mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2024-12-21 10:13:11 +00:00
c9c0773f2c
* start replacing client + federator + media workers with new worker + queue types * refactor federatingDB.Delete(), drop queued messages when deleting account / status * move all queue purging to the processor workers * undo toolchain updates * code comments, ensure dereferencer worker pool gets started * update gruf libraries in readme * start the job scheduler separately to the worker pools * reshuffle ordering or server.go + remove duplicate worker start / stop * update go-list version * fix vendoring * move queue invalidation to before wipeing / deletion, to ensure queued work not dropped * add logging to worker processing functions in testrig, don't start workers in unexpected places * update go-structr to add (+then rely on) QueueCtx{} type * ensure more worker pools get started properly in tests * fix remaining broken tests relying on worker queue logic * fix account test suite queue popping logic, ensure noop workers do not pull from queue * move back accidentally shuffled account deletion order * ensure error (non nil!!) gets passed in refactored federatingDB{}.Delete() * silently drop deletes from accounts not permitted to * don't warn log on forwarded deletes * make if else clauses easier to parse * use getFederatorMsg() * improved code comment * improved code comment re: requesting account delete checks * remove boolean result from worker start / stop since false = already running or already stopped * remove optional passed-in http.client * remove worker starting from the admin CLI commands (we don't need to handle side-effects) * update prune cli to start scheduler but not all of the workers * fix rebase issues * remove redundant return statements * i'm sorry sir linter
169 lines
4.9 KiB
Go
169 lines
4.9 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package account_test
|
|
|
|
import (
|
|
"context"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/suite"
|
|
apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model"
|
|
"github.com/superseriousbusiness/gotosocial/internal/gtsmodel"
|
|
"github.com/superseriousbusiness/gotosocial/internal/oauth"
|
|
)
|
|
|
|
type MoveTestSuite struct {
|
|
AccountStandardTestSuite
|
|
}
|
|
|
|
func (suite *MoveTestSuite) TestMoveAccountOK() {
|
|
ctx := context.Background()
|
|
|
|
// Copy zork.
|
|
requestingAcct := new(gtsmodel.Account)
|
|
*requestingAcct = *suite.testAccounts["local_account_1"]
|
|
|
|
// Copy admin.
|
|
targetAcct := new(gtsmodel.Account)
|
|
*targetAcct = *suite.testAccounts["admin_account"]
|
|
|
|
// Update admin to alias back to zork.
|
|
targetAcct.AlsoKnownAsURIs = []string{requestingAcct.URI}
|
|
if err := suite.state.DB.UpdateAccount(
|
|
ctx,
|
|
targetAcct,
|
|
"also_known_as_uris",
|
|
); err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
// Trigger move from zork to admin.
|
|
if err := suite.accountProcessor.MoveSelf(
|
|
ctx,
|
|
&oauth.Auth{
|
|
Token: oauth.DBTokenToToken(suite.testTokens["local_account_1"]),
|
|
Application: suite.testApplications["local_account_1"],
|
|
User: suite.testUsers["local_account_1"],
|
|
Account: requestingAcct,
|
|
},
|
|
&apimodel.AccountMoveRequest{
|
|
Password: "password",
|
|
MovedToURI: targetAcct.URI,
|
|
},
|
|
); err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
|
|
// There should be a message going to the worker.
|
|
cMsg, _ := suite.getClientMsg(5 * time.Second)
|
|
move, ok := cMsg.GTSModel.(*gtsmodel.Move)
|
|
if !ok {
|
|
suite.FailNow("", "could not cast %T to *gtsmodel.Move", move)
|
|
}
|
|
now := time.Now()
|
|
suite.WithinDuration(now, move.CreatedAt, 5*time.Second)
|
|
suite.WithinDuration(now, move.UpdatedAt, 5*time.Second)
|
|
suite.WithinDuration(now, move.AttemptedAt, 5*time.Second)
|
|
suite.Zero(move.SucceededAt)
|
|
suite.NotZero(move.ID)
|
|
suite.Equal(requestingAcct.URI, move.OriginURI)
|
|
suite.NotNil(move.Origin)
|
|
suite.Equal(targetAcct.URI, move.TargetURI)
|
|
suite.NotNil(move.Target)
|
|
suite.NotZero(move.URI)
|
|
|
|
// Move should be in the database now.
|
|
move, err := suite.state.DB.GetMoveByOriginTarget(
|
|
ctx,
|
|
requestingAcct.URI,
|
|
targetAcct.URI,
|
|
)
|
|
if err != nil {
|
|
suite.FailNow(err.Error())
|
|
}
|
|
suite.NotNil(move)
|
|
|
|
// Origin account should have move ID and move to URI set.
|
|
suite.Equal(move.ID, requestingAcct.MoveID)
|
|
suite.Equal(targetAcct.URI, requestingAcct.MovedToURI)
|
|
}
|
|
|
|
func (suite *MoveTestSuite) TestMoveAccountNotAliased() {
|
|
ctx := context.Background()
|
|
|
|
// Copy zork.
|
|
requestingAcct := new(gtsmodel.Account)
|
|
*requestingAcct = *suite.testAccounts["local_account_1"]
|
|
|
|
// Don't copy admin.
|
|
targetAcct := suite.testAccounts["admin_account"]
|
|
|
|
// Trigger move from zork to admin.
|
|
//
|
|
// Move should fail since admin is
|
|
// not aliased back to zork.
|
|
err := suite.accountProcessor.MoveSelf(
|
|
ctx,
|
|
&oauth.Auth{
|
|
Token: oauth.DBTokenToToken(suite.testTokens["local_account_1"]),
|
|
Application: suite.testApplications["local_account_1"],
|
|
User: suite.testUsers["local_account_1"],
|
|
Account: requestingAcct,
|
|
},
|
|
&apimodel.AccountMoveRequest{
|
|
Password: "password",
|
|
MovedToURI: targetAcct.URI,
|
|
},
|
|
)
|
|
suite.EqualError(err, "target account http://localhost:8080/users/admin is not aliased to this account via alsoKnownAs; if you just changed it, please wait a few minutes and try the Move again")
|
|
}
|
|
|
|
func (suite *MoveTestSuite) TestMoveAccountBadPassword() {
|
|
ctx := context.Background()
|
|
|
|
// Copy zork.
|
|
requestingAcct := new(gtsmodel.Account)
|
|
*requestingAcct = *suite.testAccounts["local_account_1"]
|
|
|
|
// Don't copy admin.
|
|
targetAcct := suite.testAccounts["admin_account"]
|
|
|
|
// Trigger move from zork to admin.
|
|
//
|
|
// Move should fail since admin is
|
|
// not aliased back to zork.
|
|
err := suite.accountProcessor.MoveSelf(
|
|
ctx,
|
|
&oauth.Auth{
|
|
Token: oauth.DBTokenToToken(suite.testTokens["local_account_1"]),
|
|
Application: suite.testApplications["local_account_1"],
|
|
User: suite.testUsers["local_account_1"],
|
|
Account: requestingAcct,
|
|
},
|
|
&apimodel.AccountMoveRequest{
|
|
Password: "boobies",
|
|
MovedToURI: targetAcct.URI,
|
|
},
|
|
)
|
|
suite.EqualError(err, "invalid password provided in account Move request")
|
|
}
|
|
|
|
func TestMoveTestSuite(t *testing.T) {
|
|
suite.Run(t, new(MoveTestSuite))
|
|
}
|