summaryrefslogtreecommitdiff
path: root/test/pleroma/web/activity_pub/mrf/reject_non_public_test.exs
blob: e08eb3ba6bb9c77235293154f30759cc6f0cbf4c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
# Pleroma: A lightweight social networking server
# Copyright © 2017-2020 Pleroma Authors <https://pleroma.social/>
# SPDX-License-Identifier: AGPL-3.0-only

defmodule Pleroma.Web.ActivityPub.MRF.RejectNonPublicTest do
  use Pleroma.DataCase
  import Pleroma.Factory

  alias Pleroma.Web.ActivityPub.MRF.RejectNonPublic

  setup do: clear_config([:mrf_rejectnonpublic])

  describe "public message" do
    test "it's allowed when address is public" do
      actor = insert(:user, follower_address: "test-address")

      message = %{
        "actor" => actor.ap_id,
        "to" => ["https://www.w3.org/ns/activitystreams#Public"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      assert {:ok, _message} = RejectNonPublic.filter(message)
    end

    test "it's allowed when cc address contain public address" do
      actor = insert(:user, follower_address: "test-address")

      message = %{
        "actor" => actor.ap_id,
        "to" => ["https://www.w3.org/ns/activitystreams#Public"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      assert {:ok, _message} = RejectNonPublic.filter(message)
    end
  end

  describe "followers message" do
    test "it's allowed when addrer of message in the follower addresses of user and it enabled in config" do
      actor = insert(:user, follower_address: "test-address")

      message = %{
        "actor" => actor.ap_id,
        "to" => ["test-address"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      Pleroma.Config.put([:mrf_rejectnonpublic, :allow_followersonly], true)
      assert {:ok, _message} = RejectNonPublic.filter(message)
    end

    test "it's rejected when addrer of message in the follower addresses of user and it disabled in config" do
      actor = insert(:user, follower_address: "test-address")

      message = %{
        "actor" => actor.ap_id,
        "to" => ["test-address"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      Pleroma.Config.put([:mrf_rejectnonpublic, :allow_followersonly], false)
      assert {:reject, _} = RejectNonPublic.filter(message)
    end
  end

  describe "direct message" do
    test "it's allows when direct messages are allow" do
      actor = insert(:user)

      message = %{
        "actor" => actor.ap_id,
        "to" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      Pleroma.Config.put([:mrf_rejectnonpublic, :allow_direct], true)
      assert {:ok, _message} = RejectNonPublic.filter(message)
    end

    test "it's reject when direct messages aren't allow" do
      actor = insert(:user)

      message = %{
        "actor" => actor.ap_id,
        "to" => ["https://www.w3.org/ns/activitystreams#Publid~~~"],
        "cc" => ["https://www.w3.org/ns/activitystreams#Publid"],
        "type" => "Create"
      }

      Pleroma.Config.put([:mrf_rejectnonpublic, :allow_direct], false)
      assert {:reject, _} = RejectNonPublic.filter(message)
    end
  end
end