2022-02-10 04:27:26 -06:00
|
|
|
// Copyright 2020 The Matrix.org Foundation C.I.C.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
package userapi_test
|
2020-06-15 03:54:11 -05:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"reflect"
|
|
|
|
"testing"
|
2022-02-10 04:27:26 -06:00
|
|
|
"time"
|
2020-06-15 03:54:11 -05:00
|
|
|
|
|
|
|
"github.com/gorilla/mux"
|
2022-10-21 03:48:25 -05:00
|
|
|
"github.com/matrix-org/gomatrixserverlib"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
"github.com/matrix-org/dendrite/internal/httputil"
|
|
|
|
"github.com/matrix-org/dendrite/test"
|
2022-10-18 09:59:08 -05:00
|
|
|
"github.com/matrix-org/dendrite/test/testrig"
|
2022-05-05 05:00:18 -05:00
|
|
|
"github.com/matrix-org/dendrite/userapi"
|
|
|
|
"github.com/matrix-org/dendrite/userapi/inthttp"
|
2022-02-16 11:55:38 -06:00
|
|
|
|
2020-12-02 11:41:00 -06:00
|
|
|
"github.com/matrix-org/dendrite/setup/config"
|
2020-06-15 03:54:11 -05:00
|
|
|
"github.com/matrix-org/dendrite/userapi/api"
|
2022-03-03 05:40:53 -06:00
|
|
|
"github.com/matrix-org/dendrite/userapi/internal"
|
2022-02-18 05:31:05 -06:00
|
|
|
"github.com/matrix-org/dendrite/userapi/storage"
|
2020-06-15 03:54:11 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
serverName = gomatrixserverlib.ServerName("example.com")
|
|
|
|
)
|
|
|
|
|
2022-02-10 04:27:26 -06:00
|
|
|
type apiTestOpts struct {
|
|
|
|
loginTokenLifetime time.Duration
|
|
|
|
}
|
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
func MustMakeInternalAPI(t *testing.T, opts apiTestOpts, dbType test.DBType) (api.UserInternalAPI, storage.Database, func()) {
|
2022-02-10 04:27:26 -06:00
|
|
|
if opts.loginTokenLifetime == 0 {
|
2022-02-18 05:31:05 -06:00
|
|
|
opts.loginTokenLifetime = api.DefaultLoginTokenLifetime * time.Millisecond
|
2022-02-10 04:27:26 -06:00
|
|
|
}
|
2022-10-18 09:59:08 -05:00
|
|
|
base, baseclose := testrig.CreateBaseDendrite(t, dbType)
|
2022-05-05 05:00:18 -05:00
|
|
|
connStr, close := test.PrepareDBConnectionString(t, dbType)
|
2022-10-18 09:59:08 -05:00
|
|
|
accountDB, err := storage.NewUserAPIDatabase(base, &config.DatabaseOptions{
|
2022-05-05 05:00:18 -05:00
|
|
|
ConnectionString: config.DataSource(connStr),
|
|
|
|
}, serverName, bcrypt.MinCost, config.DefaultOpenIDTokenLifetimeMS, opts.loginTokenLifetime, "")
|
2020-06-15 03:54:11 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create account DB: %s", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2020-08-27 12:53:40 -05:00
|
|
|
cfg := &config.UserAPI{
|
|
|
|
Matrix: &config.Global{
|
2022-11-18 06:12:30 -06:00
|
|
|
SigningIdentity: gomatrixserverlib.SigningIdentity{
|
|
|
|
ServerName: serverName,
|
|
|
|
},
|
2020-08-27 12:53:40 -05:00
|
|
|
},
|
2020-06-15 03:54:11 -05:00
|
|
|
}
|
|
|
|
|
2022-03-03 05:40:53 -06:00
|
|
|
return &internal.UserInternalAPI{
|
2022-10-26 06:59:19 -05:00
|
|
|
DB: accountDB,
|
|
|
|
Config: cfg,
|
2022-10-18 09:59:08 -05:00
|
|
|
}, accountDB, func() {
|
|
|
|
close()
|
|
|
|
baseclose()
|
|
|
|
}
|
2020-06-15 03:54:11 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestQueryProfile(t *testing.T) {
|
|
|
|
aliceAvatarURL := "mxc://example.com/alice"
|
|
|
|
aliceDisplayName := "Alice"
|
2022-05-05 05:00:18 -05:00
|
|
|
// only one DBType, since userapi.AddInternalRoutes complains about multiple prometheus counters added
|
|
|
|
userAPI, accountDB, close := MustMakeInternalAPI(t, apiTestOpts{}, test.DBTypeSQLite)
|
|
|
|
defer close()
|
2022-11-11 10:41:37 -06:00
|
|
|
_, err := accountDB.CreateAccount(context.TODO(), "alice", serverName, "foobar", "", api.AccountTypeUser)
|
2020-06-15 03:54:11 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to make account: %s", err)
|
|
|
|
}
|
2022-11-11 10:41:37 -06:00
|
|
|
if _, _, err := accountDB.SetAvatarURL(context.TODO(), "alice", serverName, aliceAvatarURL); err != nil {
|
2020-06-15 03:54:11 -05:00
|
|
|
t.Fatalf("failed to set avatar url: %s", err)
|
|
|
|
}
|
2022-11-11 10:41:37 -06:00
|
|
|
if _, _, err := accountDB.SetDisplayName(context.TODO(), "alice", serverName, aliceDisplayName); err != nil {
|
2020-06-15 03:54:11 -05:00
|
|
|
t.Fatalf("failed to set display name: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
req api.QueryProfileRequest
|
|
|
|
wantRes api.QueryProfileResponse
|
|
|
|
wantErr error
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
req: api.QueryProfileRequest{
|
|
|
|
UserID: fmt.Sprintf("@alice:%s", serverName),
|
|
|
|
},
|
|
|
|
wantRes: api.QueryProfileResponse{
|
|
|
|
UserExists: true,
|
|
|
|
AvatarURL: aliceAvatarURL,
|
|
|
|
DisplayName: aliceDisplayName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: api.QueryProfileRequest{
|
|
|
|
UserID: fmt.Sprintf("@bob:%s", serverName),
|
|
|
|
},
|
|
|
|
wantRes: api.QueryProfileResponse{
|
|
|
|
UserExists: false,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
req: api.QueryProfileRequest{
|
|
|
|
UserID: "@alice:wrongdomain.com",
|
|
|
|
},
|
|
|
|
wantErr: fmt.Errorf("wrong domain"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2022-08-11 09:29:33 -05:00
|
|
|
runCases := func(testAPI api.UserInternalAPI, http bool) {
|
|
|
|
mode := "monolith"
|
|
|
|
if http {
|
|
|
|
mode = "HTTP"
|
|
|
|
}
|
2020-06-15 03:54:11 -05:00
|
|
|
for _, tc := range testCases {
|
|
|
|
var gotRes api.QueryProfileResponse
|
|
|
|
gotErr := testAPI.QueryProfile(context.TODO(), &tc.req, &gotRes)
|
|
|
|
if tc.wantErr == nil && gotErr != nil || tc.wantErr != nil && gotErr == nil {
|
2022-08-11 09:29:33 -05:00
|
|
|
t.Errorf("QueryProfile %s error, got %s want %s", mode, gotErr, tc.wantErr)
|
2020-06-15 03:54:11 -05:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(tc.wantRes, gotRes) {
|
2022-08-11 09:29:33 -05:00
|
|
|
t.Errorf("QueryProfile %s response got %+v want %+v", mode, gotRes, tc.wantRes)
|
2020-06-15 03:54:11 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("HTTP API", func(t *testing.T) {
|
|
|
|
router := mux.NewRouter().PathPrefix(httputil.InternalPathPrefix).Subrouter()
|
2022-05-05 05:00:18 -05:00
|
|
|
userapi.AddInternalRoutes(router, userAPI)
|
2022-05-17 07:23:35 -05:00
|
|
|
apiURL, cancel := test.ListenAndServe(t, router, false)
|
2020-06-15 03:54:11 -05:00
|
|
|
defer cancel()
|
|
|
|
httpAPI, err := inthttp.NewUserAPIClient(apiURL, &http.Client{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to create HTTP client")
|
|
|
|
}
|
2022-08-11 09:29:33 -05:00
|
|
|
runCases(httpAPI, true)
|
2020-06-15 03:54:11 -05:00
|
|
|
})
|
|
|
|
t.Run("Monolith", func(t *testing.T) {
|
2022-08-11 09:29:33 -05:00
|
|
|
runCases(userAPI, false)
|
2020-06-15 03:54:11 -05:00
|
|
|
})
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-10-10 04:45:15 -05:00
|
|
|
// TestPasswordlessLoginFails ensures that a passwordless account cannot
|
|
|
|
// be logged into using an arbitrary password (effectively a regression test
|
|
|
|
// for https://github.com/matrix-org/dendrite/issues/2780).
|
|
|
|
func TestPasswordlessLoginFails(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
userAPI, accountDB, close := MustMakeInternalAPI(t, apiTestOpts{}, dbType)
|
|
|
|
defer close()
|
2022-11-11 10:41:37 -06:00
|
|
|
_, err := accountDB.CreateAccount(ctx, "auser", serverName, "", "", api.AccountTypeAppService)
|
2022-10-10 04:45:15 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to make account: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
userReq := &api.QueryAccountByPasswordRequest{
|
|
|
|
Localpart: "auser",
|
|
|
|
PlaintextPassword: "apassword",
|
|
|
|
}
|
|
|
|
userRes := &api.QueryAccountByPasswordResponse{}
|
|
|
|
if err := userAPI.QueryAccountByPassword(ctx, userReq, userRes); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if userRes.Exists || userRes.Account != nil {
|
|
|
|
t.Fatal("QueryAccountByPassword should not return correctly for a passwordless account")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-02-10 04:27:26 -06:00
|
|
|
func TestLoginToken(t *testing.T) {
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
t.Run("tokenLoginFlow", func(t *testing.T) {
|
2022-05-05 05:00:18 -05:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
userAPI, accountDB, close := MustMakeInternalAPI(t, apiTestOpts{}, dbType)
|
|
|
|
defer close()
|
2022-11-11 10:41:37 -06:00
|
|
|
_, err := accountDB.CreateAccount(ctx, "auser", serverName, "apassword", "", api.AccountTypeUser)
|
2022-05-05 05:00:18 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("failed to make account: %s", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
t.Log("Creating a login token like the SSO callback would...")
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
creq := api.PerformLoginTokenCreationRequest{
|
|
|
|
Data: api.LoginTokenData{UserID: "@auser:example.com"},
|
|
|
|
}
|
|
|
|
var cresp api.PerformLoginTokenCreationResponse
|
|
|
|
if err := userAPI.PerformLoginTokenCreation(ctx, &creq, &cresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenCreation failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
if cresp.Metadata.Token == "" {
|
|
|
|
t.Errorf("PerformLoginTokenCreation Token: got %q, want non-empty", cresp.Metadata.Token)
|
|
|
|
}
|
|
|
|
if cresp.Metadata.Expiration.Before(time.Now()) {
|
|
|
|
t.Errorf("PerformLoginTokenCreation Expiration: got %v, want non-expired", cresp.Metadata.Expiration)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
t.Log("Querying the login token like /login with m.login.token would...")
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
qreq := api.QueryLoginTokenRequest{Token: cresp.Metadata.Token}
|
|
|
|
var qresp api.QueryLoginTokenResponse
|
|
|
|
if err := userAPI.QueryLoginToken(ctx, &qreq, &qresp); err != nil {
|
|
|
|
t.Fatalf("QueryLoginToken failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
if qresp.Data == nil {
|
|
|
|
t.Errorf("QueryLoginToken Data: got %v, want non-nil", qresp.Data)
|
|
|
|
} else if want := "@auser:example.com"; qresp.Data.UserID != want {
|
|
|
|
t.Errorf("QueryLoginToken UserID: got %q, want %q", qresp.Data.UserID, want)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
t.Log("Deleting the login token like /login with m.login.token would...")
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
dreq := api.PerformLoginTokenDeletionRequest{Token: cresp.Metadata.Token}
|
|
|
|
var dresp api.PerformLoginTokenDeletionResponse
|
|
|
|
if err := userAPI.PerformLoginTokenDeletion(ctx, &dreq, &dresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenDeletion failed: %v", err)
|
|
|
|
}
|
|
|
|
})
|
2022-02-10 04:27:26 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("expiredTokenIsNotReturned", func(t *testing.T) {
|
2022-05-05 05:00:18 -05:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
userAPI, _, close := MustMakeInternalAPI(t, apiTestOpts{loginTokenLifetime: -1 * time.Second}, dbType)
|
|
|
|
defer close()
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
creq := api.PerformLoginTokenCreationRequest{
|
|
|
|
Data: api.LoginTokenData{UserID: "@auser:example.com"},
|
|
|
|
}
|
|
|
|
var cresp api.PerformLoginTokenCreationResponse
|
|
|
|
if err := userAPI.PerformLoginTokenCreation(ctx, &creq, &cresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenCreation failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
qreq := api.QueryLoginTokenRequest{Token: cresp.Metadata.Token}
|
|
|
|
var qresp api.QueryLoginTokenResponse
|
|
|
|
if err := userAPI.QueryLoginToken(ctx, &qreq, &qresp); err != nil {
|
|
|
|
t.Fatalf("QueryLoginToken failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
if qresp.Data != nil {
|
|
|
|
t.Errorf("QueryLoginToken Data: got %v, want nil", qresp.Data)
|
|
|
|
}
|
|
|
|
})
|
2022-02-10 04:27:26 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deleteWorks", func(t *testing.T) {
|
2022-05-05 05:00:18 -05:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
userAPI, _, close := MustMakeInternalAPI(t, apiTestOpts{}, dbType)
|
|
|
|
defer close()
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
creq := api.PerformLoginTokenCreationRequest{
|
|
|
|
Data: api.LoginTokenData{UserID: "@auser:example.com"},
|
|
|
|
}
|
|
|
|
var cresp api.PerformLoginTokenCreationResponse
|
|
|
|
if err := userAPI.PerformLoginTokenCreation(ctx, &creq, &cresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenCreation failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
dreq := api.PerformLoginTokenDeletionRequest{Token: cresp.Metadata.Token}
|
|
|
|
var dresp api.PerformLoginTokenDeletionResponse
|
|
|
|
if err := userAPI.PerformLoginTokenDeletion(ctx, &dreq, &dresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenDeletion failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
qreq := api.QueryLoginTokenRequest{Token: cresp.Metadata.Token}
|
|
|
|
var qresp api.QueryLoginTokenResponse
|
|
|
|
if err := userAPI.QueryLoginToken(ctx, &qreq, &qresp); err != nil {
|
|
|
|
t.Fatalf("QueryLoginToken failed: %v", err)
|
|
|
|
}
|
2022-02-10 04:27:26 -06:00
|
|
|
|
2022-05-05 05:00:18 -05:00
|
|
|
if qresp.Data != nil {
|
|
|
|
t.Errorf("QueryLoginToken Data: got %v, want nil", qresp.Data)
|
|
|
|
}
|
|
|
|
})
|
2022-02-10 04:27:26 -06:00
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("deleteUnknownIsNoOp", func(t *testing.T) {
|
2022-05-05 05:00:18 -05:00
|
|
|
test.WithAllDatabases(t, func(t *testing.T, dbType test.DBType) {
|
|
|
|
userAPI, _, close := MustMakeInternalAPI(t, apiTestOpts{}, dbType)
|
|
|
|
defer close()
|
|
|
|
dreq := api.PerformLoginTokenDeletionRequest{Token: "non-existent token"}
|
|
|
|
var dresp api.PerformLoginTokenDeletionResponse
|
|
|
|
if err := userAPI.PerformLoginTokenDeletion(ctx, &dreq, &dresp); err != nil {
|
|
|
|
t.Fatalf("PerformLoginTokenDeletion failed: %v", err)
|
|
|
|
}
|
|
|
|
})
|
2022-02-10 04:27:26 -06:00
|
|
|
})
|
|
|
|
}
|