port 80"}} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox80,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1,
|
|
"unreachable_since" => true
|
|
})
|
|
end
|
|
|
|
test_with_mock "calls `Instances.set_reachable` on successful federation if `unreachable_since` is not specified",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://200.site/users/nick1/inbox"
|
|
|
|
assert {:ok, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1
|
|
})
|
|
|
|
assert called(Instances.set_reachable(inbox))
|
|
end
|
|
|
|
test_with_mock "calls `Instances.set_reachable` on successful federation if `unreachable_since` is set",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://200.site/users/nick1/inbox"
|
|
|
|
assert {:ok, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1,
|
|
"unreachable_since" => NaiveDateTime.utc_now()
|
|
})
|
|
|
|
assert called(Instances.set_reachable(inbox))
|
|
end
|
|
|
|
test_with_mock "does NOT call `Instances.set_reachable` on successful federation if `unreachable_since` is nil",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://200.site/users/nick1/inbox"
|
|
|
|
assert {:ok, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1,
|
|
"unreachable_since" => nil
|
|
})
|
|
|
|
refute called(Instances.set_reachable(inbox))
|
|
end
|
|
|
|
test_with_mock "calls `Instances.set_unreachable` on target inbox on non-2xx HTTP response code",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://404.site/users/nick1/inbox"
|
|
|
|
assert {:error, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1
|
|
})
|
|
|
|
assert called(Instances.set_unreachable(inbox))
|
|
end
|
|
|
|
test_with_mock "it calls `Instances.set_unreachable` on target inbox on request error of any kind",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://connrefused.site/users/nick1/inbox"
|
|
|
|
assert capture_log(fn ->
|
|
assert {:error, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1
|
|
})
|
|
end) =~ "connrefused"
|
|
|
|
assert called(Instances.set_unreachable(inbox))
|
|
end
|
|
|
|
test_with_mock "does NOT call `Instances.set_unreachable` if target is reachable",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://200.site/users/nick1/inbox"
|
|
|
|
assert {:ok, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1
|
|
})
|
|
|
|
refute called(Instances.set_unreachable(inbox))
|
|
end
|
|
|
|
test_with_mock "does NOT call `Instances.set_unreachable` if target instance has non-nil `unreachable_since`",
|
|
Instances,
|
|
[:passthrough],
|
|
[] do
|
|
actor =
|
|
insert(:user)
|
|
|> with_signing_key()
|
|
|
|
inbox = "http://connrefused.site/users/nick1/inbox"
|
|
|
|
assert capture_log(fn ->
|
|
assert {:error, _} =
|
|
Publisher.publish_one(%{
|
|
"inbox" => inbox,
|
|
"json" => "{}",
|
|
"actor" => actor,
|
|
"id" => 1,
|
|
"unreachable_since" => NaiveDateTime.utc_now()
|
|
})
|
|
end) =~ "connrefused"
|
|
|
|
refute called(Instances.set_unreachable(inbox))
|
|
end
|
|
end
|
|
|
|
describe "publish/2" do
|
|
test_with_mock "doesn't publish any activity to quarantined or rejected instances.",
|
|
Pleroma.Web.Federator.Publisher,
|
|
[:passthrough],
|
|
[] do
|
|
Config.put([:instance, :quarantined_instances], [{"domain.com", "some reason"}])
|
|
|
|
Config.put([:mrf_simple, :reject], [{"rejected.com", "some reason"}])
|
|
|
|
follower =
|
|
insert(:user, %{
|
|
local: false,
|
|
inbox: "https://domain.com/users/nick1/inbox"
|
|
})
|
|
|
|
another_follower =
|
|
insert(:user, %{
|
|
local: false,
|
|
inbox: "https://rejected.com/users/nick2/inbox"
|
|
})
|
|
|
|
actor =
|
|
insert(:user, follower_address: follower.ap_id)
|
|
|> with_signing_key()
|
|
|
|
{:ok, follower, actor} = Pleroma.User.follow(follower, actor)
|
|
{:ok, _another_follower, actor} = Pleroma.User.follow(another_follower, actor)
|
|
|
|
actor = refresh_record(actor)
|
|
|
|
note_activity =
|
|
insert(:followers_only_note_activity,
|
|
user: actor,
|
|
recipients: [follower.ap_id]
|
|
)
|
|
|
|
public_note_activity =
|
|
insert(:note_activity,
|
|
user: actor,
|
|
recipients: [follower.ap_id, @as_public]
|
|
)
|
|
|
|
res = Publisher.publish(actor, note_activity)
|
|
|
|
assert res == :ok
|
|
|
|
:ok = Publisher.publish(actor, public_note_activity)
|
|
|
|
assert not called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => note_activity.data["id"]
|
|
})
|
|
)
|
|
|
|
assert not called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => public_note_activity.data["id"]
|
|
})
|
|
)
|
|
|
|
assert not called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://rejected.com/users/nick2/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => note_activity.data["id"]
|
|
})
|
|
)
|
|
|
|
assert not called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://rejected.com/users/nick2/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => public_note_activity.data["id"]
|
|
})
|
|
)
|
|
end
|
|
|
|
test_with_mock "Publishes a non-public activity to non-quarantined instances.",
|
|
Pleroma.Web.Federator.Publisher,
|
|
[:passthrough],
|
|
[] do
|
|
Config.put([:instance, :quarantined_instances], [{"somedomain.com", "some reason"}])
|
|
|
|
follower =
|
|
insert(:user, %{
|
|
local: false,
|
|
inbox: "https://domain.com/users/nick1/inbox"
|
|
})
|
|
|
|
actor =
|
|
insert(:user, follower_address: follower.ap_id)
|
|
|> with_signing_key()
|
|
|
|
{:ok, follower, actor} = Pleroma.User.follow(follower, actor)
|
|
actor = refresh_record(actor)
|
|
|
|
note_activity =
|
|
insert(:followers_only_note_activity,
|
|
user: actor,
|
|
recipients: [follower.ap_id]
|
|
)
|
|
|
|
res = Publisher.publish(actor, note_activity)
|
|
|
|
assert res == :ok
|
|
|
|
assert called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => note_activity.data["id"]
|
|
})
|
|
)
|
|
end
|
|
|
|
test_with_mock "publishes an activity with BCC to all relevant peers.",
|
|
Pleroma.Web.Federator.Publisher,
|
|
[:passthrough],
|
|
[] do
|
|
Config.put([:instance, :quarantined_instances], [])
|
|
|
|
follower =
|
|
insert(:user, %{
|
|
local: false,
|
|
inbox: "https://domain.com/users/nick1/inbox"
|
|
})
|
|
|
|
actor = insert(:user, follower_address: follower.ap_id)
|
|
user = insert(:user)
|
|
|
|
{:ok, follower, actor} = Pleroma.User.follow(follower, actor)
|
|
|
|
note_activity =
|
|
insert(:note_activity,
|
|
recipients: [follower.ap_id],
|
|
data_attrs: %{"bcc" => [user.ap_id]}
|
|
)
|
|
|
|
res = Publisher.publish(actor, note_activity)
|
|
assert res == :ok
|
|
|
|
assert called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => note_activity.data["id"]
|
|
})
|
|
)
|
|
end
|
|
|
|
test_with_mock "publishes a delete activity to peers who signed fetch requests to the create acitvity/object.",
|
|
Pleroma.Web.Federator.Publisher,
|
|
[:passthrough],
|
|
[] do
|
|
clear_config([:instance, :quarantined_instances], [])
|
|
|
|
fetcher =
|
|
insert(:user,
|
|
local: false,
|
|
inbox: "https://domain.com/users/nick1/inbox"
|
|
)
|
|
|
|
another_fetcher =
|
|
insert(:user,
|
|
local: false,
|
|
inbox: "https://domain2.com/users/nick1/inbox"
|
|
)
|
|
|
|
actor = insert(:user)
|
|
|
|
note_activity = insert(:note_activity, user: actor)
|
|
object = Object.normalize(note_activity, fetch: false)
|
|
|
|
activity_path = String.trim_leading(note_activity.data["id"], Pleroma.Web.Endpoint.url())
|
|
object_path = String.trim_leading(object.data["id"], Pleroma.Web.Endpoint.url())
|
|
|
|
build_conn()
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|> assign(:user, fetcher)
|
|
|> get(object_path)
|
|
|> json_response(200)
|
|
|
|
build_conn()
|
|
|> put_req_header("accept", "application/activity+json")
|
|
|> assign(:user, another_fetcher)
|
|
|> get(activity_path)
|
|
|> json_response(200)
|
|
|
|
{:ok, delete} = CommonAPI.delete(note_activity.id, actor)
|
|
|
|
res = Publisher.publish(actor, delete)
|
|
assert res == :ok
|
|
|
|
assert called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => delete.data["id"]
|
|
})
|
|
)
|
|
|
|
assert called(
|
|
Pleroma.Web.Federator.Publisher.enqueue_one(Publisher, %{
|
|
"inbox" => "https://domain2.com/users/nick1/inbox",
|
|
"actor_id" => actor.id,
|
|
"id" => delete.data["id"]
|
|
})
|
|
)
|
|
end
|
|
end
|
|
|
|
describe "should_federate/1" do
|
|
test "should not obliterate itself if the inbox URL is bad" do
|
|
url = "/inbox"
|
|
refute Pleroma.Web.ActivityPub.Publisher.should_federate?(url)
|
|
|
|
url = nil
|
|
refute Pleroma.Web.ActivityPub.Publisher.should_federate?(url)
|
|
end
|
|
end
|
|
end
|