/*
GoToSocial
Copyright (C) 2021-2023 GoToSocial Authors admin@gotosocial.org
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program. If not, see
> So we have to examine critical thinking as a signifier, dynamic and ambiguous. It has a normative definition, a tacit definition, and an ideal definition. One of the hallmarks of graduate training is learning to comprehend those definitions and applying the correct one as needed for professional success.
`, status.Content) } func (suite *ASToInternalTestSuite) TestParsePublicStatusNoURL() { t := suite.jsonToType(publicStatusActivityJsonNoURL) rep, ok := t.(ap.Statusable) if !ok { suite.FailNow("type not coercible") } status, err := suite.typeconverter.ASStatusToStatus(context.Background(), rep) suite.NoError(err) suite.Equal("reading: Punishment and Reward in the Corporate University", status.ContentWarning) suite.Equal(`> So we have to examine critical thinking as a signifier, dynamic and ambiguous. It has a normative definition, a tacit definition, and an ideal definition. One of the hallmarks of graduate training is learning to comprehend those definitions and applying the correct one as needed for professional success.
`, status.Content) // on statuses with no URL in them (like ones we get from pleroma sometimes) we should use the AP URI of the status as URL suite.Equal("http://fossbros-anonymous.io/users/foss_satan/statuses/108138763199405167", status.URL) } func (suite *ASToInternalTestSuite) TestParseGargron() { t := suite.jsonToType(gargronAsActivityJson) rep, ok := t.(ap.Accountable) if !ok { suite.FailNow("type not coercible") } acct, err := suite.typeconverter.ASRepresentationToAccount(context.Background(), rep, "", false) suite.NoError(err) suite.Equal("https://mastodon.social/inbox", *acct.SharedInboxURI) } func (suite *ASToInternalTestSuite) TestParseReplyWithMention() { t := suite.jsonToType(statusWithMentionsActivityJson) create, ok := t.(vocab.ActivityStreamsCreate) if !ok { suite.FailNow("type not coercible") } object := create.GetActivityStreamsObject() var status *gtsmodel.Status for i := object.Begin(); i != nil; i = i.Next() { statusable := i.GetActivityStreamsNote() s, err := suite.typeconverter.ASStatusToStatus(context.Background(), statusable) suite.NoError(err) status = s break } suite.NotNil(status) postingAccount := suite.testAccounts["remote_account_1"] inReplyToAccount := suite.testAccounts["local_account_1"] inReplyToStatus := suite.testStatuses["local_account_1_status_1"] suite.Equal("http://fossbros-anonymous.io/users/foss_satan/statuses/106221634728637552", status.URI) suite.Equal(postingAccount.ID, status.AccountID) suite.Equal(postingAccount.URI, status.AccountURI) suite.Equal(inReplyToAccount.ID, status.InReplyToAccountID) suite.Equal(inReplyToStatus.ID, status.InReplyToID) suite.Equal(inReplyToStatus.URI, status.InReplyToURI) suite.True(*status.Federated) suite.True(*status.Boostable) suite.True(*status.Replyable) suite.True(*status.Likeable) suite.Equal(`@the_mighty_zork nice there it is:
https://social.pixie.town/users/f0x/statuses/106221628567855262/activity
`, status.Content) suite.Len(status.Mentions, 1) m1 := status.Mentions[0] suite.Equal(inReplyToAccount.URI, m1.TargetAccountURI) suite.Equal("@the_mighty_zork@localhost:8080", m1.NameString) suite.Equal(gtsmodel.VisibilityUnlocked, status.Visibility) } func (suite *ASToInternalTestSuite) TestParseOwncastService() { t := suite.jsonToType(owncastService) rep, ok := t.(ap.Accountable) if !ok { suite.FailNow("type not coercible") } acct, err := suite.typeconverter.ASRepresentationToAccount(context.Background(), rep, "", false) suite.NoError(err) suite.Equal("rgh", acct.Username) suite.Equal("owncast.example.org", acct.Domain) suite.Equal("https://owncast.example.org/logo/external", acct.AvatarRemoteURL) suite.Equal("https://owncast.example.org/logo/external", acct.HeaderRemoteURL) suite.Equal("Rob's Owncast Server", acct.DisplayName) suite.Equal("linux audio stuff ", acct.Note) suite.True(*acct.Bot) suite.False(*acct.Locked) suite.True(*acct.Discoverable) suite.Equal("https://owncast.example.org/federation/user/rgh", acct.URI) suite.Equal("https://owncast.example.org/federation/user/rgh", acct.URL) suite.Equal("https://owncast.example.org/federation/user/rgh/inbox", acct.InboxURI) suite.Equal("https://owncast.example.org/federation/user/rgh/outbox", acct.OutboxURI) suite.Equal("https://owncast.example.org/federation/user/rgh/followers", acct.FollowersURI) suite.Equal("Service", acct.ActorType) suite.Equal("https://owncast.example.org/federation/user/rgh#main-key", acct.PublicKeyURI) acct.ID = "01G42D57DTCJQE8XT9KD4K88RK" apiAcct, err := suite.typeconverter.AccountToAPIAccountPublic(context.Background(), acct) suite.NoError(err) suite.NotNil(apiAcct) b, err := json.Marshal(apiAcct) suite.NoError(err) fmt.Printf("\n\n\n%s\n\n\n", string(b)) } func (suite *ASToInternalTestSuite) TestParseFlag1() { reportedAccount := suite.testAccounts["local_account_1"] reportingAccount := suite.testAccounts["remote_account_1"] reportedStatus := suite.testStatuses["local_account_1_status_1"] raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "Note: ` + reportedStatus.URL + `\n-----\nban this sick filth ⛔", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": "` + reportedAccount.URI + `", "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) if err != nil { suite.FailNow(err.Error()) } suite.Equal(report.AccountID, reportingAccount.ID) suite.Equal(report.TargetAccountID, reportedAccount.ID) suite.Len(report.StatusIDs, 1) suite.Len(report.Statuses, 1) suite.Equal(report.Statuses[0].ID, reportedStatus.ID) suite.Equal(report.Comment, "Note: "+reportedStatus.URL+"\n-----\nban this sick filth ⛔") } func (suite *ASToInternalTestSuite) TestParseFlag2() { reportedAccount := suite.testAccounts["local_account_1"] reportingAccount := suite.testAccounts["remote_account_1"] // report a status that doesn't exist reportedStatusURL := "http://localhost:8080/@the_mighty_zork/01GQHR6MCQSTCP85ZG4A0VR316" raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "Note: ` + reportedStatusURL + `\n-----\nban this sick filth ⛔", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": "` + reportedAccount.URI + `", "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) if err != nil { suite.FailNow(err.Error()) } suite.Equal(report.AccountID, reportingAccount.ID) suite.Equal(report.TargetAccountID, reportedAccount.ID) // nonexistent status should just be skipped, it'll still be in the content though suite.Len(report.StatusIDs, 0) suite.Len(report.Statuses, 0) suite.Equal(report.Comment, "Note: "+reportedStatusURL+"\n-----\nban this sick filth ⛔") } func (suite *ASToInternalTestSuite) TestParseFlag3() { // flag an account that doesn't exist reportedAccountURI := "http://localhost:8080/users/mr_e_man" reportingAccount := suite.testAccounts["remote_account_1"] raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "ban this sick filth ⛔", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": "` + reportedAccountURI + `", "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) suite.Nil(report) suite.EqualError(err, "ASFlagToReport: account with uri http://localhost:8080/users/mr_e_man could not be found in the db") } func (suite *ASToInternalTestSuite) TestParseFlag4() { // flag an account from another instance reportingAccount := suite.testAccounts["remote_account_1"] reportedAccountURI := suite.testAccounts["remote_account_2"].URI raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "ban this sick filth ⛔", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": "` + reportedAccountURI + `", "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) suite.Nil(report) suite.EqualError(err, "ASFlagToReport: flaggable objects contained no recognizable target account uri") } func (suite *ASToInternalTestSuite) TestParseFlag5() { reportedAccount := suite.testAccounts["local_account_1"] reportingAccount := suite.testAccounts["remote_account_1"] reportedStatus := suite.testStatuses["local_account_1_status_1"] raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "misinformation", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": [ "` + reportedAccount.URI + `", "` + reportedStatus.URI + `" ], "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) if err != nil { suite.FailNow(err.Error()) } suite.Equal(report.AccountID, reportingAccount.ID) suite.Equal(report.TargetAccountID, reportedAccount.ID) suite.Len(report.StatusIDs, 1) suite.Len(report.Statuses, 1) suite.Equal(report.Statuses[0].ID, reportedStatus.ID) suite.Equal(report.Comment, "misinformation") } func (suite *ASToInternalTestSuite) TestParseFlag6() { reportedAccount := suite.testAccounts["local_account_1"] reportingAccount := suite.testAccounts["remote_account_1"] // flag a status that belongs to another account reportedStatus := suite.testStatuses["local_account_2_status_1"] raw := `{ "@context": "https://www.w3.org/ns/activitystreams", "actor": "` + reportingAccount.URI + `", "content": "misinformation", "id": "http://fossbros-anonymous.io/db22128d-884e-4358-9935-6a7c3940535d", "object": [ "` + reportedAccount.URI + `", "` + reportedStatus.URI + `" ], "type": "Flag" }` t := suite.jsonToType(raw) asFlag, ok := t.(ap.Flaggable) if !ok { suite.FailNow("type not coercible") } report, err := suite.typeconverter.ASFlagToReport(context.Background(), asFlag) if err != nil { suite.FailNow(err.Error()) } suite.Equal(report.AccountID, reportingAccount.ID) suite.Equal(report.TargetAccountID, reportedAccount.ID) suite.Len(report.StatusIDs, 0) suite.Len(report.Statuses, 0) suite.Equal(report.Comment, "misinformation") } func TestASToInternalTestSuite(t *testing.T) { suite.Run(t, new(ASToInternalTestSuite)) }