mirror of
https://github.com/superseriousbusiness/gotosocial.git
synced 2024-11-01 15:00:00 +00:00
5e2bf0bdca
* [chore] Remove years from all license headers Years or year ranges aren't required in license headers. Many projects have removed them in recent years and it avoids a bit of yearly toil. In many cases our copyright claim was also a bit dodgy since we added the 2021-2023 header to files created after 2021 but you can't claim copyright into the past that way. * [chore] Add license header check This ensures a license header is always added to any new file. This avoids maintainers/reviewers needing to remember to check for and ask for it in case a contribution doesn't include it. * [chore] Add missing license headers * [chore] Further updates to license header * Use the more common // indentend comment format * Remove the hack we had for the linter now that we use the // format * Add SPDX license identifier
292 lines
10 KiB
Go
292 lines
10 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package accounts_test
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"testing"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/superseriousbusiness/gotosocial/internal/api/client/accounts"
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
|
)
|
|
|
|
type AccountStatusesTestSuite struct {
|
|
AccountStandardTestSuite
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPublicOnly() {
|
|
// set up the request
|
|
// we're getting statuses of admin
|
|
targetAccount := suite.testAccounts["admin_account"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?limit=20&only_media=false&only_public=true", targetAccount.ID), "")
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.NotEmpty(apimodelStatuses)
|
|
|
|
for _, s := range apimodelStatuses {
|
|
suite.Equal(apimodel.VisibilityPublic, s.Visibility)
|
|
}
|
|
|
|
suite.Equal(`<http://localhost:8080/api/v1/accounts/01F8MH17FWEB39HZJ76B6VXSKF/statuses?limit=20&max_id=01F8MH75CBF9JFX4ZAD54N0W0R&exclude_replies=false&exclude_reblogs=false&pinned=false&only_media=false&only_public=true>; rel="next", <http://localhost:8080/api/v1/accounts/01F8MH17FWEB39HZJ76B6VXSKF/statuses?limit=20&min_id=01G36SF3V6Y6V5BF9P4R7PQG7G&exclude_replies=false&exclude_reblogs=false&pinned=false&only_media=false&only_public=true>; rel="prev"`, result.Header.Get("link"))
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPublicOnlyMediaOnly() {
|
|
// set up the request
|
|
// we're getting statuses of admin
|
|
targetAccount := suite.testAccounts["admin_account"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?limit=20&only_media=true&only_public=true", targetAccount.ID), "")
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.NotEmpty(apimodelStatuses)
|
|
|
|
for _, s := range apimodelStatuses {
|
|
suite.NotEmpty(s.MediaAttachments)
|
|
suite.Equal(apimodel.VisibilityPublic, s.Visibility)
|
|
}
|
|
|
|
suite.Equal(`<http://localhost:8080/api/v1/accounts/01F8MH17FWEB39HZJ76B6VXSKF/statuses?limit=20&max_id=01F8MH75CBF9JFX4ZAD54N0W0R&exclude_replies=false&exclude_reblogs=false&pinned=false&only_media=true&only_public=true>; rel="next", <http://localhost:8080/api/v1/accounts/01F8MH17FWEB39HZJ76B6VXSKF/statuses?limit=20&min_id=01F8MH75CBF9JFX4ZAD54N0W0R&exclude_replies=false&exclude_reblogs=false&pinned=false&only_media=true&only_public=true>; rel="prev"`, result.Header.Get("link"))
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPinnedOnlyPublicPins() {
|
|
// admin has a couple statuses pinned
|
|
// we're getting pinned statuses of admin, as local account 1
|
|
targetAccount := suite.testAccounts["admin_account"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?pinned=true", targetAccount.ID), "")
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.Len(apimodelStatuses, 2)
|
|
suite.Empty(result.Header.Get("link"))
|
|
|
|
for _, s := range apimodelStatuses {
|
|
// Requesting account doesn't own these
|
|
// statuses, so pinned should be false.
|
|
suite.False(s.Pinned)
|
|
}
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPinnedOnlyNotFollowing() {
|
|
// local account 2 has a followers-only status pinned
|
|
// we're getting pinned statuses of local account 2 with an account that doesn't follow it
|
|
targetAccount := suite.testAccounts["local_account_2"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?pinned=true", targetAccount.ID), "")
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["admin_account"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauth.DBTokenToToken(suite.testTokens["admin_account"]))
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["admin_account"])
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.Empty(apimodelStatuses)
|
|
suite.Empty(result.Header.Get("link"))
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPinnedOnlyFollowing() {
|
|
// local account 2 has a followers-only status pinned
|
|
// we're getting pinned statuses of local account 2 with an account that *DOES* follow it
|
|
targetAccount := suite.testAccounts["local_account_2"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?pinned=true", targetAccount.ID), "")
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["local_account_1"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauth.DBTokenToToken(suite.testTokens["local_account_1"]))
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["local_account_1"])
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.Len(apimodelStatuses, 1)
|
|
suite.Empty(result.Header.Get("link"))
|
|
|
|
for _, s := range apimodelStatuses {
|
|
// Requesting account doesn't own these
|
|
// statuses, so pinned should be false.
|
|
suite.False(s.Pinned)
|
|
}
|
|
}
|
|
|
|
func (suite *AccountStatusesTestSuite) TestGetStatusesPinnedOnlyGetOwn() {
|
|
// local account 2 has a followers-only status pinned
|
|
// we're getting pinned statuses of local account 2 with local account 2!
|
|
targetAccount := suite.testAccounts["local_account_2"]
|
|
recorder := httptest.NewRecorder()
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, fmt.Sprintf("/api/v1/accounts/%s/statuses?pinned=true", targetAccount.ID), "")
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["local_account_2"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauth.DBTokenToToken(suite.testTokens["local_account_2"]))
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["local_account_2"])
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: accounts.IDKey,
|
|
Value: targetAccount.ID,
|
|
},
|
|
}
|
|
|
|
// call the handler
|
|
suite.accountsModule.AccountStatusesGETHandler(ctx)
|
|
|
|
// 1. we should have OK because our request was valid
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
// 2. we should have no error message in the result body
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
|
|
// check the response
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
suite.NoError(err)
|
|
|
|
// unmarshal the returned statuses
|
|
apimodelStatuses := []*apimodel.Status{}
|
|
err = json.Unmarshal(b, &apimodelStatuses)
|
|
suite.NoError(err)
|
|
suite.Len(apimodelStatuses, 1)
|
|
suite.Empty(result.Header.Get("link"))
|
|
|
|
for _, s := range apimodelStatuses {
|
|
// Requesting account owns pinned statuses.
|
|
suite.True(s.Pinned)
|
|
}
|
|
}
|
|
|
|
func TestAccountStatusesTestSuite(t *testing.T) {
|
|
suite.Run(t, new(AccountStatusesTestSuite))
|
|
}
|