2019-07-10 05:13:23 +00:00
|
|
|
# Pleroma: A lightweight social networking server
|
2021-01-13 06:49:20 +00:00
|
|
|
# Copyright © 2017-2021 Pleroma Authors <https://pleroma.social/>
|
2019-07-10 05:13:23 +00:00
|
|
|
# SPDX-License-Identifier: AGPL-3.0-only
|
|
|
|
|
2019-06-24 19:01:56 +00:00
|
|
|
defmodule Pleroma.Web.TwitterAPI.PasswordControllerTest do
|
|
|
|
use Pleroma.Web.ConnCase
|
|
|
|
|
2021-12-03 06:02:49 +00:00
|
|
|
alias Pleroma.Config
|
2019-06-24 19:01:56 +00:00
|
|
|
alias Pleroma.PasswordResetToken
|
2021-12-03 06:02:49 +00:00
|
|
|
alias Pleroma.Repo
|
|
|
|
alias Pleroma.Tests.ObanHelpers
|
2019-09-22 13:08:07 +00:00
|
|
|
alias Pleroma.User
|
2019-06-24 19:01:56 +00:00
|
|
|
alias Pleroma.Web.OAuth.Token
|
|
|
|
import Pleroma.Factory
|
2021-12-03 06:02:49 +00:00
|
|
|
import Swoosh.TestAssertions
|
2019-06-24 19:01:56 +00:00
|
|
|
|
2022-12-14 12:38:48 +00:00
|
|
|
describe "GET /api/v1/pleroma/password_reset/token" do
|
2019-06-24 19:01:56 +00:00
|
|
|
test "it returns error when token invalid", %{conn: conn} do
|
|
|
|
response =
|
|
|
|
conn
|
2022-12-14 12:38:48 +00:00
|
|
|
|> get("/api/v1/pleroma/password_reset/token")
|
2019-06-24 19:01:56 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
|
|
|
assert response =~ "<h2>Invalid Token</h2>"
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it shows password reset form", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, token} = PasswordResetToken.create_token(user)
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2022-12-14 12:38:48 +00:00
|
|
|
|> get("/api/v1/pleroma/password_reset/#{token.token}")
|
2019-06-24 19:01:56 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
|
|
|
assert response =~ "<h2>Password Reset for #{user.nickname}</h2>"
|
|
|
|
end
|
2020-11-19 11:27:06 +00:00
|
|
|
|
|
|
|
test "it returns an error when the token has expired", %{conn: conn} do
|
|
|
|
clear_config([:instance, :password_reset_token_validity], 0)
|
|
|
|
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, token} = PasswordResetToken.create_token(user)
|
2020-12-16 09:39:36 +00:00
|
|
|
{:ok, token} = time_travel(token, -2)
|
2020-11-19 11:27:06 +00:00
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
2022-12-14 12:38:48 +00:00
|
|
|
|> get("/api/v1/pleroma/password_reset/#{token.token}")
|
2020-11-19 11:27:06 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
|
|
|
assert response =~ "<h2>Invalid Token</h2>"
|
|
|
|
end
|
2019-06-24 19:01:56 +00:00
|
|
|
end
|
|
|
|
|
2022-12-14 12:38:48 +00:00
|
|
|
describe "POST /api/v1/pleroma/password_reset" do
|
2020-11-19 11:27:06 +00:00
|
|
|
test "it fails for an expired token", %{conn: conn} do
|
|
|
|
clear_config([:instance, :password_reset_token_validity], 0)
|
|
|
|
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, token} = PasswordResetToken.create_token(user)
|
2020-12-16 09:39:36 +00:00
|
|
|
{:ok, token} = time_travel(token, -2)
|
2020-11-19 11:27:06 +00:00
|
|
|
{:ok, _access_token} = Token.create(insert(:oauth_app), user, %{})
|
|
|
|
|
|
|
|
params = %{
|
|
|
|
"password" => "test",
|
|
|
|
password_confirmation: "test",
|
|
|
|
token: token.token
|
|
|
|
}
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2022-12-14 12:38:48 +00:00
|
|
|
|> post("/api/v1/pleroma/password_reset", %{data: params})
|
2020-11-19 11:27:06 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
|
|
|
refute response =~ "<h2>Password changed!</h2>"
|
|
|
|
end
|
|
|
|
|
2019-06-24 19:01:56 +00:00
|
|
|
test "it returns HTTP 200", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, token} = PasswordResetToken.create_token(user)
|
2020-08-25 16:17:51 +00:00
|
|
|
{:ok, _access_token} = Token.create(insert(:oauth_app), user, %{})
|
2019-06-24 19:01:56 +00:00
|
|
|
|
|
|
|
params = %{
|
|
|
|
"password" => "test",
|
|
|
|
password_confirmation: "test",
|
|
|
|
token: token.token
|
|
|
|
}
|
|
|
|
|
|
|
|
response =
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2022-12-14 12:38:48 +00:00
|
|
|
|> post("/api/v1/pleroma/password_reset", %{data: params})
|
2019-06-24 19:01:56 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
|
|
|
assert response =~ "<h2>Password changed!</h2>"
|
|
|
|
|
|
|
|
user = refresh_record(user)
|
2022-12-30 02:46:58 +00:00
|
|
|
assert Pleroma.Password.checkpw("test", user.password_hash)
|
2020-01-20 10:53:14 +00:00
|
|
|
assert Enum.empty?(Token.get_user_tokens(user))
|
2019-06-24 19:01:56 +00:00
|
|
|
end
|
2019-09-22 13:08:07 +00:00
|
|
|
|
|
|
|
test "it sets password_reset_pending to false", %{conn: conn} do
|
2019-10-16 18:59:21 +00:00
|
|
|
user = insert(:user, password_reset_pending: true)
|
2019-09-22 13:08:07 +00:00
|
|
|
|
|
|
|
{:ok, token} = PasswordResetToken.create_token(user)
|
2020-08-25 16:17:51 +00:00
|
|
|
{:ok, _access_token} = Token.create(insert(:oauth_app), user, %{})
|
2019-09-22 13:08:07 +00:00
|
|
|
|
|
|
|
params = %{
|
|
|
|
"password" => "test",
|
|
|
|
password_confirmation: "test",
|
|
|
|
token: token.token
|
|
|
|
}
|
|
|
|
|
|
|
|
conn
|
|
|
|
|> assign(:user, user)
|
2022-12-14 12:38:48 +00:00
|
|
|
|> post("/api/v1/pleroma/password_reset", %{data: params})
|
2019-09-22 13:08:07 +00:00
|
|
|
|> html_response(:ok)
|
|
|
|
|
2019-10-16 18:59:21 +00:00
|
|
|
assert User.get_by_id(user.id).password_reset_pending == false
|
2019-09-22 13:08:07 +00:00
|
|
|
end
|
2019-06-24 19:01:56 +00:00
|
|
|
end
|
2021-12-03 06:02:49 +00:00
|
|
|
|
|
|
|
describe "POST /auth/password, with valid parameters" do
|
|
|
|
setup %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
conn = post(conn, "/auth/password?email=#{user.email}")
|
|
|
|
%{conn: conn, user: user}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 204", %{conn: conn} do
|
|
|
|
assert empty_json_response(conn)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it creates a PasswordResetToken record for user", %{user: user} do
|
|
|
|
token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id)
|
|
|
|
assert token_record
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it sends an email to user", %{user: user} do
|
|
|
|
ObanHelpers.perform_all()
|
|
|
|
token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id)
|
|
|
|
|
|
|
|
email = Pleroma.Emails.UserEmail.password_reset_email(user, token_record.token)
|
|
|
|
notify_email = Config.get([:instance, :notify_email])
|
|
|
|
instance_name = Config.get([:instance, :name])
|
|
|
|
|
|
|
|
assert_email_sent(
|
|
|
|
from: {instance_name, notify_email},
|
|
|
|
to: {user.name, user.email},
|
|
|
|
html_body: email.html_body
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "POST /auth/password, with nickname" do
|
|
|
|
test "it returns 204", %{conn: conn} do
|
|
|
|
user = insert(:user)
|
|
|
|
|
|
|
|
assert conn
|
|
|
|
|> post("/auth/password?nickname=#{user.nickname}")
|
|
|
|
|> empty_json_response()
|
|
|
|
|
|
|
|
ObanHelpers.perform_all()
|
|
|
|
token_record = Repo.get_by(Pleroma.PasswordResetToken, user_id: user.id)
|
|
|
|
|
|
|
|
email = Pleroma.Emails.UserEmail.password_reset_email(user, token_record.token)
|
|
|
|
notify_email = Config.get([:instance, :notify_email])
|
|
|
|
instance_name = Config.get([:instance, :name])
|
|
|
|
|
|
|
|
assert_email_sent(
|
|
|
|
from: {instance_name, notify_email},
|
|
|
|
to: {user.name, user.email},
|
|
|
|
html_body: email.html_body
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it doesn't fail when a user has no email", %{conn: conn} do
|
|
|
|
user = insert(:user, %{email: nil})
|
|
|
|
|
|
|
|
assert conn
|
|
|
|
|> post("/auth/password?nickname=#{user.nickname}")
|
|
|
|
|> empty_json_response()
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe "POST /auth/password, with invalid parameters" do
|
|
|
|
setup do
|
|
|
|
user = insert(:user)
|
|
|
|
{:ok, user: user}
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 204 when user is not found", %{conn: conn, user: user} do
|
|
|
|
conn = post(conn, "/auth/password?email=nonexisting_#{user.email}")
|
|
|
|
|
|
|
|
assert empty_json_response(conn)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 204 when user is not local", %{conn: conn, user: user} do
|
|
|
|
{:ok, user} = Repo.update(Ecto.Changeset.change(user, local: false))
|
|
|
|
conn = post(conn, "/auth/password?email=#{user.email}")
|
|
|
|
|
|
|
|
assert empty_json_response(conn)
|
|
|
|
end
|
|
|
|
|
|
|
|
test "it returns 204 when user is deactivated", %{conn: conn, user: user} do
|
|
|
|
{:ok, user} = Repo.update(Ecto.Changeset.change(user, is_active: false, local: true))
|
|
|
|
conn = post(conn, "/auth/password?email=#{user.email}")
|
|
|
|
|
|
|
|
assert empty_json_response(conn)
|
|
|
|
end
|
|
|
|
end
|
2019-06-24 19:01:56 +00:00
|
|
|
end
|