* Remove Deployment.Client and change Deploy - `Deployment.Client` was used to get pre-registered clients. Now we want tests to register new users for each test, for dirty runs. So swap for `Deployment.Register` everywhere. - `Deploy` was used to deploy a blueprint. We don't want this to enable dirty runs. So replace it with the number of servers you need e.g `Deploy(t, 2)`. * Fix up more broken refactoring * unbreak tests; make user localpart look nicer * Alice and bob must share a room for presence * Fix user directory test * Fix race condition caused by making the room later than before
99 lines
3.1 KiB
Go
99 lines
3.1 KiB
Go
//go:build !dendrite_blacklist
|
|
// +build !dendrite_blacklist
|
|
|
|
package csapi_tests
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/matrix-org/complement"
|
|
"github.com/matrix-org/complement/client"
|
|
"github.com/matrix-org/complement/helpers"
|
|
"github.com/matrix-org/complement/match"
|
|
"github.com/matrix-org/complement/must"
|
|
|
|
"github.com/tidwall/gjson"
|
|
)
|
|
|
|
func TestChangePasswordPushers(t *testing.T) {
|
|
deployment := complement.Deploy(t, 1)
|
|
defer deployment.Destroy(t)
|
|
password1 := "superuser"
|
|
password2 := "my_new_password"
|
|
passwordClient := deployment.Register(t, "hs1", helpers.RegistrationOpts{
|
|
Password: password1,
|
|
})
|
|
|
|
// sytest: Pushers created with a different access token are deleted on password change
|
|
t.Run("Pushers created with a different access token are deleted on password change", func(t *testing.T) {
|
|
_, sessionOptional := createSession(t, deployment, passwordClient.UserID, password1)
|
|
reqBody := client.WithJSONBody(t, map[string]interface{}{
|
|
"data": map[string]interface{}{
|
|
"url": "https://dummy.url/_matrix/push/v1/notify",
|
|
},
|
|
"profile_tag": "tag",
|
|
"kind": "http",
|
|
"app_id": "complement",
|
|
"app_display_name": "complement_display_name",
|
|
"device_display_name": "device_display_name",
|
|
"pushkey": "a_push_key",
|
|
"lang": "en",
|
|
})
|
|
|
|
_ = sessionOptional.MustDo(t, "POST", []string{"_matrix", "client", "v3", "pushers", "set"}, reqBody)
|
|
|
|
changePassword(t, passwordClient, password1, password2)
|
|
|
|
pushersSize := 0
|
|
|
|
res := passwordClient.Do(t, "GET", []string{"_matrix", "client", "v3", "pushers"})
|
|
must.MatchResponse(t, res, match.HTTPResponse{
|
|
StatusCode: 200,
|
|
JSON: []match.JSON{
|
|
match.JSONArrayEach("pushers", func(val gjson.Result) error {
|
|
pushersSize++
|
|
return nil
|
|
}),
|
|
},
|
|
})
|
|
if pushersSize != 0 {
|
|
t.Errorf("pushers size expected to be 0, found %d", pushersSize)
|
|
}
|
|
})
|
|
|
|
// sytest: Pushers created with a the same access token are not deleted on password change
|
|
t.Run("Pushers created with the same access token are not deleted on password change", func(t *testing.T) {
|
|
reqBody := client.WithJSONBody(t, map[string]interface{}{
|
|
"data": map[string]interface{}{
|
|
"url": "https://dummy.url/_matrix/push/v1/notify",
|
|
},
|
|
"profile_tag": "tag",
|
|
"kind": "http",
|
|
"app_id": "complement",
|
|
"app_display_name": "complement_display_name",
|
|
"device_display_name": "device_display_name",
|
|
"pushkey": "a_push_key",
|
|
"lang": "en",
|
|
})
|
|
|
|
_ = passwordClient.MustDo(t, "POST", []string{"_matrix", "client", "v3", "pushers", "set"}, reqBody)
|
|
|
|
changePassword(t, passwordClient, password2, password1)
|
|
|
|
pushersSize := 0
|
|
|
|
res := passwordClient.Do(t, "GET", []string{"_matrix", "client", "v3", "pushers"})
|
|
must.MatchResponse(t, res, match.HTTPResponse{
|
|
StatusCode: 200,
|
|
JSON: []match.JSON{
|
|
match.JSONArrayEach("pushers", func(val gjson.Result) error {
|
|
pushersSize++
|
|
return nil
|
|
}),
|
|
},
|
|
})
|
|
if pushersSize != 1 {
|
|
t.Errorf("pushers size expected to be 1, found %d", pushersSize)
|
|
}
|
|
})
|
|
}
|