// GoToSocial // Copyright (C) GoToSocial Authors admin@gotosocial.org // SPDX-License-Identifier: AGPL-3.0-or-later // // This program is free software: you can redistribute it and/or modify // it under the terms of the GNU Affero General Public License as published by // the Free Software Foundation, either version 3 of the License, or // (at your option) any later version. // // This program is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the // GNU Affero General Public License for more details. // // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see . package testrig import ( "bytes" "encoding/json" "encoding/xml" "io" "net/http" "strings" "sync" "github.com/superseriousbusiness/activity/pub" "github.com/superseriousbusiness/activity/streams" "github.com/superseriousbusiness/activity/streams/vocab" apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" "github.com/superseriousbusiness/gotosocial/internal/federation" "github.com/superseriousbusiness/gotosocial/internal/gtsmodel" "github.com/superseriousbusiness/gotosocial/internal/httpclient" "github.com/superseriousbusiness/gotosocial/internal/log" "github.com/superseriousbusiness/gotosocial/internal/state" "github.com/superseriousbusiness/gotosocial/internal/transport" ) const ( applicationJSON = "application/json" applicationActivityJSON = "application/activity+json" ) // NewTestTransportController returns a test transport controller with the given http client. // // Obviously for testing purposes you should not be making actual http calls to other servers. // To obviate this, use the function NewMockHTTPClient in this package to return a mock http // client that doesn't make any remote calls but just returns whatever you tell it to. // // Unlike the other test interfaces provided in this package, you'll probably want to call this function // PER TEST rather than per suite, so that the do function can be set on a test by test (or even more granular) // basis. func NewTestTransportController(state *state.State, client pub.HttpClient) transport.Controller { return transport.NewController(state, NewTestFederatingDB(state), &federation.Clock{}, client) } type MockHTTPClient struct { do func(req *http.Request) (*http.Response, error) TestRemoteStatuses map[string]vocab.ActivityStreamsNote TestRemotePeople map[string]vocab.ActivityStreamsPerson TestRemoteGroups map[string]vocab.ActivityStreamsGroup TestRemoteServices map[string]vocab.ActivityStreamsService TestRemoteAttachments map[string]RemoteAttachmentFile TestRemoteEmojis map[string]vocab.TootEmoji TestTombstones map[string]*gtsmodel.Tombstone SentMessages sync.Map } // NewMockHTTPClient returns a client that conforms to the pub.HttpClient interface. // // If do is nil, then a standard response set will be mocked out, which includes models stored in the // testrig, and webfinger responses as well. // // If do is not nil, then the given do function will always be used, which allows callers // to customize how the client is mocked. // // Note that you should never ever make ACTUAL http calls with this thing. func NewMockHTTPClient(do func(req *http.Request) (*http.Response, error), relativeMediaPath string, extraPeople ...vocab.ActivityStreamsPerson) *MockHTTPClient { mockHTTPClient := &MockHTTPClient{} if do != nil { mockHTTPClient.do = do return mockHTTPClient } mockHTTPClient.TestRemoteStatuses = NewTestFediStatuses() mockHTTPClient.TestRemotePeople = NewTestFediPeople() mockHTTPClient.TestRemoteGroups = NewTestFediGroups() mockHTTPClient.TestRemoteServices = NewTestFediServices() mockHTTPClient.TestRemoteAttachments = NewTestFediAttachments(relativeMediaPath) mockHTTPClient.TestRemoteEmojis = NewTestFediEmojis() mockHTTPClient.TestTombstones = NewTestTombstones() mockHTTPClient.do = func(req *http.Request) (*http.Response, error) { var ( responseCode = http.StatusNotFound responseBytes = []byte(`{"error":"404 not found"}`) responseContentType = applicationJSON responseContentLength = len(responseBytes) reqURLString = req.URL.String() ) if req.Method == http.MethodPost { b, err := io.ReadAll(req.Body) if err != nil { panic(err) } if sI, loaded := mockHTTPClient.SentMessages.LoadOrStore(reqURLString, [][]byte{b}); loaded { s, ok := sI.([][]byte) if !ok { panic("SentMessages entry wasn't [][]byte") } s = append(s, b) mockHTTPClient.SentMessages.Store(reqURLString, s) } responseCode = http.StatusOK responseBytes = []byte(`{"ok":"accepted"}`) responseContentType = applicationJSON responseContentLength = len(responseBytes) } else if strings.Contains(reqURLString, ".well-known/webfinger") { responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req) } else if strings.Contains(reqURLString, ".weird-webfinger-location/webfinger") { responseCode, responseBytes, responseContentType, responseContentLength = WebfingerResponse(req) } else if strings.Contains(reqURLString, ".well-known/host-meta") { responseCode, responseBytes, responseContentType, responseContentLength = HostMetaResponse(req) } else if note, ok := mockHTTPClient.TestRemoteStatuses[reqURLString]; ok { // the request is for a note that we have stored noteI, err := streams.Serialize(note) if err != nil { panic(err) } noteJSON, err := json.Marshal(noteI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = noteJSON responseContentType = applicationActivityJSON responseContentLength = len(noteJSON) } else if person, ok := mockHTTPClient.TestRemotePeople[reqURLString]; ok { // the request is for a person that we have stored personI, err := streams.Serialize(person) if err != nil { panic(err) } personJSON, err := json.Marshal(personI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = personJSON responseContentType = applicationActivityJSON responseContentLength = len(personJSON) } else if group, ok := mockHTTPClient.TestRemoteGroups[reqURLString]; ok { // the request is for a person that we have stored groupI, err := streams.Serialize(group) if err != nil { panic(err) } groupJSON, err := json.Marshal(groupI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = groupJSON responseContentType = applicationActivityJSON responseContentLength = len(groupJSON) } else if service, ok := mockHTTPClient.TestRemoteServices[reqURLString]; ok { serviceI, err := streams.Serialize(service) if err != nil { panic(err) } serviceJSON, err := json.Marshal(serviceI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = serviceJSON responseContentType = applicationActivityJSON responseContentLength = len(serviceJSON) } else if emoji, ok := mockHTTPClient.TestRemoteEmojis[reqURLString]; ok { emojiI, err := streams.Serialize(emoji) if err != nil { panic(err) } emojiJSON, err := json.Marshal(emojiI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = emojiJSON responseContentType = applicationActivityJSON responseContentLength = len(emojiJSON) } else if attachment, ok := mockHTTPClient.TestRemoteAttachments[reqURLString]; ok { responseCode = http.StatusOK responseBytes = attachment.Data responseContentType = attachment.ContentType responseContentLength = len(attachment.Data) } else if _, ok := mockHTTPClient.TestTombstones[reqURLString]; ok { responseCode = http.StatusGone responseBytes = []byte{} responseContentType = "text/html" responseContentLength = 0 } else { for _, person := range extraPeople { // For any extra people, check if the // request matches one of: // // - Public key URI // - ActivityPub URI/id // - Web URL. // // Since this is a test environment, // just assume all these values have // been properly set. if reqURLString == person.GetW3IDSecurityV1PublicKey().At(0).Get().GetJSONLDId().GetIRI().String() || reqURLString == person.GetJSONLDId().GetIRI().String() || reqURLString == person.GetActivityStreamsUrl().At(0).GetIRI().String() { personI, err := streams.Serialize(person) if err != nil { panic(err) } personJSON, err := json.Marshal(personI) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = personJSON responseContentType = applicationActivityJSON responseContentLength = len(personJSON) } } } log.Debugf(nil, "returning response %s", string(responseBytes)) reader := bytes.NewReader(responseBytes) readCloser := io.NopCloser(reader) return &http.Response{ Request: req, StatusCode: responseCode, Body: readCloser, ContentLength: int64(responseContentLength), Header: http.Header{"Content-Type": {responseContentType}}, }, nil } return mockHTTPClient } func (m *MockHTTPClient) Do(req *http.Request) (*http.Response, error) { return m.do(req) } func (m *MockHTTPClient) DoSigned(req *http.Request, sign httpclient.SignFunc) (*http.Response, error) { return m.do(req) } func HostMetaResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) { var hm *apimodel.HostMeta if req.URL.String() == "https://misconfigured-instance.com/.well-known/host-meta" { hm = &apimodel.HostMeta{ XMLNS: "http://docs.oasis-open.org/ns/xri/xrd-1.0", Link: []apimodel.Link{ { Rel: "lrdd", Type: "application/xrd+xml", Template: "https://misconfigured-instance.com/.weird-webfinger-location/webfinger?resource={uri}", }, }, } } if hm == nil { log.Debugf(nil, "hostmeta response not available for %s", req.URL) responseCode = http.StatusNotFound responseBytes = []byte(``) responseContentType = "application/xml" responseContentLength = len(responseBytes) return } hmXML, err := xml.Marshal(hm) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = hmXML responseContentType = "application/xml" responseContentLength = len(hmXML) return } func WebfingerResponse(req *http.Request) (responseCode int, responseBytes []byte, responseContentType string, responseContentLength int) { var wfr *apimodel.WellKnownResponse switch req.URL.String() { case "https://unknown-instance.com/.well-known/webfinger?resource=acct%3Asome_group%40unknown-instance.com": wfr = &apimodel.WellKnownResponse{ Subject: "acct:some_group@unknown-instance.com", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://unknown-instance.com/groups/some_group", }, }, } case "https://owncast.example.org/.well-known/webfinger?resource=acct%3Argh%40owncast.example.org": wfr = &apimodel.WellKnownResponse{ Subject: "acct:rgh@example.org", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://owncast.example.org/federation/user/rgh", }, }, } case "https://unknown-instance.com/.well-known/webfinger?resource=acct%3Abrand_new_person%40unknown-instance.com": wfr = &apimodel.WellKnownResponse{ Subject: "acct:brand_new_person@unknown-instance.com", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://unknown-instance.com/users/brand_new_person", }, }, } case "https://turnip.farm/.well-known/webfinger?resource=acct%3Aturniplover6969%40turnip.farm": wfr = &apimodel.WellKnownResponse{ Subject: "acct:turniplover6969@turnip.farm", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://turnip.farm/users/turniplover6969", }, }, } case "https://fossbros-anonymous.io/.well-known/webfinger?resource=acct%3Afoss_satan%40fossbros-anonymous.io": wfr = &apimodel.WellKnownResponse{ Subject: "acct:foss_satan@fossbros-anonymous.io", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "http://fossbros-anonymous.io/users/foss_satan", }, }, } case "https://example.org/.well-known/webfinger?resource=acct%3ASome_User%40example.org": wfr = &apimodel.WellKnownResponse{ Subject: "acct:Some_User@example.org", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://example.org/users/Some_User", }, }, } case "https://misconfigured-instance.com/.weird-webfinger-location/webfinger?resource=acct%3Asomeone%40misconfigured-instance.com": wfr = &apimodel.WellKnownResponse{ Subject: "acct:someone@misconfigured-instance.com", Links: []apimodel.Link{ { Rel: "self", Type: applicationActivityJSON, Href: "https://misconfigured-instance.com/users/someone", }, }, } } if wfr == nil { log.Debugf(nil, "webfinger response not available for %s", req.URL) responseCode = http.StatusNotFound responseBytes = []byte(`{"error":"not found"}`) responseContentType = applicationJSON responseContentLength = len(responseBytes) return } wfrJSON, err := json.Marshal(wfr) if err != nil { panic(err) } responseCode = http.StatusOK responseBytes = wfrJSON responseContentType = applicationJSON responseContentLength = len(wfrJSON) return }