2023-03-12 18:00:57 +03:00
|
|
|
// GoToSocial
|
|
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
//
|
|
|
|
// This program is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Affero General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2021-03-01 17:41:43 +03:00
|
|
|
|
2023-01-02 15:10:50 +03:00
|
|
|
package accounts_test
|
2021-09-10 15:36:10 +03:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
2024-07-31 19:26:09 +03:00
|
|
|
"io"
|
2021-09-10 15:36:10 +03:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/stretchr/testify/suite"
|
2023-01-02 15:10:50 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/api/client/accounts"
|
2021-09-10 15:36:10 +03:00
|
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
2024-07-31 19:26:09 +03:00
|
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
2021-09-10 15:36:10 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
type AccountVerifyTestSuite struct {
|
|
|
|
AccountStandardTestSuite
|
|
|
|
}
|
|
|
|
|
2024-07-31 19:26:09 +03:00
|
|
|
// accountVerifyGet calls the verify_credentials API method for a given account fixture name.
|
|
|
|
// Assumes token and user fixture names are the same as the account fixture name.
|
|
|
|
func (suite *AccountVerifyTestSuite) accountVerifyGet(fixtureName string) *apimodel.Account {
|
2021-09-10 15:36:10 +03:00
|
|
|
// set up the request
|
|
|
|
recorder := httptest.NewRecorder()
|
2023-01-02 15:10:50 +03:00
|
|
|
ctx := suite.newContext(recorder, http.MethodGet, nil, accounts.VerifyPath, "")
|
2021-09-10 15:36:10 +03:00
|
|
|
|
2024-07-31 19:26:09 +03:00
|
|
|
// override the account that we're authenticated as
|
|
|
|
ctx.Set(oauth.SessionAuthorizedAccount, suite.testAccounts[fixtureName])
|
|
|
|
ctx.Set(oauth.SessionAuthorizedToken, oauth.DBTokenToToken(suite.testTokens[fixtureName]))
|
|
|
|
ctx.Set(oauth.SessionAuthorizedUser, suite.testUsers[fixtureName])
|
|
|
|
|
2021-09-10 15:36:10 +03:00
|
|
|
// call the handler
|
2023-01-02 15:10:50 +03:00
|
|
|
suite.accountsModule.AccountVerifyGETHandler(ctx)
|
2021-09-10 15:36:10 +03:00
|
|
|
|
|
|
|
// 1. we should have OK because our request was valid
|
|
|
|
suite.Equal(http.StatusOK, recorder.Code)
|
|
|
|
|
|
|
|
// 2. we should have no error message in the result body
|
|
|
|
result := recorder.Result()
|
|
|
|
defer result.Body.Close()
|
|
|
|
|
|
|
|
// check the response
|
2024-07-31 19:26:09 +03:00
|
|
|
b, err := io.ReadAll(result.Body)
|
|
|
|
if err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
2021-09-10 15:36:10 +03:00
|
|
|
|
|
|
|
// unmarshal the returned account
|
|
|
|
apimodelAccount := &apimodel.Account{}
|
|
|
|
err = json.Unmarshal(b, apimodelAccount)
|
2024-07-31 19:26:09 +03:00
|
|
|
if err != nil {
|
|
|
|
suite.FailNow(err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
return apimodelAccount
|
|
|
|
}
|
|
|
|
|
|
|
|
// We should see public account information and profile source for a normal user.
|
|
|
|
func (suite *AccountVerifyTestSuite) TestAccountVerifyGet() {
|
|
|
|
fixtureName := "local_account_1"
|
|
|
|
testAccount := suite.testAccounts[fixtureName]
|
|
|
|
|
|
|
|
apimodelAccount := suite.accountVerifyGet(fixtureName)
|
2021-09-10 15:36:10 +03:00
|
|
|
|
|
|
|
createdAt, err := time.Parse(time.RFC3339, apimodelAccount.CreatedAt)
|
|
|
|
suite.NoError(err)
|
2022-01-25 14:03:25 +03:00
|
|
|
|
2021-09-10 15:36:10 +03:00
|
|
|
suite.Equal(testAccount.ID, apimodelAccount.ID)
|
|
|
|
suite.Equal(testAccount.Username, apimodelAccount.Username)
|
|
|
|
suite.Equal(testAccount.Username, apimodelAccount.Acct)
|
|
|
|
suite.Equal(testAccount.DisplayName, apimodelAccount.DisplayName)
|
2022-08-15 13:35:05 +03:00
|
|
|
suite.Equal(*testAccount.Locked, apimodelAccount.Locked)
|
|
|
|
suite.Equal(*testAccount.Bot, apimodelAccount.Bot)
|
2021-09-10 15:36:10 +03:00
|
|
|
suite.WithinDuration(testAccount.CreatedAt, createdAt, 30*time.Second) // we lose a bit of accuracy serializing so fuzz this a bit
|
|
|
|
suite.Equal(testAccount.URL, apimodelAccount.URL)
|
2023-01-11 14:13:13 +03:00
|
|
|
suite.Equal("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/avatar/original/01F8MH58A357CV5K7R7TJMSH6S.jpg", apimodelAccount.Avatar)
|
2024-07-19 18:28:43 +03:00
|
|
|
suite.Equal("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/avatar/small/01F8MH58A357CV5K7R7TJMSH6S.webp", apimodelAccount.AvatarStatic)
|
2023-01-11 14:13:13 +03:00
|
|
|
suite.Equal("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/header/original/01PFPMWK2FF0D9WMHEJHR07C3Q.jpg", apimodelAccount.Header)
|
2024-07-19 18:28:43 +03:00
|
|
|
suite.Equal("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/header/small/01PFPMWK2FF0D9WMHEJHR07C3Q.webp", apimodelAccount.HeaderStatic)
|
2022-04-29 16:05:13 +03:00
|
|
|
suite.Equal(2, apimodelAccount.FollowersCount)
|
2021-09-10 15:36:10 +03:00
|
|
|
suite.Equal(2, apimodelAccount.FollowingCount)
|
2024-12-05 16:35:07 +03:00
|
|
|
suite.Equal(9, apimodelAccount.StatusesCount)
|
2024-11-25 16:48:59 +03:00
|
|
|
suite.EqualValues(apimodel.VisibilityPublic, apimodelAccount.Source.Privacy)
|
2024-03-22 16:03:46 +03:00
|
|
|
suite.Equal(testAccount.Settings.Language, apimodelAccount.Source.Language)
|
2022-05-07 18:55:27 +03:00
|
|
|
suite.Equal(testAccount.NoteRaw, apimodelAccount.Source.Note)
|
2021-09-10 15:36:10 +03:00
|
|
|
}
|
|
|
|
|
2024-07-31 19:26:09 +03:00
|
|
|
// testAccountVerifyGetRole calls the verify_credentials API method for a given account fixture name,
|
|
|
|
// and checks the response for permissions appropriate to the role.
|
|
|
|
func (suite *AccountVerifyTestSuite) testAccountVerifyGetRole(fixtureName string) {
|
|
|
|
testUser := suite.testUsers[fixtureName]
|
|
|
|
|
|
|
|
apimodelAccount := suite.accountVerifyGet(fixtureName)
|
|
|
|
|
|
|
|
if suite.NotNil(apimodelAccount.Role) {
|
|
|
|
switch {
|
|
|
|
case *testUser.Admin:
|
|
|
|
suite.Equal("admin", string(apimodelAccount.Role.Name))
|
|
|
|
suite.NotZero(apimodelAccount.Role.Permissions)
|
|
|
|
suite.True(apimodelAccount.Role.Highlighted)
|
|
|
|
|
|
|
|
case *testUser.Moderator:
|
|
|
|
suite.Equal("moderator", string(apimodelAccount.Role.Name))
|
|
|
|
suite.Zero(apimodelAccount.Role.Permissions)
|
|
|
|
suite.True(apimodelAccount.Role.Highlighted)
|
|
|
|
|
|
|
|
default:
|
|
|
|
suite.Equal("user", string(apimodelAccount.Role.Name))
|
|
|
|
suite.Zero(apimodelAccount.Role.Permissions)
|
|
|
|
suite.False(apimodelAccount.Role.Highlighted)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// We should see a role for a normal user, and that role should not have any permissions.
|
|
|
|
func (suite *AccountVerifyTestSuite) TestAccountVerifyGetRoleUser() {
|
|
|
|
suite.testAccountVerifyGetRole("local_account_1")
|
|
|
|
}
|
|
|
|
|
|
|
|
// We should see a role for an admin user, and that role should have some permissions.
|
|
|
|
func (suite *AccountVerifyTestSuite) TestAccountVerifyGetRoleAdmin() {
|
|
|
|
suite.testAccountVerifyGetRole("admin_account")
|
|
|
|
}
|
|
|
|
|
2021-09-10 15:36:10 +03:00
|
|
|
func TestAccountVerifyTestSuite(t *testing.T) {
|
|
|
|
suite.Run(t, new(AccountVerifyTestSuite))
|
|
|
|
}
|