mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2024-12-12 16:50:28 +01:00
2aaec82732
* add smtp configuration * add email confirm + reset templates * add email sender to testrig * flesh out the email sender interface * go fmt * golint * update from field with more clarity * tidy up the email formatting * fix tests * add email sender to processor * tidy client api processing a bit * further tidying in fromClientAPI * pin new account to user * send msg to processor on new account creation * generate confirm email uri * remove emailer from account processor again * add processCreateAccountFromClientAPI * move emailer accountprocessor => userprocessor * add email sender to user processor * SendConfirmEmail function * add noop email sender * use noop email sender in tests * only assemble message if callback is not nil * use noop email sender if no smtp host is defined * minify email html before sending * fix wrong email address * email confirm test * fmt * serve web hndler * add email confirm handler * init test log properly on testrig * log emails that *would* have been sent * go fmt ./... * unexport confirm email handler * updatedAt * test confirm email function * don't allow tokens older than 7 days * change error message a bit * add basic smtp docs * add a few more snippets * typo * add email sender to outbox tests * don't use dutch wikipedia link * don't minify email html
183 lines
6.8 KiB
Go
183 lines
6.8 KiB
Go
/*
|
|
GoToSocial
|
|
Copyright (C) 2021 GoToSocial Authors admin@gotosocial.org
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU Affero General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU Affero General Public License for more details.
|
|
You should have received a copy of the GNU Affero General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package status_test
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/gin-gonic/gin"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/suite"
|
|
"github.com/superseriousbusiness/gotosocial/internal/api/client/status"
|
|
"github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
|
)
|
|
|
|
type StatusBoostTestSuite struct {
|
|
StatusStandardTestSuite
|
|
}
|
|
|
|
func (suite *StatusBoostTestSuite) TestPostBoost() {
|
|
|
|
t := suite.testTokens["local_account_1"]
|
|
oauthToken := oauth.DBTokenToToken(t)
|
|
|
|
targetStatus := suite.testStatuses["admin_account_status_1"]
|
|
|
|
// setup
|
|
recorder := httptest.NewRecorder()
|
|
ctx, _ := gin.CreateTestContext(recorder)
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauthToken)
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["local_account_1"])
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["local_account_1"])
|
|
ctx.Request = httptest.NewRequest(http.MethodPost, fmt.Sprintf("http://localhost:8080%s", strings.Replace(status.ReblogPath, ":id", targetStatus.ID, 1)), nil) // the endpoint we're hitting
|
|
|
|
// normally the router would populate these params from the path values,
|
|
// but because we're calling the function directly, we need to set them manually.
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: status.IDKey,
|
|
Value: targetStatus.ID,
|
|
},
|
|
}
|
|
|
|
suite.statusModule.StatusBoostPOSTHandler(ctx)
|
|
|
|
// check response
|
|
suite.EqualValues(http.StatusOK, recorder.Code)
|
|
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
assert.NoError(suite.T(), err)
|
|
|
|
statusReply := &model.Status{}
|
|
err = json.Unmarshal(b, statusReply)
|
|
assert.NoError(suite.T(), err)
|
|
|
|
assert.False(suite.T(), statusReply.Sensitive)
|
|
assert.Equal(suite.T(), model.VisibilityPublic, statusReply.Visibility)
|
|
|
|
assert.Equal(suite.T(), targetStatus.ContentWarning, statusReply.SpoilerText)
|
|
assert.Equal(suite.T(), targetStatus.Content, statusReply.Content)
|
|
assert.Equal(suite.T(), "the_mighty_zork", statusReply.Account.Username)
|
|
assert.Len(suite.T(), statusReply.MediaAttachments, 0)
|
|
assert.Len(suite.T(), statusReply.Mentions, 0)
|
|
assert.Len(suite.T(), statusReply.Emojis, 0)
|
|
assert.Len(suite.T(), statusReply.Tags, 0)
|
|
|
|
assert.NotNil(suite.T(), statusReply.Application)
|
|
assert.Equal(suite.T(), "really cool gts application", statusReply.Application.Name)
|
|
|
|
assert.NotNil(suite.T(), statusReply.Reblog)
|
|
assert.Equal(suite.T(), 1, statusReply.Reblog.ReblogsCount)
|
|
assert.Equal(suite.T(), 1, statusReply.Reblog.FavouritesCount)
|
|
assert.Equal(suite.T(), targetStatus.Content, statusReply.Reblog.Content)
|
|
assert.Equal(suite.T(), targetStatus.ContentWarning, statusReply.Reblog.SpoilerText)
|
|
assert.Equal(suite.T(), targetStatus.AccountID, statusReply.Reblog.Account.ID)
|
|
assert.Len(suite.T(), statusReply.Reblog.MediaAttachments, 1)
|
|
assert.Len(suite.T(), statusReply.Reblog.Tags, 1)
|
|
assert.Len(suite.T(), statusReply.Reblog.Emojis, 1)
|
|
assert.Equal(suite.T(), "superseriousbusiness", statusReply.Reblog.Application.Name)
|
|
}
|
|
|
|
// try to boost a status that's not boostable
|
|
func (suite *StatusBoostTestSuite) TestPostUnboostable() {
|
|
|
|
t := suite.testTokens["local_account_1"]
|
|
oauthToken := oauth.DBTokenToToken(t)
|
|
|
|
targetStatus := suite.testStatuses["local_account_2_status_4"]
|
|
|
|
// setup
|
|
recorder := httptest.NewRecorder()
|
|
ctx, _ := gin.CreateTestContext(recorder)
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauthToken)
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["local_account_1"])
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["local_account_1"])
|
|
ctx.Request = httptest.NewRequest(http.MethodPost, fmt.Sprintf("http://localhost:8080%s", strings.Replace(status.ReblogPath, ":id", targetStatus.ID, 1)), nil) // the endpoint we're hitting
|
|
|
|
// normally the router would populate these params from the path values,
|
|
// but because we're calling the function directly, we need to set them manually.
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: status.IDKey,
|
|
Value: targetStatus.ID,
|
|
},
|
|
}
|
|
|
|
suite.statusModule.StatusBoostPOSTHandler(ctx)
|
|
|
|
// check response
|
|
suite.EqualValues(http.StatusForbidden, recorder.Code) // we 403 unboostable statuses
|
|
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
assert.NoError(suite.T(), err)
|
|
assert.Equal(suite.T(), `{"error":"forbidden"}`, string(b))
|
|
}
|
|
|
|
// try to boost a status that's not visible to the user
|
|
func (suite *StatusBoostTestSuite) TestPostNotVisible() {
|
|
|
|
t := suite.testTokens["local_account_2"]
|
|
oauthToken := oauth.DBTokenToToken(t)
|
|
|
|
targetStatus := suite.testStatuses["local_account_1_status_3"] // this is a mutual only status and these accounts aren't mutuals
|
|
|
|
// setup
|
|
recorder := httptest.NewRecorder()
|
|
ctx, _ := gin.CreateTestContext(recorder)
|
|
ctx.Set(oauth.SessionAuthorizedApplication, suite.testApplications["application_1"])
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauthToken)
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers["local_account_2"])
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts["local_account_2"])
|
|
ctx.Request = httptest.NewRequest(http.MethodPost, fmt.Sprintf("http://localhost:8080%s", strings.Replace(status.ReblogPath, ":id", targetStatus.ID, 1)), nil) // the endpoint we're hitting
|
|
|
|
// normally the router would populate these params from the path values,
|
|
// but because we're calling the function directly, we need to set them manually.
|
|
ctx.Params = gin.Params{
|
|
gin.Param{
|
|
Key: status.IDKey,
|
|
Value: targetStatus.ID,
|
|
},
|
|
}
|
|
|
|
suite.statusModule.StatusBoostPOSTHandler(ctx)
|
|
|
|
// check response
|
|
suite.EqualValues(http.StatusNotFound, recorder.Code) // we 404 statuses that aren't visible
|
|
|
|
result := recorder.Result()
|
|
defer result.Body.Close()
|
|
b, err := ioutil.ReadAll(result.Body)
|
|
assert.NoError(suite.T(), err)
|
|
assert.Equal(suite.T(), `{"error":"404 not found"}`, string(b))
|
|
}
|
|
|
|
func TestStatusBoostTestSuite(t *testing.T) {
|
|
suite.Run(t, new(StatusBoostTestSuite))
|
|
}
|