chunking away at it
This commit is contained in:
@ -19,6 +19,8 @@
|
||||
package account
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"net"
|
||||
"net/http"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
@ -26,9 +28,10 @@ import (
|
||||
"github.com/gotosocial/gotosocial/internal/db"
|
||||
"github.com/gotosocial/gotosocial/internal/db/model"
|
||||
"github.com/gotosocial/gotosocial/internal/module"
|
||||
"github.com/gotosocial/gotosocial/internal/module/oauth"
|
||||
"github.com/gotosocial/gotosocial/internal/oauth"
|
||||
"github.com/gotosocial/gotosocial/internal/router"
|
||||
"github.com/gotosocial/gotosocial/pkg/mastotypes"
|
||||
"github.com/gotosocial/oauth2/v4"
|
||||
"github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
@ -39,9 +42,10 @@ const (
|
||||
)
|
||||
|
||||
type accountModule struct {
|
||||
config *config.Config
|
||||
db db.DB
|
||||
log *logrus.Logger
|
||||
config *config.Config
|
||||
db db.DB
|
||||
oauthServer oauth.Server
|
||||
log *logrus.Logger
|
||||
}
|
||||
|
||||
// New returns a new account module
|
||||
@ -60,15 +64,15 @@ func (m *accountModule) Route(r router.Router) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
// accountCreatePOSTHandler handles create account requests, validates them,
|
||||
// and puts them in the database if they're valid.
|
||||
// It should be served as a POST at /api/v1/accounts
|
||||
func (m *accountModule) accountCreatePOSTHandler(c *gin.Context) {
|
||||
l := m.log.WithField("func", "AccountCreatePOSTHandler")
|
||||
// TODO: check whether a valid app token has been presented!!
|
||||
// See: https://docs.joinmastodon.org/methods/accounts/
|
||||
|
||||
l.Trace("checking if registration is open")
|
||||
if !m.config.AccountsConfig.OpenRegistration {
|
||||
l.Debug("account registration is closed, returning error to client")
|
||||
c.JSON(http.StatusUnauthorized, gin.H{"error": "account registration is closed"})
|
||||
l := m.log.WithField("func", "accountCreatePOSTHandler")
|
||||
authed, err := oauth.GetAuthed(c)
|
||||
if err != nil {
|
||||
l.Debugf("couldn't auth: %s", err)
|
||||
c.JSON(http.StatusForbidden, gin.H{"error": err.Error()})
|
||||
return
|
||||
}
|
||||
|
||||
@ -81,15 +85,34 @@ func (m *accountModule) accountCreatePOSTHandler(c *gin.Context) {
|
||||
}
|
||||
|
||||
l.Tracef("validating form %+v", form)
|
||||
if err := validateCreateAccount(form, m.config.AccountsConfig.ReasonRequired, m.db); err != nil {
|
||||
if err := validateCreateAccount(form, m.config.AccountsConfig, m.db); err != nil {
|
||||
l.Debugf("error validating form: %s", err)
|
||||
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
||||
return
|
||||
}
|
||||
|
||||
clientIP := c.ClientIP()
|
||||
l.Tracef("attempting to parse client ip address %s", clientIP)
|
||||
signUpIP := net.ParseIP(clientIP)
|
||||
if signUpIP == nil {
|
||||
l.Debugf("error validating sign up ip address %s", clientIP)
|
||||
c.JSON(http.StatusBadRequest, gin.H{"error": "ip address could not be parsed from request"})
|
||||
return
|
||||
}
|
||||
|
||||
ti, err := m.accountCreate(form, signUpIP, authed.Token, authed.Application)
|
||||
if err != nil {
|
||||
l.Errorf("internal server error while creating new account: %s", err)
|
||||
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
||||
return
|
||||
}
|
||||
|
||||
c.JSON(http.StatusOK, ti)
|
||||
}
|
||||
|
||||
// accountVerifyGETHandler serves a user's account details to them IF they reached this
|
||||
// handler while in possession of a valid token, according to the oauth middleware.
|
||||
// It should be served as a GET at /api/v1/accounts/verify_credentials
|
||||
func (m *accountModule) accountVerifyGETHandler(c *gin.Context) {
|
||||
l := m.log.WithField("func", "AccountVerifyGETHandler")
|
||||
|
||||
@ -120,3 +143,39 @@ func (m *accountModule) accountVerifyGETHandler(c *gin.Context) {
|
||||
l.Tracef("conversion successful, returning OK and mastosensitive account %+v", acctSensitive)
|
||||
c.JSON(http.StatusOK, acctSensitive)
|
||||
}
|
||||
|
||||
/*
|
||||
HELPER FUNCTIONS
|
||||
*/
|
||||
|
||||
// accountCreate does the dirty work of making an account and user in the database.
|
||||
// It then returns a token to the caller, for use with the new account, as per the
|
||||
// spec here: https://docs.joinmastodon.org/methods/accounts/
|
||||
func (m *accountModule) accountCreate(form *mastotypes.AccountCreateRequest, signUpIP net.IP, token oauth2.TokenInfo, app *model.Application) (*mastotypes.Token, error) {
|
||||
l := m.log.WithField("func", "accountCreate")
|
||||
|
||||
// don't store a reason if we don't require one
|
||||
reason := form.Reason
|
||||
if !m.config.AccountsConfig.ReasonRequired {
|
||||
reason = ""
|
||||
}
|
||||
|
||||
l.Trace("creating new username and account")
|
||||
user, err := m.db.NewSignup(form.Username, reason, m.config.AccountsConfig.RequireApproval, form.Email, form.Password, signUpIP, form.Locale)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error creating new signup in the database: %s", err)
|
||||
}
|
||||
|
||||
l.Tracef("generating a token for user %s with account %s and application %s", user.ID, user.AccountID, app.ID)
|
||||
ti, err := m.oauthServer.GenerateUserAccessToken(token, app.ClientSecret, user.ID)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error creating new access token for user %s: %s", user.ID, err)
|
||||
}
|
||||
|
||||
return &mastotypes.Token{
|
||||
AccessToken: ti.GetCode(),
|
||||
TokenType: "Bearer",
|
||||
Scope: ti.GetScope(),
|
||||
CreatedAt: ti.GetCodeCreateAt().Unix(),
|
||||
}, nil
|
||||
}
|
||||
|
||||
@ -20,34 +20,33 @@ package account
|
||||
|
||||
import (
|
||||
"context"
|
||||
"fmt"
|
||||
"net/url"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
"time"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
"github.com/google/uuid"
|
||||
"github.com/gotosocial/gotosocial/internal/config"
|
||||
"github.com/gotosocial/gotosocial/internal/db"
|
||||
"github.com/gotosocial/gotosocial/internal/db/model"
|
||||
"github.com/gotosocial/gotosocial/internal/module/oauth"
|
||||
"github.com/gotosocial/gotosocial/internal/router"
|
||||
"github.com/sirupsen/logrus"
|
||||
"github.com/stretchr/testify/suite"
|
||||
"golang.org/x/crypto/bcrypt"
|
||||
)
|
||||
|
||||
type AccountTestSuite struct {
|
||||
suite.Suite
|
||||
db db.DB
|
||||
log *logrus.Logger
|
||||
testAccountLocal *model.Account
|
||||
testAccountRemote *model.Account
|
||||
testUser *model.User
|
||||
config *config.Config
|
||||
db db.DB
|
||||
accountModule *accountModule
|
||||
}
|
||||
|
||||
// SetupSuite sets some variables on the suite that we can use as consts (more or less) throughout
|
||||
func (suite *AccountTestSuite) SetupSuite() {
|
||||
log := logrus.New()
|
||||
log.SetLevel(logrus.TraceLevel)
|
||||
suite.log = log
|
||||
|
||||
c := config.Empty()
|
||||
c.DBConfig = &config.DBConfig{
|
||||
Type: "postgres",
|
||||
@ -58,118 +57,126 @@ func (suite *AccountTestSuite) SetupSuite() {
|
||||
Database: "postgres",
|
||||
ApplicationName: "gotosocial",
|
||||
}
|
||||
suite.config = c
|
||||
|
||||
encryptedPassword, err := bcrypt.GenerateFromPassword([]byte("password"), bcrypt.DefaultCost)
|
||||
database, err := db.New(context.Background(), c, log)
|
||||
if err != nil {
|
||||
logrus.Panicf("error encrypting user pass: %s", err)
|
||||
suite.FailNow(err.Error())
|
||||
}
|
||||
suite.db = database
|
||||
|
||||
suite.accountModule = &accountModule{
|
||||
config: c,
|
||||
db: database,
|
||||
log: log,
|
||||
}
|
||||
|
||||
localAvatar, err := url.Parse("https://localhost:8080/media/aaaaaaaaa.png")
|
||||
if err != nil {
|
||||
logrus.Panicf("error parsing localavatar url: %s", err)
|
||||
}
|
||||
localHeader, err := url.Parse("https://localhost:8080/media/ffffffffff.png")
|
||||
if err != nil {
|
||||
logrus.Panicf("error parsing localheader url: %s", err)
|
||||
}
|
||||
// encryptedPassword, err := bcrypt.GenerateFromPassword([]byte("password"), bcrypt.DefaultCost)
|
||||
// if err != nil {
|
||||
// logrus.Panicf("error encrypting user pass: %s", err)
|
||||
// }
|
||||
|
||||
acctID := uuid.NewString()
|
||||
suite.testAccountLocal = &model.Account{
|
||||
ID: acctID,
|
||||
Username: "local_account_of_some_kind",
|
||||
AvatarRemoteURL: localAvatar,
|
||||
HeaderRemoteURL: localHeader,
|
||||
DisplayName: "michael caine",
|
||||
Fields: []model.Field{
|
||||
{
|
||||
Name: "come and ave a go",
|
||||
Value: "if you think you're hard enough",
|
||||
},
|
||||
{
|
||||
Name: "website",
|
||||
Value: "https://imdb.com",
|
||||
VerifiedAt: time.Now(),
|
||||
},
|
||||
},
|
||||
Note: "My name is Michael Caine and i'm a local user.",
|
||||
Discoverable: true,
|
||||
}
|
||||
// localAvatar, err := url.Parse("https://localhost:8080/media/aaaaaaaaa.png")
|
||||
// if err != nil {
|
||||
// logrus.Panicf("error parsing localavatar url: %s", err)
|
||||
// }
|
||||
// localHeader, err := url.Parse("https://localhost:8080/media/ffffffffff.png")
|
||||
// if err != nil {
|
||||
// logrus.Panicf("error parsing localheader url: %s", err)
|
||||
// }
|
||||
|
||||
avatarURL, err := url.Parse("http://example.org/accounts/avatars/000/207/122/original/089-1098-09.png")
|
||||
if err != nil {
|
||||
logrus.Panicf("error parsing avatarURL: %s", err)
|
||||
}
|
||||
// acctID := uuid.NewString()
|
||||
// suite.testAccountLocal = &model.Account{
|
||||
// ID: acctID,
|
||||
// Username: "local_account_of_some_kind",
|
||||
// AvatarRemoteURL: localAvatar,
|
||||
// HeaderRemoteURL: localHeader,
|
||||
// DisplayName: "michael caine",
|
||||
// Fields: []model.Field{
|
||||
// {
|
||||
// Name: "come and ave a go",
|
||||
// Value: "if you think you're hard enough",
|
||||
// },
|
||||
// {
|
||||
// Name: "website",
|
||||
// Value: "https://imdb.com",
|
||||
// VerifiedAt: time.Now(),
|
||||
// },
|
||||
// },
|
||||
// Note: "My name is Michael Caine and i'm a local user.",
|
||||
// Discoverable: true,
|
||||
// }
|
||||
|
||||
headerURL, err := url.Parse("http://example.org/accounts/headers/000/207/122/original/111111111111.png")
|
||||
if err != nil {
|
||||
logrus.Panicf("error parsing avatarURL: %s", err)
|
||||
}
|
||||
suite.testAccountRemote = &model.Account{
|
||||
ID: uuid.NewString(),
|
||||
Username: "neato_bombeato",
|
||||
Domain: "example.org",
|
||||
// avatarURL, err := url.Parse("http://example.org/accounts/avatars/000/207/122/original/089-1098-09.png")
|
||||
// if err != nil {
|
||||
// logrus.Panicf("error parsing avatarURL: %s", err)
|
||||
// }
|
||||
|
||||
AvatarFileName: "avatar.png",
|
||||
AvatarContentType: "image/png",
|
||||
AvatarFileSize: 1024,
|
||||
AvatarUpdatedAt: time.Now(),
|
||||
AvatarRemoteURL: avatarURL,
|
||||
// headerURL, err := url.Parse("http://example.org/accounts/headers/000/207/122/original/111111111111.png")
|
||||
// if err != nil {
|
||||
// logrus.Panicf("error parsing avatarURL: %s", err)
|
||||
// }
|
||||
// suite.testAccountRemote = &model.Account{
|
||||
// ID: uuid.NewString(),
|
||||
// Username: "neato_bombeato",
|
||||
// Domain: "example.org",
|
||||
|
||||
HeaderFileName: "avatar.png",
|
||||
HeaderContentType: "image/png",
|
||||
HeaderFileSize: 1024,
|
||||
HeaderUpdatedAt: time.Now(),
|
||||
HeaderRemoteURL: headerURL,
|
||||
// AvatarFileName: "avatar.png",
|
||||
// AvatarContentType: "image/png",
|
||||
// AvatarFileSize: 1024,
|
||||
// AvatarUpdatedAt: time.Now(),
|
||||
// AvatarRemoteURL: avatarURL,
|
||||
|
||||
DisplayName: "one cool dude 420",
|
||||
Fields: []model.Field{
|
||||
{
|
||||
Name: "pronouns",
|
||||
Value: "he/they",
|
||||
},
|
||||
{
|
||||
Name: "website",
|
||||
Value: "https://imcool.edu",
|
||||
VerifiedAt: time.Now(),
|
||||
},
|
||||
},
|
||||
Note: "<p>I'm cool as heck!</p>",
|
||||
Discoverable: true,
|
||||
URI: "https://example.org/users/neato_bombeato",
|
||||
URL: "https://example.org/@neato_bombeato",
|
||||
LastWebfingeredAt: time.Now(),
|
||||
InboxURL: "https://example.org/users/neato_bombeato/inbox",
|
||||
OutboxURL: "https://example.org/users/neato_bombeato/outbox",
|
||||
SharedInboxURL: "https://example.org/inbox",
|
||||
FollowersURL: "https://example.org/users/neato_bombeato/followers",
|
||||
FeaturedCollectionURL: "https://example.org/users/neato_bombeato/collections/featured",
|
||||
}
|
||||
suite.testUser = &model.User{
|
||||
ID: uuid.NewString(),
|
||||
EncryptedPassword: string(encryptedPassword),
|
||||
Email: "user@example.org",
|
||||
AccountID: acctID,
|
||||
// HeaderFileName: "avatar.png",
|
||||
// HeaderContentType: "image/png",
|
||||
// HeaderFileSize: 1024,
|
||||
// HeaderUpdatedAt: time.Now(),
|
||||
// HeaderRemoteURL: headerURL,
|
||||
|
||||
// DisplayName: "one cool dude 420",
|
||||
// Fields: []model.Field{
|
||||
// {
|
||||
// Name: "pronouns",
|
||||
// Value: "he/they",
|
||||
// },
|
||||
// {
|
||||
// Name: "website",
|
||||
// Value: "https://imcool.edu",
|
||||
// VerifiedAt: time.Now(),
|
||||
// },
|
||||
// },
|
||||
// Note: "<p>I'm cool as heck!</p>",
|
||||
// Discoverable: true,
|
||||
// URI: "https://example.org/users/neato_bombeato",
|
||||
// URL: "https://example.org/@neato_bombeato",
|
||||
// LastWebfingeredAt: time.Now(),
|
||||
// InboxURL: "https://example.org/users/neato_bombeato/inbox",
|
||||
// OutboxURL: "https://example.org/users/neato_bombeato/outbox",
|
||||
// SharedInboxURL: "https://example.org/inbox",
|
||||
// FollowersURL: "https://example.org/users/neato_bombeato/followers",
|
||||
// FeaturedCollectionURL: "https://example.org/users/neato_bombeato/collections/featured",
|
||||
// }
|
||||
// suite.testUser = &model.User{
|
||||
// ID: uuid.NewString(),
|
||||
// EncryptedPassword: string(encryptedPassword),
|
||||
// Email: "user@example.org",
|
||||
// AccountID: acctID,
|
||||
// }
|
||||
}
|
||||
|
||||
func (suite *AccountTestSuite) TearDownSuite() {
|
||||
if err := suite.db.Stop(context.Background()); err != nil {
|
||||
logrus.Panicf("error closing db connection: %s", err)
|
||||
}
|
||||
}
|
||||
|
||||
// SetupTest creates a postgres connection and creates the oauth_clients table before each test
|
||||
// SetupTest creates a db connection and creates necessary tables before each test
|
||||
func (suite *AccountTestSuite) SetupTest() {
|
||||
|
||||
log := logrus.New()
|
||||
log.SetLevel(logrus.TraceLevel)
|
||||
db, err := db.New(context.Background(), suite.config, log)
|
||||
if err != nil {
|
||||
logrus.Panicf("error creating database connection: %s", err)
|
||||
}
|
||||
|
||||
suite.db = db
|
||||
|
||||
models := []interface{}{
|
||||
&model.User{},
|
||||
&model.Account{},
|
||||
&model.Follow{},
|
||||
&model.Status{},
|
||||
&model.Application{},
|
||||
}
|
||||
|
||||
for _, m := range models {
|
||||
@ -177,70 +184,31 @@ func (suite *AccountTestSuite) SetupTest() {
|
||||
logrus.Panicf("db connection error: %s", err)
|
||||
}
|
||||
}
|
||||
|
||||
if err := suite.db.Put(suite.testAccountLocal); err != nil {
|
||||
logrus.Panicf("could not insert test account into db: %s", err)
|
||||
}
|
||||
if err := suite.db.Put(suite.testUser); err != nil {
|
||||
logrus.Panicf("could not insert test user into db: %s", err)
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
// TearDownTest drops the oauth_clients table and closes the pg connection after each test
|
||||
// TearDownTest drops tables to make sure there's no data in the db
|
||||
func (suite *AccountTestSuite) TearDownTest() {
|
||||
models := []interface{}{
|
||||
&model.User{},
|
||||
&model.Account{},
|
||||
&model.Follow{},
|
||||
&model.Status{},
|
||||
&model.Application{},
|
||||
}
|
||||
for _, m := range models {
|
||||
if err := suite.db.DropTable(m); err != nil {
|
||||
logrus.Panicf("error dropping table: %s", err)
|
||||
}
|
||||
}
|
||||
if err := suite.db.Stop(context.Background()); err != nil {
|
||||
logrus.Panicf("error closing db connection: %s", err)
|
||||
}
|
||||
suite.db = nil
|
||||
}
|
||||
|
||||
func (suite *AccountTestSuite) TestAPIInitialize() {
|
||||
log := logrus.New()
|
||||
log.SetLevel(logrus.TraceLevel)
|
||||
|
||||
r, err := router.New(suite.config, log)
|
||||
if err != nil {
|
||||
suite.FailNow(fmt.Sprintf("error creating router: %s", err))
|
||||
}
|
||||
|
||||
r.AttachMiddleware(func(c *gin.Context) {
|
||||
account := &model.Account{}
|
||||
if err := suite.db.GetAccountByUserID(suite.testUser.ID, account); err != nil || account == nil {
|
||||
suite.T().Log(err)
|
||||
suite.FailNowf("no account found for user %s, continuing with unauthenticated request: %+v", "", suite.testUser.ID, account)
|
||||
fmt.Println(account)
|
||||
return
|
||||
}
|
||||
|
||||
c.Set(oauth.SessionAuthorizedAccount, account)
|
||||
c.Set(oauth.SessionAuthorizedUser, suite.testUser.ID)
|
||||
})
|
||||
|
||||
acct := New(suite.config, suite.db, log)
|
||||
if err := acct.Route(r); err != nil {
|
||||
suite.FailNow(fmt.Sprintf("error mapping routes onto router: %s", err))
|
||||
}
|
||||
|
||||
r.Start()
|
||||
defer func() {
|
||||
if err := r.Stop(context.Background()); err != nil {
|
||||
panic(fmt.Errorf("error stopping router: %s", err))
|
||||
}
|
||||
}()
|
||||
time.Sleep(10 * time.Second)
|
||||
|
||||
func (suite *AccountTestSuite) TestAccountCreatePOSTHandler() {
|
||||
// TODO: figure out how to test this properly
|
||||
recorder := httptest.NewRecorder()
|
||||
recorder.Header().Set("X-Forwarded-For", "127.0.0.1")
|
||||
ctx, _ := gin.CreateTestContext(recorder)
|
||||
// ctx.Set()
|
||||
suite.accountModule.accountCreatePOSTHandler(ctx)
|
||||
}
|
||||
|
||||
func TestAccountTestSuite(t *testing.T) {
|
||||
|
||||
@ -21,12 +21,17 @@ package account
|
||||
import (
|
||||
"errors"
|
||||
|
||||
"github.com/gotosocial/gotosocial/internal/config"
|
||||
"github.com/gotosocial/gotosocial/internal/db"
|
||||
"github.com/gotosocial/gotosocial/internal/util"
|
||||
"github.com/gotosocial/gotosocial/pkg/mastotypes"
|
||||
)
|
||||
|
||||
func validateCreateAccount(form *mastotypes.AccountCreateRequest, reasonRequired bool, database db.DB) error {
|
||||
func validateCreateAccount(form *mastotypes.AccountCreateRequest, c *config.AccountsConfig, database db.DB) error {
|
||||
if !c.OpenRegistration {
|
||||
return errors.New("registration is not open for this server")
|
||||
}
|
||||
|
||||
if err := util.ValidateSignUpUsername(form.Username); err != nil {
|
||||
return err
|
||||
}
|
||||
@ -47,7 +52,7 @@ func validateCreateAccount(form *mastotypes.AccountCreateRequest, reasonRequired
|
||||
return err
|
||||
}
|
||||
|
||||
if err := util.ValidateSignUpReason(form.Reason, reasonRequired); err != nil {
|
||||
if err := util.ValidateSignUpReason(form.Reason, c.ReasonRequired); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user