Merge remote-tracking branch 'parent/main' into upstream-20241231

This commit is contained in:
KMY 2024-12-31 11:56:36 +09:00
commit 3c77d4e8e4
268 changed files with 4213 additions and 3029 deletions

View file

@ -137,7 +137,7 @@ RSpec.describe 'Media' do
end
context 'with image/gif', :attachment_processing do
let(:params) { { file: fixture_file_upload('600x400.gif', 'image/gif') } }
let(:params) { { file: fixture_file_upload('attachment.gif', 'image/gif') } }
it_behaves_like 'a successful media upload', 'image'
end

View file

@ -0,0 +1,16 @@
# frozen_string_literal: true
require 'rails_helper'
RSpec.describe 'Filters' do
describe 'GET /filters' do
context 'with signed out user' do
it 'redirects to sign in page' do
get filters_path
expect(response)
.to redirect_to(new_user_session_path)
end
end
end
end

View file

@ -0,0 +1,218 @@
# frozen_string_literal: true
require 'rails_helper'
RSpec.describe 'Status Activity' do
describe 'GET /users/:account_username/statuses/:id/activity' do
let(:account) { Fabricate(:account) }
let(:status) { Fabricate(:status, account: account) }
context 'when signed out' do
subject { get activity_account_status_path(account.username, status) }
context 'when account is permanently suspended' do
before do
account.suspend!
account.deletion_request.destroy
end
it 'returns http gone' do
subject
expect(response)
.to have_http_status(410)
end
end
context 'when account is temporarily suspended' do
before { account.suspend! }
it 'returns http forbidden' do
subject
expect(response)
.to have_http_status(403)
end
end
context 'when status is public' do
before { status.update(visibility: :public) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(:success)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when status is private' do
before { status.update(visibility: :private) }
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
context 'when status is direct' do
before { status.update(visibility: :direct) }
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
end
context 'when signed in' do
subject { get activity_account_status_path(account.username, status) }
let(:user) { Fabricate(:user) }
before { sign_in(user) }
context 'when status is public' do
before { status.update(visibility: :public) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(:success)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when status is private' do
before { status.update(visibility: :private) }
context 'when user is authorized to see it' do
before { user.account.follow!(account) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(200)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when user is not authorized to see it' do
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
end
context 'when status is direct' do
before { status.update(visibility: :direct) }
context 'when user is authorized to see it' do
before { Fabricate(:mention, account: user.account, status: status) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(200)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when user is not authorized to see it' do
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
end
end
context 'with signature' do
subject { get activity_account_status_path(account.username, status), headers: nil, sign_with: remote_account }
let(:remote_account) { Fabricate(:account, domain: 'example.com') }
context 'when status is public' do
before { status.update(visibility: :public) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(:success)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when status is private' do
before { status.update(visibility: :private) }
context 'when user is authorized to see it' do
before { remote_account.follow!(account) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(200)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when user is not authorized to see it' do
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
end
context 'when status is direct' do
before { status.update(visibility: :direct) }
context 'when user is authorized to see it' do
before { Fabricate(:mention, account: remote_account, status: status) }
it 'returns http success' do
subject
expect(response)
.to have_http_status(200)
expect(response.content_type)
.to start_with('application/activity+json')
end
end
context 'when user is not authorized to see it' do
it 'returns http not_found' do
subject
expect(response)
.to have_http_status(404)
end
end
end
end
end
end