Relax admin automated account registration
Some checks failed
Lint / pnpm_install (pull_request) Successful in 1m50s
Publish Docker image / Build (pull_request) Successful in 5m30s
Test (production install and build) / production (20.16.0) (pull_request) Successful in 1m20s
Test (backend) / unit (20.16.0) (pull_request) Successful in 8m21s
Lint / lint (backend) (pull_request) Successful in 2m30s
Lint / lint (frontend) (pull_request) Successful in 2m15s
Lint / lint (frontend-embed) (pull_request) Successful in 2m26s
Lint / lint (frontend-shared) (pull_request) Successful in 2m24s
Test (backend) / e2e (20.16.0) (pull_request) Failing after 12m16s
Lint / lint (misskey-bubble-game) (pull_request) Successful in 2m31s
Lint / typecheck (backend) (pull_request) Has been cancelled
Lint / lint (misskey-js) (pull_request) Has been cancelled
Lint / typecheck (misskey-js) (pull_request) Has been cancelled
Lint / lint (misskey-reversi) (pull_request) Has been cancelled
Lint / typecheck (sw) (pull_request) Has been cancelled
Lint / lint (sw) (pull_request) Has been cancelled

Signed-off-by: eternal-flame-AD <yume@yumechi.jp>
This commit is contained in:
ゆめ 2024-11-14 02:50:44 -06:00
parent 7748ab5dd0
commit fd271ea268
No known key found for this signature in database
2 changed files with 94 additions and 2 deletions

View file

@ -15,18 +15,21 @@ import { DI } from '@/di-symbols.js';
import type { Config } from '@/config.js';
import { ApiError } from '@/server/api/error.js';
import { Packed } from '@/misc/json-schema.js';
import { RoleService } from '@/core/RoleService.js';
export const meta = {
tags: ['admin'],
errors: {
accessDenied: {
httpStatusCode: 403,
message: 'Access denied.',
code: 'ACCESS_DENIED',
id: '1fb7cb09-d46a-4fff-b8df-057708cce513',
},
wrongInitialPassword: {
httpStatusCode: 401,
message: 'Initial password is incorrect.',
code: 'INCORRECT_INITIAL_PASSWORD',
id: '97147c55-1ae1-4f6f-91d6-e1c3e0e76d62',
@ -65,6 +68,7 @@ export default class extends Endpoint<typeof meta, typeof paramDef> { // eslint-
@Inject(DI.usersRepository)
private usersRepository: UsersRepository,
private roleService: RoleService,
private userEntityService: UserEntityService,
private signupService: SignupService,
private instanceActorService: InstanceActorService,
@ -85,8 +89,8 @@ export default class extends Endpoint<typeof meta, typeof paramDef> { // eslint-
// 初期パスワードが設定されていないのに初期パスワードが入力された場合
throw new ApiError(meta.errors.wrongInitialPassword);
}
} else if ((realUsers && !me?.isRoot) || token !== null) {
// 初回セットアップではなく、管理者でない場合 or 外部トークンを使用している場合
} else if (!(me?.isRoot) && !await this.roleService.isAdministrator(me)) {
// 管理者でない場合
throw new ApiError(meta.errors.accessDenied);
}

View file

@ -0,0 +1,88 @@
/*
* SPDX-FileCopyrightText: syuilo and misskey-project
* SPDX-License-Identifier: AGPL-3.0-only
*/
process.env.NODE_ENV = 'test';
import * as assert from 'assert';
import type * as misskey from 'misskey-js';
import { api, role, signup } from '../utils.js';
describe('Admin Create User', () => {
let admin: misskey.entities.SignupResponse;
let user: misskey.entities.SignupResponse;
let formerAdmin: misskey.entities.SignupResponse;
let adminRole : misskey.entities.Role;
let formerAdminRole : misskey.entities.Role;
beforeAll(async () => {
admin = await signup({ username: 'admin' });
formerAdmin = await signup({ username: 'former_admin' });
user = await signup({ username: 'user' });
adminRole = await role(admin, {
name: 'admin',
isAdministrator: true
});
formerAdminRole = await role(admin, {
name: 'former_admin',
isAdministrator: true
});
const addAdminRole = await api('admin/roles/assign', {
userId: admin.id,
roleId: adminRole.id
}, admin);
assert.strictEqual(addAdminRole.status, 204);
const addFormerAdminRole = await api('admin/roles/assign', {
userId: formerAdmin.id,
roleId: formerAdminRole.id
}, admin);
assert.strictEqual(addFormerAdminRole.status, 204);
}, 1000 * 60 * 2);
test('Create User', async () => {
const newUser1 = await api('admin/accounts/create', {
username: 'new_user1',
password: 'password',
}, admin);
assert.strictEqual(newUser1.status, 200);
const newUser2 = await api('admin/accounts/create', {
username: 'new_user2',
password: 'password',
}, formerAdmin);
assert.strictEqual(newUser2.status, 200);
const newUser3 = await api('admin/accounts/create', {
username: 'new_user3',
password: 'password',
}, user);
assert.strictEqual(newUser3.status, 403);
});
test('Revoking Admin Role', async () => {
const res = await api('admin/roles/delete', {roleId: formerAdminRole.id}, admin);
assert.strictEqual(res.status, 200);
const res2 = await api('admin/roles/delete', {roleId: adminRole.id}, formerAdmin);
assert.strictEqual(res2.status, 403);
});
test('Revoked User Should Not Create User', async () => {
const newUser4 = await api('admin/accounts/create', {
username: 'new_user4',
password: 'password',
}, formerAdmin);
assert.strictEqual(newUser4.status, 403);
const newUser5 = await api('admin/accounts/create', {
username: 'new_user5',
password: 'password',
}, admin);
assert.strictEqual(newUser5.status, 200);
});
})