mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-30 23:22:26 -05:00 
			
		
		
		
	* [chore] Remove years from all license headers Years or year ranges aren't required in license headers. Many projects have removed them in recent years and it avoids a bit of yearly toil. In many cases our copyright claim was also a bit dodgy since we added the 2021-2023 header to files created after 2021 but you can't claim copyright into the past that way. * [chore] Add license header check This ensures a license header is always added to any new file. This avoids maintainers/reviewers needing to remember to check for and ask for it in case a contribution doesn't include it. * [chore] Add missing license headers * [chore] Further updates to license header * Use the more common // indentend comment format * Remove the hack we had for the linter now that we use the // format * Add SPDX license identifier
		
			
				
	
	
		
			224 lines
		
	
	
	
		
			7.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			224 lines
		
	
	
	
		
			7.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // GoToSocial
 | |
| // Copyright (C) GoToSocial Authors admin@gotosocial.org
 | |
| // SPDX-License-Identifier: AGPL-3.0-or-later
 | |
| //
 | |
| // This program is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Affero General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // This program is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | |
| // GNU Affero General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Affero General Public License
 | |
| // along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package dereferencing_test
 | |
| 
 | |
| import (
 | |
| 	"context"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/stretchr/testify/suite"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/ap"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/config"
 | |
| 	"github.com/superseriousbusiness/gotosocial/internal/federation/dereferencing"
 | |
| 	"github.com/superseriousbusiness/gotosocial/testrig"
 | |
| )
 | |
| 
 | |
| type AccountTestSuite struct {
 | |
| 	DereferencerStandardTestSuite
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceGroup() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 
 | |
| 	groupURL := testrig.URLMustParse("https://unknown-instance.com/groups/some_group")
 | |
| 	group, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		groupURL,
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(group)
 | |
| 
 | |
| 	// group values should be set
 | |
| 	suite.Equal("https://unknown-instance.com/groups/some_group", group.URI)
 | |
| 	suite.Equal("https://unknown-instance.com/@some_group", group.URL)
 | |
| 	suite.WithinDuration(time.Now(), group.FetchedAt, 5*time.Second)
 | |
| 
 | |
| 	// group should be in the database
 | |
| 	dbGroup, err := suite.db.GetAccountByURI(context.Background(), group.URI)
 | |
| 	suite.NoError(err)
 | |
| 	suite.Equal(group.ID, dbGroup.ID)
 | |
| 	suite.Equal(ap.ActorGroup, dbGroup.ActorType)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceService() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 
 | |
| 	serviceURL := testrig.URLMustParse("https://owncast.example.org/federation/user/rgh")
 | |
| 	service, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		serviceURL,
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(service)
 | |
| 
 | |
| 	// service values should be set
 | |
| 	suite.Equal("https://owncast.example.org/federation/user/rgh", service.URI)
 | |
| 	suite.Equal("https://owncast.example.org/federation/user/rgh", service.URL)
 | |
| 	suite.WithinDuration(time.Now(), service.FetchedAt, 5*time.Second)
 | |
| 
 | |
| 	// service should be in the database
 | |
| 	dbService, err := suite.db.GetAccountByURI(context.Background(), service.URI)
 | |
| 	suite.NoError(err)
 | |
| 	suite.Equal(service.ID, dbService.ID)
 | |
| 	suite.Equal(ap.ActorService, dbService.ActorType)
 | |
| 	suite.Equal("example.org", dbService.Domain)
 | |
| }
 | |
| 
 | |
| /*
 | |
| 	We shouldn't try webfingering or making http calls to dereference local accounts
 | |
| 	that might be passed into GetRemoteAccount for whatever reason, so these tests are
 | |
| 	here to make sure that such cases are (basically) short-circuit evaluated and given
 | |
| 	back as-is without trying to make any calls to one's own instance.
 | |
| */
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountAsRemoteURL() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 	targetAccount := suite.testAccounts["local_account_2"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		testrig.URLMustParse(targetAccount.URI),
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(fetchedAccount)
 | |
| 	suite.Empty(fetchedAccount.Domain)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountAsRemoteURLNoSharedInboxYet() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 	targetAccount := suite.testAccounts["local_account_2"]
 | |
| 
 | |
| 	targetAccount.SharedInboxURI = nil
 | |
| 	if err := suite.db.UpdateAccount(context.Background(), targetAccount); err != nil {
 | |
| 		suite.FailNow(err.Error())
 | |
| 	}
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		testrig.URLMustParse(targetAccount.URI),
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(fetchedAccount)
 | |
| 	suite.Empty(fetchedAccount.Domain)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsername() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 	targetAccount := suite.testAccounts["local_account_2"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		testrig.URLMustParse(targetAccount.URI),
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(fetchedAccount)
 | |
| 	suite.Empty(fetchedAccount.Domain)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsernameDomain() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 	targetAccount := suite.testAccounts["local_account_2"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		testrig.URLMustParse(targetAccount.URI),
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(fetchedAccount)
 | |
| 	suite.Empty(fetchedAccount.Domain)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountAsUsernameDomainAndURL() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 	targetAccount := suite.testAccounts["local_account_2"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByUsernameDomain(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		targetAccount.Username,
 | |
| 		config.GetHost(),
 | |
| 		false,
 | |
| 	)
 | |
| 	suite.NoError(err)
 | |
| 	suite.NotNil(fetchedAccount)
 | |
| 	suite.Empty(fetchedAccount.Domain)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUsername() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByUsernameDomain(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		"thisaccountdoesnotexist",
 | |
| 		config.GetHost(),
 | |
| 		false,
 | |
| 	)
 | |
| 	var errNotRetrievable *dereferencing.ErrNotRetrievable
 | |
| 	suite.ErrorAs(err, &errNotRetrievable)
 | |
| 	suite.EqualError(err, "item could not be retrieved: no entries")
 | |
| 	suite.Nil(fetchedAccount)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUsernameDomain() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByUsernameDomain(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		"thisaccountdoesnotexist",
 | |
| 		"localhost:8080",
 | |
| 		false,
 | |
| 	)
 | |
| 	var errNotRetrievable *dereferencing.ErrNotRetrievable
 | |
| 	suite.ErrorAs(err, &errNotRetrievable)
 | |
| 	suite.EqualError(err, "item could not be retrieved: no entries")
 | |
| 	suite.Nil(fetchedAccount)
 | |
| }
 | |
| 
 | |
| func (suite *AccountTestSuite) TestDereferenceLocalAccountWithUnknownUserURI() {
 | |
| 	fetchingAccount := suite.testAccounts["local_account_1"]
 | |
| 
 | |
| 	fetchedAccount, err := suite.dereferencer.GetAccountByURI(
 | |
| 		context.Background(),
 | |
| 		fetchingAccount.Username,
 | |
| 		testrig.URLMustParse("http://localhost:8080/users/thisaccountdoesnotexist"),
 | |
| 		false,
 | |
| 	)
 | |
| 	var errNotRetrievable *dereferencing.ErrNotRetrievable
 | |
| 	suite.ErrorAs(err, &errNotRetrievable)
 | |
| 	suite.EqualError(err, "item could not be retrieved: no entries")
 | |
| 	suite.Nil(fetchedAccount)
 | |
| }
 | |
| 
 | |
| func TestAccountTestSuite(t *testing.T) {
 | |
| 	suite.Run(t, new(AccountTestSuite))
 | |
| }
 |