gtsocial-umbx

Unnamed repository; edit this file 'description' to name the repository.
Log | Files | Refs | README | LICENSE

commit 8eda0051eced29fe039e9fc1c50e4011b6c9545b
parent 6c9d8e78ebbd81928abab1bbb49a3c4daa7d2a3a
Author: tobi <31960611+tsmethurst@users.noreply.github.com>
Date:   Fri, 12 May 2023 11:17:31 +0200

[bugfix] Ensure account fields can be set by JSON (#1762)


Diffstat:
Mdocs/api/swagger.yaml | 3++-
Minternal/api/client/accounts/accountupdate.go | 99+++++++++++++++++++++++++++++++++++++++++++++++++++----------------------------
Minternal/api/client/accounts/accountupdate_test.go | 595++++++++++++++++++++++++++++++++-----------------------------------------------
Minternal/api/model/account.go | 43++++++++++++++++++++++++-------------------
4 files changed, 334 insertions(+), 406 deletions(-)

diff --git a/docs/api/swagger.yaml b/docs/api/swagger.yaml @@ -2469,7 +2469,7 @@ definitions: x-go-name: Tag x-go-package: github.com/superseriousbusiness/gotosocial/internal/api/model updateField: - description: By default, max 4 fields and 255 characters per property/value. + description: By default, max 6 fields and 255 characters per property/value. properties: name: description: Name of the field @@ -3088,6 +3088,7 @@ paths: patch: consumes: - multipart/form-data + - application/json operationId: accountUpdate parameters: - description: Account should be made discoverable and shown in the profile directory (if enabled). diff --git a/internal/api/client/accounts/accountupdate.go b/internal/api/client/accounts/accountupdate.go @@ -24,11 +24,13 @@ import ( "strconv" "github.com/gin-gonic/gin" + "github.com/gin-gonic/gin/binding" "github.com/go-playground/form/v4" apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" apiutil "github.com/superseriousbusiness/gotosocial/internal/api/util" "github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/internal/oauth" + "golang.org/x/exp/slices" ) // AccountUpdateCredentialsPATCHHandler swagger:operation PATCH /api/v1/accounts/update_credentials accountUpdate @@ -41,6 +43,7 @@ import ( // // consumes: // - multipart/form-data +// - application/json // // produces: // - application/json @@ -169,26 +172,26 @@ func (m *Module) AccountUpdateCredentialsPATCHHandler(c *gin.Context) { c.JSON(http.StatusOK, acctSensitive) } -type fieldAttributesBinding struct{} +// fieldsAttributesFormBinding satisfies gin's binding.Binding interface. +// Should only be used specifically for multipart/form-data MIME type. +type fieldsAttributesFormBinding struct{} -func (fieldAttributesBinding) Name() string { - return "FieldAttributes" +func (fieldsAttributesFormBinding) Name() string { + return "FieldsAttributes" } -func (fieldAttributesBinding) Bind(req *http.Request, obj any) error { +func (fieldsAttributesFormBinding) Bind(req *http.Request, obj any) error { if err := req.ParseForm(); err != nil { return err } + // Change default namespace prefix and suffix to + // allow correct parsing of the field attributes. decoder := form.NewDecoder() - // change default namespace prefix and suffix to allow correct parsing of the field attributes decoder.SetNamespacePrefix("[") decoder.SetNamespaceSuffix("]") - if err := decoder.Decode(obj, req.Form); err != nil { - return err - } - return nil + return decoder.Decode(obj, req.Form) } func parseUpdateAccountForm(c *gin.Context) (*apimodel.UpdateCredentialsRequest, error) { @@ -196,36 +199,34 @@ func parseUpdateAccountForm(c *gin.Context) (*apimodel.UpdateCredentialsRequest, Source: &apimodel.UpdateSource{}, } - if err := c.ShouldBind(&form); err != nil { - return nil, fmt.Errorf("could not parse form from request: %s", err) - } - - // use custom form binding to support field attributes in the form data - if err := c.ShouldBindWith(&form, fieldAttributesBinding{}); err != nil { - return nil, fmt.Errorf("could not parse form from request: %s", err) - } - - // parse source field-by-field - sourceMap := c.PostFormMap("source") - - if privacy, ok := sourceMap["privacy"]; ok { - form.Source.Privacy = &privacy - } + switch ct := c.ContentType(); ct { + case binding.MIMEJSON: + // Bind with default json binding first. + if err := c.ShouldBindWith(form, binding.JSON); err != nil { + return nil, err + } - if sensitive, ok := sourceMap["sensitive"]; ok { - sensitiveBool, err := strconv.ParseBool(sensitive) + // Now use custom form binding for + // field attributes in the json data. + var err error + form.FieldsAttributes, err = parseFieldsAttributesFromJSON(form.JSONFieldsAttributes) if err != nil { - return nil, fmt.Errorf("error parsing form source[sensitive]: %s", err) + return nil, fmt.Errorf("custom json binding failed: %w", err) + } + case binding.MIMEMultipartPOSTForm: + // Bind with default form binding first. + if err := c.ShouldBindWith(form, binding.FormMultipart); err != nil { + return nil, err } - form.Source.Sensitive = &sensitiveBool - } - - if language, ok := sourceMap["language"]; ok { - form.Source.Language = &language - } - if statusContentType, ok := sourceMap["status_content_type"]; ok { - form.Source.StatusContentType = &statusContentType + // Now use custom form binding for + // field attributes in the form data. + if err := c.ShouldBindWith(form, fieldsAttributesFormBinding{}); err != nil { + return nil, fmt.Errorf("custom form binding failed: %w", err) + } + default: + err := fmt.Errorf("content-type %s not supported for this endpoint; supported content-types are %s, %s", ct, binding.MIMEJSON, binding.MIMEMultipartPOSTForm) + return nil, err } if form == nil || @@ -248,3 +249,31 @@ func parseUpdateAccountForm(c *gin.Context) (*apimodel.UpdateCredentialsRequest, return form, nil } + +func parseFieldsAttributesFromJSON(jsonFieldsAttributes *map[string]apimodel.UpdateField) (*[]apimodel.UpdateField, error) { + if jsonFieldsAttributes == nil { + // Nothing set, nothing to do. + return nil, nil + } + + fieldsAttributes := make([]apimodel.UpdateField, 0, len(*jsonFieldsAttributes)) + for keyStr, updateField := range *jsonFieldsAttributes { + key, err := strconv.Atoi(keyStr) + if err != nil { + return nil, fmt.Errorf("couldn't parse fieldAttributes key %s to int: %w", keyStr, err) + } + + fieldsAttributes = append(fieldsAttributes, apimodel.UpdateField{ + Key: key, + Name: updateField.Name, + Value: updateField.Value, + }) + } + + // Sort slice by the key each field was submitted with. + slices.SortFunc(fieldsAttributes, func(a, b apimodel.UpdateField) bool { + return a.Key < b.Key + }) + + return &fieldsAttributes, nil +} diff --git a/internal/api/client/accounts/accountupdate_test.go b/internal/api/client/accounts/accountupdate_test.go @@ -20,7 +20,8 @@ package accounts_test import ( "context" "encoding/json" - "io/ioutil" + "fmt" + "io" "net/http" "net/http/httptest" "testing" @@ -28,6 +29,7 @@ import ( "github.com/stretchr/testify/suite" "github.com/superseriousbusiness/gotosocial/internal/api/client/accounts" apimodel "github.com/superseriousbusiness/gotosocial/internal/api/model" + "github.com/superseriousbusiness/gotosocial/internal/gtserror" "github.com/superseriousbusiness/gotosocial/testrig" ) @@ -35,460 +37,351 @@ type AccountUpdateTestSuite struct { AccountStandardTestSuite } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandler() { - // set up the request - // we're updating the note and profile fields of zork - newBio := "this is my new bio read it and weep" - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "note": newBio, - "fields_attributes[0][name]": "pronouns", - "fields_attributes[0][value]": "they/them", - }) +func (suite *AccountUpdateTestSuite) updateAccountFromFormData(data map[string]string, expectedHTTPStatus int, expectedBody string) (*apimodel.Account, error) { + requestBody, w, err := testrig.CreateMultipartFormData("", "", data) if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) - - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() - - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) - - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) - // check the returned api model account - // fields should be updated - suite.Equal("<p>this is my new bio read it and weep</p>", apimodelAccount.Note) - suite.Equal("they/them", apimodelAccount.Fields[0].Value) - suite.Equal(newBio, apimodelAccount.Source.Note) + return suite.updateAccount(requestBody.Bytes(), w.FormDataContentType(), expectedHTTPStatus, expectedBody) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerUnlockLock() { - // set up the first request - requestBody1, w1, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "locked": "false", - }) +func (suite *AccountUpdateTestSuite) updateAccountFromFormDataWithFile(fieldName string, fileName string, data map[string]string, expectedHTTPStatus int, expectedBody string) (*apimodel.Account, error) { + requestBody, w, err := testrig.CreateMultipartFormData(fieldName, fileName, data) if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes1 := requestBody1.Bytes() - recorder1 := httptest.NewRecorder() - ctx1 := suite.newContext(recorder1, http.MethodPatch, bodyBytes1, accounts.UpdateCredentialsPath, w1.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx1) - - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder1.Code) + return suite.updateAccount(requestBody.Bytes(), w.FormDataContentType(), expectedHTTPStatus, expectedBody) +} - // 2. we should have no error message in the result body - result1 := recorder1.Result() - defer result1.Body.Close() +func (suite *AccountUpdateTestSuite) updateAccountFromJSON(data string, expectedHTTPStatus int, expectedBody string) (*apimodel.Account, error) { + return suite.updateAccount([]byte(data), "application/json", expectedHTTPStatus, expectedBody) +} - // check the response - b1, err := ioutil.ReadAll(result1.Body) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) updateAccount( + bodyBytes []byte, + contentType string, + expectedHTTPStatus int, + expectedBody string, +) (*apimodel.Account, error) { + // Initialize http test context. + recorder := httptest.NewRecorder() + ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, contentType) - // unmarshal the returned account - apimodelAccount1 := &apimodel.Account{} - err = json.Unmarshal(b1, apimodelAccount1) - suite.NoError(err) + // Trigger the handler. + suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - // check the returned api model account - // fields should be updated - suite.False(apimodelAccount1.Locked) + // Read the result. + result := recorder.Result() + defer result.Body.Close() - // set up the first request - requestBody2, w2, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "locked": "true", - }) + b, err := io.ReadAll(result.Body) if err != nil { - panic(err) + return nil, err } - bodyBytes2 := requestBody2.Bytes() - recorder2 := httptest.NewRecorder() - ctx2 := suite.newContext(recorder2, http.MethodPatch, bodyBytes2, accounts.UpdateCredentialsPath, w2.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx2) + errs := gtserror.MultiError{} - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder1.Code) + // Check expected code + body. + if resultCode := recorder.Code; expectedHTTPStatus != resultCode { + errs = append(errs, fmt.Sprintf("expected %d got %d", expectedHTTPStatus, resultCode)) + } - // 2. we should have no error message in the result body - result2 := recorder2.Result() - defer result2.Body.Close() + // If we got an expected body, return early. + if expectedBody != "" && string(b) != expectedBody { + errs = append(errs, fmt.Sprintf("expected %s got %s", expectedBody, string(b))) + } - // check the response - b2, err := ioutil.ReadAll(result2.Body) - suite.NoError(err) + if err := errs.Combine(); err != nil { + return nil, fmt.Errorf("%v (body %s)", err, string(b)) + } - // unmarshal the returned account - apimodelAccount2 := &apimodel.Account{} - err = json.Unmarshal(b2, apimodelAccount2) - suite.NoError(err) + // Return account response. + resp := &apimodel.Account{} + if err := json.Unmarshal(b, resp); err != nil { + return nil, err + } - // check the returned api model account - // fields should be updated - suite.True(apimodelAccount2.Locked) + return resp, nil } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerGetAccountFirst() { - // get the account first to make sure it's in the database cache -- when the account is updated via - // the PATCH handler, it should invalidate the cache and not return the old version - _, err := suite.db.GetAccountByID(context.Background(), suite.testAccounts["local_account_1"].ID) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountBasicFormData() { + data := map[string]string{ + "note": "this is my new bio read it and weep", + "fields_attributes[0][name]": "pronouns", + "fields_attributes[0][value]": "they/them", + "fields_attributes[1][name]": "Website", + "fields_attributes[1][value]": "https://example.com", + } - // set up the request - // we're updating the note of zork - newBio := "this is my new bio read it and weep" - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "note": newBio, - }) + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) + suite.Equal("<p>this is my new bio read it and weep</p>", apimodelAccount.Note) + suite.Equal("this is my new bio read it and weep", apimodelAccount.Source.Note) - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() + if l := len(apimodelAccount.Fields); l != 2 { + suite.FailNow("", "expected %d fields, got %d", 2, l) + } + suite.Equal(`pronouns`, apimodelAccount.Fields[0].Name) + suite.Equal(`they/them`, apimodelAccount.Fields[0].Value) + suite.Equal(`Website`, apimodelAccount.Fields[1].Name) + suite.Equal(`<a href="https://example.com" rel="nofollow noreferrer noopener" target="_blank">https://example.com</a>`, apimodelAccount.Fields[1].Value) +} - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountBasicJSON() { + data := ` +{ + "note": "this is my new bio read it and weep", + "fields_attributes": { + "0": { + "name": "pronouns", + "value": "they/them" + }, + "1": { + "name": "Website", + "value": "https://example.com" + } + } +} +` - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) + apimodelAccount, err := suite.updateAccountFromJSON(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the returned api model account - // fields should be updated suite.Equal("<p>this is my new bio read it and weep</p>", apimodelAccount.Note) - suite.Equal(newBio, apimodelAccount.Source.Note) + suite.Equal("this is my new bio read it and weep", apimodelAccount.Source.Note) + + if l := len(apimodelAccount.Fields); l != 2 { + suite.FailNow("", "expected %d fields, got %d", 2, l) + } + suite.Equal(`pronouns`, apimodelAccount.Fields[0].Name) + suite.Equal(`they/them`, apimodelAccount.Fields[0].Value) + suite.Equal(`Website`, apimodelAccount.Fields[1].Name) + suite.Equal(`<a href="https://example.com" rel="nofollow noreferrer noopener" target="_blank">https://example.com</a>`, apimodelAccount.Fields[1].Value) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerTwoFields() { - // set up the request - // we're updating the note of zork, and setting locked to true - newBio := "this is my new bio read it and weep :rainbow:" - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "note": newBio, - "locked": "true", - }) +func (suite *AccountUpdateTestSuite) TestUpdateAccountLockFormData() { + data := map[string]string{ + "locked": "true", + } + + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) + suite.True(apimodelAccount.Locked) +} - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) +func (suite *AccountUpdateTestSuite) TestUpdateAccountLockJSON() { + data := ` +{ + "locked": true +}` - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() + apimodelAccount, err := suite.updateAccountFromJSON(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) + suite.True(apimodelAccount.Locked) +} - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountUnlockFormData() { + data := map[string]string{ + "locked": "false", + } - // check the returned api model account - // fields should be updated - suite.Equal("<p>this is my new bio read it and weep :rainbow:</p>", apimodelAccount.Note) - suite.Equal(newBio, apimodelAccount.Source.Note) - suite.True(apimodelAccount.Locked) - suite.NotEmpty(apimodelAccount.Emojis) - suite.Equal(apimodelAccount.Emojis[0].Shortcode, "rainbow") + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the account in the database - dbZork, err := suite.db.GetAccountByID(context.Background(), apimodelAccount.ID) - suite.NoError(err) - suite.Equal(newBio, dbZork.NoteRaw) - suite.Equal("<p>this is my new bio read it and weep :rainbow:</p>", dbZork.Note) - suite.True(*dbZork.Locked) - suite.NotEmpty(dbZork.EmojiIDs) + suite.False(apimodelAccount.Locked) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerDiscoverable() { - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "discoverable": "false", - }) +func (suite *AccountUpdateTestSuite) TestUpdateAccountUnlockJSON() { + data := ` +{ + "locked": false +}` + + apimodelAccount, err := suite.updateAccountFromJSON(data, http.StatusOK, "") if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) + suite.False(apimodelAccount.Locked) +} - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) +func (suite *AccountUpdateTestSuite) TestUpdateAccountCache() { + // Get the account first to make sure it's in the database + // cache. When the account is updated via the PATCH handler, + // it should invalidate the cache and return the new version. + if _, err := suite.db.GetAccountByID(context.Background(), suite.testAccounts["local_account_1"].ID); err != nil { + suite.FailNow(err.Error()) + } - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() + data := map[string]string{ + "note": "this is my new bio read it and weep", + } - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) + suite.Equal("<p>this is my new bio read it and weep</p>", apimodelAccount.Note) +} + +func (suite *AccountUpdateTestSuite) TestUpdateAccountDiscoverableFormData() { + data := map[string]string{ + "discoverable": "false", + } + + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the returned api model account - // fields should be updated suite.False(apimodelAccount.Discoverable) - // check the account in the database + // Check the account in the database too. dbZork, err := suite.db.GetAccountByID(context.Background(), apimodelAccount.ID) suite.NoError(err) suite.False(*dbZork.Discoverable) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerWithMedia() { - // set up the request - // we're updating the header image, the display name, and the locked status of zork - // we're removing the note/bio - requestBody, w, err := testrig.CreateMultipartFormData( - "header", "../../../../testrig/media/test-jpeg.jpg", - map[string]string{ - "display_name": "updated zork display name!!!", - "note": "", - "locked": "true", - }) +func (suite *AccountUpdateTestSuite) TestUpdateAccountDiscoverableJSON() { + data := ` +{ + "discoverable": false +}` + + apimodelAccount, err := suite.updateAccountFromJSON(data, http.StatusOK, "") if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) - - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() + suite.False(apimodelAccount.Discoverable) - // check the response - b, err := ioutil.ReadAll(result.Body) + // Check the account in the database too. + dbZork, err := suite.db.GetAccountByID(context.Background(), apimodelAccount.ID) suite.NoError(err) + suite.False(*dbZork.Discoverable) +} - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountWithImageFormData() { + data := map[string]string{ + "display_name": "updated zork display name!!!", + "note": "", + "locked": "true", + } + + apimodelAccount, err := suite.updateAccountFromFormDataWithFile("header", "../../../../testrig/media/test-jpeg.jpg", data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the returned api model account - // fields should be updated - suite.Equal("updated zork display name!!!", apimodelAccount.DisplayName) + suite.Equal(data["display_name"], apimodelAccount.DisplayName) suite.True(apimodelAccount.Locked) suite.Empty(apimodelAccount.Note) suite.Empty(apimodelAccount.Source.Note) - - // header values... - // should be set suite.NotEmpty(apimodelAccount.Header) suite.NotEmpty(apimodelAccount.HeaderStatic) - // should be different from the values set before + // Can't predict IDs generated for new media + // so just ensure it's different than before. suite.NotEqual("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/header/original/01PFPMWK2FF0D9WMHEJHR07C3Q.jpg", apimodelAccount.Header) suite.NotEqual("http://localhost:8080/fileserver/01F8MH1H7YV1Z7D2C8K2730QBF/header/small/01PFPMWK2FF0D9WMHEJHR07C3Q.jpg", apimodelAccount.HeaderStatic) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerEmptyForm() { - // set up the request - bodyBytes := []byte{} - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, "") - - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) +func (suite *AccountUpdateTestSuite) TestUpdateAccountEmptyFormData() { + data := make(map[string]string) - // 1. we should have OK because our request was valid - suite.Equal(http.StatusBadRequest, recorder.Code) - - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() - - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) - suite.Equal(`{"error":"Bad Request: empty form submitted"}`, string(b)) -} - -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerUpdateSource() { - // set up the request - // we're updating the language of zork - newLanguage := "de" - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "source[privacy]": string(apimodel.VisibilityPrivate), - "source[language]": "de", - "source[sensitive]": "true", - "locked": "true", - }) + _, err := suite.updateAccountFromFormData(data, http.StatusBadRequest, `{"error":"Bad Request: empty form submitted"}`) if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) - - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() +} - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountSourceFormData() { + data := map[string]string{ + "source[privacy]": string(apimodel.VisibilityPrivate), + "source[language]": "de", + "source[sensitive]": "true", + "locked": "true", + } - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the returned api model account - // fields should be updated - suite.Equal(newLanguage, apimodelAccount.Source.Language) + suite.Equal(data["source[language]"], apimodelAccount.Source.Language) suite.EqualValues(apimodel.VisibilityPrivate, apimodelAccount.Source.Privacy) suite.True(apimodelAccount.Source.Sensitive) suite.True(apimodelAccount.Locked) } -func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerUpdateStatusContentTypeOK() { - // set up the request - // we're updating the language of zork - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "source[status_content_type]": "text/markdown", - }) +func (suite *AccountUpdateTestSuite) TestUpdateAccountSourceJSON() { + data := ` +{ + "source": { + "privacy": "private", + "language": "de", + "sensitive": true + }, + "locked": true +} +` + + apimodelAccount, err := suite.updateAccountFromJSON(data, http.StatusOK, "") if err != nil { - panic(err) + suite.FailNow(err.Error()) } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - // 1. we should have OK because our request was valid - suite.Equal(http.StatusOK, recorder.Code) - - // 2. we should have no error message in the result body - result := recorder.Result() - defer result.Body.Close() + suite.Equal("de", apimodelAccount.Source.Language) + suite.EqualValues(apimodel.VisibilityPrivate, apimodelAccount.Source.Privacy) + suite.True(apimodelAccount.Source.Sensitive) + suite.True(apimodelAccount.Locked) +} - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) +func (suite *AccountUpdateTestSuite) TestUpdateAccountSourceBadContentTypeFormData() { + data := map[string]string{ + "source[status_content_type]": "text/markdown", + } - // unmarshal the returned account - apimodelAccount := &apimodel.Account{} - err = json.Unmarshal(b, apimodelAccount) - suite.NoError(err) + apimodelAccount, err := suite.updateAccountFromFormData(data, http.StatusOK, "") + if err != nil { + suite.FailNow(err.Error()) + } - // check the returned api model account - // fields should be updated - suite.Equal("text/markdown", apimodelAccount.Source.StatusContentType) + suite.Equal(data["source[status_content_type]"], apimodelAccount.Source.StatusContentType) + // Check the account in the database too. dbAccount, err := suite.db.GetAccountByID(context.Background(), suite.testAccounts["local_account_1"].ID) if err != nil { suite.FailNow(err.Error()) } - suite.Equal(dbAccount.StatusContentType, "text/markdown") + suite.Equal(data["source[status_content_type]"], dbAccount.StatusContentType) } func (suite *AccountUpdateTestSuite) TestAccountUpdateCredentialsPATCHHandlerUpdateStatusContentTypeBad() { - // set up the request - // we're updating the language of zork - requestBody, w, err := testrig.CreateMultipartFormData( - "", "", - map[string]string{ - "source[status_content_type]": "peepeepoopoo", - }) - if err != nil { - panic(err) + data := map[string]string{ + "source[status_content_type]": "peepeepoopoo", } - bodyBytes := requestBody.Bytes() - recorder := httptest.NewRecorder() - ctx := suite.newContext(recorder, http.MethodPatch, bodyBytes, accounts.UpdateCredentialsPath, w.FormDataContentType()) - // call the handler - suite.accountsModule.AccountUpdateCredentialsPATCHHandler(ctx) - - suite.Equal(http.StatusBadRequest, recorder.Code) - - result := recorder.Result() - defer result.Body.Close() - - // check the response - b, err := ioutil.ReadAll(result.Body) - suite.NoError(err) - - suite.Equal(`{"error":"Bad Request: status content type 'peepeepoopoo' was not recognized, valid options are 'text/plain', 'text/markdown'"}`, string(b)) + _, err := suite.updateAccountFromFormData(data, http.StatusBadRequest, `{"error":"Bad Request: status content type 'peepeepoopoo' was not recognized, valid options are 'text/plain', 'text/markdown'"}`) + if err != nil { + suite.FailNow(err.Error()) + } } func TestAccountUpdateTestSuite(t *testing.T) { diff --git a/internal/api/model/account.go b/internal/api/model/account.go @@ -140,27 +140,29 @@ type AccountCreateRequest struct { // swagger:ignore type UpdateCredentialsRequest struct { // Account should be made discoverable and shown in the profile directory (if enabled). - Discoverable *bool `form:"discoverable" json:"discoverable" xml:"discoverable"` + Discoverable *bool `form:"discoverable" json:"discoverable"` // Account is flagged as a bot. - Bot *bool `form:"bot" json:"bot" xml:"bot"` + Bot *bool `form:"bot" json:"bot"` // The display name to use for the account. - DisplayName *string `form:"display_name" json:"display_name" xml:"display_name"` + DisplayName *string `form:"display_name" json:"display_name"` // Bio/description of this account. - Note *string `form:"note" json:"note" xml:"note"` + Note *string `form:"note" json:"note"` // Avatar image encoded using multipart/form-data. - Avatar *multipart.FileHeader `form:"avatar" json:"avatar" xml:"avatar"` + Avatar *multipart.FileHeader `form:"avatar" json:"-"` // Header image encoded using multipart/form-data - Header *multipart.FileHeader `form:"header" json:"header" xml:"header"` + Header *multipart.FileHeader `form:"header" json:"-"` // Require manual approval of follow requests. - Locked *bool `form:"locked" json:"locked" xml:"locked"` + Locked *bool `form:"locked" json:"locked"` // New Source values for this account. - Source *UpdateSource `form:"source" json:"source" xml:"source"` - // Profile metadata name and value - FieldsAttributes *[]UpdateField `form:"fields_attributes" json:"fields_attributes" xml:"fields_attributes"` + Source *UpdateSource `form:"source" json:"source"` + // Profile metadata names and values. + FieldsAttributes *[]UpdateField `form:"fields_attributes" json:"-"` + // Profile metadata names and values, parsed from JSON. + JSONFieldsAttributes *map[string]UpdateField `form:"-" json:"fields_attributes"` // Custom CSS to be included when rendering this account's profile or statuses. - CustomCSS *string `form:"custom_css" json:"custom_css" xml:"custom_css"` + CustomCSS *string `form:"custom_css" json:"custom_css"` // Enable RSS feed of public toots for this account at /@[username]/feed.rss - EnableRSS *bool `form:"enable_rss" json:"enable_rss" xml:"enable_rss"` + EnableRSS *bool `form:"enable_rss" json:"enable_rss"` } // UpdateSource is to be used specifically in an UpdateCredentialsRequest. @@ -168,24 +170,27 @@ type UpdateCredentialsRequest struct { // swagger:model updateSource type UpdateSource struct { // Default post privacy for authored statuses. - Privacy *string `form:"privacy" json:"privacy" xml:"privacy"` + Privacy *string `form:"privacy" json:"privacy"` // Mark authored statuses as sensitive by default. - Sensitive *bool `form:"sensitive" json:"sensitive" xml:"sensitive"` + Sensitive *bool `form:"sensitive" json:"sensitive"` // Default language to use for authored statuses. (ISO 6391) - Language *string `form:"language" json:"language" xml:"language"` + Language *string `form:"language" json:"language"` // Default format for authored statuses (text/plain or text/markdown). - StatusContentType *string `form:"status_content_type" json:"status_content_type" xml:"status_content_type"` + StatusContentType *string `form:"status_content_type" json:"status_content_type"` } // UpdateField is to be used specifically in an UpdateCredentialsRequest. -// By default, max 4 fields and 255 characters per property/value. +// By default, max 6 fields and 255 characters per property/value. // // swagger:model updateField type UpdateField struct { + // Key this form field was submitted with; + // only set if it was submitted as JSON. + Key int `form:"-" json:"-"` // Name of the field - Name *string `form:"name" json:"name" xml:"name"` + Name *string `form:"name" json:"name"` // Value of the field - Value *string `form:"value" json:"value" xml:"value"` + Value *string `form:"value" json:"value"` } // AccountFollowRequest models a request to follow an account.