mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-29 04:22:24 -05:00 
			
		
		
		
	
		
			
				
	
	
		
			402 lines
		
	
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			402 lines
		
	
	
	
		
			14 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package testrig
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"encoding/json"
 | |
| 	"encoding/xml"
 | |
| 	"io"
 | |
| 	"net/http"
 | |
| 	"strings"
 | |
| 	"sync"
 | |
| 
 | |
| 	"github.com/superseriousbusiness/activity/streams"
 | |
| 	"github.com/superseriousbusiness/activity/streams/vocab"
 | |
| 	apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/federation"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/httpclient"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/log"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/state"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/transport"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	applicationJSON         = "application/json"
 | |
| 	applicationActivityJSON = "application/activity+json"
 | |
| )
 | |
| 
 | |
| // NewTestTransportController returns a test transport controller with the given http client.
 | |
| //
 | |
| // Obviously for testing purposes you should not be making actual http calls to other servers.
 | |
| // To obviate this, use the function NewMockHTTPClient in this package to return a mock http
 | |
| // client that doesn't make any remote calls but just returns whatever you tell it to.
 | |
| //
 | |
| // Unlike the other test interfaces provided in this package, you'll probably want to call this function
 | |
| // PER TEST rather than per suite, so that the do function can be set on a test by test (or even more granular)
 | |
| // basis.
 | |
| func NewTestTransportController(state *state.State, client httpclient.SigningClient) transport.Controller {
 | |
| 	return transport.NewController(state, NewTestFederatingDB(state), &federation.Clock{}, client)
 | |
| }
 | |
| 
 | |
| type MockHTTPClient struct {
 | |
| 	do func(req *http.Request) (*http.Response, error)
 | |
| 
 | |
| 	TestRemoteStatuses    map[string]vocab.ActivityStreamsNote
 | |
| 	TestRemotePeople      map[string]vocab.ActivityStreamsPerson
 | |
| 	TestRemoteGroups      map[string]vocab.ActivityStreamsGroup
 | |
| 	TestRemoteServices    map[string]vocab.ActivityStreamsService
 | |
| 	TestRemoteAttachments map[string]RemoteAttachmentFile
 | |
| 	TestRemoteEmojis      map[string]vocab.TootEmoji
 | |
| 	TestTombstones        map[string]*gtsmodel.Tombstone
 | |
| 
 | |
| 	SentMessages sync.Map
 | |
| }
 | |
| 
 | |
| // NewMockHTTPClient returns a client that conforms to the pub.HttpClient interface.
 | |
| //
 | |
| // If do is nil, then a standard response set will be mocked out, which includes models stored in the
 | |
| // testrig, and webfinger responses as well.
 | |
| //
 | |
| // If do is not nil, then the given do function will always be used, which allows callers
 | |
| // to customize how the client is mocked.
 | |
| //
 | |
| // Note that you should never ever make ACTUAL http calls with this thing.
 | |
| func NewMockHTTPClient(do func(req *http.Request) (*http.Response, error), relativeMediaPath string, extraPeople ...vocab.ActivityStreamsPerson) *MockHTTPClient {
 | |
| 	mockHTTPClient := &MockHTTPClient{}
 | |
| 
 | |
| 	if do != nil {
 | |
| 		mockHTTPClient.do = do
 | |
| 		return mockHTTPClient
 | |
| 	}
 | |
| 
 | |
| 	mockHTTPClient.TestRemoteStatuses = NewTestFediStatuses()
 | |
| 	mockHTTPClient.TestRemotePeople = NewTestFediPeople()
 | |
| 	mockHTTPClient.TestRemoteGroups = NewTestFediGroups()
 | |
| 	mockHTTPClient.TestRemoteServices = NewTestFediServices()
 | |
| 	mockHTTPClient.TestRemoteAttachments = NewTestFediAttachments(relativeMediaPath)
 | |
| 	mockHTTPClient.TestRemoteEmojis = NewTestFediEmojis()
 | |
| 	mockHTTPClient.TestTombstones = NewTestTombstones()
 | |
| 
 | |
| 	mockHTTPClient.do = func(req *http.Request) (*http.Response, error) {
 | |
| 		var (
 | |
| 			responseCode          = http.StatusNotFound
 | |
| 			responseBytes         = []byte(`{"error":"404 not found"}`)
 | |
| 			responseContentType   = applicationJSON
 | |
| 			responseContentLength = len(responseBytes)
 | |
| 			reqURLString          = req.URL.String()
 | |
| 		)
 | |
| 
 | |
| 		if req.Method == http.MethodPost {
 | |
| 			b, err := io.ReadAll(req.Body)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 
 | |
| 			if sI, loaded := mockHTTPClient.SentMessages.LoadOrStore(reqURLString, [][]byte{b}); loaded {
 | |
| 				s, ok := sI.([][]byte)
 | |
| 				if !ok {
 | |
| 					panic("SentMessages entry wasn't [][]byte")
 | |
| 				}
 | |
| 				s = append(s, b)
 | |
| 				mockHTTPClient.SentMessages.Store(reqURLString, s)
 | |
| 			}
 | |
| 
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = []byte(`{"ok":"accepted"}`)
 | |
| 			responseContentType = applicationJSON
 | |
| 			responseContentLength = len(responseBytes)
 | |
| 		} else if strings.Contains(reqURLString, ".well-known/webfinger") {
 | |
| 			responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req)
 | |
| 		} else if strings.Contains(reqURLString, ".weird-webfinger-location/webfinger") {
 | |
| 			responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req)
 | |
| 		} else if strings.Contains(reqURLString, ".well-known/host-meta") {
 | |
| 			responseCode, responseBytes, responseContentType, responseContentLength = HostMetaResponse(req)
 | |
| 		} else if note, ok := mockHTTPClient.TestRemoteStatuses[reqURLString]; ok {
 | |
| 			// the request is for a note that we have stored
 | |
| 			noteI, err := streams.Serialize(note)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			noteJSON, err := json.Marshal(noteI)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = noteJSON
 | |
| 			responseContentType = applicationActivityJSON
 | |
| 			responseContentLength = len(noteJSON)
 | |
| 		} else if person, ok := mockHTTPClient.TestRemotePeople[reqURLString]; ok {
 | |
| 			// the request is for a person that we have stored
 | |
| 			personI, err := streams.Serialize(person)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			personJSON, err := json.Marshal(personI)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = personJSON
 | |
| 			responseContentType = applicationActivityJSON
 | |
| 			responseContentLength = len(personJSON)
 | |
| 		} else if group, ok := mockHTTPClient.TestRemoteGroups[reqURLString]; ok {
 | |
| 			// the request is for a person that we have stored
 | |
| 			groupI, err := streams.Serialize(group)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			groupJSON, err := json.Marshal(groupI)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = groupJSON
 | |
| 			responseContentType = applicationActivityJSON
 | |
| 			responseContentLength = len(groupJSON)
 | |
| 		} else if service, ok := mockHTTPClient.TestRemoteServices[reqURLString]; ok {
 | |
| 			serviceI, err := streams.Serialize(service)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			serviceJSON, err := json.Marshal(serviceI)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = serviceJSON
 | |
| 			responseContentType = applicationActivityJSON
 | |
| 			responseContentLength = len(serviceJSON)
 | |
| 		} else if emoji, ok := mockHTTPClient.TestRemoteEmojis[reqURLString]; ok {
 | |
| 			emojiI, err := streams.Serialize(emoji)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			emojiJSON, err := json.Marshal(emojiI)
 | |
| 			if err != nil {
 | |
| 				panic(err)
 | |
| 			}
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = emojiJSON
 | |
| 			responseContentType = applicationActivityJSON
 | |
| 			responseContentLength = len(emojiJSON)
 | |
| 		} else if attachment, ok := mockHTTPClient.TestRemoteAttachments[reqURLString]; ok {
 | |
| 			responseCode = http.StatusOK
 | |
| 			responseBytes = attachment.Data
 | |
| 			responseContentType = attachment.ContentType
 | |
| 			responseContentLength = len(attachment.Data)
 | |
| 		} else if _, ok := mockHTTPClient.TestTombstones[reqURLString]; ok {
 | |
| 			responseCode = http.StatusGone
 | |
| 			responseBytes = []byte{}
 | |
| 			responseContentType = "text/html"
 | |
| 			responseContentLength = 0
 | |
| 		} else {
 | |
| 			for _, person := range extraPeople {
 | |
| 				// For any extra people, check if the
 | |
| 				// request matches one of:
 | |
| 				//
 | |
| 				//   - Public key URI
 | |
| 				//   - ActivityPub URI/id
 | |
| 				//   - Web URL.
 | |
| 				//
 | |
| 				// Since this is a test environment,
 | |
| 				// just assume all these values have
 | |
| 				// been properly set.
 | |
| 				if reqURLString == person.GetW3IDSecurityV1PublicKey().At(0).Get().GetJSONLDId().GetIRI().String() ||
 | |
| 					reqURLString == person.GetJSONLDId().GetIRI().String() ||
 | |
| 					reqURLString == person.GetActivityStreamsUrl().At(0).GetIRI().String() {
 | |
| 					personI, err := streams.Serialize(person)
 | |
| 					if err != nil {
 | |
| 						panic(err)
 | |
| 					}
 | |
| 					personJSON, err := json.Marshal(personI)
 | |
| 					if err != nil {
 | |
| 						panic(err)
 | |
| 					}
 | |
| 					responseCode = http.StatusOK
 | |
| 					responseBytes = personJSON
 | |
| 					responseContentType = applicationActivityJSON
 | |
| 					responseContentLength = len(personJSON)
 | |
| 				}
 | |
| 			}
 | |
| 		}
 | |
| 
 | |
| 		log.Debugf(nil, "returning response %s", string(responseBytes))
 | |
| 		reader := bytes.NewReader(responseBytes)
 | |
| 		readCloser := io.NopCloser(reader)
 | |
| 		return &http.Response{
 | |
| 			Request:       req,
 | |
| 			StatusCode:    responseCode,
 | |
| 			Body:          readCloser,
 | |
| 			ContentLength: int64(responseContentLength),
 | |
| 			Header: http.Header{
 | |
| 				"content-type": {responseContentType},
 | |
| 			},
 | |
| 		}, nil
 | |
| 	}
 | |
| 
 | |
| 	return mockHTTPClient
 | |
| }
 | |
| 
 | |
| func (m *MockHTTPClient) Do(req *http.Request) (*http.Response, error) {
 | |
| 	return m.do(req)
 | |
| }
 | |
| 
 | |
| func (m *MockHTTPClient) DoSigned(req *http.Request, sign httpclient.SignFunc) (*http.Response, error) {
 | |
| 	return m.do(req)
 | |
| }
 | |
| 
 | |
| func HostMetaResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) {
 | |
| 	var hm *apimodel.HostMeta
 | |
| 
 | |
| 	if req.URL.String() == "https://misconfigured-instance.com/.well-known/host-meta" {
 | |
| 		hm = &apimodel.HostMeta{
 | |
| 			XMLNS: "http://docs.oasis-open.org/ns/xri/xrd-1.0",
 | |
| 			Link: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:      "lrdd",
 | |
| 					Type:     "application/xrd+xml",
 | |
| 					Template: "https://misconfigured-instance.com/.weird-webfinger-location/webfinger?resource={uri}",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if hm == nil {
 | |
| 		log.Debugf(nil, "hostmeta response not available for %s", req.URL)
 | |
| 		responseCode = http.StatusNotFound
 | |
| 		responseBytes = []byte(``)
 | |
| 		responseContentType = "application/xml"
 | |
| 		responseContentLength = len(responseBytes)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	hmXML, err := xml.Marshal(hm)
 | |
| 	if err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 	responseCode = http.StatusOK
 | |
| 	responseBytes = hmXML
 | |
| 	responseContentType = "application/xml"
 | |
| 	responseContentLength = len(hmXML)
 | |
| 	return
 | |
| }
 | |
| 
 | |
| func WebfingerResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) {
 | |
| 	var wfr *apimodel.WellKnownResponse
 | |
| 
 | |
| 	switch req.URL.String() {
 | |
| 	case "https://unknown-instance.com/.well-known/webfinger?resource=acct%3Asome_group%40unknown-instance.com":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:some_group@unknown-instance.com",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://unknown-instance.com/groups/some_group",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://owncast.example.org/.well-known/webfinger?resource=acct%3Argh%40owncast.example.org":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:rgh@example.org",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://owncast.example.org/federation/user/rgh",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://unknown-instance.com/.well-known/webfinger?resource=acct%3Abrand_new_person%40unknown-instance.com":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:brand_new_person@unknown-instance.com",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://unknown-instance.com/users/brand_new_person",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://turnip.farm/.well-known/webfinger?resource=acct%3Aturniplover6969%40turnip.farm":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:turniplover6969@turnip.farm",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://turnip.farm/users/turniplover6969",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://fossbros-anonymous.io/.well-known/webfinger?resource=acct%3Afoss_satan%40fossbros-anonymous.io":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:foss_satan@fossbros-anonymous.io",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "http://fossbros-anonymous.io/users/foss_satan",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://example.org/.well-known/webfinger?resource=acct%3ASome_User%40example.org":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:Some_User@example.org",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://example.org/users/Some_User",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	case "https://misconfigured-instance.com/.weird-webfinger-location/webfinger?resource=acct%3Asomeone%40misconfigured-instance.com":
 | |
| 		wfr = &apimodel.WellKnownResponse{
 | |
| 			Subject: "acct:someone@misconfigured-instance.com",
 | |
| 			Links: []apimodel.Link{
 | |
| 				{
 | |
| 					Rel:  "self",
 | |
| 					Type: applicationActivityJSON,
 | |
| 					Href: "https://misconfigured-instance.com/users/someone",
 | |
| 				},
 | |
| 			},
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	if wfr == nil {
 | |
| 		log.Debugf(nil, "webfinger response not available for %s", req.URL)
 | |
| 		responseCode = http.StatusNotFound
 | |
| 		responseBytes = []byte(`{"error":"not found"}`)
 | |
| 		responseContentType = applicationJSON
 | |
| 		responseContentLength = len(responseBytes)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	wfrJSON, err := json.Marshal(wfr)
 | |
| 	if err != nil {
 | |
| 		panic(err)
 | |
| 	}
 | |
| 	responseCode = http.StatusOK
 | |
| 	responseBytes = wfrJSON
 | |
| 	responseContentType = applicationJSON
 | |
| 	responseContentLength = len(wfrJSON)
 | |
| 	return
 | |
| }
 |