@atproto/pds 0.4.77 → 0.4.79
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +18 -0
- package/dist/account-manager/helpers/auth.d.ts +1 -1
- package/dist/account-manager/helpers/auth.d.ts.map +1 -1
- package/dist/account-manager/helpers/auth.js +3 -1
- package/dist/account-manager/helpers/auth.js.map +1 -1
- package/dist/account-manager/index.d.ts +2 -1
- package/dist/account-manager/index.d.ts.map +1 -1
- package/dist/account-manager/index.js +13 -8
- package/dist/account-manager/index.js.map +1 -1
- package/dist/api/app/bsky/actor/getPreferences.d.ts.map +1 -1
- package/dist/api/app/bsky/actor/getPreferences.js +4 -1
- package/dist/api/app/bsky/actor/getPreferences.js.map +1 -1
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.d.ts.map +1 -1
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.js +2 -1
- package/dist/api/com/atproto/identity/requestPlcOperationSignature.js.map +1 -1
- package/dist/api/com/atproto/index.d.ts.map +1 -1
- package/dist/api/com/atproto/index.js +2 -0
- package/dist/api/com/atproto/index.js.map +1 -1
- package/dist/api/com/atproto/moderation/createReport.d.ts +4 -0
- package/dist/api/com/atproto/moderation/createReport.d.ts.map +1 -0
- package/dist/api/com/atproto/moderation/createReport.js +28 -0
- package/dist/api/com/atproto/moderation/createReport.js.map +1 -0
- package/dist/api/com/atproto/moderation/index.d.ts +4 -0
- package/dist/api/com/atproto/moderation/index.d.ts.map +1 -0
- package/dist/api/com/atproto/moderation/index.js +11 -0
- package/dist/api/com/atproto/moderation/index.js.map +1 -0
- package/dist/api/com/atproto/server/createSession.d.ts.map +1 -1
- package/dist/api/com/atproto/server/createSession.js +6 -2
- package/dist/api/com/atproto/server/createSession.js.map +1 -1
- package/dist/api/com/atproto/server/deactivateAccount.d.ts.map +1 -1
- package/dist/api/com/atproto/server/deactivateAccount.js +2 -1
- package/dist/api/com/atproto/server/deactivateAccount.js.map +1 -1
- package/dist/api/com/atproto/server/getServiceAuth.d.ts.map +1 -1
- package/dist/api/com/atproto/server/getServiceAuth.js +10 -1
- package/dist/api/com/atproto/server/getServiceAuth.js.map +1 -1
- package/dist/api/com/atproto/sync/deprecated/getCheckout.js +1 -1
- package/dist/api/com/atproto/sync/deprecated/getCheckout.js.map +1 -1
- package/dist/api/com/atproto/sync/deprecated/getHead.js +1 -1
- package/dist/api/com/atproto/sync/deprecated/getHead.js.map +1 -1
- package/dist/api/com/atproto/sync/getBlob.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/getBlob.js +4 -1
- package/dist/api/com/atproto/sync/getBlob.js.map +1 -1
- package/dist/api/com/atproto/sync/getBlocks.js +1 -1
- package/dist/api/com/atproto/sync/getBlocks.js.map +1 -1
- package/dist/api/com/atproto/sync/getLatestCommit.js +1 -1
- package/dist/api/com/atproto/sync/getLatestCommit.js.map +1 -1
- package/dist/api/com/atproto/sync/getRecord.js +1 -1
- package/dist/api/com/atproto/sync/getRecord.js.map +1 -1
- package/dist/api/com/atproto/sync/getRepo.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/getRepo.js +4 -1
- package/dist/api/com/atproto/sync/getRepo.js.map +1 -1
- package/dist/api/com/atproto/sync/listBlobs.d.ts.map +1 -1
- package/dist/api/com/atproto/sync/listBlobs.js +4 -1
- package/dist/api/com/atproto/sync/listBlobs.js.map +1 -1
- package/dist/auth-verifier.d.ts +3 -2
- package/dist/auth-verifier.d.ts.map +1 -1
- package/dist/auth-verifier.js +3 -2
- package/dist/auth-verifier.js.map +1 -1
- package/dist/basic-routes.d.ts.map +1 -1
- package/dist/basic-routes.js +20 -1
- package/dist/basic-routes.js.map +1 -1
- package/dist/lexicon/index.d.ts +2 -2
- package/dist/lexicon/index.d.ts.map +1 -1
- package/dist/lexicon/lexicons.d.ts +36 -0
- package/dist/lexicon/lexicons.d.ts.map +1 -1
- package/dist/lexicon/lexicons.js +18 -0
- package/dist/lexicon/lexicons.js.map +1 -1
- package/dist/lexicon/types/com/atproto/server/createSession.d.ts +2 -0
- package/dist/lexicon/types/com/atproto/server/createSession.d.ts.map +1 -1
- package/dist/lexicon/types/tools/ozone/moderation/queryStatuses.d.ts +6 -0
- package/dist/lexicon/types/tools/ozone/moderation/queryStatuses.d.ts.map +1 -1
- package/dist/pipethrough.d.ts +4 -0
- package/dist/pipethrough.d.ts.map +1 -1
- package/dist/pipethrough.js +1 -0
- package/dist/pipethrough.js.map +1 -1
- package/package.json +5 -5
- package/src/account-manager/helpers/auth.ts +5 -1
- package/src/account-manager/index.ts +14 -11
- package/src/api/app/bsky/actor/getPreferences.ts +4 -1
- package/src/api/com/atproto/identity/requestPlcOperationSignature.ts +2 -1
- package/src/api/com/atproto/index.ts +2 -0
- package/src/api/com/atproto/moderation/createReport.ts +36 -0
- package/src/api/com/atproto/moderation/index.ts +7 -0
- package/src/api/com/atproto/server/createSession.ts +11 -2
- package/src/api/com/atproto/server/deactivateAccount.ts +2 -1
- package/src/api/com/atproto/server/getServiceAuth.ts +14 -1
- package/src/api/com/atproto/sync/deprecated/getCheckout.ts +1 -1
- package/src/api/com/atproto/sync/deprecated/getHead.ts +1 -1
- package/src/api/com/atproto/sync/getBlob.ts +4 -1
- package/src/api/com/atproto/sync/getBlocks.ts +1 -1
- package/src/api/com/atproto/sync/getLatestCommit.ts +1 -1
- package/src/api/com/atproto/sync/getRecord.ts +1 -1
- package/src/api/com/atproto/sync/getRepo.ts +4 -1
- package/src/api/com/atproto/sync/listBlobs.ts +4 -1
- package/src/auth-verifier.ts +13 -10
- package/src/basic-routes.ts +20 -3
- package/src/lexicon/index.ts +2 -2
- package/src/lexicon/lexicons.ts +22 -0
- package/src/lexicon/types/com/atproto/server/createSession.ts +2 -0
- package/src/lexicon/types/tools/ozone/moderation/queryStatuses.ts +6 -0
- package/src/pipethrough.ts +1 -2
- package/tests/__snapshots__/takedown-appeal.test.ts.snap +30 -0
- package/tests/account-deactivation.test.ts +1 -1
- package/tests/account-migration.test.ts +3 -3
- package/tests/auth.test.ts +10 -11
- package/tests/blob-deletes.test.ts +8 -8
- package/tests/crud.test.ts +4 -12
- package/tests/file-uploads.test.ts +5 -11
- package/tests/moderation.test.ts +1 -1
- package/tests/proxied/__snapshots__/admin.test.ts.snap +32 -7
- package/tests/proxied/__snapshots__/feedgen.test.ts.snap +4 -4
- package/tests/proxied/__snapshots__/views.test.ts.snap +32 -32
- package/tests/proxied/read-after-write.test.ts +2 -2
- package/tests/seeds/basic.ts +3 -3
- package/tests/takedown-appeal.test.ts +157 -0
- package/tsconfig.build.tsbuildinfo +1 -1
- package/tsconfig.tests.tsbuildinfo +1 -1
package/src/lexicon/lexicons.ts
CHANGED
@@ -2412,6 +2412,11 @@ export const schemaDict = {
|
|
2412
2412
|
authFactorToken: {
|
2413
2413
|
type: 'string',
|
2414
2414
|
},
|
2415
|
+
allowTakendown: {
|
2416
|
+
type: 'boolean',
|
2417
|
+
description:
|
2418
|
+
'When true, instead of throwing error for takendown accounts, a valid response with a narrow scoped token will be returned',
|
2419
|
+
},
|
2415
2420
|
},
|
2416
2421
|
},
|
2417
2422
|
},
|
@@ -12377,6 +12382,20 @@ export const schemaDict = {
|
|
12377
12382
|
parameters: {
|
12378
12383
|
type: 'params',
|
12379
12384
|
properties: {
|
12385
|
+
queueCount: {
|
12386
|
+
type: 'integer',
|
12387
|
+
description:
|
12388
|
+
'Number of queues being used by moderators. Subjects will be split among all queues.',
|
12389
|
+
},
|
12390
|
+
queueIndex: {
|
12391
|
+
type: 'integer',
|
12392
|
+
description:
|
12393
|
+
'Index of the queue to fetch subjects from. Works only when queueCount value is specified.',
|
12394
|
+
},
|
12395
|
+
queueSeed: {
|
12396
|
+
type: 'string',
|
12397
|
+
description: 'A seeder to shuffle/balance the queue items.',
|
12398
|
+
},
|
12380
12399
|
includeAllUserRecords: {
|
12381
12400
|
type: 'boolean',
|
12382
12401
|
description:
|
@@ -12498,6 +12517,9 @@ export const schemaDict = {
|
|
12498
12517
|
type: 'array',
|
12499
12518
|
items: {
|
12500
12519
|
type: 'string',
|
12520
|
+
maxLength: 25,
|
12521
|
+
description:
|
12522
|
+
'Items in this array are applied with OR filters. To apply AND filter, put all tags in the same string and separate using && characters',
|
12501
12523
|
},
|
12502
12524
|
},
|
12503
12525
|
excludeTags: {
|
@@ -15,6 +15,8 @@ export interface InputSchema {
|
|
15
15
|
identifier: string
|
16
16
|
password: string
|
17
17
|
authFactorToken?: string
|
18
|
+
/** When true, instead of throwing error for takendown accounts, a valid response with a narrow scoped token will be returned */
|
19
|
+
allowTakendown?: boolean
|
18
20
|
[k: string]: unknown
|
19
21
|
}
|
20
22
|
|
@@ -10,6 +10,12 @@ import { HandlerAuth, HandlerPipeThrough } from '@atproto/xrpc-server'
|
|
10
10
|
import * as ToolsOzoneModerationDefs from './defs'
|
11
11
|
|
12
12
|
export interface QueryParams {
|
13
|
+
/** Number of queues being used by moderators. Subjects will be split among all queues. */
|
14
|
+
queueCount?: number
|
15
|
+
/** Index of the queue to fetch subjects from. Works only when queueCount value is specified. */
|
16
|
+
queueIndex?: number
|
17
|
+
/** A seeder to shuffle/balance the queue items. */
|
18
|
+
queueSeed?: string
|
13
19
|
/** All subjects, or subjects from given 'collections' param, belonging to the account specified in the 'subject' param will be returned. */
|
14
20
|
includeAllUserRecords?: boolean
|
15
21
|
/** The subject to get the status for. */
|
package/src/pipethrough.ts
CHANGED
@@ -28,7 +28,6 @@ export const proxyHandler = (ctx: AppContext): CatchallHandler => {
|
|
28
28
|
const accessStandard = ctx.authVerifier.accessStandard()
|
29
29
|
return async (req, res, next) => {
|
30
30
|
// /!\ Hot path
|
31
|
-
|
32
31
|
try {
|
33
32
|
if (
|
34
33
|
req.method !== 'GET' &&
|
@@ -207,7 +206,7 @@ export async function pipethrough(
|
|
207
206
|
// Request setup/formatting
|
208
207
|
// -------------------
|
209
208
|
|
210
|
-
async function parseProxyInfo(
|
209
|
+
export async function parseProxyInfo(
|
211
210
|
ctx: AppContext,
|
212
211
|
req: express.Request,
|
213
212
|
lxm: string,
|
@@ -0,0 +1,30 @@
|
|
1
|
+
// Jest Snapshot v1, https://goo.gl/fbAQLP
|
2
|
+
|
3
|
+
exports[`appeal account takedown actor takedown allows appeal request. 1`] = `
|
4
|
+
Object {
|
5
|
+
"appealed": true,
|
6
|
+
"createdAt": "1970-01-01T00:00:00.000Z",
|
7
|
+
"hosting": Object {
|
8
|
+
"$type": "tools.ozone.moderation.defs#accountHosting",
|
9
|
+
"status": "unknown",
|
10
|
+
},
|
11
|
+
"id": 1,
|
12
|
+
"lastAppealedAt": "1970-01-01T00:00:00.000Z",
|
13
|
+
"lastReportedAt": "1970-01-01T00:00:00.000Z",
|
14
|
+
"lastReviewedAt": "1970-01-01T00:00:00.000Z",
|
15
|
+
"lastReviewedBy": "user(0)",
|
16
|
+
"reviewState": "tools.ozone.moderation.defs#reviewEscalated",
|
17
|
+
"subject": Object {
|
18
|
+
"$type": "com.atproto.admin.defs#repoRef",
|
19
|
+
"did": "user(1)",
|
20
|
+
},
|
21
|
+
"subjectBlobCids": Array [],
|
22
|
+
"subjectRepoHandle": "jeff.test",
|
23
|
+
"tags": Array [
|
24
|
+
"lang:und",
|
25
|
+
"report:appeal",
|
26
|
+
],
|
27
|
+
"takendown": true,
|
28
|
+
"updatedAt": "1970-01-01T00:00:00.000Z",
|
29
|
+
}
|
30
|
+
`;
|
@@ -44,17 +44,17 @@ describe('account migration', () => {
|
|
44
44
|
}
|
45
45
|
const img1 = await sc.uploadFile(
|
46
46
|
alice,
|
47
|
-
'../dev-env/
|
47
|
+
'../dev-env/assets/at.png',
|
48
48
|
'image/png',
|
49
49
|
)
|
50
50
|
const img2 = await sc.uploadFile(
|
51
51
|
alice,
|
52
|
-
'../dev-env/
|
52
|
+
'../dev-env/assets/key-alt.jpg',
|
53
53
|
'image/jpeg',
|
54
54
|
)
|
55
55
|
const img3 = await sc.uploadFile(
|
56
56
|
alice,
|
57
|
-
'../dev-env/
|
57
|
+
'../dev-env/assets/key-landscape-small.jpg',
|
58
58
|
'image/jpeg',
|
59
59
|
)
|
60
60
|
|
package/tests/auth.test.ts
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
import * as jose from 'jose'
|
2
2
|
import { AtpAgent } from '@atproto/api'
|
3
|
-
import {
|
3
|
+
import { SeedClient, TestNetworkNoAppView } from '@atproto/dev-env'
|
4
4
|
import { createRefreshToken } from '../src/account-manager/helpers/auth'
|
5
5
|
|
6
6
|
describe('auth', () => {
|
@@ -19,11 +19,11 @@ describe('auth', () => {
|
|
19
19
|
})
|
20
20
|
|
21
21
|
const createAccount = async (info) => {
|
22
|
-
const { data } = await agent.
|
22
|
+
const { data } = await agent.com.atproto.server.createAccount(info)
|
23
23
|
return data
|
24
24
|
}
|
25
25
|
const getSession = async (jwt) => {
|
26
|
-
const { data } = await agent.
|
26
|
+
const { data } = await agent.com.atproto.server.getSession(
|
27
27
|
{},
|
28
28
|
{
|
29
29
|
headers: SeedClient.getHeaders(jwt),
|
@@ -32,19 +32,18 @@ describe('auth', () => {
|
|
32
32
|
return data
|
33
33
|
}
|
34
34
|
const createSession = async (info) => {
|
35
|
-
const { data } = await agent.
|
35
|
+
const { data } = await agent.com.atproto.server.createSession(info)
|
36
36
|
return data
|
37
37
|
}
|
38
38
|
const deleteSession = async (jwt) => {
|
39
|
-
await agent.
|
39
|
+
await agent.com.atproto.server.deleteSession(undefined, {
|
40
40
|
headers: SeedClient.getHeaders(jwt),
|
41
41
|
})
|
42
42
|
}
|
43
43
|
const refreshSession = async (jwt: string) => {
|
44
|
-
const { data } = await agent.
|
45
|
-
|
46
|
-
|
47
|
-
)
|
44
|
+
const { data } = await agent.com.atproto.server.refreshSession(undefined, {
|
45
|
+
headers: SeedClient.getHeaders(jwt),
|
46
|
+
})
|
48
47
|
return data
|
49
48
|
}
|
50
49
|
|
@@ -269,7 +268,7 @@ describe('auth', () => {
|
|
269
268
|
email: 'iris@test.com',
|
270
269
|
password: 'password',
|
271
270
|
})
|
272
|
-
await agent.
|
271
|
+
await agent.com.atproto.admin.updateSubjectStatus(
|
273
272
|
{
|
274
273
|
subject: {
|
275
274
|
$type: 'com.atproto.admin.defs#repoRef',
|
@@ -295,7 +294,7 @@ describe('auth', () => {
|
|
295
294
|
email: 'jared@test.com',
|
296
295
|
password: 'password',
|
297
296
|
})
|
298
|
-
await agent.
|
297
|
+
await agent.com.atproto.admin.updateSubjectStatus(
|
299
298
|
{
|
300
299
|
subject: {
|
301
300
|
$type: 'com.atproto.admin.defs#repoRef',
|
@@ -48,7 +48,7 @@ describe('blob deletes', () => {
|
|
48
48
|
it('deletes blob when record is deleted', async () => {
|
49
49
|
const img = await sc.uploadFile(
|
50
50
|
alice,
|
51
|
-
'../dev-env/
|
51
|
+
'../dev-env/assets/key-portrait-small.jpg',
|
52
52
|
'image/jpeg',
|
53
53
|
)
|
54
54
|
const post = await sc.post(alice, 'test', undefined, [img])
|
@@ -65,12 +65,12 @@ describe('blob deletes', () => {
|
|
65
65
|
it('deletes blob when blob-ref in record is updated', async () => {
|
66
66
|
const img = await sc.uploadFile(
|
67
67
|
alice,
|
68
|
-
'../dev-env/
|
68
|
+
'../dev-env/assets/key-portrait-small.jpg',
|
69
69
|
'image/jpeg',
|
70
70
|
)
|
71
71
|
const img2 = await sc.uploadFile(
|
72
72
|
alice,
|
73
|
-
'../dev-env/
|
73
|
+
'../dev-env/assets/key-landscape-small.jpg',
|
74
74
|
'image/jpeg',
|
75
75
|
)
|
76
76
|
await updateProfile(sc, alice, img.image, img.image)
|
@@ -94,12 +94,12 @@ describe('blob deletes', () => {
|
|
94
94
|
it('does not delete blob when blob-ref in record is not updated', async () => {
|
95
95
|
const img = await sc.uploadFile(
|
96
96
|
alice,
|
97
|
-
'../dev-env/
|
97
|
+
'../dev-env/assets/key-portrait-small.jpg',
|
98
98
|
'image/jpeg',
|
99
99
|
)
|
100
100
|
const img2 = await sc.uploadFile(
|
101
101
|
alice,
|
102
|
-
'../dev-env/
|
102
|
+
'../dev-env/assets/key-landscape-small.jpg',
|
103
103
|
'image/jpeg',
|
104
104
|
)
|
105
105
|
await updateProfile(sc, alice, img.image, img.image)
|
@@ -120,7 +120,7 @@ describe('blob deletes', () => {
|
|
120
120
|
it('does not delete blob when blob is reused by another record in same commit', async () => {
|
121
121
|
const img = await sc.uploadFile(
|
122
122
|
alice,
|
123
|
-
'../dev-env/
|
123
|
+
'../dev-env/assets/key-portrait-small.jpg',
|
124
124
|
'image/jpeg',
|
125
125
|
)
|
126
126
|
const post = await sc.post(alice, 'post', undefined, [img])
|
@@ -167,12 +167,12 @@ describe('blob deletes', () => {
|
|
167
167
|
it('does delete blob from user blob store if another user is using it', async () => {
|
168
168
|
const imgAlice = await sc.uploadFile(
|
169
169
|
alice,
|
170
|
-
'../dev-env/
|
170
|
+
'../dev-env/assets/key-landscape-small.jpg',
|
171
171
|
'image/jpeg',
|
172
172
|
)
|
173
173
|
const imgBob = await sc.uploadFile(
|
174
174
|
bob,
|
175
|
-
'../dev-env/
|
175
|
+
'../dev-env/assets/key-landscape-small.jpg',
|
176
176
|
'image/jpeg',
|
177
177
|
)
|
178
178
|
const postAlice = await sc.post(alice, 'post', undefined, [imgAlice])
|
package/tests/crud.test.ts
CHANGED
@@ -156,9 +156,7 @@ describe('crud operations', () => {
|
|
156
156
|
})
|
157
157
|
|
158
158
|
it('attaches images to a post', async () => {
|
159
|
-
const file = await fs.readFile(
|
160
|
-
'../dev-env/src/seed/img/key-landscape-small.jpg',
|
161
|
-
)
|
159
|
+
const file = await fs.readFile('../dev-env/assets/key-landscape-small.jpg')
|
162
160
|
const uploadedRes = await aliceAgent.api.com.atproto.repo.uploadBlob(file, {
|
163
161
|
encoding: 'image/jpeg',
|
164
162
|
})
|
@@ -516,9 +514,7 @@ describe('crud operations', () => {
|
|
516
514
|
// @TODO remove after migrating legacy blobs
|
517
515
|
it('updates a legacy blob ref when updating profile', async () => {
|
518
516
|
const { repo } = bobAgent.api.com.atproto
|
519
|
-
const file = await fs.readFile(
|
520
|
-
'../dev-env/src/seed/img/key-portrait-small.jpg',
|
521
|
-
)
|
517
|
+
const file = await fs.readFile('../dev-env/assets/key-portrait-small.jpg')
|
522
518
|
const uploadedRes = await repo.uploadBlob(file, {
|
523
519
|
encoding: 'image/jpeg',
|
524
520
|
})
|
@@ -812,9 +808,7 @@ describe('crud operations', () => {
|
|
812
808
|
})
|
813
809
|
|
814
810
|
it('correctly associates images with unknown record types', async () => {
|
815
|
-
const file = await fs.readFile(
|
816
|
-
'../dev-env/src/seed/img/key-portrait-small.jpg',
|
817
|
-
)
|
811
|
+
const file = await fs.readFile('../dev-env/assets/key-portrait-small.jpg')
|
818
812
|
const uploadedRes = await aliceAgent.api.com.atproto.repo.uploadBlob(
|
819
813
|
file,
|
820
814
|
{
|
@@ -867,9 +861,7 @@ describe('crud operations', () => {
|
|
867
861
|
})
|
868
862
|
|
869
863
|
it('enforces blob ref format even when unvalidated', async () => {
|
870
|
-
const file = await fs.readFile(
|
871
|
-
'../dev-env/src/seed/img/key-portrait-small.jpg',
|
872
|
-
)
|
864
|
+
const file = await fs.readFile('../dev-env/assets/key-portrait-small.jpg')
|
873
865
|
const uploadedRes = await aliceAgent.api.com.atproto.repo.uploadBlob(
|
874
866
|
file,
|
875
867
|
{
|
@@ -72,9 +72,7 @@ describe('file uploads', () => {
|
|
72
72
|
})
|
73
73
|
|
74
74
|
it('uploads files', async () => {
|
75
|
-
smallFile = await fs.readFile(
|
76
|
-
'../dev-env/src/seed/img/key-portrait-small.jpg',
|
77
|
-
)
|
75
|
+
smallFile = await fs.readFile('../dev-env/assets/key-portrait-small.jpg')
|
78
76
|
const res = await agent.api.com.atproto.repo.uploadBlob(smallFile, {
|
79
77
|
headers: sc.getHeaders(alice),
|
80
78
|
encoding: 'image/jpeg',
|
@@ -130,7 +128,7 @@ describe('file uploads', () => {
|
|
130
128
|
let largeFile: Uint8Array
|
131
129
|
|
132
130
|
it('does not allow referencing a file that is outside blob constraints', async () => {
|
133
|
-
largeFile = await fs.readFile('../dev-env/
|
131
|
+
largeFile = await fs.readFile('../dev-env/assets/hd-key.jpg')
|
134
132
|
const res = await agent.api.com.atproto.repo.uploadBlob(largeFile, {
|
135
133
|
headers: sc.getHeaders(alice),
|
136
134
|
encoding: 'image/jpeg',
|
@@ -159,9 +157,7 @@ describe('file uploads', () => {
|
|
159
157
|
})
|
160
158
|
|
161
159
|
it('permits duplicate uploads of the same file', async () => {
|
162
|
-
const file = await fs.readFile(
|
163
|
-
'../dev-env/src/seed/img/key-landscape-small.jpg',
|
164
|
-
)
|
160
|
+
const file = await fs.readFile('../dev-env/assets/key-landscape-small.jpg')
|
165
161
|
const { data: uploadA } = await agent.api.com.atproto.repo.uploadBlob(
|
166
162
|
file,
|
167
163
|
{
|
@@ -225,9 +221,7 @@ describe('file uploads', () => {
|
|
225
221
|
})
|
226
222
|
|
227
223
|
it('corrects a bad mimetype', async () => {
|
228
|
-
const file = await fs.readFile(
|
229
|
-
'../dev-env/src/seed/img/key-landscape-large.jpg',
|
230
|
-
)
|
224
|
+
const file = await fs.readFile('../dev-env/assets/key-landscape-large.jpg')
|
231
225
|
const res = await agent.api.com.atproto.repo.uploadBlob(file, {
|
232
226
|
headers: sc.getHeaders(alice),
|
233
227
|
encoding: 'video/mp4',
|
@@ -245,7 +239,7 @@ describe('file uploads', () => {
|
|
245
239
|
})
|
246
240
|
|
247
241
|
it('handles pngs', async () => {
|
248
|
-
const file = await fs.readFile('../dev-env/
|
242
|
+
const file = await fs.readFile('../dev-env/assets/at.png')
|
249
243
|
const res = await agent.api.com.atproto.repo.uploadBlob(file, {
|
250
244
|
headers: sc.getHeaders(alice),
|
251
245
|
encoding: 'image/png',
|
package/tests/moderation.test.ts
CHANGED
@@ -177,7 +177,7 @@ describe('moderation', () => {
|
|
177
177
|
it('prevents blob from being reuploaded', async () => {
|
178
178
|
const attempt = sc.uploadFile(
|
179
179
|
sc.dids.carol,
|
180
|
-
'../dev-env/
|
180
|
+
'../dev-env/assets/key-alt.jpg',
|
181
181
|
'image/jpeg',
|
182
182
|
)
|
183
183
|
await expect(attempt).rejects.toThrow(
|
@@ -35,7 +35,7 @@ Array [
|
|
35
35
|
"event": Object {
|
36
36
|
"$type": "tools.ozone.moderation.defs#modEventAcknowledge",
|
37
37
|
},
|
38
|
-
"id":
|
38
|
+
"id": 7,
|
39
39
|
"subject": Object {
|
40
40
|
"$type": "com.atproto.admin.defs#repoRef",
|
41
41
|
"did": "user(0)",
|
@@ -46,6 +46,25 @@ Array [
|
|
46
46
|
Object {
|
47
47
|
"createdAt": "1970-01-01T00:00:00.000Z",
|
48
48
|
"createdBy": "user(2)",
|
49
|
+
"creatorHandle": "mod-authority.test",
|
50
|
+
"event": Object {
|
51
|
+
"$type": "tools.ozone.moderation.defs#modEventTag",
|
52
|
+
"add": Array [
|
53
|
+
"report:other",
|
54
|
+
],
|
55
|
+
"remove": Array [],
|
56
|
+
},
|
57
|
+
"id": 4,
|
58
|
+
"subject": Object {
|
59
|
+
"$type": "com.atproto.admin.defs#repoRef",
|
60
|
+
"did": "user(0)",
|
61
|
+
},
|
62
|
+
"subjectBlobCids": Array [],
|
63
|
+
"subjectHandle": "bob.test",
|
64
|
+
},
|
65
|
+
Object {
|
66
|
+
"createdAt": "1970-01-01T00:00:00.000Z",
|
67
|
+
"createdBy": "user(3)",
|
49
68
|
"creatorHandle": "carol.test",
|
50
69
|
"event": Object {
|
51
70
|
"$type": "tools.ozone.moderation.defs#modEventReport",
|
@@ -63,11 +82,12 @@ Array [
|
|
63
82
|
},
|
64
83
|
Object {
|
65
84
|
"createdAt": "1970-01-01T00:00:00.000Z",
|
66
|
-
"createdBy": "user(
|
85
|
+
"createdBy": "user(2)",
|
67
86
|
"creatorHandle": "mod-authority.test",
|
68
87
|
"event": Object {
|
69
88
|
"$type": "tools.ozone.moderation.defs#modEventTag",
|
70
89
|
"add": Array [
|
90
|
+
"report:spam",
|
71
91
|
"lang:en",
|
72
92
|
"lang:i",
|
73
93
|
],
|
@@ -108,6 +128,7 @@ Object {
|
|
108
128
|
"event": Object {
|
109
129
|
"$type": "tools.ozone.moderation.defs#modEventTag",
|
110
130
|
"add": Array [
|
131
|
+
"report:spam",
|
111
132
|
"lang:en",
|
112
133
|
"lang:i",
|
113
134
|
],
|
@@ -138,8 +159,10 @@ Object {
|
|
138
159
|
"subjectBlobCids": Array [],
|
139
160
|
"subjectRepoHandle": "bob.test",
|
140
161
|
"tags": Array [
|
162
|
+
"report:spam",
|
141
163
|
"lang:en",
|
142
164
|
"lang:i",
|
165
|
+
"report:other",
|
143
166
|
],
|
144
167
|
"takendown": false,
|
145
168
|
"updatedAt": "1970-01-01T00:00:00.000Z",
|
@@ -180,7 +203,7 @@ Array [
|
|
180
203
|
],
|
181
204
|
"remove": Array [],
|
182
205
|
},
|
183
|
-
"id":
|
206
|
+
"id": 6,
|
184
207
|
"subject": Object {
|
185
208
|
"$type": "com.atproto.repo.strongRef",
|
186
209
|
"cid": "cids(0)",
|
@@ -196,7 +219,7 @@ Array [
|
|
196
219
|
"event": Object {
|
197
220
|
"$type": "tools.ozone.moderation.defs#modEventAcknowledge",
|
198
221
|
},
|
199
|
-
"id":
|
222
|
+
"id": 5,
|
200
223
|
"subject": Object {
|
201
224
|
"$type": "com.atproto.repo.strongRef",
|
202
225
|
"cid": "cids(0)",
|
@@ -222,7 +245,7 @@ Object {
|
|
222
245
|
"$type": "tools.ozone.moderation.defs#recordHosting",
|
223
246
|
"status": "unknown",
|
224
247
|
},
|
225
|
-
"id":
|
248
|
+
"id": 5,
|
226
249
|
"lastReviewedAt": "1970-01-01T00:00:00.000Z",
|
227
250
|
"lastReviewedBy": "user(1)",
|
228
251
|
"reviewState": "tools.ozone.moderation.defs#reviewClosed",
|
@@ -295,8 +318,10 @@ Object {
|
|
295
318
|
"subjectBlobCids": Array [],
|
296
319
|
"subjectRepoHandle": "bob.test",
|
297
320
|
"tags": Array [
|
321
|
+
"report:spam",
|
298
322
|
"lang:en",
|
299
323
|
"lang:i",
|
324
|
+
"report:other",
|
300
325
|
],
|
301
326
|
"takendown": false,
|
302
327
|
"updatedAt": "1970-01-01T00:00:00.000Z",
|
@@ -401,7 +426,7 @@ Object {
|
|
401
426
|
"event": Object {
|
402
427
|
"$type": "tools.ozone.moderation.defs#modEventAcknowledge",
|
403
428
|
},
|
404
|
-
"id":
|
429
|
+
"id": 5,
|
405
430
|
"subject": Object {
|
406
431
|
"$type": "com.atproto.repo.strongRef",
|
407
432
|
"cid": "cids(0)",
|
@@ -418,7 +443,7 @@ Object {
|
|
418
443
|
"event": Object {
|
419
444
|
"$type": "tools.ozone.moderation.defs#modEventAcknowledge",
|
420
445
|
},
|
421
|
-
"id":
|
446
|
+
"id": 7,
|
422
447
|
"subject": Object {
|
423
448
|
"$type": "com.atproto.admin.defs#repoRef",
|
424
449
|
"did": "user(0)",
|
@@ -87,12 +87,12 @@ Object {
|
|
87
87
|
"$type": "app.bsky.embed.images#view",
|
88
88
|
"images": Array [
|
89
89
|
Object {
|
90
|
-
"alt": "../dev-env/
|
90
|
+
"alt": "../dev-env/assets/key-landscape-small.jpg",
|
91
91
|
"fullsize": "https://bsky.public.url/img/feed_fullsize/plain/user(3)/cids(4)@jpeg",
|
92
92
|
"thumb": "https://bsky.public.url/img/feed_thumbnail/plain/user(3)/cids(4)@jpeg",
|
93
93
|
},
|
94
94
|
Object {
|
95
|
-
"alt": "../dev-env/
|
95
|
+
"alt": "../dev-env/assets/key-alt.jpg",
|
96
96
|
"fullsize": "https://bsky.public.url/img/feed_fullsize/plain/user(3)/cids(5)@jpeg",
|
97
97
|
"thumb": "https://bsky.public.url/img/feed_thumbnail/plain/user(3)/cids(5)@jpeg",
|
98
98
|
},
|
@@ -149,7 +149,7 @@ Object {
|
|
149
149
|
"$type": "app.bsky.embed.images",
|
150
150
|
"images": Array [
|
151
151
|
Object {
|
152
|
-
"alt": "../dev-env/
|
152
|
+
"alt": "../dev-env/assets/key-landscape-small.jpg",
|
153
153
|
"image": Object {
|
154
154
|
"$type": "blob",
|
155
155
|
"mimeType": "image/jpeg",
|
@@ -160,7 +160,7 @@ Object {
|
|
160
160
|
},
|
161
161
|
},
|
162
162
|
Object {
|
163
|
-
"alt": "../dev-env/
|
163
|
+
"alt": "../dev-env/assets/key-alt.jpg",
|
164
164
|
"image": Object {
|
165
165
|
"$type": "blob",
|
166
166
|
"mimeType": "image/jpeg",
|