123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- # Copyright 2022 The Matrix.org Foundation C.I.C.
- #
- # Licensed under the Apache License, Version 2.0 (the "License");
- # you may not use this file except in compliance with the License.
- # You may obtain a copy of the License at
- #
- # http://www.apache.org/licenses/LICENSE-2.0
- #
- # Unless required by applicable law or agreed to in writing, software
- # distributed under the License is distributed on an "AS IS" BASIS,
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- # See the License for the specific language governing permissions and
- # limitations under the License.
- from twisted.test.proto_helpers import MemoryReactor
- from synapse.rest import admin
- from synapse.rest.client import login, login_token_request, versions
- from synapse.server import HomeServer
- from synapse.util import Clock
- from tests import unittest
- from tests.unittest import override_config
- GET_TOKEN_ENDPOINT = "/_matrix/client/v1/login/get_token"
- class LoginTokenRequestServletTestCase(unittest.HomeserverTestCase):
- servlets = [
- login.register_servlets,
- admin.register_servlets,
- login_token_request.register_servlets,
- versions.register_servlets, # TODO: remove once unstable revision 0 support is removed
- ]
- def make_homeserver(self, reactor: MemoryReactor, clock: Clock) -> HomeServer:
- self.hs = self.setup_test_homeserver()
- self.hs.config.registration.enable_registration = True
- self.hs.config.registration.registrations_require_3pid = []
- self.hs.config.registration.auto_join_rooms = []
- self.hs.config.captcha.enable_registration_captcha = False
- return self.hs
- def prepare(self, reactor: MemoryReactor, clock: Clock, hs: HomeServer) -> None:
- self.user = "user123"
- self.password = "password"
- def test_disabled(self) -> None:
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=None)
- self.assertEqual(channel.code, 404)
- self.register_user(self.user, self.password)
- token = self.login(self.user, self.password)
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=token)
- self.assertEqual(channel.code, 404)
- @override_config({"login_via_existing_session": {"enabled": True}})
- def test_require_auth(self) -> None:
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=None)
- self.assertEqual(channel.code, 401)
- @override_config({"login_via_existing_session": {"enabled": True}})
- def test_uia_on(self) -> None:
- user_id = self.register_user(self.user, self.password)
- token = self.login(self.user, self.password)
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=token)
- self.assertEqual(channel.code, 401)
- self.assertIn({"stages": ["m.login.password"]}, channel.json_body["flows"])
- session = channel.json_body["session"]
- uia = {
- "auth": {
- "type": "m.login.password",
- "identifier": {"type": "m.id.user", "user": self.user},
- "password": self.password,
- "session": session,
- },
- }
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, uia, access_token=token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(channel.json_body["expires_in_ms"], 300000)
- login_token = channel.json_body["login_token"]
- channel = self.make_request(
- "POST",
- "/login",
- content={"type": "m.login.token", "token": login_token},
- )
- self.assertEqual(channel.code, 200, channel.result)
- self.assertEqual(channel.json_body["user_id"], user_id)
- @override_config(
- {"login_via_existing_session": {"enabled": True, "require_ui_auth": False}}
- )
- def test_uia_off(self) -> None:
- user_id = self.register_user(self.user, self.password)
- token = self.login(self.user, self.password)
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(channel.json_body["expires_in_ms"], 300000)
- login_token = channel.json_body["login_token"]
- channel = self.make_request(
- "POST",
- "/login",
- content={"type": "m.login.token", "token": login_token},
- )
- self.assertEqual(channel.code, 200, channel.result)
- self.assertEqual(channel.json_body["user_id"], user_id)
- @override_config(
- {
- "login_via_existing_session": {
- "enabled": True,
- "require_ui_auth": False,
- "token_timeout": "15s",
- }
- }
- )
- def test_expires_in(self) -> None:
- self.register_user(self.user, self.password)
- token = self.login(self.user, self.password)
- channel = self.make_request("POST", GET_TOKEN_ENDPOINT, {}, access_token=token)
- self.assertEqual(channel.code, 200)
- self.assertEqual(channel.json_body["expires_in_ms"], 15000)
- @override_config(
- {
- "login_via_existing_session": {
- "enabled": True,
- "require_ui_auth": False,
- "token_timeout": "15s",
- }
- }
- )
- def test_unstable_support(self) -> None:
- # TODO: remove support for unstable MSC3882 is no longer needed
- # check feature is advertised in versions response:
- channel = self.make_request(
- "GET", "/_matrix/client/versions", {}, access_token=None
- )
- self.assertEqual(channel.code, 200)
- self.assertEqual(
- channel.json_body["unstable_features"]["org.matrix.msc3882"], True
- )
- self.register_user(self.user, self.password)
- token = self.login(self.user, self.password)
- # check feature is available via the unstable endpoint and returns an expires_in value in seconds
- channel = self.make_request(
- "POST",
- "/_matrix/client/unstable/org.matrix.msc3882/login/token",
- {},
- access_token=token,
- )
- self.assertEqual(channel.code, 200)
- self.assertEqual(channel.json_body["expires_in"], 15)
|