436 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
			
		
		
	
	
			436 lines
		
	
	
	
		
			12 KiB
		
	
	
	
		
			Elixir
		
	
	
	
	
	
| # Pleroma: A lightweight social networking server
 | |
| # Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
 | |
| # SPDX-License-Identifier: AGPL-3.0-only
 | |
| 
 | |
| defmodule Pleroma.Web.TwitterAPI.UtilControllerTest do
 | |
|   use Pleroma.Web.ConnCase
 | |
|   use Oban.Testing, repo: Pleroma.Repo
 | |
| 
 | |
|   alias Pleroma.Tests.ObanHelpers
 | |
|   alias Pleroma.User
 | |
| 
 | |
|   import Pleroma.Factory
 | |
|   import Mock
 | |
| 
 | |
|   setup do
 | |
|     Tesla.Mock.mock(fn env -> apply(HttpRequestMock, :request, [env]) end)
 | |
|     :ok
 | |
|   end
 | |
| 
 | |
|   setup do: clear_config([:instance])
 | |
|   setup do: clear_config([:frontend_configurations, :pleroma_fe])
 | |
| 
 | |
|   describe "PUT /api/pleroma/notification_settings" do
 | |
|     setup do: oauth_access(["write:accounts"])
 | |
| 
 | |
|     test "it updates notification settings", %{user: user, conn: conn} do
 | |
|       conn
 | |
|       |> put("/api/pleroma/notification_settings", %{
 | |
|         "block_from_strangers" => true,
 | |
|         "bar" => 1
 | |
|       })
 | |
|       |> json_response(:ok)
 | |
| 
 | |
|       user = refresh_record(user)
 | |
| 
 | |
|       assert %Pleroma.User.NotificationSetting{
 | |
|                block_from_strangers: true,
 | |
|                hide_notification_contents: false
 | |
|              } == user.notification_settings
 | |
|     end
 | |
| 
 | |
|     test "it updates notification settings to enable hiding contents", %{user: user, conn: conn} do
 | |
|       conn
 | |
|       |> put("/api/pleroma/notification_settings", %{"hide_notification_contents" => "1"})
 | |
|       |> json_response(:ok)
 | |
| 
 | |
|       user = refresh_record(user)
 | |
| 
 | |
|       assert %Pleroma.User.NotificationSetting{
 | |
|                block_from_strangers: false,
 | |
|                hide_notification_contents: true
 | |
|              } == user.notification_settings
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "GET /api/pleroma/frontend_configurations" do
 | |
|     test "returns everything in :pleroma, :frontend_configurations", %{conn: conn} do
 | |
|       config = [
 | |
|         frontend_a: %{
 | |
|           x: 1,
 | |
|           y: 2
 | |
|         },
 | |
|         frontend_b: %{
 | |
|           z: 3
 | |
|         }
 | |
|       ]
 | |
| 
 | |
|       clear_config(:frontend_configurations, config)
 | |
| 
 | |
|       response =
 | |
|         conn
 | |
|         |> get("/api/pleroma/frontend_configurations")
 | |
|         |> json_response(:ok)
 | |
| 
 | |
|       assert response == Jason.encode!(config |> Enum.into(%{})) |> Jason.decode!()
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "/api/pleroma/emoji" do
 | |
|     test "returns json with custom emoji with tags", %{conn: conn} do
 | |
|       emoji =
 | |
|         conn
 | |
|         |> get("/api/pleroma/emoji")
 | |
|         |> json_response(200)
 | |
| 
 | |
|       assert Enum.all?(emoji, fn
 | |
|                {_key,
 | |
|                 %{
 | |
|                   "image_url" => url,
 | |
|                   "tags" => tags
 | |
|                 }} ->
 | |
|                  is_binary(url) and is_list(tags)
 | |
|              end)
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "GET /api/pleroma/healthcheck" do
 | |
|     setup do: clear_config([:instance, :healthcheck])
 | |
| 
 | |
|     test "returns 503 when healthcheck disabled", %{conn: conn} do
 | |
|       clear_config([:instance, :healthcheck], false)
 | |
| 
 | |
|       response =
 | |
|         conn
 | |
|         |> get("/api/pleroma/healthcheck")
 | |
|         |> json_response(503)
 | |
| 
 | |
|       assert response == %{}
 | |
|     end
 | |
| 
 | |
|     test "returns 200 when healthcheck enabled and all ok", %{conn: conn} do
 | |
|       clear_config([:instance, :healthcheck], true)
 | |
| 
 | |
|       with_mock Pleroma.Healthcheck,
 | |
|         system_info: fn -> %Pleroma.Healthcheck{healthy: true} end do
 | |
|         response =
 | |
|           conn
 | |
|           |> get("/api/pleroma/healthcheck")
 | |
|           |> json_response(200)
 | |
| 
 | |
|         assert %{
 | |
|                  "active" => _,
 | |
|                  "healthy" => true,
 | |
|                  "idle" => _,
 | |
|                  "memory_used" => _,
 | |
|                  "pool_size" => _
 | |
|                } = response
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     test "returns 503 when healthcheck enabled and health is false", %{conn: conn} do
 | |
|       clear_config([:instance, :healthcheck], true)
 | |
| 
 | |
|       with_mock Pleroma.Healthcheck,
 | |
|         system_info: fn -> %Pleroma.Healthcheck{healthy: false} end do
 | |
|         response =
 | |
|           conn
 | |
|           |> get("/api/pleroma/healthcheck")
 | |
|           |> json_response(503)
 | |
| 
 | |
|         assert %{
 | |
|                  "active" => _,
 | |
|                  "healthy" => false,
 | |
|                  "idle" => _,
 | |
|                  "memory_used" => _,
 | |
|                  "pool_size" => _
 | |
|                } = response
 | |
|       end
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "POST /api/pleroma/disable_account" do
 | |
|     setup do: oauth_access(["write:accounts"])
 | |
| 
 | |
|     test "with valid permissions and password, it disables the account", %{conn: conn, user: user} do
 | |
|       response =
 | |
|         conn
 | |
|         |> post("/api/pleroma/disable_account", %{"password" => "test"})
 | |
|         |> json_response(:ok)
 | |
| 
 | |
|       assert response == %{"status" => "success"}
 | |
|       ObanHelpers.perform_all()
 | |
| 
 | |
|       user = User.get_cached_by_id(user.id)
 | |
| 
 | |
|       refute user.is_active
 | |
|     end
 | |
| 
 | |
|     test "with valid permissions and invalid password, it returns an error", %{conn: conn} do
 | |
|       user = insert(:user)
 | |
| 
 | |
|       response =
 | |
|         conn
 | |
|         |> post("/api/pleroma/disable_account", %{"password" => "test1"})
 | |
|         |> json_response(:ok)
 | |
| 
 | |
|       assert response == %{"error" => "Invalid password."}
 | |
|       user = User.get_cached_by_id(user.id)
 | |
| 
 | |
|       assert user.is_active
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "POST /main/ostatus - remote_subscribe/2" do
 | |
|     setup do: clear_config([:instance, :federating], true)
 | |
| 
 | |
|     test "renders subscribe form", %{conn: conn} do
 | |
|       user = insert(:user)
 | |
| 
 | |
|       response =
 | |
|         conn
 | |
|         |> post("/main/ostatus", %{"nickname" => user.nickname, "profile" => ""})
 | |
|         |> response(:ok)
 | |
| 
 | |
|       refute response =~ "Could not find user"
 | |
|       assert response =~ "Remotely follow #{user.nickname}"
 | |
|     end
 | |
| 
 | |
|     test "renders subscribe form with error when user not found", %{conn: conn} do
 | |
|       response =
 | |
|         conn
 | |
|         |> post("/main/ostatus", %{"nickname" => "nickname", "profile" => ""})
 | |
|         |> response(:ok)
 | |
| 
 | |
|       assert response =~ "Could not find user"
 | |
|       refute response =~ "Remotely follow"
 | |
|     end
 | |
| 
 | |
|     test "it redirect to webfinger url", %{conn: conn} do
 | |
|       user = insert(:user)
 | |
|       user2 = insert(:user, ap_id: "shp@social.heldscal.la")
 | |
| 
 | |
|       conn =
 | |
|         conn
 | |
|         |> post("/main/ostatus", %{
 | |
|           "user" => %{"nickname" => user.nickname, "profile" => user2.ap_id}
 | |
|         })
 | |
| 
 | |
|       assert redirected_to(conn) ==
 | |
|                "https://social.heldscal.la/main/ostatussub?profile=#{user.ap_id}"
 | |
|     end
 | |
| 
 | |
|     test "it renders form with error when user not found", %{conn: conn} do
 | |
|       user2 = insert(:user, ap_id: "shp@social.heldscal.la")
 | |
| 
 | |
|       response =
 | |
|         conn
 | |
|         |> post("/main/ostatus", %{"user" => %{"nickname" => "jimm", "profile" => user2.ap_id}})
 | |
|         |> response(:ok)
 | |
| 
 | |
|       assert response =~ "Something went wrong."
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   test "it returns new captcha", %{conn: conn} do
 | |
|     with_mock Pleroma.Captcha,
 | |
|       new: fn -> "test_captcha" end do
 | |
|       resp =
 | |
|         conn
 | |
|         |> get("/api/pleroma/captcha")
 | |
|         |> response(200)
 | |
| 
 | |
|       assert resp == "\"test_captcha\""
 | |
|       assert called(Pleroma.Captcha.new())
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "POST /api/pleroma/change_email" do
 | |
|     setup do: oauth_access(["write:accounts"])
 | |
| 
 | |
|     test "without permissions", %{conn: conn} do
 | |
|       conn =
 | |
|         conn
 | |
|         |> assign(:token, nil)
 | |
|         |> post("/api/pleroma/change_email")
 | |
| 
 | |
|       assert json_response(conn, 403) == %{"error" => "Insufficient permissions: write:accounts."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions and invalid password", %{conn: conn} do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "hi",
 | |
|           "email" => "test@test.com"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Invalid password."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and invalid email", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "test",
 | |
|           "email" => "foobar"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Email has invalid format."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and no email", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "test"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Email can't be blank."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and blank email", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "test",
 | |
|           "email" => ""
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Email can't be blank."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and non unique email", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       user = insert(:user)
 | |
| 
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "test",
 | |
|           "email" => user.email
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Email has already been taken."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and valid email", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_email", %{
 | |
|           "password" => "test",
 | |
|           "email" => "cofe@foobar.com"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"status" => "success"}
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "POST /api/pleroma/change_password" do
 | |
|     setup do: oauth_access(["write:accounts"])
 | |
| 
 | |
|     test "without permissions", %{conn: conn} do
 | |
|       conn =
 | |
|         conn
 | |
|         |> assign(:token, nil)
 | |
|         |> post("/api/pleroma/change_password")
 | |
| 
 | |
|       assert json_response(conn, 403) == %{"error" => "Insufficient permissions: write:accounts."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions and invalid password", %{conn: conn} do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_password", %{
 | |
|           "password" => "hi",
 | |
|           "new_password" => "newpass",
 | |
|           "new_password_confirmation" => "newpass"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"error" => "Invalid password."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and new password and confirmation not matching",
 | |
|          %{
 | |
|            conn: conn
 | |
|          } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_password", %{
 | |
|           "password" => "test",
 | |
|           "new_password" => "newpass",
 | |
|           "new_password_confirmation" => "notnewpass"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{
 | |
|                "error" => "New password does not match confirmation."
 | |
|              }
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and invalid new password", %{
 | |
|       conn: conn
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_password", %{
 | |
|           "password" => "test",
 | |
|           "new_password" => "",
 | |
|           "new_password_confirmation" => ""
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{
 | |
|                "error" => "New password can't be blank."
 | |
|              }
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions, valid password and matching new password and confirmation", %{
 | |
|       conn: conn,
 | |
|       user: user
 | |
|     } do
 | |
|       conn =
 | |
|         post(conn, "/api/pleroma/change_password", %{
 | |
|           "password" => "test",
 | |
|           "new_password" => "newpass",
 | |
|           "new_password_confirmation" => "newpass"
 | |
|         })
 | |
| 
 | |
|       assert json_response(conn, 200) == %{"status" => "success"}
 | |
|       fetched_user = User.get_cached_by_id(user.id)
 | |
|       assert Pleroma.Password.Pbkdf2.verify_pass("newpass", fetched_user.password_hash) == true
 | |
|     end
 | |
|   end
 | |
| 
 | |
|   describe "POST /api/pleroma/delete_account" do
 | |
|     setup do: oauth_access(["write:accounts"])
 | |
| 
 | |
|     test "without permissions", %{conn: conn} do
 | |
|       conn =
 | |
|         conn
 | |
|         |> assign(:token, nil)
 | |
|         |> post("/api/pleroma/delete_account")
 | |
| 
 | |
|       assert json_response(conn, 403) ==
 | |
|                %{"error" => "Insufficient permissions: write:accounts."}
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions and wrong or missing password", %{conn: conn} do
 | |
|       for params <- [%{"password" => "hi"}, %{}] do
 | |
|         ret_conn = post(conn, "/api/pleroma/delete_account", params)
 | |
| 
 | |
|         assert json_response(ret_conn, 200) == %{"error" => "Invalid password."}
 | |
|       end
 | |
|     end
 | |
| 
 | |
|     test "with proper permissions and valid password", %{conn: conn, user: user} do
 | |
|       conn = post(conn, "/api/pleroma/delete_account", %{"password" => "test"})
 | |
|       ObanHelpers.perform_all()
 | |
|       assert json_response(conn, 200) == %{"status" => "success"}
 | |
| 
 | |
|       user = User.get_by_id(user.id)
 | |
|       refute user.is_active
 | |
|       assert user.name == nil
 | |
|       assert user.bio == ""
 | |
|       assert user.password_hash == nil
 | |
|     end
 | |
|   end
 | |
| end
 | 
