| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | package federation_test | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							|  |  |  | 	"context" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							|  |  |  | 	"net/http/httptest" | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	"net/url" | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 	"testing" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	"github.com/go-fed/httpsig" | 
					
						
							|  |  |  | 	"github.com/stretchr/testify/suite" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/ap" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/federation" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/testrig" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | type FederatingProtocolTestSuite struct { | 
					
						
							|  |  |  | 	FederatorStandardTestSuite | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | func (suite *FederatingProtocolTestSuite) TestPostInboxRequestBodyHook1() { | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 	// the activity we're gonna use | 
					
						
							| 
									
										
										
										
											2022-04-29 15:53:04 +02:00
										 |  |  | 	activity := suite.testActivities["dm_for_zork"] | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 	// setup module being tested | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// setup request | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/the_mighty_zork/inbox", nil) // the endpoint we're hitting | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	newContext, err := federator.PostInboxRequestBodyHook(ctx, request, activity.Activity) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(newContext) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	involvedIRIsI := newContext.Value(ap.ContextOtherInvolvedIRIs) | 
					
						
							|  |  |  | 	involvedIRIs, ok := involvedIRIsI.([]*url.URL) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		suite.FailNow("couldn't get involved IRIs from context") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	suite.Len(involvedIRIs, 1) | 
					
						
							|  |  |  | 	suite.Contains(involvedIRIs, testrig.URLMustParse("http://localhost:8080/users/the_mighty_zork")) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestPostInboxRequestBodyHook2() { | 
					
						
							|  |  |  | 	// the activity we're gonna use | 
					
						
							|  |  |  | 	activity := suite.testActivities["reply_to_turtle_for_zork"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	// setup module being tested | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// setup request | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/the_mighty_zork/inbox", nil) // the endpoint we're hitting | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	newContext, err := federator.PostInboxRequestBodyHook(ctx, request, activity.Activity) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(newContext) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	involvedIRIsI := newContext.Value(ap.ContextOtherInvolvedIRIs) | 
					
						
							|  |  |  | 	involvedIRIs, ok := involvedIRIsI.([]*url.URL) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		suite.FailNow("couldn't get involved IRIs from context") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	suite.Len(involvedIRIs, 2) | 
					
						
							|  |  |  | 	suite.Contains(involvedIRIs, testrig.URLMustParse("http://localhost:8080/users/1happyturtle")) | 
					
						
							|  |  |  | 	suite.Contains(involvedIRIs, testrig.URLMustParse("http://fossbros-anonymous.io/users/foss_satan/followers")) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestPostInboxRequestBodyHook3() { | 
					
						
							|  |  |  | 	// the activity we're gonna use | 
					
						
							|  |  |  | 	activity := suite.testActivities["reply_to_turtle_for_turtle"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	// setup module being tested | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// setup request | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/1happyturtle/inbox", nil) // the endpoint we're hitting | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	newContext, err := federator.PostInboxRequestBodyHook(ctx, request, activity.Activity) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(newContext) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	involvedIRIsI := newContext.Value(ap.ContextOtherInvolvedIRIs) | 
					
						
							|  |  |  | 	involvedIRIs, ok := involvedIRIsI.([]*url.URL) | 
					
						
							|  |  |  | 	if !ok { | 
					
						
							|  |  |  | 		suite.FailNow("couldn't get involved IRIs from context") | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	suite.Len(involvedIRIs, 2) | 
					
						
							|  |  |  | 	suite.Contains(involvedIRIs, testrig.URLMustParse("http://localhost:8080/users/1happyturtle")) | 
					
						
							|  |  |  | 	suite.Contains(involvedIRIs, testrig.URLMustParse("http://fossbros-anonymous.io/users/foss_satan/followers")) | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestAuthenticatePostInbox() { | 
					
						
							|  |  |  | 	// the activity we're gonna use | 
					
						
							| 
									
										
										
										
											2022-04-29 15:53:04 +02:00
										 |  |  | 	activity := suite.testActivities["dm_for_zork"] | 
					
						
							|  |  |  | 	sendingAccount := suite.testAccounts["remote_account_1"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 	// now setup module being tested, with the mock transport controller | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/the_mighty_zork/inbox", nil) | 
					
						
							|  |  |  | 	// we need these headers for the request to be validated | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Date", activity.DateHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Digest", activity.DigestHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	verifier, err := httpsig.NewVerifier(request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	// by the time AuthenticatePostInbox is called, PostInboxRequestBodyHook should have already been called, | 
					
						
							|  |  |  | 	// which should have set the account and username onto the request. We can replicate that behavior here: | 
					
						
							|  |  |  | 	ctxWithAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 	ctxWithVerifier := context.WithValue(ctxWithAccount, ap.ContextRequestingPublicKeyVerifier, verifier) | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | 	ctxWithSignature := context.WithValue(ctxWithVerifier, ap.ContextRequestingPublicKeySignature, activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// we can pass this recorder as a writer and read it back after | 
					
						
							|  |  |  | 	recorder := httptest.NewRecorder() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	newContext, authed, err := federator.AuthenticatePostInbox(ctxWithSignature, recorder, request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.True(authed) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// since we know this account already it should be set on the context | 
					
						
							|  |  |  | 	requestingAccountI := newContext.Value(ap.ContextRequestingAccount) | 
					
						
							|  |  |  | 	suite.NotNil(requestingAccountI) | 
					
						
							|  |  |  | 	requestingAccount, ok := requestingAccountI.(*gtsmodel.Account) | 
					
						
							|  |  |  | 	suite.True(ok) | 
					
						
							|  |  |  | 	suite.Equal(sendingAccount.Username, requestingAccount.Username) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-11-11 12:18:38 +01:00
										 |  |  | func (suite *FederatingProtocolTestSuite) TestAuthenticatePostGone() { | 
					
						
							|  |  |  | 	// the activity we're gonna use | 
					
						
							|  |  |  | 	activity := suite.testActivities["delete_https://somewhere.mysterious/users/rest_in_piss#main-key"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-11-11 12:18:38 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// now setup module being tested, with the mock transport controller | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-11-11 12:18:38 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/the_mighty_zork/inbox", nil) | 
					
						
							|  |  |  | 	// we need these headers for the request to be validated | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Date", activity.DateHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Digest", activity.DigestHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	verifier, err := httpsig.NewVerifier(request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	// by the time AuthenticatePostInbox is called, PostInboxRequestBodyHook should have already been called, | 
					
						
							|  |  |  | 	// which should have set the account and username onto the request. We can replicate that behavior here: | 
					
						
							|  |  |  | 	ctxWithAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithVerifier := context.WithValue(ctxWithAccount, ap.ContextRequestingPublicKeyVerifier, verifier) | 
					
						
							|  |  |  | 	ctxWithSignature := context.WithValue(ctxWithVerifier, ap.ContextRequestingPublicKeySignature, activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// we can pass this recorder as a writer and read it back after | 
					
						
							|  |  |  | 	recorder := httptest.NewRecorder() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	_, authed, err := federator.AuthenticatePostInbox(ctxWithSignature, recorder, request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.False(authed) | 
					
						
							|  |  |  | 	suite.Equal(http.StatusAccepted, recorder.Code) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestAuthenticatePostGoneNoTombstoneYet() { | 
					
						
							|  |  |  | 	// delete the relevant tombstone | 
					
						
							|  |  |  | 	if err := suite.db.DeleteTombstone(context.Background(), suite.testTombstones["https://somewhere.mysterious/users/rest_in_piss#main-key"].ID); err != nil { | 
					
						
							|  |  |  | 		suite.FailNow(err.Error()) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// the activity we're gonna use | 
					
						
							|  |  |  | 	activity := suite.testActivities["delete_https://somewhere.mysterious/users/rest_in_piss#main-key"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2022-11-11 12:18:38 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// now setup module being tested, with the mock transport controller | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-11-11 12:18:38 +01:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	request := httptest.NewRequest(http.MethodPost, "http://localhost:8080/users/the_mighty_zork/inbox", nil) | 
					
						
							|  |  |  | 	// we need these headers for the request to be validated | 
					
						
							|  |  |  | 	request.Header.Set("Signature", activity.SignatureHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Date", activity.DateHeader) | 
					
						
							|  |  |  | 	request.Header.Set("Digest", activity.DigestHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	verifier, err := httpsig.NewVerifier(request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	// by the time AuthenticatePostInbox is called, PostInboxRequestBodyHook should have already been called, | 
					
						
							|  |  |  | 	// which should have set the account and username onto the request. We can replicate that behavior here: | 
					
						
							|  |  |  | 	ctxWithAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithVerifier := context.WithValue(ctxWithAccount, ap.ContextRequestingPublicKeyVerifier, verifier) | 
					
						
							|  |  |  | 	ctxWithSignature := context.WithValue(ctxWithVerifier, ap.ContextRequestingPublicKeySignature, activity.SignatureHeader) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// we can pass this recorder as a writer and read it back after | 
					
						
							|  |  |  | 	recorder := httptest.NewRecorder() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// trigger the function being tested, and return the new context it creates | 
					
						
							|  |  |  | 	_, authed, err := federator.AuthenticatePostInbox(ctxWithSignature, recorder, request) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.False(authed) | 
					
						
							|  |  |  | 	suite.Equal(http.StatusAccepted, recorder.Code) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// there should be a tombstone in the db now for this account | 
					
						
							|  |  |  | 	exists, err := suite.db.TombstoneExistsWithURI(ctx, "https://somewhere.mysterious/users/rest_in_piss#main-key") | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.True(exists) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | func (suite *FederatingProtocolTestSuite) TestBlocked1() { | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	sendingAccount := suite.testAccounts["remote_account_1"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	otherInvolvedIRIs := []*url.URL{} | 
					
						
							|  |  |  | 	actorIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(sendingAccount.URI), | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	ctxWithReceivingAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithRequestingAccount := context.WithValue(ctxWithReceivingAccount, ap.ContextRequestingAccount, sendingAccount) | 
					
						
							|  |  |  | 	ctxWithOtherInvolvedIRIs := context.WithValue(ctxWithRequestingAccount, ap.ContextOtherInvolvedIRIs, otherInvolvedIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	blocked, err := federator.Blocked(ctxWithOtherInvolvedIRIs, actorIRIs) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.False(blocked) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestBlocked2() { | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	sendingAccount := suite.testAccounts["remote_account_1"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	otherInvolvedIRIs := []*url.URL{} | 
					
						
							|  |  |  | 	actorIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(sendingAccount.URI), | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	ctxWithReceivingAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithRequestingAccount := context.WithValue(ctxWithReceivingAccount, ap.ContextRequestingAccount, sendingAccount) | 
					
						
							|  |  |  | 	ctxWithOtherInvolvedIRIs := context.WithValue(ctxWithRequestingAccount, ap.ContextOtherInvolvedIRIs, otherInvolvedIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// insert a block from inboxAccount targeting sendingAccount | 
					
						
							| 
									
										
										
										
											2022-11-20 16:33:49 +00:00
										 |  |  | 	if err := suite.db.PutBlock(context.Background(), >smodel.Block{ | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 		ID:              "01G3KBEMJD4VQ2D615MPV7KTRD", | 
					
						
							|  |  |  | 		URI:             "whatever", | 
					
						
							|  |  |  | 		AccountID:       inboxAccount.ID, | 
					
						
							|  |  |  | 		TargetAccountID: sendingAccount.ID, | 
					
						
							|  |  |  | 	}); err != nil { | 
					
						
							|  |  |  | 		suite.Fail(err.Error()) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// request should be blocked now | 
					
						
							|  |  |  | 	blocked, err := federator.Blocked(ctxWithOtherInvolvedIRIs, actorIRIs) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.True(blocked) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestBlocked3() { | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	sendingAccount := suite.testAccounts["remote_account_1"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	ccedAccount := suite.testAccounts["remote_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	otherInvolvedIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(ccedAccount.URI), | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	actorIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(sendingAccount.URI), | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	ctxWithReceivingAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithRequestingAccount := context.WithValue(ctxWithReceivingAccount, ap.ContextRequestingAccount, sendingAccount) | 
					
						
							|  |  |  | 	ctxWithOtherInvolvedIRIs := context.WithValue(ctxWithRequestingAccount, ap.ContextOtherInvolvedIRIs, otherInvolvedIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// insert a block from inboxAccount targeting CCed account | 
					
						
							| 
									
										
										
										
											2022-11-20 16:33:49 +00:00
										 |  |  | 	if err := suite.db.PutBlock(context.Background(), >smodel.Block{ | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 		ID:              "01G3KBEMJD4VQ2D615MPV7KTRD", | 
					
						
							|  |  |  | 		URI:             "whatever", | 
					
						
							|  |  |  | 		AccountID:       inboxAccount.ID, | 
					
						
							|  |  |  | 		TargetAccountID: ccedAccount.ID, | 
					
						
							|  |  |  | 	}); err != nil { | 
					
						
							|  |  |  | 		suite.Fail(err.Error()) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	blocked, err := federator.Blocked(ctxWithOtherInvolvedIRIs, actorIRIs) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.True(blocked) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *FederatingProtocolTestSuite) TestBlocked4() { | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	httpClient := testrig.NewMockHTTPClient(nil, "../../testrig/media") | 
					
						
							| 
									
										
										
										
											2023-03-01 18:26:53 +00:00
										 |  |  | 	tc := testrig.NewTestTransportController(&suite.state, httpClient) | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	federator := federation.NewFederator(&suite.state, testrig.NewTestFederatingDB(&suite.state), tc, suite.tc, testrig.NewTestMediaManager(&suite.state)) | 
					
						
							| 
									
										
										
										
											2022-05-23 11:46:50 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	sendingAccount := suite.testAccounts["remote_account_1"] | 
					
						
							|  |  |  | 	inboxAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	repliedStatus := suite.testStatuses["local_account_2_status_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	otherInvolvedIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(repliedStatus.URI), // this status is involved because the hypothetical activity is a reply to this status | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	actorIRIs := []*url.URL{ | 
					
						
							|  |  |  | 		testrig.URLMustParse(sendingAccount.URI), | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	ctx := context.Background() | 
					
						
							|  |  |  | 	ctxWithReceivingAccount := context.WithValue(ctx, ap.ContextReceivingAccount, inboxAccount) | 
					
						
							|  |  |  | 	ctxWithRequestingAccount := context.WithValue(ctxWithReceivingAccount, ap.ContextRequestingAccount, sendingAccount) | 
					
						
							|  |  |  | 	ctxWithOtherInvolvedIRIs := context.WithValue(ctxWithRequestingAccount, ap.ContextOtherInvolvedIRIs, otherInvolvedIRIs) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// local account 2 (replied status account) blocks sending account already so we don't need to add a block here | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	blocked, err := federator.Blocked(ctxWithOtherInvolvedIRIs, actorIRIs) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.True(blocked) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-04-29 15:05:13 +02:00
										 |  |  | func TestFederatingProtocolTestSuite(t *testing.T) { | 
					
						
							|  |  |  | 	suite.Run(t, new(FederatingProtocolTestSuite)) | 
					
						
							|  |  |  | } |