mirror of
https://github.com/matrix-org/dendrite
synced 2024-11-16 14:50:52 +01:00
c2db38d295
This adds tests for `/profile`. Also, as a first change in this regard, refactors the methods defined on the `UserInternalAPI` to not use structs as the request/response parameters.
667 lines
21 KiB
Go
667 lines
21 KiB
Go
// Copyright 2017 Andrew Morgan <andrew@amorgan.xyz>
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package routing
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"reflect"
|
|
"regexp"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
|
"github.com/matrix-org/dendrite/internal"
|
|
"github.com/matrix-org/dendrite/internal/caching"
|
|
"github.com/matrix-org/dendrite/internal/sqlutil"
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
"github.com/matrix-org/dendrite/setup/jetstream"
|
|
"github.com/matrix-org/dendrite/test"
|
|
"github.com/matrix-org/dendrite/test/testrig"
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
|
"github.com/matrix-org/util"
|
|
"github.com/patrickmn/go-cache"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
var (
|
|
// Registration Flows that the server allows.
|
|
allowedFlows = []authtypes.Flow{
|
|
{
|
|
Stages: []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage2"),
|
|
},
|
|
},
|
|
{
|
|
Stages: []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
},
|
|
},
|
|
}
|
|
)
|
|
|
|
// Should return true as we're completing all the stages of a single flow in
|
|
// order.
|
|
func TestFlowCheckingCompleteFlowOrdered(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
}
|
|
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as all stages in a single flow need to be completed.
|
|
func TestFlowCheckingStagesFromDifferentFlows(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage2"),
|
|
authtypes.LoginType("stage3"),
|
|
}
|
|
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return true as we're completing all the stages from a single flow, as
|
|
// well as some extraneous stages.
|
|
func TestFlowCheckingCompleteOrderedExtraneous(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
authtypes.LoginType("stage4"),
|
|
authtypes.LoginType("stage5"),
|
|
}
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're submitting an empty flow.
|
|
func TestFlowCheckingEmptyFlow(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we've completed a stage that isn't in any allowed flow.
|
|
func TestFlowCheckingInvalidStage(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return true as we complete all stages of an allowed flow, though out
|
|
// of order, as well as extraneous stages.
|
|
func TestFlowCheckingExtraneousUnordered(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage5"),
|
|
authtypes.LoginType("stage4"),
|
|
authtypes.LoginType("stage3"),
|
|
authtypes.LoginType("stage2"),
|
|
authtypes.LoginType("stage1"),
|
|
}
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're providing fewer stages than are required.
|
|
func TestFlowCheckingShortIncorrectInput(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're providing different stages than are required.
|
|
func TestFlowCheckingExtraneousIncorrectInput(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
authtypes.LoginType("stage9"),
|
|
authtypes.LoginType("stage10"),
|
|
authtypes.LoginType("stage11"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Completed flows stages should always be a valid slice header.
|
|
// TestEmptyCompletedFlows checks that sessionsDict returns a slice & not nil.
|
|
func TestEmptyCompletedFlows(t *testing.T) {
|
|
fakeEmptySessions := newSessionsDict()
|
|
fakeSessionID := "aRandomSessionIDWhichDoesNotExist"
|
|
ret := fakeEmptySessions.getCompletedStages(fakeSessionID)
|
|
|
|
// check for []
|
|
if ret == nil || len(ret) != 0 {
|
|
t.Error("Empty Completed Flow Stages should be a empty slice: returned ", ret, ". Should be []")
|
|
}
|
|
}
|
|
|
|
// This method tests validation of the provided Application Service token and
|
|
// username that they're registering
|
|
func TestValidationOfApplicationServices(t *testing.T) {
|
|
// Set up application service namespaces
|
|
regex := "@_appservice_.*"
|
|
regexp, err := regexp.Compile(regex)
|
|
if err != nil {
|
|
t.Errorf("Error compiling regex: %s", regex)
|
|
}
|
|
|
|
fakeNamespace := config.ApplicationServiceNamespace{
|
|
Exclusive: true,
|
|
Regex: regex,
|
|
RegexpObject: regexp,
|
|
}
|
|
|
|
// Create a fake application service
|
|
fakeID := "FakeAS"
|
|
fakeSenderLocalpart := "_appservice_bot"
|
|
fakeApplicationService := config.ApplicationService{
|
|
ID: fakeID,
|
|
URL: "null",
|
|
ASToken: "1234",
|
|
HSToken: "4321",
|
|
SenderLocalpart: fakeSenderLocalpart,
|
|
NamespaceMap: map[string][]config.ApplicationServiceNamespace{
|
|
"users": {fakeNamespace},
|
|
},
|
|
}
|
|
|
|
// Set up a config
|
|
fakeConfig := &config.Dendrite{}
|
|
fakeConfig.Defaults(config.DefaultOpts{
|
|
Generate: true,
|
|
SingleDatabase: true,
|
|
})
|
|
fakeConfig.Global.ServerName = "localhost"
|
|
fakeConfig.ClientAPI.Derived.ApplicationServices = []config.ApplicationService{fakeApplicationService}
|
|
|
|
// Access token is correct, user_id omitted so we are acting as SenderLocalpart
|
|
asID, resp := validateApplicationService(&fakeConfig.ClientAPI, fakeSenderLocalpart, "1234")
|
|
if resp != nil || asID != fakeID {
|
|
t.Errorf("appservice should have validated and returned correct ID: %s", resp.JSON)
|
|
}
|
|
|
|
// Access token is incorrect, user_id omitted so we are acting as SenderLocalpart
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, fakeSenderLocalpart, "xxxx")
|
|
if resp == nil || asID == fakeID {
|
|
t.Errorf("access_token should have been marked as invalid")
|
|
}
|
|
|
|
// Access token is correct, acting as valid user_id
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, "_appservice_bob", "1234")
|
|
if resp != nil || asID != fakeID {
|
|
t.Errorf("access_token and user_id should've been valid: %s", resp.JSON)
|
|
}
|
|
|
|
// Access token is correct, acting as invalid user_id
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, "_something_else", "1234")
|
|
if resp == nil || asID == fakeID {
|
|
t.Errorf("user_id should not have been valid: @_something_else:localhost")
|
|
}
|
|
}
|
|
|
|
func TestSessionCleanUp(t *testing.T) {
|
|
s := newSessionsDict()
|
|
|
|
t.Run("session is cleaned up after a while", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld"
|
|
// manually added, as s.addParams() would start the timer with the default timeout
|
|
s.params[dummySession] = registerRequest{Username: "Testing"}
|
|
s.startTimer(time.Millisecond, dummySession)
|
|
time.Sleep(time.Millisecond * 50)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
})
|
|
|
|
t.Run("session is deleted, once the registration completed", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld2"
|
|
s.startTimer(time.Minute, dummySession)
|
|
s.deleteSession(dummySession)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
})
|
|
|
|
t.Run("session timer is restarted after second call", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld3"
|
|
// the following will start a timer with the default timeout of 5min
|
|
s.addParams(dummySession, registerRequest{Username: "Testing"})
|
|
s.addCompletedSessionStage(dummySession, authtypes.LoginTypeRecaptcha)
|
|
s.addCompletedSessionStage(dummySession, authtypes.LoginTypeDummy)
|
|
s.addDeviceToDelete(dummySession, "dummyDevice")
|
|
s.getCompletedStages(dummySession)
|
|
// reset the timer with a lower timeout
|
|
s.startTimer(time.Millisecond, dummySession)
|
|
time.Sleep(time.Millisecond * 50)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
if _, ok := s.timer[dummySession]; ok {
|
|
t.Error("expected timer to be delete")
|
|
}
|
|
if _, ok := s.sessions[dummySession]; ok {
|
|
t.Error("expected session to be delete")
|
|
}
|
|
if _, ok := s.getDeviceToDelete(dummySession); ok {
|
|
t.Error("expected session to device to be delete")
|
|
}
|
|
})
|
|
}
|
|
|
|
func Test_register(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
kind string
|
|
password string
|
|
username string
|
|
loginType string
|
|
forceEmpty bool
|
|
registrationDisabled bool
|
|
guestsDisabled bool
|
|
enableRecaptcha bool
|
|
captchaBody string
|
|
wantResponse util.JSONResponse
|
|
}{
|
|
{
|
|
name: "disallow guests",
|
|
kind: "guest",
|
|
guestsDisabled: true,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Forbidden(`Guest registration is disabled on "test"`),
|
|
},
|
|
},
|
|
{
|
|
name: "allow guests",
|
|
kind: "guest",
|
|
},
|
|
{
|
|
name: "unknown login type",
|
|
loginType: "im.not.known",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusNotImplemented,
|
|
JSON: jsonerror.Unknown("unknown/unimplemented auth type"),
|
|
},
|
|
},
|
|
{
|
|
name: "disabled registration",
|
|
registrationDisabled: true,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Forbidden(`Registration is disabled on "test"`),
|
|
},
|
|
},
|
|
{
|
|
name: "successful registration, numeric ID",
|
|
username: "",
|
|
password: "someRandomPassword",
|
|
forceEmpty: true,
|
|
},
|
|
{
|
|
name: "successful registration",
|
|
username: "success",
|
|
},
|
|
{
|
|
name: "failing registration - user already exists",
|
|
username: "success",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.UserInUse("Desired user ID is already taken."),
|
|
},
|
|
},
|
|
{
|
|
name: "successful registration uppercase username",
|
|
username: "LOWERCASED", // this is going to be lower-cased
|
|
},
|
|
{
|
|
name: "invalid username",
|
|
username: "#totalyNotValid",
|
|
wantResponse: *internal.UsernameResponse(internal.ErrUsernameInvalid),
|
|
},
|
|
{
|
|
name: "numeric username is forbidden",
|
|
username: "1337",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.InvalidUsername("Numeric user IDs are reserved"),
|
|
},
|
|
},
|
|
{
|
|
name: "disabled recaptcha login",
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Unknown(ErrCaptchaDisabled.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "enabled recaptcha, no response defined",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.BadJSON(ErrMissingResponse.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "invalid captcha response",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `notvalid`,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusUnauthorized,
|
|
JSON: jsonerror.BadJSON(ErrInvalidCaptcha.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "valid captcha response",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `success`,
|
|
},
|
|
{
|
|
name: "captcha invalid from remote",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `i should fail for other reasons`,
|
|
wantResponse: util.JSONResponse{Code: http.StatusInternalServerError, JSON: jsonerror.InternalServerError()},
|
|
},
|
|
}
|
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
cfg, processCtx, close := testrig.CreateConfig(t, dbType)
|
|
defer close()
|
|
|
|
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
|
|
natsInstance := jetstream.NATSInstance{}
|
|
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
if tc.enableRecaptcha {
|
|
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if err := r.ParseForm(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
response := r.Form.Get("response")
|
|
|
|
// Respond with valid JSON or no JSON at all to test happy/error cases
|
|
switch response {
|
|
case "success":
|
|
json.NewEncoder(w).Encode(recaptchaResponse{Success: true})
|
|
case "notvalid":
|
|
json.NewEncoder(w).Encode(recaptchaResponse{Success: false})
|
|
default:
|
|
|
|
}
|
|
}))
|
|
defer srv.Close()
|
|
cfg.ClientAPI.RecaptchaSiteVerifyAPI = srv.URL
|
|
}
|
|
|
|
if err := cfg.Derive(); err != nil {
|
|
t.Fatalf("failed to derive config: %s", err)
|
|
}
|
|
|
|
cfg.ClientAPI.RecaptchaEnabled = tc.enableRecaptcha
|
|
cfg.ClientAPI.RegistrationDisabled = tc.registrationDisabled
|
|
cfg.ClientAPI.GuestsDisabled = tc.guestsDisabled
|
|
|
|
if tc.kind == "" {
|
|
tc.kind = "user"
|
|
}
|
|
if tc.password == "" && !tc.forceEmpty {
|
|
tc.password = "someRandomPassword"
|
|
}
|
|
if tc.username == "" && !tc.forceEmpty {
|
|
tc.username = "valid"
|
|
}
|
|
if tc.loginType == "" {
|
|
tc.loginType = "m.login.dummy"
|
|
}
|
|
|
|
reg := registerRequest{
|
|
Password: tc.password,
|
|
Username: tc.username,
|
|
}
|
|
|
|
body := &bytes.Buffer{}
|
|
err := json.NewEncoder(body).Encode(reg)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req := httptest.NewRequest(http.MethodPost, fmt.Sprintf("/?kind=%s", tc.kind), body)
|
|
|
|
resp := Register(req, userAPI, &cfg.ClientAPI)
|
|
t.Logf("Resp: %+v", resp)
|
|
|
|
// The first request should return a userInteractiveResponse
|
|
switch r := resp.JSON.(type) {
|
|
case userInteractiveResponse:
|
|
// Check that the flows are the ones we configured
|
|
if !reflect.DeepEqual(r.Flows, cfg.Derived.Registration.Flows) {
|
|
t.Fatalf("unexpected registration flows: %+v, want %+v", r.Flows, cfg.Derived.Registration.Flows)
|
|
}
|
|
case *jsonerror.MatrixError:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("(%s), unexpected response: %+v, want: %+v", tc.name, resp, tc.wantResponse)
|
|
}
|
|
return
|
|
case registerResponse:
|
|
// this should only be possible on guest user registration, never for normal users
|
|
if tc.kind != "guest" {
|
|
t.Fatalf("got register response on first request: %+v", r)
|
|
}
|
|
// assert we've got a UserID, AccessToken and DeviceID
|
|
if r.UserID == "" {
|
|
t.Fatalf("missing userID in response")
|
|
}
|
|
if r.AccessToken == "" {
|
|
t.Fatalf("missing accessToken in response")
|
|
}
|
|
if r.DeviceID == "" {
|
|
t.Fatalf("missing deviceID in response")
|
|
}
|
|
return
|
|
default:
|
|
t.Logf("Got response: %T", resp.JSON)
|
|
}
|
|
|
|
// If we reached this, we should have received a UIA response
|
|
uia, ok := resp.JSON.(userInteractiveResponse)
|
|
if !ok {
|
|
t.Fatalf("did not receive a userInteractiveResponse: %T", resp.JSON)
|
|
}
|
|
t.Logf("%+v", uia)
|
|
|
|
// Register the user
|
|
reg.Auth = authDict{
|
|
Type: authtypes.LoginType(tc.loginType),
|
|
Session: uia.Session,
|
|
}
|
|
|
|
if tc.captchaBody != "" {
|
|
reg.Auth.Response = tc.captchaBody
|
|
}
|
|
|
|
dummy := "dummy"
|
|
reg.DeviceID = &dummy
|
|
reg.InitialDisplayName = &dummy
|
|
reg.Type = authtypes.LoginType(tc.loginType)
|
|
|
|
err = json.NewEncoder(body).Encode(reg)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = httptest.NewRequest(http.MethodPost, "/", body)
|
|
|
|
resp = Register(req, userAPI, &cfg.ClientAPI)
|
|
|
|
switch resp.JSON.(type) {
|
|
case *jsonerror.MatrixError:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("unexpected response: %+v, want: %+v", resp, tc.wantResponse)
|
|
}
|
|
return
|
|
case util.JSONResponse:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("unexpected response: %+v, want: %+v", resp, tc.wantResponse)
|
|
}
|
|
return
|
|
}
|
|
|
|
rr, ok := resp.JSON.(registerResponse)
|
|
if !ok {
|
|
t.Fatalf("expected a registerresponse, got %T", resp.JSON)
|
|
}
|
|
|
|
// validate the response
|
|
if tc.forceEmpty {
|
|
// when not supplying a username, one will be generated. Given this _SHOULD_ be
|
|
// the second user, set the username accordingly
|
|
reg.Username = "2"
|
|
}
|
|
wantUserID := strings.ToLower(fmt.Sprintf("@%s:%s", reg.Username, "test"))
|
|
if wantUserID != rr.UserID {
|
|
t.Fatalf("unexpected userID: %s, want %s", rr.UserID, wantUserID)
|
|
}
|
|
if rr.DeviceID != *reg.DeviceID {
|
|
t.Fatalf("unexpected deviceID: %s, want %s", rr.DeviceID, *reg.DeviceID)
|
|
}
|
|
if rr.AccessToken == "" {
|
|
t.Fatalf("missing accessToken in response")
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestRegisterUserWithDisplayName(t *testing.T) {
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
cfg, processCtx, close := testrig.CreateConfig(t, dbType)
|
|
defer close()
|
|
cfg.Global.ServerName = "server"
|
|
|
|
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
|
|
natsInstance := jetstream.NATSInstance{}
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
|
|
deviceName, deviceID := "deviceName", "deviceID"
|
|
expectedDisplayName := "DisplayName"
|
|
response := completeRegistration(
|
|
processCtx.Context(),
|
|
userAPI,
|
|
"user",
|
|
"server",
|
|
expectedDisplayName,
|
|
"password",
|
|
"",
|
|
"localhost",
|
|
"user agent",
|
|
"session",
|
|
false,
|
|
&deviceName,
|
|
&deviceID,
|
|
api.AccountTypeAdmin,
|
|
)
|
|
|
|
assert.Equal(t, http.StatusOK, response.Code)
|
|
|
|
profile, err := userAPI.QueryProfile(processCtx.Context(), "@user:server")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, expectedDisplayName, profile.DisplayName)
|
|
})
|
|
}
|
|
|
|
func TestRegisterAdminUsingSharedSecret(t *testing.T) {
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
cfg, processCtx, close := testrig.CreateConfig(t, dbType)
|
|
defer close()
|
|
natsInstance := jetstream.NATSInstance{}
|
|
cfg.Global.ServerName = "server"
|
|
sharedSecret := "dendritetest"
|
|
cfg.ClientAPI.RegistrationSharedSecret = sharedSecret
|
|
|
|
cm := sqlutil.NewConnectionManager(processCtx, cfg.Global.DatabaseOptions)
|
|
caches := caching.NewRistrettoCache(128*1024*1024, time.Hour, caching.DisableMetrics)
|
|
rsAPI := roomserver.NewInternalAPI(processCtx, cfg, cm, &natsInstance, caches, caching.DisableMetrics)
|
|
userAPI := userapi.NewInternalAPI(processCtx, cfg, cm, &natsInstance, rsAPI, nil)
|
|
|
|
expectedDisplayName := "rabbit"
|
|
jsonStr := []byte(`{"admin":true,"mac":"24dca3bba410e43fe64b9b5c28306693bf3baa9f","nonce":"759f047f312b99ff428b21d581256f8592b8976e58bc1b543972dc6147e529a79657605b52d7becd160ff5137f3de11975684319187e06901955f79e5a6c5a79","password":"wonderland","username":"alice","displayname":"rabbit"}`)
|
|
req, err := NewSharedSecretRegistrationRequest(io.NopCloser(bytes.NewBuffer(jsonStr)))
|
|
assert.NoError(t, err)
|
|
if err != nil {
|
|
t.Fatalf("failed to read request: %s", err)
|
|
}
|
|
|
|
r := NewSharedSecretRegistration(sharedSecret)
|
|
|
|
// force the nonce to be known
|
|
r.nonces.Set(req.Nonce, true, cache.DefaultExpiration)
|
|
|
|
_, err = r.IsValidMacLogin(req.Nonce, req.User, req.Password, req.Admin, req.MacBytes)
|
|
assert.NoError(t, err)
|
|
|
|
body := &bytes.Buffer{}
|
|
err = json.NewEncoder(body).Encode(req)
|
|
assert.NoError(t, err)
|
|
ssrr := httptest.NewRequest(http.MethodPost, "/", body)
|
|
|
|
response := handleSharedSecretRegistration(
|
|
&cfg.ClientAPI,
|
|
userAPI,
|
|
r,
|
|
ssrr,
|
|
)
|
|
assert.Equal(t, http.StatusOK, response.Code)
|
|
|
|
profile, err := userAPI.QueryProfile(processCtx.Context(), "@alice:server")
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, expectedDisplayName, profile.DisplayName)
|
|
})
|
|
}
|