2021-05-08 13:25:55 +01:00
|
|
|
/*
|
|
|
|
GoToSocial
|
2021-12-20 17:42:19 +00:00
|
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
2021-05-08 13:25:55 +01:00
|
|
|
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU Affero General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package testrig
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2022-06-11 10:01:34 +01:00
|
|
|
"encoding/json"
|
|
|
|
"io"
|
2021-05-08 13:25:55 +01:00
|
|
|
"net/http"
|
2022-06-11 10:01:34 +01:00
|
|
|
"strings"
|
2022-08-31 16:31:21 +01:00
|
|
|
"sync"
|
2021-05-08 13:25:55 +01:00
|
|
|
|
2021-11-13 16:29:43 +00:00
|
|
|
"github.com/superseriousbusiness/activity/pub"
|
2022-06-11 10:01:34 +01:00
|
|
|
"github.com/superseriousbusiness/activity/streams"
|
|
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
2022-05-15 10:16:43 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/concurrency"
|
2021-08-10 12:32:39 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
2021-05-08 13:25:55 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation"
|
2022-11-11 11:18:38 +00:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
2022-07-19 09:47:55 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/log"
|
2022-04-28 13:23:11 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
2021-05-08 13:25:55 +01:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/transport"
|
|
|
|
)
|
|
|
|
|
2022-07-19 09:47:55 +01:00
|
|
|
const (
|
|
|
|
applicationJSON = "application/json"
|
|
|
|
applicationActivityJSON = "application/activity+json"
|
|
|
|
)
|
2022-06-11 10:01:34 +01:00
|
|
|
|
2021-05-08 13:25:55 +01:00
|
|
|
// NewTestTransportController returns a test transport controller with the given http client.
|
|
|
|
//
|
|
|
|
// Obviously for testing purposes you should not be making actual http calls to other servers.
|
|
|
|
// To obviate this, use the function NewMockHTTPClient in this package to return a mock http
|
|
|
|
// client that doesn't make any remote calls but just returns whatever you tell it to.
|
|
|
|
//
|
|
|
|
// Unlike the other test interfaces provided in this package, you'll probably want to call this function
|
|
|
|
// PER TEST rather than per suite, so that the do function can be set on a test by test (or even more granular)
|
|
|
|
// basis.
|
2022-05-15 10:16:43 +01:00
|
|
|
func NewTestTransportController(client pub.HttpClient, db db.DB, fedWorker *concurrency.WorkerPool[messages.FromFederator]) transport.Controller {
|
2022-04-28 13:23:11 +01:00
|
|
|
return transport.NewController(db, NewTestFederatingDB(db, fedWorker), &federation.Clock{}, client)
|
2021-05-08 13:25:55 +01:00
|
|
|
}
|
|
|
|
|
2022-06-11 10:01:34 +01:00
|
|
|
type MockHTTPClient struct {
|
|
|
|
do func(req *http.Request) (*http.Response, error)
|
|
|
|
|
|
|
|
testRemoteStatuses map[string]vocab.ActivityStreamsNote
|
|
|
|
testRemotePeople map[string]vocab.ActivityStreamsPerson
|
|
|
|
testRemoteGroups map[string]vocab.ActivityStreamsGroup
|
|
|
|
testRemoteServices map[string]vocab.ActivityStreamsService
|
|
|
|
testRemoteAttachments map[string]RemoteAttachmentFile
|
2022-09-26 10:56:01 +01:00
|
|
|
testRemoteEmojis map[string]vocab.TootEmoji
|
2022-11-11 11:18:38 +00:00
|
|
|
testTombstones map[string]*gtsmodel.Tombstone
|
2022-06-11 10:01:34 +01:00
|
|
|
|
2022-08-31 16:31:21 +01:00
|
|
|
SentMessages sync.Map
|
2022-06-11 10:01:34 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewMockHTTPClient returns a client that conforms to the pub.HttpClient interface.
|
|
|
|
//
|
|
|
|
// If do is nil, then a standard response set will be mocked out, which includes models stored in the
|
|
|
|
// testrig, and webfinger responses as well.
|
2021-05-08 13:25:55 +01:00
|
|
|
//
|
2022-06-11 10:01:34 +01:00
|
|
|
// If do is not nil, then the given do function will always be used, which allows callers
|
|
|
|
// to customize how the client is mocked.
|
2021-05-08 13:25:55 +01:00
|
|
|
//
|
|
|
|
// Note that you should never ever make ACTUAL http calls with this thing.
|
2022-06-11 10:01:34 +01:00
|
|
|
func NewMockHTTPClient(do func(req *http.Request) (*http.Response, error), relativeMediaPath string) *MockHTTPClient {
|
|
|
|
mockHTTPClient := &MockHTTPClient{}
|
|
|
|
|
|
|
|
if do != nil {
|
|
|
|
mockHTTPClient.do = do
|
|
|
|
return mockHTTPClient
|
2021-05-08 13:25:55 +01:00
|
|
|
}
|
2022-06-11 10:01:34 +01:00
|
|
|
|
|
|
|
mockHTTPClient.testRemoteStatuses = NewTestFediStatuses()
|
|
|
|
mockHTTPClient.testRemotePeople = NewTestFediPeople()
|
|
|
|
mockHTTPClient.testRemoteGroups = NewTestFediGroups()
|
|
|
|
mockHTTPClient.testRemoteServices = NewTestFediServices()
|
|
|
|
mockHTTPClient.testRemoteAttachments = NewTestFediAttachments(relativeMediaPath)
|
2022-09-26 10:56:01 +01:00
|
|
|
mockHTTPClient.testRemoteEmojis = NewTestFediEmojis()
|
2022-11-11 11:18:38 +00:00
|
|
|
mockHTTPClient.testTombstones = NewTestTombstones()
|
2022-06-11 10:01:34 +01:00
|
|
|
|
|
|
|
mockHTTPClient.do = func(req *http.Request) (*http.Response, error) {
|
|
|
|
responseCode := http.StatusNotFound
|
|
|
|
responseBytes := []byte(`{"error":"404 not found"}`)
|
|
|
|
responseContentType := applicationJSON
|
|
|
|
responseContentLength := len(responseBytes)
|
|
|
|
|
|
|
|
if req.Method == http.MethodPost {
|
|
|
|
b, err := io.ReadAll(req.Body)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
2022-08-31 16:31:21 +01:00
|
|
|
|
|
|
|
if sI, loaded := mockHTTPClient.SentMessages.LoadOrStore(req.URL.String(), [][]byte{b}); loaded {
|
|
|
|
s, ok := sI.([][]byte)
|
|
|
|
if !ok {
|
|
|
|
panic("SentMessages entry wasn't [][]byte")
|
|
|
|
}
|
|
|
|
s = append(s, b)
|
|
|
|
mockHTTPClient.SentMessages.Store(req.URL.String(), s)
|
|
|
|
}
|
2022-06-11 10:01:34 +01:00
|
|
|
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = []byte(`{"ok":"accepted"}`)
|
|
|
|
responseContentType = applicationJSON
|
|
|
|
responseContentLength = len(responseBytes)
|
|
|
|
} else if strings.Contains(req.URL.String(), ".well-known/webfinger") {
|
|
|
|
responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req)
|
|
|
|
} else if note, ok := mockHTTPClient.testRemoteStatuses[req.URL.String()]; ok {
|
|
|
|
// the request is for a note that we have stored
|
|
|
|
noteI, err := streams.Serialize(note)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
noteJSON, err := json.Marshal(noteI)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = noteJSON
|
|
|
|
responseContentType = applicationActivityJSON
|
|
|
|
responseContentLength = len(noteJSON)
|
|
|
|
} else if person, ok := mockHTTPClient.testRemotePeople[req.URL.String()]; ok {
|
|
|
|
// the request is for a person that we have stored
|
|
|
|
personI, err := streams.Serialize(person)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
personJSON, err := json.Marshal(personI)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = personJSON
|
|
|
|
responseContentType = applicationActivityJSON
|
|
|
|
responseContentLength = len(personJSON)
|
|
|
|
} else if group, ok := mockHTTPClient.testRemoteGroups[req.URL.String()]; ok {
|
|
|
|
// the request is for a person that we have stored
|
|
|
|
groupI, err := streams.Serialize(group)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
groupJSON, err := json.Marshal(groupI)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = groupJSON
|
|
|
|
responseContentType = applicationActivityJSON
|
|
|
|
responseContentLength = len(groupJSON)
|
|
|
|
} else if service, ok := mockHTTPClient.testRemoteServices[req.URL.String()]; ok {
|
|
|
|
serviceI, err := streams.Serialize(service)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
serviceJSON, err := json.Marshal(serviceI)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = serviceJSON
|
|
|
|
responseContentType = applicationActivityJSON
|
|
|
|
responseContentLength = len(serviceJSON)
|
2022-09-26 10:56:01 +01:00
|
|
|
} else if emoji, ok := mockHTTPClient.testRemoteEmojis[req.URL.String()]; ok {
|
|
|
|
emojiI, err := streams.Serialize(emoji)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
emojiJSON, err := json.Marshal(emojiI)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = emojiJSON
|
|
|
|
responseContentType = applicationActivityJSON
|
|
|
|
responseContentLength = len(emojiJSON)
|
2022-06-11 10:01:34 +01:00
|
|
|
} else if attachment, ok := mockHTTPClient.testRemoteAttachments[req.URL.String()]; ok {
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = attachment.Data
|
|
|
|
responseContentType = attachment.ContentType
|
|
|
|
responseContentLength = len(attachment.Data)
|
2022-11-11 11:18:38 +00:00
|
|
|
} else if _, ok := mockHTTPClient.testTombstones[req.URL.String()]; ok {
|
|
|
|
responseCode = http.StatusGone
|
|
|
|
responseBytes = []byte{}
|
|
|
|
responseContentType = "text/html"
|
|
|
|
responseContentLength = 0
|
2022-06-11 10:01:34 +01:00
|
|
|
}
|
|
|
|
|
2022-07-19 09:47:55 +01:00
|
|
|
log.Debugf("returning response %s", string(responseBytes))
|
2022-06-11 10:01:34 +01:00
|
|
|
reader := bytes.NewReader(responseBytes)
|
|
|
|
readCloser := io.NopCloser(reader)
|
|
|
|
return &http.Response{
|
|
|
|
StatusCode: responseCode,
|
|
|
|
Body: readCloser,
|
|
|
|
ContentLength: int64(responseContentLength),
|
|
|
|
Header: http.Header{
|
|
|
|
"content-type": {responseContentType},
|
|
|
|
},
|
|
|
|
}, nil
|
2021-05-08 13:25:55 +01:00
|
|
|
}
|
|
|
|
|
2022-06-11 10:01:34 +01:00
|
|
|
return mockHTTPClient
|
2021-05-08 13:25:55 +01:00
|
|
|
}
|
|
|
|
|
2022-06-11 10:01:34 +01:00
|
|
|
func (m *MockHTTPClient) Do(req *http.Request) (*http.Response, error) {
|
2021-05-08 13:25:55 +01:00
|
|
|
return m.do(req)
|
|
|
|
}
|
2022-06-11 10:01:34 +01:00
|
|
|
|
|
|
|
func WebfingerResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) {
|
|
|
|
var wfr *apimodel.WellKnownResponse
|
|
|
|
|
|
|
|
switch req.URL.String() {
|
|
|
|
case "https://unknown-instance.com/.well-known/webfinger?resource=acct:some_group@unknown-instance.com":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:some_group@unknown-instance.com",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://unknown-instance.com/groups/some_group",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case "https://owncast.example.org/.well-known/webfinger?resource=acct:rgh@owncast.example.org":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:rgh@example.org",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://owncast.example.org/federation/user/rgh",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case "https://unknown-instance.com/.well-known/webfinger?resource=acct:brand_new_person@unknown-instance.com":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:brand_new_person@unknown-instance.com",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://unknown-instance.com/users/brand_new_person",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case "https://turnip.farm/.well-known/webfinger?resource=acct:turniplover6969@turnip.farm":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:turniplover6969@turnip.farm",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://turnip.farm/users/turniplover6969",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case "https://fossbros-anonymous.io/.well-known/webfinger?resource=acct:foss_satan@fossbros-anonymous.io":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:foss_satan@fossbros-anonymous.io",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://fossbros-anonymous.io/users/foss_satan",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
case "https://example.org/.well-known/webfinger?resource=acct:some_user@example.org":
|
|
|
|
wfr = &apimodel.WellKnownResponse{
|
|
|
|
Subject: "acct:some_user@example.org",
|
|
|
|
Links: []apimodel.Link{
|
|
|
|
{
|
|
|
|
Rel: "self",
|
|
|
|
Type: applicationActivityJSON,
|
|
|
|
Href: "https://example.org/users/some_user",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if wfr == nil {
|
2022-07-19 09:47:55 +01:00
|
|
|
log.Debugf("webfinger response not available for %s", req.URL)
|
2022-06-11 10:01:34 +01:00
|
|
|
responseCode = http.StatusNotFound
|
|
|
|
responseBytes = []byte(`{"error":"not found"}`)
|
|
|
|
responseContentType = applicationJSON
|
|
|
|
responseContentLength = len(responseBytes)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
wfrJSON, err := json.Marshal(wfr)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
responseCode = http.StatusOK
|
|
|
|
responseBytes = wfrJSON
|
|
|
|
responseContentType = applicationJSON
|
|
|
|
responseContentLength = len(wfrJSON)
|
|
|
|
return
|
|
|
|
}
|