mirror of
https://github.com/1f349/dendrite.git
synced 2024-11-14 15:51:37 +00:00
7482cd2b47
`/_synapse/admin/v1/register` has a `displayname` field that we were previously ignoring. This handles that field and adds the displayname to the new user if one was provided.
666 lines
21 KiB
Go
666 lines
21 KiB
Go
// Copyright 2017 Andrew Morgan <andrew@amorgan.xyz>
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package routing
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"reflect"
|
|
"regexp"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/matrix-org/dendrite/clientapi/auth/authtypes"
|
|
"github.com/matrix-org/dendrite/clientapi/jsonerror"
|
|
"github.com/matrix-org/dendrite/internal"
|
|
"github.com/matrix-org/dendrite/keyserver"
|
|
"github.com/matrix-org/dendrite/roomserver"
|
|
"github.com/matrix-org/dendrite/setup/config"
|
|
"github.com/matrix-org/dendrite/test"
|
|
"github.com/matrix-org/dendrite/test/testrig"
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
|
"github.com/matrix-org/util"
|
|
"github.com/patrickmn/go-cache"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
var (
|
|
// Registration Flows that the server allows.
|
|
allowedFlows = []authtypes.Flow{
|
|
{
|
|
Stages: []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage2"),
|
|
},
|
|
},
|
|
{
|
|
Stages: []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
},
|
|
},
|
|
}
|
|
)
|
|
|
|
// Should return true as we're completing all the stages of a single flow in
|
|
// order.
|
|
func TestFlowCheckingCompleteFlowOrdered(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
}
|
|
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as all stages in a single flow need to be completed.
|
|
func TestFlowCheckingStagesFromDifferentFlows(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage2"),
|
|
authtypes.LoginType("stage3"),
|
|
}
|
|
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return true as we're completing all the stages from a single flow, as
|
|
// well as some extraneous stages.
|
|
func TestFlowCheckingCompleteOrderedExtraneous(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage1"),
|
|
authtypes.LoginType("stage3"),
|
|
authtypes.LoginType("stage4"),
|
|
authtypes.LoginType("stage5"),
|
|
}
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're submitting an empty flow.
|
|
func TestFlowCheckingEmptyFlow(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we've completed a stage that isn't in any allowed flow.
|
|
func TestFlowCheckingInvalidStage(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return true as we complete all stages of an allowed flow, though out
|
|
// of order, as well as extraneous stages.
|
|
func TestFlowCheckingExtraneousUnordered(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage5"),
|
|
authtypes.LoginType("stage4"),
|
|
authtypes.LoginType("stage3"),
|
|
authtypes.LoginType("stage2"),
|
|
authtypes.LoginType("stage1"),
|
|
}
|
|
if !checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be true.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're providing fewer stages than are required.
|
|
func TestFlowCheckingShortIncorrectInput(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Should return false as we're providing different stages than are required.
|
|
func TestFlowCheckingExtraneousIncorrectInput(t *testing.T) {
|
|
testFlow := []authtypes.LoginType{
|
|
authtypes.LoginType("stage8"),
|
|
authtypes.LoginType("stage9"),
|
|
authtypes.LoginType("stage10"),
|
|
authtypes.LoginType("stage11"),
|
|
}
|
|
if checkFlowCompleted(testFlow, allowedFlows) {
|
|
t.Error("Incorrect registration flow verification: ", testFlow, ", from allowed flows: ", allowedFlows, ". Should be false.")
|
|
}
|
|
}
|
|
|
|
// Completed flows stages should always be a valid slice header.
|
|
// TestEmptyCompletedFlows checks that sessionsDict returns a slice & not nil.
|
|
func TestEmptyCompletedFlows(t *testing.T) {
|
|
fakeEmptySessions := newSessionsDict()
|
|
fakeSessionID := "aRandomSessionIDWhichDoesNotExist"
|
|
ret := fakeEmptySessions.getCompletedStages(fakeSessionID)
|
|
|
|
// check for []
|
|
if ret == nil || len(ret) != 0 {
|
|
t.Error("Empty Completed Flow Stages should be a empty slice: returned ", ret, ". Should be []")
|
|
}
|
|
}
|
|
|
|
// This method tests validation of the provided Application Service token and
|
|
// username that they're registering
|
|
func TestValidationOfApplicationServices(t *testing.T) {
|
|
// Set up application service namespaces
|
|
regex := "@_appservice_.*"
|
|
regexp, err := regexp.Compile(regex)
|
|
if err != nil {
|
|
t.Errorf("Error compiling regex: %s", regex)
|
|
}
|
|
|
|
fakeNamespace := config.ApplicationServiceNamespace{
|
|
Exclusive: true,
|
|
Regex: regex,
|
|
RegexpObject: regexp,
|
|
}
|
|
|
|
// Create a fake application service
|
|
fakeID := "FakeAS"
|
|
fakeSenderLocalpart := "_appservice_bot"
|
|
fakeApplicationService := config.ApplicationService{
|
|
ID: fakeID,
|
|
URL: "null",
|
|
ASToken: "1234",
|
|
HSToken: "4321",
|
|
SenderLocalpart: fakeSenderLocalpart,
|
|
NamespaceMap: map[string][]config.ApplicationServiceNamespace{
|
|
"users": {fakeNamespace},
|
|
},
|
|
}
|
|
|
|
// Set up a config
|
|
fakeConfig := &config.Dendrite{}
|
|
fakeConfig.Defaults(config.DefaultOpts{
|
|
Generate: true,
|
|
Monolithic: true,
|
|
})
|
|
fakeConfig.Global.ServerName = "localhost"
|
|
fakeConfig.ClientAPI.Derived.ApplicationServices = []config.ApplicationService{fakeApplicationService}
|
|
|
|
// Access token is correct, user_id omitted so we are acting as SenderLocalpart
|
|
asID, resp := validateApplicationService(&fakeConfig.ClientAPI, fakeSenderLocalpart, "1234")
|
|
if resp != nil || asID != fakeID {
|
|
t.Errorf("appservice should have validated and returned correct ID: %s", resp.JSON)
|
|
}
|
|
|
|
// Access token is incorrect, user_id omitted so we are acting as SenderLocalpart
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, fakeSenderLocalpart, "xxxx")
|
|
if resp == nil || asID == fakeID {
|
|
t.Errorf("access_token should have been marked as invalid")
|
|
}
|
|
|
|
// Access token is correct, acting as valid user_id
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, "_appservice_bob", "1234")
|
|
if resp != nil || asID != fakeID {
|
|
t.Errorf("access_token and user_id should've been valid: %s", resp.JSON)
|
|
}
|
|
|
|
// Access token is correct, acting as invalid user_id
|
|
asID, resp = validateApplicationService(&fakeConfig.ClientAPI, "_something_else", "1234")
|
|
if resp == nil || asID == fakeID {
|
|
t.Errorf("user_id should not have been valid: @_something_else:localhost")
|
|
}
|
|
}
|
|
|
|
func TestSessionCleanUp(t *testing.T) {
|
|
s := newSessionsDict()
|
|
|
|
t.Run("session is cleaned up after a while", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld"
|
|
// manually added, as s.addParams() would start the timer with the default timeout
|
|
s.params[dummySession] = registerRequest{Username: "Testing"}
|
|
s.startTimer(time.Millisecond, dummySession)
|
|
time.Sleep(time.Millisecond * 50)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
})
|
|
|
|
t.Run("session is deleted, once the registration completed", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld2"
|
|
s.startTimer(time.Minute, dummySession)
|
|
s.deleteSession(dummySession)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
})
|
|
|
|
t.Run("session timer is restarted after second call", func(t *testing.T) {
|
|
// t.Parallel()
|
|
dummySession := "helloWorld3"
|
|
// the following will start a timer with the default timeout of 5min
|
|
s.addParams(dummySession, registerRequest{Username: "Testing"})
|
|
s.addCompletedSessionStage(dummySession, authtypes.LoginTypeRecaptcha)
|
|
s.addCompletedSessionStage(dummySession, authtypes.LoginTypeDummy)
|
|
s.addDeviceToDelete(dummySession, "dummyDevice")
|
|
s.getCompletedStages(dummySession)
|
|
// reset the timer with a lower timeout
|
|
s.startTimer(time.Millisecond, dummySession)
|
|
time.Sleep(time.Millisecond * 50)
|
|
if data, ok := s.getParams(dummySession); ok {
|
|
t.Errorf("expected session to be deleted: %+v", data)
|
|
}
|
|
if _, ok := s.timer[dummySession]; ok {
|
|
t.Error("expected timer to be delete")
|
|
}
|
|
if _, ok := s.sessions[dummySession]; ok {
|
|
t.Error("expected session to be delete")
|
|
}
|
|
if _, ok := s.getDeviceToDelete(dummySession); ok {
|
|
t.Error("expected session to device to be delete")
|
|
}
|
|
})
|
|
}
|
|
|
|
func Test_register(t *testing.T) {
|
|
testCases := []struct {
|
|
name string
|
|
kind string
|
|
password string
|
|
username string
|
|
loginType string
|
|
forceEmpty bool
|
|
registrationDisabled bool
|
|
guestsDisabled bool
|
|
enableRecaptcha bool
|
|
captchaBody string
|
|
wantResponse util.JSONResponse
|
|
}{
|
|
{
|
|
name: "disallow guests",
|
|
kind: "guest",
|
|
guestsDisabled: true,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Forbidden(`Guest registration is disabled on "test"`),
|
|
},
|
|
},
|
|
{
|
|
name: "allow guests",
|
|
kind: "guest",
|
|
},
|
|
{
|
|
name: "unknown login type",
|
|
loginType: "im.not.known",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusNotImplemented,
|
|
JSON: jsonerror.Unknown("unknown/unimplemented auth type"),
|
|
},
|
|
},
|
|
{
|
|
name: "disabled registration",
|
|
registrationDisabled: true,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Forbidden(`Registration is disabled on "test"`),
|
|
},
|
|
},
|
|
{
|
|
name: "successful registration, numeric ID",
|
|
username: "",
|
|
password: "someRandomPassword",
|
|
forceEmpty: true,
|
|
},
|
|
{
|
|
name: "successful registration",
|
|
username: "success",
|
|
},
|
|
{
|
|
name: "failing registration - user already exists",
|
|
username: "success",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.UserInUse("Desired user ID is already taken."),
|
|
},
|
|
},
|
|
{
|
|
name: "successful registration uppercase username",
|
|
username: "LOWERCASED", // this is going to be lower-cased
|
|
},
|
|
{
|
|
name: "invalid username",
|
|
username: "#totalyNotValid",
|
|
wantResponse: *internal.UsernameResponse(internal.ErrUsernameInvalid),
|
|
},
|
|
{
|
|
name: "numeric username is forbidden",
|
|
username: "1337",
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.InvalidUsername("Numeric user IDs are reserved"),
|
|
},
|
|
},
|
|
{
|
|
name: "disabled recaptcha login",
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusForbidden,
|
|
JSON: jsonerror.Unknown(ErrCaptchaDisabled.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "enabled recaptcha, no response defined",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusBadRequest,
|
|
JSON: jsonerror.BadJSON(ErrMissingResponse.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "invalid captcha response",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `notvalid`,
|
|
wantResponse: util.JSONResponse{
|
|
Code: http.StatusUnauthorized,
|
|
JSON: jsonerror.BadJSON(ErrInvalidCaptcha.Error()),
|
|
},
|
|
},
|
|
{
|
|
name: "valid captcha response",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `success`,
|
|
},
|
|
{
|
|
name: "captcha invalid from remote",
|
|
enableRecaptcha: true,
|
|
loginType: authtypes.LoginTypeRecaptcha,
|
|
captchaBody: `i should fail for other reasons`,
|
|
wantResponse: util.JSONResponse{Code: http.StatusInternalServerError, JSON: jsonerror.InternalServerError()},
|
|
},
|
|
}
|
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
base, baseClose := testrig.CreateBaseDendrite(t, dbType)
|
|
defer baseClose()
|
|
|
|
rsAPI := roomserver.NewInternalAPI(base)
|
|
keyAPI := keyserver.NewInternalAPI(base, &base.Cfg.KeyServer, nil, rsAPI)
|
|
userAPI := userapi.NewInternalAPI(base, &base.Cfg.UserAPI, nil, keyAPI, rsAPI, nil)
|
|
keyAPI.SetUserAPI(userAPI)
|
|
|
|
for _, tc := range testCases {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
if tc.enableRecaptcha {
|
|
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
|
if err := r.ParseForm(); err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
response := r.Form.Get("response")
|
|
|
|
// Respond with valid JSON or no JSON at all to test happy/error cases
|
|
switch response {
|
|
case "success":
|
|
json.NewEncoder(w).Encode(recaptchaResponse{Success: true})
|
|
case "notvalid":
|
|
json.NewEncoder(w).Encode(recaptchaResponse{Success: false})
|
|
default:
|
|
|
|
}
|
|
}))
|
|
defer srv.Close()
|
|
base.Cfg.ClientAPI.RecaptchaSiteVerifyAPI = srv.URL
|
|
}
|
|
|
|
if err := base.Cfg.Derive(); err != nil {
|
|
t.Fatalf("failed to derive config: %s", err)
|
|
}
|
|
|
|
base.Cfg.ClientAPI.RecaptchaEnabled = tc.enableRecaptcha
|
|
base.Cfg.ClientAPI.RegistrationDisabled = tc.registrationDisabled
|
|
base.Cfg.ClientAPI.GuestsDisabled = tc.guestsDisabled
|
|
|
|
if tc.kind == "" {
|
|
tc.kind = "user"
|
|
}
|
|
if tc.password == "" && !tc.forceEmpty {
|
|
tc.password = "someRandomPassword"
|
|
}
|
|
if tc.username == "" && !tc.forceEmpty {
|
|
tc.username = "valid"
|
|
}
|
|
if tc.loginType == "" {
|
|
tc.loginType = "m.login.dummy"
|
|
}
|
|
|
|
reg := registerRequest{
|
|
Password: tc.password,
|
|
Username: tc.username,
|
|
}
|
|
|
|
body := &bytes.Buffer{}
|
|
err := json.NewEncoder(body).Encode(reg)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req := httptest.NewRequest(http.MethodPost, fmt.Sprintf("/?kind=%s", tc.kind), body)
|
|
|
|
resp := Register(req, userAPI, &base.Cfg.ClientAPI)
|
|
t.Logf("Resp: %+v", resp)
|
|
|
|
// The first request should return a userInteractiveResponse
|
|
switch r := resp.JSON.(type) {
|
|
case userInteractiveResponse:
|
|
// Check that the flows are the ones we configured
|
|
if !reflect.DeepEqual(r.Flows, base.Cfg.Derived.Registration.Flows) {
|
|
t.Fatalf("unexpected registration flows: %+v, want %+v", r.Flows, base.Cfg.Derived.Registration.Flows)
|
|
}
|
|
case *jsonerror.MatrixError:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("(%s), unexpected response: %+v, want: %+v", tc.name, resp, tc.wantResponse)
|
|
}
|
|
return
|
|
case registerResponse:
|
|
// this should only be possible on guest user registration, never for normal users
|
|
if tc.kind != "guest" {
|
|
t.Fatalf("got register response on first request: %+v", r)
|
|
}
|
|
// assert we've got a UserID, AccessToken and DeviceID
|
|
if r.UserID == "" {
|
|
t.Fatalf("missing userID in response")
|
|
}
|
|
if r.AccessToken == "" {
|
|
t.Fatalf("missing accessToken in response")
|
|
}
|
|
if r.DeviceID == "" {
|
|
t.Fatalf("missing deviceID in response")
|
|
}
|
|
return
|
|
default:
|
|
t.Logf("Got response: %T", resp.JSON)
|
|
}
|
|
|
|
// If we reached this, we should have received a UIA response
|
|
uia, ok := resp.JSON.(userInteractiveResponse)
|
|
if !ok {
|
|
t.Fatalf("did not receive a userInteractiveResponse: %T", resp.JSON)
|
|
}
|
|
t.Logf("%+v", uia)
|
|
|
|
// Register the user
|
|
reg.Auth = authDict{
|
|
Type: authtypes.LoginType(tc.loginType),
|
|
Session: uia.Session,
|
|
}
|
|
|
|
if tc.captchaBody != "" {
|
|
reg.Auth.Response = tc.captchaBody
|
|
}
|
|
|
|
dummy := "dummy"
|
|
reg.DeviceID = &dummy
|
|
reg.InitialDisplayName = &dummy
|
|
reg.Type = authtypes.LoginType(tc.loginType)
|
|
|
|
err = json.NewEncoder(body).Encode(reg)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
req = httptest.NewRequest(http.MethodPost, "/", body)
|
|
|
|
resp = Register(req, userAPI, &base.Cfg.ClientAPI)
|
|
|
|
switch resp.JSON.(type) {
|
|
case *jsonerror.MatrixError:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("unexpected response: %+v, want: %+v", resp, tc.wantResponse)
|
|
}
|
|
return
|
|
case util.JSONResponse:
|
|
if !reflect.DeepEqual(tc.wantResponse, resp) {
|
|
t.Fatalf("unexpected response: %+v, want: %+v", resp, tc.wantResponse)
|
|
}
|
|
return
|
|
}
|
|
|
|
rr, ok := resp.JSON.(registerResponse)
|
|
if !ok {
|
|
t.Fatalf("expected a registerresponse, got %T", resp.JSON)
|
|
}
|
|
|
|
// validate the response
|
|
if tc.forceEmpty {
|
|
// when not supplying a username, one will be generated. Given this _SHOULD_ be
|
|
// the second user, set the username accordingly
|
|
reg.Username = "2"
|
|
}
|
|
wantUserID := strings.ToLower(fmt.Sprintf("@%s:%s", reg.Username, "test"))
|
|
if wantUserID != rr.UserID {
|
|
t.Fatalf("unexpected userID: %s, want %s", rr.UserID, wantUserID)
|
|
}
|
|
if rr.DeviceID != *reg.DeviceID {
|
|
t.Fatalf("unexpected deviceID: %s, want %s", rr.DeviceID, *reg.DeviceID)
|
|
}
|
|
if rr.AccessToken == "" {
|
|
t.Fatalf("missing accessToken in response")
|
|
}
|
|
})
|
|
}
|
|
})
|
|
}
|
|
|
|
func TestRegisterUserWithDisplayName(t *testing.T) {
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
base, baseClose := testrig.CreateBaseDendrite(t, dbType)
|
|
defer baseClose()
|
|
base.Cfg.Global.ServerName = "server"
|
|
|
|
rsAPI := roomserver.NewInternalAPI(base)
|
|
keyAPI := keyserver.NewInternalAPI(base, &base.Cfg.KeyServer, nil, rsAPI)
|
|
userAPI := userapi.NewInternalAPI(base, &base.Cfg.UserAPI, nil, keyAPI, rsAPI, nil)
|
|
keyAPI.SetUserAPI(userAPI)
|
|
deviceName, deviceID := "deviceName", "deviceID"
|
|
expectedDisplayName := "DisplayName"
|
|
response := completeRegistration(
|
|
base.Context(),
|
|
userAPI,
|
|
"user",
|
|
"server",
|
|
expectedDisplayName,
|
|
"password",
|
|
"",
|
|
"localhost",
|
|
"user agent",
|
|
"session",
|
|
false,
|
|
&deviceName,
|
|
&deviceID,
|
|
api.AccountTypeAdmin,
|
|
)
|
|
|
|
assert.Equal(t, http.StatusOK, response.Code)
|
|
|
|
req := api.QueryProfileRequest{UserID: "@user:server"}
|
|
var res api.QueryProfileResponse
|
|
err := userAPI.QueryProfile(base.Context(), &req, &res)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, expectedDisplayName, res.DisplayName)
|
|
})
|
|
}
|
|
|
|
func TestRegisterAdminUsingSharedSecret(t *testing.T) {
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
base, baseClose := testrig.CreateBaseDendrite(t, dbType)
|
|
defer baseClose()
|
|
base.Cfg.Global.ServerName = "server"
|
|
sharedSecret := "dendritetest"
|
|
base.Cfg.ClientAPI.RegistrationSharedSecret = sharedSecret
|
|
|
|
rsAPI := roomserver.NewInternalAPI(base)
|
|
keyAPI := keyserver.NewInternalAPI(base, &base.Cfg.KeyServer, nil, rsAPI)
|
|
userAPI := userapi.NewInternalAPI(base, &base.Cfg.UserAPI, nil, keyAPI, rsAPI, nil)
|
|
keyAPI.SetUserAPI(userAPI)
|
|
|
|
expectedDisplayName := "rabbit"
|
|
jsonStr := []byte(`{"admin":true,"mac":"24dca3bba410e43fe64b9b5c28306693bf3baa9f","nonce":"759f047f312b99ff428b21d581256f8592b8976e58bc1b543972dc6147e529a79657605b52d7becd160ff5137f3de11975684319187e06901955f79e5a6c5a79","password":"wonderland","username":"alice","displayname":"rabbit"}`)
|
|
req, err := NewSharedSecretRegistrationRequest(io.NopCloser(bytes.NewBuffer(jsonStr)))
|
|
assert.NoError(t, err)
|
|
if err != nil {
|
|
t.Fatalf("failed to read request: %s", err)
|
|
}
|
|
|
|
r := NewSharedSecretRegistration(sharedSecret)
|
|
|
|
// force the nonce to be known
|
|
r.nonces.Set(req.Nonce, true, cache.DefaultExpiration)
|
|
|
|
_, err = r.IsValidMacLogin(req.Nonce, req.User, req.Password, req.Admin, req.MacBytes)
|
|
assert.NoError(t, err)
|
|
|
|
body := &bytes.Buffer{}
|
|
err = json.NewEncoder(body).Encode(req)
|
|
assert.NoError(t, err)
|
|
ssrr := httptest.NewRequest(http.MethodPost, "/", body)
|
|
|
|
response := handleSharedSecretRegistration(
|
|
&base.Cfg.ClientAPI,
|
|
userAPI,
|
|
r,
|
|
ssrr,
|
|
)
|
|
assert.Equal(t, http.StatusOK, response.Code)
|
|
|
|
profilReq := api.QueryProfileRequest{UserID: "@alice:server"}
|
|
var profileRes api.QueryProfileResponse
|
|
err = userAPI.QueryProfile(base.Context(), &profilReq, &profileRes)
|
|
assert.NoError(t, err)
|
|
assert.Equal(t, expectedDisplayName, profileRes.DisplayName)
|
|
})
|
|
}
|