| 
									
										
										
										
											2023-03-12 16:00:57 +01:00
										 |  |  | // GoToSocial | 
					
						
							|  |  |  | // Copyright (C) GoToSocial Authors admin@gotosocial.org | 
					
						
							|  |  |  | // SPDX-License-Identifier: AGPL-3.0-or-later | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is free software: you can redistribute it and/or modify | 
					
						
							|  |  |  | // it under the terms of the GNU Affero General Public License as published by | 
					
						
							|  |  |  | // the Free Software Foundation, either version 3 of the License, or | 
					
						
							|  |  |  | // (at your option) any later version. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // This program is distributed in the hope that it will be useful, | 
					
						
							|  |  |  | // but WITHOUT ANY WARRANTY; without even the implied warranty of | 
					
						
							|  |  |  | // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
					
						
							|  |  |  | // GNU Affero General Public License for more details. | 
					
						
							|  |  |  | // | 
					
						
							|  |  |  | // You should have received a copy of the GNU Affero General Public License | 
					
						
							|  |  |  | // along with this program.  If not, see <http://www.gnu.org/licenses/>. | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | package dereferencing_test | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | import ( | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	"bytes" | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 	"context" | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	"crypto/rsa" | 
					
						
							|  |  |  | 	"crypto/x509" | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	"encoding/json" | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	"encoding/pem" | 
					
						
							| 
									
										
										
										
											2024-02-14 11:13:38 +00:00
										 |  |  | 	"fmt" | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	"io" | 
					
						
							|  |  |  | 	"net/http" | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	"net/url" | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 	"testing" | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	"time" | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-03-02 12:48:00 +01:00
										 |  |  | 	"codeberg.org/superseriousbusiness/activity/streams" | 
					
						
							|  |  |  | 	"codeberg.org/superseriousbusiness/activity/streams/vocab" | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 	"github.com/stretchr/testify/suite" | 
					
						
							|  |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/ap" | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/config" | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/db" | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing" | 
					
						
							| 
									
										
										
										
											2023-06-22 20:46:36 +01:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/internal/gtserror" | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 	"github.com/superseriousbusiness/gotosocial/testrig" | 
					
						
							|  |  |  | ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | type AccountTestSuite struct { | 
					
						
							|  |  |  | 	DereferencerStandardTestSuite | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceGroup() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	groupURL := testrig.URLMustParse("https://unknown-instance.com/groups/some_group") | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	group, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		groupURL, | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(group) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// group values should be set | 
					
						
							|  |  |  | 	suite.Equal("https://unknown-instance.com/groups/some_group", group.URI) | 
					
						
							|  |  |  | 	suite.Equal("https://unknown-instance.com/@some_group", group.URL) | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	suite.WithinDuration(time.Now(), group.FetchedAt, 5*time.Second) | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// group should be in the database | 
					
						
							|  |  |  | 	dbGroup, err := suite.db.GetAccountByURI(context.Background(), group.URI) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.Equal(group.ID, dbGroup.ID) | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 	suite.Equal(ap.ActorGroup, dbGroup.ActorType.String()) | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-05-27 16:35:35 +02:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceService() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	serviceURL := testrig.URLMustParse("https://owncast.example.org/federation/user/rgh") | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	service, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		serviceURL, | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-05-27 16:35:35 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(service) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// service values should be set | 
					
						
							|  |  |  | 	suite.Equal("https://owncast.example.org/federation/user/rgh", service.URI) | 
					
						
							|  |  |  | 	suite.Equal("https://owncast.example.org/federation/user/rgh", service.URL) | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	suite.WithinDuration(time.Now(), service.FetchedAt, 5*time.Second) | 
					
						
							| 
									
										
										
										
											2022-05-27 16:35:35 +02:00
										 |  |  | 
 | 
					
						
							|  |  |  | 	// service should be in the database | 
					
						
							|  |  |  | 	dbService, err := suite.db.GetAccountByURI(context.Background(), service.URI) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.Equal(service.ID, dbService.ID) | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 	suite.Equal(ap.ActorService, dbService.ActorType.String()) | 
					
						
							| 
									
										
										
										
											2022-06-11 11:01:34 +02:00
										 |  |  | 	suite.Equal("example.org", dbService.Domain) | 
					
						
							| 
									
										
										
										
											2022-05-27 16:35:35 +02:00
										 |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | /* | 
					
						
							|  |  |  | 	We shouldn't try webfingering or making http calls to dereference local accounts | 
					
						
							|  |  |  | 	that might be passed into GetRemoteAccount for whatever reason, so these tests are | 
					
						
							|  |  |  | 	here to make sure that such cases are (basically) short-circuit evaluated and given | 
					
						
							|  |  |  | 	back as-is without trying to make any calls to one's own instance. | 
					
						
							|  |  |  | */ | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountAsRemoteURL() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(targetAccount.URI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(fetchedAccount) | 
					
						
							|  |  |  | 	suite.Empty(fetchedAccount.Domain) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-09-23 21:27:35 +02:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountAsRemoteURLNoSharedInboxYet() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	targetAccount.SharedInboxURI = nil | 
					
						
							| 
									
										
										
										
											2022-11-15 18:45:15 +00:00
										 |  |  | 	if err := suite.db.UpdateAccount(context.Background(), targetAccount); err != nil { | 
					
						
							| 
									
										
										
										
											2022-09-23 21:27:35 +02:00
										 |  |  | 		suite.FailNow(err.Error()) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(targetAccount.URI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-09-23 21:27:35 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(fetchedAccount) | 
					
						
							|  |  |  | 	suite.Empty(fetchedAccount.Domain) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsername() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(targetAccount.URI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(fetchedAccount) | 
					
						
							|  |  |  | 	suite.Empty(fetchedAccount.Domain) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsernameDomain() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(targetAccount.URI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(fetchedAccount) | 
					
						
							|  |  |  | 	suite.Empty(fetchedAccount.Domain) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsernameDomainAndURL() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByUsernameDomain( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		targetAccount.Username, | 
					
						
							|  |  |  | 		config.GetHost(), | 
					
						
							|  |  |  | 	) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(fetchedAccount) | 
					
						
							|  |  |  | 	suite.Empty(fetchedAccount.Domain) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUsername() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByUsernameDomain( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		"thisaccountdoesnotexist", | 
					
						
							|  |  |  | 		config.GetHost(), | 
					
						
							|  |  |  | 	) | 
					
						
							| 
									
										
										
										
											2023-11-30 16:22:34 +00:00
										 |  |  | 	suite.True(gtserror.IsUnretrievable(err)) | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	suite.EqualError(err, db.ErrNoEntries.Error()) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.Nil(fetchedAccount) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUsernameDomain() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByUsernameDomain( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		"thisaccountdoesnotexist", | 
					
						
							|  |  |  | 		"localhost:8080", | 
					
						
							|  |  |  | 	) | 
					
						
							| 
									
										
										
										
											2023-11-30 16:22:34 +00:00
										 |  |  | 	suite.True(gtserror.IsUnretrievable(err)) | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	suite.EqualError(err, db.ErrNoEntries.Error()) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.Nil(fetchedAccount) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUserURI() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-12 10:15:54 +01:00
										 |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse("http://localhost:8080/users/thisaccountdoesnotexist"), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2023-02-03 20:03:05 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2023-11-30 16:22:34 +00:00
										 |  |  | 	suite.True(gtserror.IsUnretrievable(err)) | 
					
						
							| 
									
										
										
										
											2023-07-25 09:34:05 +01:00
										 |  |  | 	suite.EqualError(err, db.ErrNoEntries.Error()) | 
					
						
							| 
									
										
										
										
											2022-08-20 22:47:19 +02:00
										 |  |  | 	suite.Nil(fetchedAccount) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceLocalAccountByRedirect() { | 
					
						
							|  |  |  | 	ctx, cncl := context.WithCancel(context.Background()) | 
					
						
							|  |  |  | 	defer cncl() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Convert the target account to ActivityStreams model for dereference. | 
					
						
							|  |  |  | 	targetAccountable, err := suite.converter.AccountToAS(ctx, targetAccount) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(targetAccountable) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Serialize to "raw" JSON map for response. | 
					
						
							|  |  |  | 	rawJSON, err := ap.Serialize(targetAccountable) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Finally serialize to actual bytes. | 
					
						
							|  |  |  | 	json, err := json.Marshal(rawJSON) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Replace test HTTP client with one that always returns the target account AS model. | 
					
						
							|  |  |  | 	suite.client = testrig.NewMockHTTPClient(func(req *http.Request) (*http.Response, error) { | 
					
						
							|  |  |  | 		return &http.Response{ | 
					
						
							|  |  |  | 			Status:        http.StatusText(http.StatusOK), | 
					
						
							|  |  |  | 			StatusCode:    http.StatusOK, | 
					
						
							|  |  |  | 			ContentLength: int64(len(json)), | 
					
						
							|  |  |  | 			Header:        http.Header{"Content-Type": {"application/activity+json"}}, | 
					
						
							|  |  |  | 			Body:          io.NopCloser(bytes.NewReader(json)), | 
					
						
							|  |  |  | 			Request:       &http.Request{URL: testrig.URLMustParse(targetAccount.URI)}, | 
					
						
							|  |  |  | 		}, nil | 
					
						
							|  |  |  | 	}, "") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Update dereferencer to use new test HTTP client. | 
					
						
							|  |  |  | 	suite.dereferencer = dereferencing.NewDereferencer( | 
					
						
							|  |  |  | 		&suite.state, | 
					
						
							|  |  |  | 		suite.converter, | 
					
						
							|  |  |  | 		testrig.NewTestTransportController(&suite.state, suite.client), | 
					
						
							|  |  |  | 		suite.visFilter, | 
					
						
							|  |  |  | 		suite.intFilter, | 
					
						
							|  |  |  | 		suite.media, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Use any old input test URI, this doesn't actually matter what it is. | 
					
						
							|  |  |  | 	uri := testrig.URLMustParse("https://this-will-be-redirected.butts/") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Try dereference the test URI, since it correctly redirects to us it should return our account. | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 	account, accountable, err := suite.dereferencer.GetAccountByURI(ctx, fetchingAccount.Username, uri, false) | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.Nil(accountable) | 
					
						
							|  |  |  | 	suite.NotNil(account) | 
					
						
							|  |  |  | 	suite.Equal(targetAccount.ID, account.ID) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceMasqueradingLocalAccount() { | 
					
						
							|  |  |  | 	ctx, cncl := context.WithCancel(context.Background()) | 
					
						
							|  |  |  | 	defer cncl() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	targetAccount := suite.testAccounts["local_account_2"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Convert the target account to ActivityStreams model for dereference. | 
					
						
							|  |  |  | 	targetAccountable, err := suite.converter.AccountToAS(ctx, targetAccount) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(targetAccountable) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Serialize to "raw" JSON map for response. | 
					
						
							|  |  |  | 	rawJSON, err := ap.Serialize(targetAccountable) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Finally serialize to actual bytes. | 
					
						
							|  |  |  | 	json, err := json.Marshal(rawJSON) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Use any old input test URI, this doesn't actually matter what it is. | 
					
						
							|  |  |  | 	uri := testrig.URLMustParse("https://this-will-be-redirected.butts/") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Replace test HTTP client with one that returns OUR account, but at their URI endpoint. | 
					
						
							|  |  |  | 	suite.client = testrig.NewMockHTTPClient(func(req *http.Request) (*http.Response, error) { | 
					
						
							|  |  |  | 		return &http.Response{ | 
					
						
							|  |  |  | 			Status:        http.StatusText(http.StatusOK), | 
					
						
							|  |  |  | 			StatusCode:    http.StatusOK, | 
					
						
							|  |  |  | 			ContentLength: int64(len(json)), | 
					
						
							|  |  |  | 			Header:        http.Header{"Content-Type": {"application/activity+json"}}, | 
					
						
							|  |  |  | 			Body:          io.NopCloser(bytes.NewReader(json)), | 
					
						
							|  |  |  | 			Request:       &http.Request{URL: uri}, | 
					
						
							|  |  |  | 		}, nil | 
					
						
							|  |  |  | 	}, "") | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Update dereferencer to use new test HTTP client. | 
					
						
							|  |  |  | 	suite.dereferencer = dereferencing.NewDereferencer( | 
					
						
							|  |  |  | 		&suite.state, | 
					
						
							|  |  |  | 		suite.converter, | 
					
						
							|  |  |  | 		testrig.NewTestTransportController(&suite.state, suite.client), | 
					
						
							|  |  |  | 		suite.visFilter, | 
					
						
							|  |  |  | 		suite.intFilter, | 
					
						
							|  |  |  | 		suite.media, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Try dereference the test URI, since it correctly redirects to us it should return our account. | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 	account, accountable, err := suite.dereferencer.GetAccountByURI(ctx, fetchingAccount.Username, uri, false) | 
					
						
							| 
									
										
										
										
											2025-01-30 09:40:21 +00:00
										 |  |  | 	suite.NotNil(err) | 
					
						
							|  |  |  | 	suite.Nil(account) | 
					
						
							|  |  |  | 	suite.Nil(accountable) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-02-14 11:13:38 +00:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceRemoteAccountWithNonMatchingURI() { | 
					
						
							|  |  |  | 	fetchingAccount := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	const ( | 
					
						
							|  |  |  | 		remoteURI    = "https://turnip.farm/users/turniplover6969" | 
					
						
							|  |  |  | 		remoteAltURI = "https://turnip.farm/users/turniphater420" | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Create a copy of this remote account at alternative URI. | 
					
						
							|  |  |  | 	remotePerson := suite.client.TestRemotePeople[remoteURI] | 
					
						
							|  |  |  | 	suite.client.TestRemotePeople[remoteAltURI] = remotePerson | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Attempt to fetch account at alternative URI, it should fail! | 
					
						
							|  |  |  | 	fetchedAccount, _, err := suite.dereferencer.GetAccountByURI( | 
					
						
							|  |  |  | 		context.Background(), | 
					
						
							|  |  |  | 		fetchingAccount.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(remoteAltURI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2024-02-14 11:13:38 +00:00
										 |  |  | 	) | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	suite.Equal(err.Error(), fmt.Sprintf("enrichAccount: account uri %s does not match %s", remoteURI, remoteAltURI)) | 
					
						
							| 
									
										
										
										
											2024-02-14 11:13:38 +00:00
										 |  |  | 	suite.Nil(fetchedAccount) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | func (suite *AccountTestSuite) TestDereferenceRemoteAccountWithUnexpectedKeyChange() { | 
					
						
							|  |  |  | 	ctx, cncl := context.WithCancel(context.Background()) | 
					
						
							|  |  |  | 	defer cncl() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	fetchingAcc := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	remoteURI := "https://turnip.farm/users/turniplover6969" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Fetch the remote account to load into the database. | 
					
						
							|  |  |  | 	remoteAcc, _, err := suite.dereferencer.GetAccountByURI(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(remoteURI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(remoteAcc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Mark account as requiring a refetch. | 
					
						
							|  |  |  | 	remoteAcc.FetchedAt = time.Time{} | 
					
						
							|  |  |  | 	err = suite.state.DB.UpdateAccount(ctx, remoteAcc, "fetched_at") | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Update remote to have an unexpected different key. | 
					
						
							|  |  |  | 	remotePerson := suite.client.TestRemotePeople[remoteURI] | 
					
						
							|  |  |  | 	setPublicKey(remotePerson, | 
					
						
							|  |  |  | 		remoteURI, | 
					
						
							|  |  |  | 		fetchingAcc.PublicKeyURI+".unique", | 
					
						
							|  |  |  | 		fetchingAcc.PublicKey, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Force refresh account expecting key change error. | 
					
						
							|  |  |  | 	_, _, err = suite.dereferencer.RefreshAccount(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		remoteAcc, | 
					
						
							|  |  |  | 		nil, | 
					
						
							|  |  |  | 		nil, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	suite.Equal(err.Error(), fmt.Sprintf("RefreshAccount: enrichAccount: account %s pubkey has changed (key rotation required?)", remoteURI)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestDereferenceRemoteAccountWithExpectedKeyChange() { | 
					
						
							|  |  |  | 	ctx, cncl := context.WithCancel(context.Background()) | 
					
						
							|  |  |  | 	defer cncl() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	fetchingAcc := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	remoteURI := "https://turnip.farm/users/turniplover6969" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Fetch the remote account to load into the database. | 
					
						
							|  |  |  | 	remoteAcc, _, err := suite.dereferencer.GetAccountByURI(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(remoteURI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(remoteAcc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Expire the remote account's public key. | 
					
						
							|  |  |  | 	remoteAcc.PublicKeyExpiresAt = time.Now() | 
					
						
							|  |  |  | 	remoteAcc.FetchedAt = time.Time{} // force fetch | 
					
						
							|  |  |  | 	err = suite.state.DB.UpdateAccount(ctx, remoteAcc, "fetched_at", "public_key_expires_at") | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Update remote to have a different stored public key. | 
					
						
							|  |  |  | 	remotePerson := suite.client.TestRemotePeople[remoteURI] | 
					
						
							|  |  |  | 	setPublicKey(remotePerson, | 
					
						
							|  |  |  | 		remoteURI, | 
					
						
							|  |  |  | 		fetchingAcc.PublicKeyURI+".unique", | 
					
						
							|  |  |  | 		fetchingAcc.PublicKey, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Refresh account expecting a succesful refresh with changed keys! | 
					
						
							|  |  |  | 	updatedAcc, apAcc, err := suite.dereferencer.RefreshAccount(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		remoteAcc, | 
					
						
							|  |  |  | 		nil, | 
					
						
							|  |  |  | 		nil, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(apAcc) | 
					
						
							|  |  |  | 	suite.True(updatedAcc.PublicKey.Equal(fetchingAcc.PublicKey)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | func (suite *AccountTestSuite) TestRefreshFederatedRemoteAccountWithKeyChange() { | 
					
						
							|  |  |  | 	ctx, cncl := context.WithCancel(context.Background()) | 
					
						
							|  |  |  | 	defer cncl() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	fetchingAcc := suite.testAccounts["local_account_1"] | 
					
						
							|  |  |  | 	remoteURI := "https://turnip.farm/users/turniplover6969" | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Fetch the remote account to load into the database. | 
					
						
							|  |  |  | 	remoteAcc, _, err := suite.dereferencer.GetAccountByURI(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		testrig.URLMustParse(remoteURI), | 
					
						
							| 
									
										
										
										
											2025-04-06 14:39:40 +02:00
										 |  |  | 		false, | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 	) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(remoteAcc) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Update remote to have a different stored public key. | 
					
						
							|  |  |  | 	remotePerson := suite.client.TestRemotePeople[remoteURI] | 
					
						
							|  |  |  | 	setPublicKey(remotePerson, | 
					
						
							|  |  |  | 		remoteURI, | 
					
						
							|  |  |  | 		fetchingAcc.PublicKeyURI+".unique", | 
					
						
							|  |  |  | 		fetchingAcc.PublicKey, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// Refresh account expecting a succesful refresh with changed keys! | 
					
						
							|  |  |  | 	// By passing in the remote person model this indicates that the data | 
					
						
							|  |  |  | 	// was received via the federator, which should trust any key change. | 
					
						
							|  |  |  | 	updatedAcc, apAcc, err := suite.dereferencer.RefreshAccount(ctx, | 
					
						
							|  |  |  | 		fetchingAcc.Username, | 
					
						
							|  |  |  | 		remoteAcc, | 
					
						
							|  |  |  | 		remotePerson, | 
					
						
							|  |  |  | 		nil, | 
					
						
							|  |  |  | 	) | 
					
						
							|  |  |  | 	suite.NoError(err) | 
					
						
							|  |  |  | 	suite.NotNil(apAcc) | 
					
						
							|  |  |  | 	suite.True(updatedAcc.PublicKey.Equal(fetchingAcc.PublicKey)) | 
					
						
							|  |  |  | } | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-09-30 12:27:42 +02:00
										 |  |  | func TestAccountTestSuite(t *testing.T) { | 
					
						
							|  |  |  | 	suite.Run(t, new(AccountTestSuite)) | 
					
						
							|  |  |  | } | 
					
						
							| 
									
										
										
										
											2024-08-13 15:37:09 +00:00
										 |  |  | 
 | 
					
						
							|  |  |  | func setPublicKey(person vocab.ActivityStreamsPerson, ownerURI, keyURI string, key *rsa.PublicKey) { | 
					
						
							|  |  |  | 	profileIDURI, err := url.Parse(ownerURI) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		panic(err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	publicKeyURI, err := url.Parse(keyURI) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		panic(err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	publicKeyProp := streams.NewW3IDSecurityV1PublicKeyProperty() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// create the public key | 
					
						
							|  |  |  | 	publicKey := streams.NewW3IDSecurityV1PublicKey() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// set ID for the public key | 
					
						
							|  |  |  | 	publicKeyIDProp := streams.NewJSONLDIdProperty() | 
					
						
							|  |  |  | 	publicKeyIDProp.SetIRI(publicKeyURI) | 
					
						
							|  |  |  | 	publicKey.SetJSONLDId(publicKeyIDProp) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// set owner for the public key | 
					
						
							|  |  |  | 	publicKeyOwnerProp := streams.NewW3IDSecurityV1OwnerProperty() | 
					
						
							|  |  |  | 	publicKeyOwnerProp.SetIRI(profileIDURI) | 
					
						
							|  |  |  | 	publicKey.SetW3IDSecurityV1Owner(publicKeyOwnerProp) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// set the pem key itself | 
					
						
							|  |  |  | 	encodedPublicKey, err := x509.MarshalPKIXPublicKey(key) | 
					
						
							|  |  |  | 	if err != nil { | 
					
						
							|  |  |  | 		panic(err) | 
					
						
							|  |  |  | 	} | 
					
						
							|  |  |  | 	publicKeyBytes := pem.EncodeToMemory(&pem.Block{ | 
					
						
							|  |  |  | 		Type:  "PUBLIC KEY", | 
					
						
							|  |  |  | 		Bytes: encodedPublicKey, | 
					
						
							|  |  |  | 	}) | 
					
						
							|  |  |  | 	publicKeyPEMProp := streams.NewW3IDSecurityV1PublicKeyPemProperty() | 
					
						
							|  |  |  | 	publicKeyPEMProp.Set(string(publicKeyBytes)) | 
					
						
							|  |  |  | 	publicKey.SetW3IDSecurityV1PublicKeyPem(publicKeyPEMProp) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// append the public key to the public key property | 
					
						
							|  |  |  | 	publicKeyProp.AppendW3IDSecurityV1PublicKey(publicKey) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 	// set the public key property on the Person | 
					
						
							|  |  |  | 	person.SetW3IDSecurityV1PublicKey(publicKeyProp) | 
					
						
							|  |  |  | } |