mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-10-31 22:40:01 +00:00
dfdc473cef
* move finger to dereferencer * totally break GetRemoteAccount * start reworking finger func a bit * start reworking getRemoteAccount a bit * move mention parts to namestring * rework webfingerget * use util function to extract webfinger parts * use accountDomain * rework finger again, final form * just a real nasty commit, the worst * remove refresh from account * use new ASRepToAccount signature * fix incorrect debug call * fix for new getRemoteAccount * rework GetRemoteAccount * start updating tests to remove repetition * break a lot of tests Move shared test logic into the testrig, rather than having it scattered all over the place. This allows us to just mock the transport controller once, and have all tests use it (unless they need not to for some other reason). * fix up tests to use main mock httpclient * webfinger only if necessary * cheeky linting with the lads * update mentionName regex recognize instance accounts * don't finger instance accounts * test webfinger part extraction * increase default worker count to 4 per cpu * don't repeat regex parsing * final search for discovered accountDomain * be more permissive in namestring lookup * add more extraction tests * simplify GetParseMentionFunc * skip long search if local account * fix broken test
285 lines
9.7 KiB
Go
285 lines
9.7 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021-2022 GoToSocial Authors admin@gotosocial.org
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package testrig
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"io"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/superseriousbusiness/activity/pub"
|
|
"github.com/superseriousbusiness/activity/streams"
|
|
"github.com/superseriousbusiness/activity/streams/vocab"
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/concurrency"
|
|
"github.com/superseriousbusiness/gotosocial/internal/db"
|
|
"github.com/superseriousbusiness/gotosocial/internal/federation"
|
|
"github.com/superseriousbusiness/gotosocial/internal/messages"
|
|
"github.com/superseriousbusiness/gotosocial/internal/transport"
|
|
)
|
|
|
|
const applicationJSON = "application/json"
|
|
const applicationActivityJSON = "application/activity+json"
|
|
|
|
// NewTestTransportController returns a test transport controller with the given http client.
|
|
//
|
|
// Obviously for testing purposes you should not be making actual http calls to other servers.
|
|
// To obviate this, use the function NewMockHTTPClient in this package to return a mock http
|
|
// client that doesn't make any remote calls but just returns whatever you tell it to.
|
|
//
|
|
// Unlike the other test interfaces provided in this package, you'll probably want to call this function
|
|
// PER TEST rather than per suite, so that the do function can be set on a test by test (or even more granular)
|
|
// basis.
|
|
func NewTestTransportController(client pub.HttpClient, db db.DB, fedWorker *concurrency.WorkerPool[messages.FromFederator]) transport.Controller {
|
|
return transport.NewController(db, NewTestFederatingDB(db, fedWorker), &federation.Clock{}, client)
|
|
}
|
|
|
|
type MockHTTPClient struct {
|
|
do func(req *http.Request) (*http.Response, error)
|
|
|
|
testRemoteStatuses map[string]vocab.ActivityStreamsNote
|
|
testRemotePeople map[string]vocab.ActivityStreamsPerson
|
|
testRemoteGroups map[string]vocab.ActivityStreamsGroup
|
|
testRemoteServices map[string]vocab.ActivityStreamsService
|
|
testRemoteAttachments map[string]RemoteAttachmentFile
|
|
|
|
SentMessages map[string][]byte
|
|
}
|
|
|
|
// NewMockHTTPClient returns a client that conforms to the pub.HttpClient interface.
|
|
//
|
|
// If do is nil, then a standard response set will be mocked out, which includes models stored in the
|
|
// testrig, and webfinger responses as well.
|
|
//
|
|
// If do is not nil, then the given do function will always be used, which allows callers
|
|
// to customize how the client is mocked.
|
|
//
|
|
// Note that you should never ever make ACTUAL http calls with this thing.
|
|
func NewMockHTTPClient(do func(req *http.Request) (*http.Response, error), relativeMediaPath string) *MockHTTPClient {
|
|
mockHTTPClient := &MockHTTPClient{}
|
|
|
|
if do != nil {
|
|
mockHTTPClient.do = do
|
|
return mockHTTPClient
|
|
}
|
|
|
|
mockHTTPClient.testRemoteStatuses = NewTestFediStatuses()
|
|
mockHTTPClient.testRemotePeople = NewTestFediPeople()
|
|
mockHTTPClient.testRemoteGroups = NewTestFediGroups()
|
|
mockHTTPClient.testRemoteServices = NewTestFediServices()
|
|
mockHTTPClient.testRemoteAttachments = NewTestFediAttachments(relativeMediaPath)
|
|
|
|
mockHTTPClient.SentMessages = make(map[string][]byte)
|
|
|
|
mockHTTPClient.do = func(req *http.Request) (*http.Response, error) {
|
|
responseCode := http.StatusNotFound
|
|
responseBytes := []byte(`{"error":"404 not found"}`)
|
|
responseContentType := applicationJSON
|
|
responseContentLength := len(responseBytes)
|
|
|
|
if req.Method == http.MethodPost {
|
|
b, err := io.ReadAll(req.Body)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
mockHTTPClient.SentMessages[req.URL.String()] = b
|
|
|
|
responseCode = http.StatusOK
|
|
responseBytes = []byte(`{"ok":"accepted"}`)
|
|
responseContentType = applicationJSON
|
|
responseContentLength = len(responseBytes)
|
|
} else if strings.Contains(req.URL.String(), ".well-known/webfinger") {
|
|
responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req)
|
|
} else if note, ok := mockHTTPClient.testRemoteStatuses[req.URL.String()]; ok {
|
|
// the request is for a note that we have stored
|
|
noteI, err := streams.Serialize(note)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
noteJSON, err := json.Marshal(noteI)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
responseCode = http.StatusOK
|
|
responseBytes = noteJSON
|
|
responseContentType = applicationActivityJSON
|
|
responseContentLength = len(noteJSON)
|
|
} else if person, ok := mockHTTPClient.testRemotePeople[req.URL.String()]; ok {
|
|
// the request is for a person that we have stored
|
|
personI, err := streams.Serialize(person)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
personJSON, err := json.Marshal(personI)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
responseCode = http.StatusOK
|
|
responseBytes = personJSON
|
|
responseContentType = applicationActivityJSON
|
|
responseContentLength = len(personJSON)
|
|
} else if group, ok := mockHTTPClient.testRemoteGroups[req.URL.String()]; ok {
|
|
// the request is for a person that we have stored
|
|
groupI, err := streams.Serialize(group)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
groupJSON, err := json.Marshal(groupI)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
responseCode = http.StatusOK
|
|
responseBytes = groupJSON
|
|
responseContentType = applicationActivityJSON
|
|
responseContentLength = len(groupJSON)
|
|
} else if service, ok := mockHTTPClient.testRemoteServices[req.URL.String()]; ok {
|
|
serviceI, err := streams.Serialize(service)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
serviceJSON, err := json.Marshal(serviceI)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
responseCode = http.StatusOK
|
|
responseBytes = serviceJSON
|
|
responseContentType = applicationActivityJSON
|
|
responseContentLength = len(serviceJSON)
|
|
} else if attachment, ok := mockHTTPClient.testRemoteAttachments[req.URL.String()]; ok {
|
|
responseCode = http.StatusOK
|
|
responseBytes = attachment.Data
|
|
responseContentType = attachment.ContentType
|
|
responseContentLength = len(attachment.Data)
|
|
}
|
|
|
|
logrus.Debugf("returning response %s", string(responseBytes))
|
|
reader := bytes.NewReader(responseBytes)
|
|
readCloser := io.NopCloser(reader)
|
|
return &http.Response{
|
|
StatusCode: responseCode,
|
|
Body: readCloser,
|
|
ContentLength: int64(responseContentLength),
|
|
Header: http.Header{
|
|
"content-type": {responseContentType},
|
|
},
|
|
}, nil
|
|
}
|
|
|
|
return mockHTTPClient
|
|
}
|
|
|
|
func (m *MockHTTPClient) Do(req *http.Request) (*http.Response, error) {
|
|
return m.do(req)
|
|
}
|
|
|
|
func WebfingerResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) {
|
|
var wfr *apimodel.WellKnownResponse
|
|
|
|
switch req.URL.String() {
|
|
case "https://unknown-instance.com/.well-known/webfinger?resource=acct:some_group@unknown-instance.com":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:some_group@unknown-instance.com",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://unknown-instance.com/groups/some_group",
|
|
},
|
|
},
|
|
}
|
|
case "https://owncast.example.org/.well-known/webfinger?resource=acct:rgh@owncast.example.org":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:rgh@example.org",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://owncast.example.org/federation/user/rgh",
|
|
},
|
|
},
|
|
}
|
|
case "https://unknown-instance.com/.well-known/webfinger?resource=acct:brand_new_person@unknown-instance.com":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:brand_new_person@unknown-instance.com",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://unknown-instance.com/users/brand_new_person",
|
|
},
|
|
},
|
|
}
|
|
case "https://turnip.farm/.well-known/webfinger?resource=acct:turniplover6969@turnip.farm":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:turniplover6969@turnip.farm",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://turnip.farm/users/turniplover6969",
|
|
},
|
|
},
|
|
}
|
|
case "https://fossbros-anonymous.io/.well-known/webfinger?resource=acct:foss_satan@fossbros-anonymous.io":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:foss_satan@fossbros-anonymous.io",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://fossbros-anonymous.io/users/foss_satan",
|
|
},
|
|
},
|
|
}
|
|
case "https://example.org/.well-known/webfinger?resource=acct:some_user@example.org":
|
|
wfr = &apimodel.WellKnownResponse{
|
|
Subject: "acct:some_user@example.org",
|
|
Links: []apimodel.Link{
|
|
{
|
|
Rel: "self",
|
|
Type: applicationActivityJSON,
|
|
Href: "https://example.org/users/some_user",
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
if wfr == nil {
|
|
logrus.Debugf("webfinger response not available for %s", req.URL)
|
|
responseCode = http.StatusNotFound
|
|
responseBytes = []byte(`{"error":"not found"}`)
|
|
responseContentType = applicationJSON
|
|
responseContentLength = len(responseBytes)
|
|
return
|
|
}
|
|
|
|
wfrJSON, err := json.Marshal(wfr)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
responseCode = http.StatusOK
|
|
responseBytes = wfrJSON
|
|
responseContentType = applicationJSON
|
|
responseContentLength = len(wfrJSON)
|
|
return
|
|
}
|