This repository has been archived on 2022-11-27. You can view files and clone it, but cannot push or open issues or pull requests.
activitypub/tests/server_to_server_test.go

569 lines
18 KiB
Go
Raw Normal View History

package tests
// Server to Server tests from: https://test.activitypub.rocks/
import (
"fmt"
pub "github.com/go-ap/activitypub"
"testing"
)
// S2S Server: Activities requiring the object property
// The distribution of the following activities require that they contain the object property:
// Create, Update, Delete, Follow, Add, Remove, Like, Block, Undo.
// Implementation always includes object property for each of the above supported activities
func TestObjectPropertyExists(t *testing.T) {
desc := `
S2S Server: Activities requiring the object property
The distribution of the following activities require that they contain the object property:
Create, Update, Delete, Follow, Add, Remove, Like, Block, Undo.
Implementation always includes object property for each of the above supported activities
`
t.Log(desc)
obj := pub.MentionNew("gigel")
add := pub.AddNew("https://localhost/myactivity", obj, nil)
if add.Object == nil {
t.Errorf("Missing GetID in Add activity %#v", add.Object)
}
if add.Object != obj {
t.Errorf("Add.GetID different than what we initialized %#v %#v", add.Object, obj)
}
block := pub.BlockNew("https://localhost/myactivity", obj)
if block.Object == nil {
t.Errorf("Missing GetID in Add activity %#v", block.Object)
}
if block.Object != obj {
t.Errorf("Block.GetID different than what we initialized %#v %#v", block.Object, obj)
}
create := pub.CreateNew("https://localhost/myactivity", obj)
if create.Object == nil {
t.Errorf("Missing GetID in Add activity %#v", create.Object)
}
if create.Object != obj {
t.Errorf("Create.GetID different than what we initialized %#v %#v", create.Object, obj)
}
delete := pub.DeleteNew("https://localhost/myactivity", obj)
if delete.Object == nil {
t.Errorf("Missing GetID in Delete activity %#v", delete.Object)
}
if delete.Object != obj {
t.Errorf("Delete.GetID different than what we initialized %#v %#v", delete.Object, obj)
}
follow := pub.FollowNew("https://localhost/myactivity", obj)
if follow.Object == nil {
t.Errorf("Missing GetID in Follow activity %#v", follow.Object)
}
if follow.Object != obj {
t.Errorf("Follow.GetID different than what we initialized %#v %#v", follow.Object, obj)
}
like := pub.LikeNew("https://localhost/myactivity", obj)
if like.Object == nil {
t.Errorf("Missing GetID in Like activity %#v", like.Object)
}
if like.Object != obj {
t.Errorf("Like.GetID different than what we initialized %#v %#v", add.Object, obj)
}
update := pub.UpdateNew("https://localhost/myactivity", obj)
if update.Object == nil {
t.Errorf("Missing GetID in Update activity %#v", update.Object)
}
if update.Object != obj {
t.Errorf("Update.GetID different than what we initialized %#v %#v", update.Object, obj)
}
undo := pub.UndoNew("https://localhost/myactivity", obj)
if undo.Object == nil {
t.Errorf("Missing GetID in Undo activity %#v", undo.Object)
}
if undo.Object != obj {
t.Errorf("Undo.GetID different than what we initialized %#v %#v", undo.Object, obj)
}
}
// S2S Server: Activities requiring the target property
// The distribution of the following activities require that they contain the target property:
// Add, Remove.
// Implementation always includes target property for each of the above supported activities.
func TestTargetPropertyExists(t *testing.T) {
desc := `
S2S Server: Activities requiring the target property
The distribution of the following activities require that they contain the target
property: Add, Remove.
Implementation always includes target property for each of the above supported activities.
`
t.Log(desc)
obj := pub.MentionNew("foo")
target := pub.MentionNew("bar")
add := pub.AddNew("https://localhost/myactivity", obj, target)
if add.Target == nil {
t.Errorf("Missing Target in Add activity %#v", add.Target)
}
if add.Target != target {
t.Errorf("Add.Target different than what we initialized %#v %#v", add.Target, target)
}
remove := pub.RemoveNew("https://localhost/myactivity", obj, target)
if remove.Target == nil {
t.Errorf("Missing Target in Remove activity %#v", remove.Target)
}
if remove.Target != target {
t.Errorf("Remove.Target different than what we initialized %#v %#v", remove.Target, target)
}
}
2018-04-07 10:34:57 +00:00
// S2S Server: Deduplication of recipient list
// Attempt to submit for delivery an activity that addresses the same actor
// (ie an actor with the same id) twice.
// (For example, the same actor could appear on both the to and cc fields,
// or the actor could be explicitly addressed
2018-04-07 10:34:57 +00:00
// in to but could also be a member of the addressed followers collection of the sending actor.)
// The server should deduplicate the list of inboxes to deliver to before delivering.
// The final recipient list is deduplicated before delivery.
func TestDeduplication(t *testing.T) {
desc := `
S2S Server: Deduplication of recipient list
Attempt to submit for delivery an activity that addresses the same actor
(ie an actor with the same id) twice.
The final recipient list is deduplicated before delivery.
`
t.Log(desc)
to := pub.PersonNew("bob")
o := pub.ObjectNew(pub.ArticleType)
cc := pub.PersonNew("alice")
o.ID = "something"
c := pub.CreateNew("create", o)
c.To.Append(to)
c.CC.Append(cc)
c.BCC.Append(cc)
c.Recipients()
checkDedup := func(list pub.ItemCollection, recIds *[]pub.ObjectID) error {
for _, rec := range list {
for _, id := range *recIds {
if rec.GetID() == id {
return fmt.Errorf("%T[%s] already stored in recipients list, Deduplication faild", rec, id)
}
}
*recIds = append(*recIds, rec.GetID())
}
return nil
}
var err error
recIds := make([]pub.ObjectID, 0)
err = checkDedup(c.To, &recIds)
if err != nil {
t.Error(err)
}
err = checkDedup(c.Bto, &recIds)
if err != nil {
t.Error(err)
}
err = checkDedup(c.CC, &recIds)
if err != nil {
t.Error(err)
}
err = checkDedup(c.BCC, &recIds)
if err != nil {
t.Error(err)
}
}
// S2S Server: Do-not-deliver considerations
// Server does not deliver to recipients which are the same as the actor of the
// Activity being notified about
func TestDoNotDeliverToActor(t *testing.T) {
desc := `
S2S Server: Do-not-deliver considerations
Server does not deliver to recipients which are the same as the actor of the
Activity being notified about
`
t.Log(desc)
p := pub.PersonNew("main actor")
to := pub.PersonNew("bob")
o := pub.ObjectNew(pub.ArticleType)
cc := pub.PersonNew("alice")
o.ID = "something"
c := pub.CreateNew("create", o)
c.Actor = *p
c.To.Append(p)
c.To.Append(to)
c.CC.Append(cc)
c.CC.Append(p)
c.BCC.Append(cc)
c.BCC.Append(p)
c.Recipients()
checkActor := func(list pub.ItemCollection, actor pub.Item) error {
for _, rec := range list {
if rec.GetID() == actor.GetID() {
return fmt.Errorf("%T[%s] Actor of activity should not be in the recipients list", rec, actor.GetID())
}
}
return nil
}
var err error
err = checkActor(c.To, c.Actor)
if err != nil {
t.Error(err)
}
err = checkActor(c.Bto, c.Actor)
if err != nil {
t.Error(err)
}
err = checkActor(c.CC, c.Actor)
if err != nil {
t.Error(err)
}
err = checkActor(c.BCC, c.Actor)
if err != nil {
t.Error(err)
}
}
// S2S Server: Do-not-deliver considerations
// Server does not deliver Block activities to their object.
func TestDoNotDeliverBlockToObject(t *testing.T) {
desc := `
S2S Server: Do-not-deliver considerations
Server does not deliver Block activities to their object.
`
t.Log(desc)
p := pub.PersonNew("blocked")
bob := pub.PersonNew("bob")
jane := pub.PersonNew("jane doe")
b := pub.BlockNew("block actor", p)
b.Actor = *bob
b.To.Append(jane)
b.To.Append(p)
b.To.Append(bob)
b.Recipients()
checkActor := func(list pub.ItemCollection, ob pub.Item) error {
for _, rec := range list {
if rec.GetID() == ob.GetID() {
return fmt.Errorf("%T[%s] of activity should not be in the recipients list", rec, ob.GetID())
}
}
return nil
}
var err error
err = checkActor(b.To, b.Object)
if err != nil {
t.Error(err)
}
err = checkActor(b.To, b.Actor)
if err != nil {
t.Error(err)
}
}
// S2S Sever: Support for sharedInbox
// Delivers to sharedInbox endpoints to reduce the number of receiving actors delivered
// to by identifying all followers which share the same sharedInbox who would otherwise be
// individual recipients and instead deliver objects to said sharedInbox.
func TestSharedInboxIdentifySharedInbox(t *testing.T) {
desc := `
S2S Sever: Support for sharedInbox
Delivers to sharedInbox endpoints to reduce the number of receiving actors delivered
to by identifying all followers which share the same sharedInbox who would otherwise be
individual recipients and instead deliver objects to said sharedInbox.
`
t.Skip(desc)
}
// S2S Sever: Support for sharedInbox
// Deliver to actor inboxes and collections otherwise addressed which do not have a sharedInbox.
func TestSharedInboxActorsWOSharedInbox(t *testing.T) {
desc := `
S2S Server: Do-not-deliver considerations
Server does not deliver Block activities to their object.
`
t.Skip(desc)
}
// S2S Server: Deduplicating received activities
// Server deduplicates activities received in inbox by comparing activity ids
func TestInboxDeduplication(t *testing.T) {
desc := `
S2S Server: Deduplicating received activities
Server deduplicates activities received in inbox by comparing activity ids
`
t.Skip(desc)
}
// S2S Server: Special forwarding mechanism
// ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
// Forwards incoming activities to the values of to, bto, cc, bcc, audience if and only if criteria are met.
func TestForwardingMechanismsToRecipients(t *testing.T) {
desc := `
S2S Server: Special forwarding mechanism
ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
Forwards incoming activities to the values of to, bto, cc, bcc, audience if and only if criteria are met.
`
t.Skip(desc)
}
// S2S Server: Special forwarding mechanism
// ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
// Recurse through to, bto, cc, bcc, audience object values to determine whether/where
// to forward according to criteria in 7.1.2
func TestForwardingMechanismsRecurseRecipients(t *testing.T) {
desc := `
S2S Server: Special forwarding mechanism
ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
Recurse through to, bto, cc, bcc, audience object values to determine whether/where
to forward according to criteria in 7.1.2
`
t.Skip(desc)
}
// S2S Server: Special forwarding mechanism
// ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
// Limits depth of this recursion.
func TestForwardingMechanismsLimitsRecursion(t *testing.T) {
desc := `
S2S Server: Special forwarding mechanism
ActivityPub contains a special mechanism for forwarding replies to avoid "ghost replies".
Limits depth of this recursion.
`
t.Skip(desc)
}
// S2S Server: Verification of content authorship
// Before accepting activities delivered to an actor's inbox some sort of verification
// should be performed. (For example, if the delivering actor has a public key on their profile,
// the request delivering the activity may be signed with HTTP Signatures.)
// Don't trust content received from a server other than the content's origin without some form of verification.
func TestVerification(t *testing.T) {
desc := `
S2S Server: Verification of content authorship
Before accepting activities delivered to an actor's inbox some sort of verification
should be performed. (For example, if the delivering actor has a public key on their profile,
the request delivering the activity may be signed with HTTP Signatures.)
Don't trust content received from a server other than the content's origin without some form of verification.
`
t.Skip(desc)
}
// S2S Server: Update activity
// On receiving an Update activity to an actor's inbox, the server:
// Takes care to be sure that the Update is authorized to modify its object
func TestUpdateIsAuthorized(t *testing.T) {
desc := `
S2S Server: Update activity
On receiving an Update activity to an actor's inbox, the server:
Takes care to be sure that the Update is authorized to modify its object
`
t.Skip(desc)
}
// S2S Server: Update activity
// On receiving an Update activity to an actor's inbox, the server:
// Completely replaces its copy of the activity with the newly received value
func TestUpdateReplacesActivity(t *testing.T) {
desc := `
S2S Server: Update activity
On receiving an Update activity to an actor's inbox, the server:
Completely replaces its copy of the activity with the newly received value
`
t.Skip(desc)
}
// S2S Server: Delete activity
// Delete removes object's representation, assuming object is owned by sending actor/server
func TestDeleteRemoves(t *testing.T) {
desc := `
S2S Server: Delete activity
Delete removes object's representation, assuming object is owned by sending actor/server
`
t.Skip(desc)
}
// S2S Server: Delete activity
// Replaces deleted object with a Tombstone object (optional)
func TestDeleteReplacesWithTombstone(t *testing.T) {
desc := `
S2S Server: Delete activity
Replaces deleted object with a Tombstone object (optional)
`
t.Skip(desc)
}
//S2S Server: Following, and handling accept/reject of follows
// Follow should add the activity's actor to the receiving actor's Followers Collection.
func TestFollowAddsToFollowers(t *testing.T) {
desc := `
S2S Server: Following, and handling accept/reject of follows
Follow should add the activity's actor to the receiving actor's Followers Collection.
`
t.Skip(desc)
}
//S2S Server: Following, and handling accept/reject of follows
// Generates either an Accept or Reject activity with Follow as object and deliver to actor of the Follow
func TestGeneratesAcceptOrReject(t *testing.T) {
desc := `
S2S Server: Following, and handling accept/reject of follows
Generates either an Accept or Reject activity with Follow as object and deliver to actor of the Follow
`
t.Skip(desc)
}
//S2S Server: Following, and handling accept/reject of follows
// If receiving an Accept in reply to a Follow activity, adds actor to receiver's Following Collection
func TestAddsFollowerIfAccept(t *testing.T) {
desc := `
S2S Server: Following, and handling accept/reject of follows
If receiving an Accept in reply to a Follow activity, adds actor to receiver's Following Collection
`
t.Skip(desc)
}
//S2S Server: Following, and handling accept/reject of follows
// If receiving a Reject in reply to a Follow activity, does not add actor to receiver's Following Collection
func TestDoesntAddFollowerIfReject(t *testing.T) {
desc := `
S2S Server: Following, and handling accept/reject of follows
If receiving a Reject in reply to a Follow activity, does not add actor to receiver's Following Collection
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Create makes record of the object existing
func TestCreateMakesRecord(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Create makes record of the object existing
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Add should add the activity's object to the Collection specified in the target property,
// unless not allowed per requirements
func TestAddObjectToTarget(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Add should add the activity's object to the Collection specified in the target property,
unless not allowed per requirements
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Remove should remove the object from the Collection specified in the target property,
// unless not allowed per requirements
func TestRemoveObjectFromTarget(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Remove should remove the object from the Collection specified in the target property,
unless not allowed per requirements
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Like increments the object's count of likes by adding the received activity to the likes
// collection if this collection is present
func TestLikeIncrementsLikes(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Like increments the object's count of likes by adding the received activity to the likes
collection if this collection is present
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Announce increments object's count of shares by adding the received activity to the
// 'shares' collection if this collection is present
func TestAnnounceIncrementsShares(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Announce increments object's count of shares by adding the received activity to the
'shares' collection if this collection is present
`
t.Skip(desc)
}
//S2S Server: Activity acceptance side-effects
// Test accepting the following activities to an actor's inbox and observe the side effects:
//
// Undo performs Undo of object in federated context
func TestUndoPerformsUndoOnObject(t *testing.T) {
desc := `
S2S Server: Activity acceptance side-effects
Test accepting the following activities to an actor's inbox and observe the side effects:
Undo performs Undo of object in federated context
`
t.Skip(desc)
}