2023-02-22 11:55:31 +11:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-02-28 16:54:55 +11:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe ActivityPub::Activity::Flag do
|
2022-07-04 19:08:30 +10:00
|
|
|
let(:sender) { Fabricate(:account, username: 'example.com', domain: 'example.com', uri: 'http://example.com/actor') }
|
2018-02-28 16:54:55 +11:00
|
|
|
let(:flagged) { Fabricate(:account) }
|
|
|
|
let(:status) { Fabricate(:status, account: flagged, uri: 'foobar') }
|
2019-03-18 01:34:56 +11:00
|
|
|
let(:flag_id) { nil }
|
2018-02-28 16:54:55 +11:00
|
|
|
|
|
|
|
let(:json) do
|
|
|
|
{
|
|
|
|
'@context': 'https://www.w3.org/ns/activitystreams',
|
2019-03-18 01:34:56 +11:00
|
|
|
id: flag_id,
|
2018-02-28 16:54:55 +11:00
|
|
|
type: 'Flag',
|
|
|
|
content: 'Boo!!',
|
|
|
|
actor: ActivityPub::TagManager.instance.uri_for(sender),
|
|
|
|
object: [
|
|
|
|
ActivityPub::TagManager.instance.uri_for(flagged),
|
|
|
|
ActivityPub::TagManager.instance.uri_for(status),
|
|
|
|
],
|
|
|
|
}.with_indifferent_access
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#perform' do
|
|
|
|
subject { described_class.new(json, sender) }
|
|
|
|
|
2022-07-04 19:08:30 +10:00
|
|
|
context 'when the reported status is public' do
|
|
|
|
before do
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq [status.id]
|
2024-07-16 23:23:08 +10:00
|
|
|
expect(report.application).to be_nil
|
2023-05-22 21:15:21 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the report comment is excessively long' do
|
|
|
|
subject do
|
|
|
|
described_class.new({
|
|
|
|
'@context': 'https://www.w3.org/ns/activitystreams',
|
|
|
|
id: flag_id,
|
|
|
|
type: 'Flag',
|
|
|
|
content: long_comment,
|
|
|
|
actor: ActivityPub::TagManager.instance.uri_for(sender),
|
|
|
|
object: [
|
|
|
|
ActivityPub::TagManager.instance.uri_for(flagged),
|
|
|
|
ActivityPub::TagManager.instance.uri_for(status),
|
|
|
|
],
|
|
|
|
}.with_indifferent_access, sender)
|
|
|
|
end
|
|
|
|
|
2024-06-11 01:23:55 +10:00
|
|
|
let(:long_comment) { 'a' * described_class::COMMENT_SIZE_LIMIT * 2 }
|
2023-05-22 21:15:21 +10:00
|
|
|
|
|
|
|
before do
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report but with a truncated comment' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
2024-06-11 01:23:55 +10:00
|
|
|
expect(report)
|
|
|
|
.to be_present
|
|
|
|
.and have_attributes(status_ids: [status.id])
|
|
|
|
expect(report.comment)
|
|
|
|
.to have_attributes(length: described_class::COMMENT_SIZE_LIMIT)
|
|
|
|
.and eq(long_comment[0...described_class::COMMENT_SIZE_LIMIT])
|
2022-07-04 19:08:30 +10:00
|
|
|
end
|
2018-02-28 16:54:55 +11:00
|
|
|
end
|
|
|
|
|
2022-07-04 19:08:30 +10:00
|
|
|
context 'when the reported status is private and should not be visible to the remote server' do
|
|
|
|
let(:status) { Fabricate(:status, account: flagged, uri: 'foobar', visibility: :private) }
|
2018-02-28 16:54:55 +11:00
|
|
|
|
2022-07-04 19:08:30 +10:00
|
|
|
before do
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report with no attached status' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq []
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the reported status is private and the author has a follower on the remote instance' do
|
|
|
|
let(:status) { Fabricate(:status, account: flagged, uri: 'foobar', visibility: :private) }
|
|
|
|
let(:follower) { Fabricate(:account, domain: 'example.com', uri: 'http://example.com/users/account') }
|
|
|
|
|
|
|
|
before do
|
|
|
|
follower.follow!(flagged)
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report with the attached status' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq [status.id]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the reported status is private and the author mentions someone else on the remote instance' do
|
|
|
|
let(:status) { Fabricate(:status, account: flagged, uri: 'foobar', visibility: :private) }
|
|
|
|
let(:mentioned) { Fabricate(:account, domain: 'example.com', uri: 'http://example.com/users/account') }
|
|
|
|
|
|
|
|
before do
|
|
|
|
status.mentions.create(account: mentioned)
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report with the attached status' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq [status.id]
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the reported status is private and the author mentions someone else on the local instance' do
|
|
|
|
let(:status) { Fabricate(:status, account: flagged, uri: 'foobar', visibility: :private) }
|
|
|
|
let(:mentioned) { Fabricate(:account) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
status.mentions.create(account: mentioned)
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report with no attached status' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq []
|
|
|
|
end
|
2018-02-28 16:54:55 +11:00
|
|
|
end
|
2023-07-28 00:11:56 +10:00
|
|
|
|
|
|
|
context 'when an account is passed but no status' do
|
|
|
|
let(:mentioned) { Fabricate(:account) }
|
|
|
|
|
|
|
|
let(:json) do
|
|
|
|
{
|
|
|
|
'@context': 'https://www.w3.org/ns/activitystreams',
|
|
|
|
id: flag_id,
|
|
|
|
type: 'Flag',
|
|
|
|
content: 'Boo!!',
|
|
|
|
actor: ActivityPub::TagManager.instance.uri_for(sender),
|
|
|
|
object: [
|
|
|
|
ActivityPub::TagManager.instance.uri_for(flagged),
|
|
|
|
],
|
|
|
|
}.with_indifferent_access
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report with no attached status' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq []
|
|
|
|
end
|
|
|
|
end
|
2018-02-28 16:54:55 +11:00
|
|
|
end
|
2019-03-18 01:34:56 +11:00
|
|
|
|
|
|
|
describe '#perform with a defined uri' do
|
|
|
|
subject { described_class.new(json, sender) }
|
2023-02-20 12:46:00 +11:00
|
|
|
|
2023-02-18 14:00:05 +11:00
|
|
|
let(:flag_id) { 'http://example.com/reports/1' }
|
2019-03-18 01:34:56 +11:00
|
|
|
|
|
|
|
before do
|
|
|
|
subject.perform
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'creates a report' do
|
|
|
|
report = Report.find_by(account: sender, target_account: flagged)
|
|
|
|
|
|
|
|
expect(report).to_not be_nil
|
|
|
|
expect(report.comment).to eq 'Boo!!'
|
|
|
|
expect(report.status_ids).to eq [status.id]
|
|
|
|
expect(report.uri).to eq flag_id
|
|
|
|
end
|
|
|
|
end
|
2018-02-28 16:54:55 +11:00
|
|
|
end
|