Add more register tests

This commit is contained in:
Pim Kunis 2021-07-13 19:35:02 +02:00
parent 096c99df92
commit 6b9c9333b8
6 changed files with 86 additions and 33 deletions

View file

@ -24,7 +24,9 @@ defmodule MatrixServer do
def localpart_regex, do: ~r/^([a-z0-9\._=\/])+$/ def localpart_regex, do: ~r/^([a-z0-9\._=\/])+$/
@alphabet Enum.into(?a..?z, []) ++ Enum.into(?A..?Z, []) @alphabet Enum.into(?a..?z, []) ++ Enum.into(?A..?Z, [])
def random_string(length) when length >= 1 do def random_string(length), do: random_string(length, @alphabet)
for _ <- 1..length, into: "", do: <<Enum.random(@alphabet)>>
def random_string(length, alphabet) when length >= 1 do
for _ <- 1..length, into: "", do: <<Enum.random(alphabet)>>
end end
end end

View file

@ -4,6 +4,7 @@ defmodule MatrixServer.Account do
import Ecto.{Changeset, Query} import Ecto.{Changeset, Query}
alias MatrixServer.{Repo, Account, Device} alias MatrixServer.{Repo, Account, Device}
alias MatrixServerWeb.API.Register
alias Ecto.Multi alias Ecto.Multi
@max_mxid_length 255 @max_mxid_length 255
@ -32,20 +33,22 @@ defmodule MatrixServer.Account do
end end
end end
def register(params) do def register(%Register{} = api) do
Multi.new() account_params = %{
|> Multi.insert(:account, changeset(%Account{}, params)) localpart: api.username || MatrixServer.random_string(10, ?a..?z),
|> Multi.insert(:device, fn %{account: account} -> password_hash: Bcrypt.hash_pwd_salt(api.password)
device_id = Device.generate_device_id(account.localpart) }
params = Multi.new()
Map.update(params, :device_id, device_id, fn |> Multi.insert(:account, changeset(%Account{}, account_params))
nil -> device_id |> Multi.insert(:device, fn %{account: account} ->
x -> x device_params = %{
end) display_name: api.initial_device_display_name,
device_id: api.device_id || Device.generate_device_id(account.localpart)
}
Ecto.build_assoc(account, :devices) Ecto.build_assoc(account, :devices)
|> Device.changeset(params) |> Device.changeset(device_params)
end) end)
|> Multi.run(:device_with_access_token, &Device.insert_new_access_token/2) |> Multi.run(:device_with_access_token, &Device.insert_new_access_token/2)
end end

View file

@ -23,7 +23,7 @@ defmodule MatrixServerWeb.API.Register do
:username, :username,
:inhibit_login :inhibit_login
]) ])
|> validate_required([:password, :username]) |> validate_required([:password])
end end
def get_error(%Changeset{errors: [error | _]}), do: get_error(error) def get_error(%Changeset{errors: [error | _]}), do: get_error(error)

View file

@ -14,20 +14,14 @@ defmodule MatrixServerWeb.AuthController do
def register(conn, %{"auth" => %{"type" => @register_type}} = params) do def register(conn, %{"auth" => %{"type" => @register_type}} = params) do
case Register.changeset(params) do case Register.changeset(params) do
%Changeset{valid?: true} = cs -> %Changeset{valid?: true} = cs ->
# TODO: refactor this api = apply_changes(cs)
input =
apply_changes(cs)
|> Map.from_struct()
|> MatrixServer.maybe_update_map(:initial_device_display_name, :display_name)
|> MatrixServer.maybe_update_map(:username, :localpart)
|> MatrixServer.maybe_update_map(:password, :password_hash, &Bcrypt.hash_pwd_salt/1)
case Account.register(input) |> Repo.transaction() do case Account.register(api) |> Repo.transaction() do
{:ok, %{device_with_access_token: device}} -> {:ok, %{device_with_access_token: device}} ->
data = %{user_id: MatrixServer.get_mxid(device.localpart)} data = %{user_id: MatrixServer.get_mxid(device.localpart)}
data = data =
if not input.inhibit_login do if not api.inhibit_login do
data data
|> Map.put(:device_id, device.device_id) |> Map.put(:device_id, device.device_id)
|> Map.put(:access_token, device.access_token) |> Map.put(:access_token, device.access_token)
@ -40,7 +34,6 @@ defmodule MatrixServerWeb.AuthController do
|> json(data) |> json(data)
{:error, _, cs, _} -> {:error, _, cs, _} ->
IO.inspect(cs)
put_error(conn, Register.get_error(cs)) put_error(conn, Register.get_error(cs))
end end

View file

@ -4,7 +4,7 @@ defmodule MatrixServerWeb.Plug.Error do
@error_code_and_message %{ @error_code_and_message %{
bad_json: {400, "M_BAD_JSON", "Bad request."}, bad_json: {400, "M_BAD_JSON", "Bad request."},
user_in_use: {400, "M_USE_IN_USE", "Username is already taken."}, user_in_use: {400, "M_USER_IN_USE", "Username is already taken."},
invalid_username: {400, "M_INVALID_USERNAME", "Invalid username."}, invalid_username: {400, "M_INVALID_USERNAME", "Invalid username."},
forbidden: {400, "M_FORBIDDEN", "The requested action is forbidden."}, forbidden: {400, "M_FORBIDDEN", "The requested action is forbidden."},
unrecognized: {400, "M_UNRECOGNIZED", "Unrecognized request."}, unrecognized: {400, "M_UNRECOGNIZED", "Unrecognized request."},

View file

@ -1,8 +1,17 @@
defmodule MatrixServerWeb.AuthControllerTest do defmodule MatrixServerWeb.AuthControllerTest do
use MatrixServerWeb.ConnCase use MatrixServerWeb.ConnCase
import Ecto.Query
alias MatrixServer.{Repo, Device, Factory}
alias MatrixServerWeb.Endpoint alias MatrixServerWeb.Endpoint
@basic_params %{
"username" => "user",
"password" => "lemmein",
"auth" => %{"type" => "m.login.dummy"}
}
describe "register endpoint" do describe "register endpoint" do
test "renders the auth flow when no auth parameter is given", %{conn: conn} do test "renders the auth flow when no auth parameter is given", %{conn: conn} do
conn = post(conn, Routes.auth_path(conn, :register)) conn = post(conn, Routes.auth_path(conn, :register))
@ -12,18 +21,64 @@ defmodule MatrixServerWeb.AuthControllerTest do
end end
test "registers account with minimal information", %{conn: conn} do test "registers account with minimal information", %{conn: conn} do
params = %{ conn = post_json(conn, Routes.auth_path(Endpoint, :register), @basic_params)
"username" => "user",
"password" => "lemmein",
"auth" => %{"type" => "m.login.dummy"}
}
conn = post_json(conn, Routes.auth_path(Endpoint, :register), params)
user_id = MatrixServer.get_mxid("user") user_id = MatrixServer.get_mxid("user")
assert %{"access_token" => _, "device_id" => _, "user_id" => ^user_id} = assert %{"access_token" => _, "device_id" => _, "user_id" => ^user_id} =
json_response(conn, 200) json_response(conn, 200)
end end
test "registers and sets device id", %{conn: conn} do
params = Map.put(@basic_params, :device_id, "android")
conn = post_json(conn, Routes.auth_path(Endpoint, :register), params)
assert %{"device_id" => "android"} = json_response(conn, 200)
end
test "registers and sets display name", %{conn: conn} do
params = Map.put(@basic_params, :initial_device_display_name, "My Android")
conn = post_json(conn, Routes.auth_path(Endpoint, :register), params)
assert json_response(conn, 200)
assert Repo.one!(from d in Device, select: d.display_name) == "My Android"
end
test "rejects account if localpart is already in use", %{conn: conn} do
Factory.insert(:account, localpart: "sneed")
conn =
post_json(conn, Routes.auth_path(Endpoint, :register), %{
@basic_params
| "username" => "sneed"
})
assert %{"errcode" => "M_USER_IN_USE"} = json_response(conn, 400)
end
test "obeys inhibit_login parameter", %{conn: conn} do
params = Map.put(@basic_params, :inhibit_login, "true")
conn = post_json(conn, Routes.auth_path(Endpoint, :register), params)
assert response = json_response(conn, 200)
refute Map.has_key?(response, "access_token")
refute Map.has_key?(response, "device_id")
end
test "generates localpart if omitted", %{conn: conn} do
params = Map.delete(@basic_params, "username")
conn = post_json(conn, Routes.auth_path(Endpoint, :register), params)
assert %{"user_id" => _} = json_response(conn, 200)
end
test "rejects invalid usernames", %{conn: conn} do
conn =
post_json(conn, Routes.auth_path(Endpoint, :register), %{
@basic_params
| "username" => "User1"
})
assert %{"errcode" => "M_INVALID_USERNAME"} = json_response(conn, 400)
end
end end
end end