mirror of
https://github.com/matrix-org/dendrite
synced 2024-11-19 16:20:51 +01:00
1ed732cc78
* Implement /_synapse/admin/v1/register This is implemented identically to Synapse, so scripts which work with Synapse should work with Dendrite. ``` Test 27 POST /_synapse/admin/v1/register with shared secret... OK Test 28 POST /_synapse/admin/v1/register admin with shared secret... OK Test 29 POST /_synapse/admin/v1/register with shared secret downcases capitals... OK Test 30 POST /_synapse/admin/v1/register with shared secret disallows symbols... OK ``` Sytest however has `implementation_specific => "synapse"` which stops these tests from running. * Add missing muxes to gobind * Linting
43 lines
1.3 KiB
Go
43 lines
1.3 KiB
Go
package routing
|
|
|
|
import (
|
|
"bytes"
|
|
"io/ioutil"
|
|
"testing"
|
|
|
|
"github.com/patrickmn/go-cache"
|
|
)
|
|
|
|
func TestSharedSecretRegister(t *testing.T) {
|
|
// these values have come from a local synapse instance to ensure compatibility
|
|
jsonStr := []byte(`{"admin":false,"mac":"f1ba8d37123866fd659b40de4bad9b0f8965c565","nonce":"759f047f312b99ff428b21d581256f8592b8976e58bc1b543972dc6147e529a79657605b52d7becd160ff5137f3de11975684319187e06901955f79e5a6c5a79","password":"wonderland","username":"alice"}`)
|
|
sharedSecret := "dendritetest"
|
|
|
|
req, err := NewSharedSecretRegistrationRequest(ioutil.NopCloser(bytes.NewBuffer(jsonStr)))
|
|
if err != nil {
|
|
t.Fatalf("failed to read request: %s", err)
|
|
}
|
|
|
|
r := NewSharedSecretRegistration(sharedSecret)
|
|
|
|
// force the nonce to be known
|
|
r.nonces.Set(req.Nonce, true, cache.DefaultExpiration)
|
|
|
|
valid, err := r.IsValidMacLogin(req.Nonce, req.User, req.Password, req.Admin, req.MacBytes)
|
|
if err != nil {
|
|
t.Fatalf("failed to check for valid mac: %s", err)
|
|
}
|
|
if !valid {
|
|
t.Errorf("mac login failed, wanted success")
|
|
}
|
|
|
|
// modify the mac so it fails
|
|
req.MacBytes[0] = 0xff
|
|
valid, err = r.IsValidMacLogin(req.Nonce, req.User, req.Password, req.Admin, req.MacBytes)
|
|
if err != nil {
|
|
t.Fatalf("failed to check for valid mac: %s", err)
|
|
}
|
|
if valid {
|
|
t.Errorf("mac login succeeded, wanted failure")
|
|
}
|
|
}
|