aboutsummaryrefslogtreecommitdiff
path: root/clientapi/admin_test.go
diff options
context:
space:
mode:
Diffstat (limited to 'clientapi/admin_test.go')
-rw-r--r--clientapi/admin_test.go67
1 files changed, 17 insertions, 50 deletions
diff --git a/clientapi/admin_test.go b/clientapi/admin_test.go
index 3e7cb875..79e88d13 100644
--- a/clientapi/admin_test.go
+++ b/clientapi/admin_test.go
@@ -8,7 +8,6 @@ import (
"testing"
"time"
- "github.com/matrix-org/dendrite/clientapi/auth/authtypes"
"github.com/matrix-org/dendrite/federationapi"
"github.com/matrix-org/dendrite/internal/caching"
"github.com/matrix-org/dendrite/internal/httputil"
@@ -54,10 +53,10 @@ func TestAdminResetPassword(t *testing.T) {
AddPublicRoutes(processCtx, routers, cfg, &natsInstance, nil, rsAPI, nil, nil, nil, userAPI, nil, nil, caching.DisableMetrics)
// Create the users in the userapi and login
- accessTokens := map[*test.User]string{
- aliceAdmin: "",
- bob: "",
- vhUser: "",
+ accessTokens := map[*test.User]userDevice{
+ aliceAdmin: {},
+ bob: {},
+ vhUser: {},
}
createAccessTokens(t, accessTokens, userAPI, ctx, routers)
@@ -103,7 +102,7 @@ func TestAdminResetPassword(t *testing.T) {
}
if tc.withHeader {
- req.Header.Set("Authorization", "Bearer "+accessTokens[tc.requestingUser])
+ req.Header.Set("Authorization", "Bearer "+accessTokens[tc.requestingUser].accessToken)
}
rec := httptest.NewRecorder()
@@ -154,8 +153,8 @@ func TestPurgeRoom(t *testing.T) {
AddPublicRoutes(processCtx, routers, cfg, &natsInstance, nil, rsAPI, nil, nil, nil, userAPI, nil, nil, caching.DisableMetrics)
// Create the users in the userapi and login
- accessTokens := map[*test.User]string{
- aliceAdmin: "",
+ accessTokens := map[*test.User]userDevice{
+ aliceAdmin: {},
}
createAccessTokens(t, accessTokens, userAPI, ctx, routers)
@@ -174,7 +173,7 @@ func TestPurgeRoom(t *testing.T) {
t.Run(tc.name, func(t *testing.T) {
req := test.NewRequest(t, http.MethodPost, "/_dendrite/admin/purgeRoom/"+tc.roomID)
- req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin])
+ req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin].accessToken)
rec := httptest.NewRecorder()
routers.DendriteAdmin.ServeHTTP(rec, req)
@@ -224,8 +223,8 @@ func TestAdminEvacuateRoom(t *testing.T) {
AddPublicRoutes(processCtx, routers, cfg, &natsInstance, nil, rsAPI, nil, nil, nil, userAPI, nil, nil, caching.DisableMetrics)
// Create the users in the userapi and login
- accessTokens := map[*test.User]string{
- aliceAdmin: "",
+ accessTokens := map[*test.User]userDevice{
+ aliceAdmin: {},
}
createAccessTokens(t, accessTokens, userAPI, ctx, routers)
@@ -243,7 +242,7 @@ func TestAdminEvacuateRoom(t *testing.T) {
t.Run(tc.name, func(t *testing.T) {
req := test.NewRequest(t, http.MethodPost, "/_dendrite/admin/evacuateRoom/"+tc.roomID)
- req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin])
+ req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin].accessToken)
rec := httptest.NewRecorder()
routers.DendriteAdmin.ServeHTTP(rec, req)
@@ -308,8 +307,8 @@ func TestAdminEvacuateUser(t *testing.T) {
AddPublicRoutes(processCtx, routers, cfg, &natsInstance, nil, rsAPI, nil, nil, nil, userAPI, nil, nil, caching.DisableMetrics)
// Create the users in the userapi and login
- accessTokens := map[*test.User]string{
- aliceAdmin: "",
+ accessTokens := map[*test.User]userDevice{
+ aliceAdmin: {},
}
createAccessTokens(t, accessTokens, userAPI, ctx, routers)
@@ -329,7 +328,7 @@ func TestAdminEvacuateUser(t *testing.T) {
t.Run(tc.name, func(t *testing.T) {
req := test.NewRequest(t, http.MethodPost, "/_dendrite/admin/evacuateUser/"+tc.userID)
- req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin])
+ req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin].accessToken)
rec := httptest.NewRecorder()
routers.DendriteAdmin.ServeHTTP(rec, req)
@@ -390,8 +389,8 @@ func TestAdminMarkAsStale(t *testing.T) {
AddPublicRoutes(processCtx, routers, cfg, &natsInstance, nil, rsAPI, nil, nil, nil, userAPI, nil, nil, caching.DisableMetrics)
// Create the users in the userapi and login
- accessTokens := map[*test.User]string{
- aliceAdmin: "",
+ accessTokens := map[*test.User]userDevice{
+ aliceAdmin: {},
}
createAccessTokens(t, accessTokens, userAPI, ctx, routers)
@@ -409,7 +408,7 @@ func TestAdminMarkAsStale(t *testing.T) {
t.Run(tc.name, func(t *testing.T) {
req := test.NewRequest(t, http.MethodPost, "/_dendrite/admin/refreshDevices/"+tc.userID)
- req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin])
+ req.Header.Set("Authorization", "Bearer "+accessTokens[aliceAdmin].accessToken)
rec := httptest.NewRecorder()
routers.DendriteAdmin.ServeHTTP(rec, req)
@@ -421,35 +420,3 @@ func TestAdminMarkAsStale(t *testing.T) {
}
})
}
-
-func createAccessTokens(t *testing.T, accessTokens map[*test.User]string, userAPI uapi.UserInternalAPI, ctx context.Context, routers httputil.Routers) {
- t.Helper()
- for u := range accessTokens {
- localpart, serverName, _ := gomatrixserverlib.SplitID('@', u.ID)
- userRes := &uapi.PerformAccountCreationResponse{}
- password := util.RandomString(8)
- if err := userAPI.PerformAccountCreation(ctx, &uapi.PerformAccountCreationRequest{
- AccountType: u.AccountType,
- Localpart: localpart,
- ServerName: serverName,
- Password: password,
- }, userRes); err != nil {
- t.Errorf("failed to create account: %s", err)
- }
-
- req := test.NewRequest(t, http.MethodPost, "/_matrix/client/v3/login", test.WithJSONBody(t, map[string]interface{}{
- "type": authtypes.LoginTypePassword,
- "identifier": map[string]interface{}{
- "type": "m.id.user",
- "user": u.ID,
- },
- "password": password,
- }))
- rec := httptest.NewRecorder()
- routers.Client.ServeHTTP(rec, req)
- if rec.Code != http.StatusOK {
- t.Fatalf("failed to login: %s", rec.Body.String())
- }
- accessTokens[u] = gjson.GetBytes(rec.Body.Bytes(), "access_token").String()
- }
-}