mirror of
https://github.com/BookStackApp/BookStack.git
synced 2024-10-01 01:36:00 -04:00
Added testing coverage to API token auth
This commit is contained in:
parent
6f1b88a6a6
commit
3d11cba223
@ -150,4 +150,11 @@ class ApiTokenGuard implements Guard
|
||||
return Hash::check($credentials['secret'], $token->secret);
|
||||
}
|
||||
|
||||
/**
|
||||
* "Log out" the currently authenticated user.
|
||||
*/
|
||||
public function logout()
|
||||
{
|
||||
$this->user = null;
|
||||
}
|
||||
}
|
@ -72,7 +72,7 @@ class Role extends Model
|
||||
*/
|
||||
public function detachPermission(RolePermission $permission)
|
||||
{
|
||||
$this->permissions()->detach($permission->id);
|
||||
$this->permissions()->detach([$permission->id]);
|
||||
}
|
||||
|
||||
/**
|
||||
|
@ -35,7 +35,7 @@ class ApiAuthenticate
|
||||
}
|
||||
|
||||
if ($this->awaitingEmailConfirmation()) {
|
||||
return $this->emailConfirmationErrorResponse($request);
|
||||
return $this->emailConfirmationErrorResponse($request, true);
|
||||
}
|
||||
|
||||
return $next($request);
|
||||
|
@ -26,9 +26,9 @@ trait ChecksForEmailConfirmation
|
||||
* Provide an error response for when the current user's email is not confirmed
|
||||
* in a system which requires it.
|
||||
*/
|
||||
protected function emailConfirmationErrorResponse(Request $request)
|
||||
protected function emailConfirmationErrorResponse(Request $request, bool $forceJson = false)
|
||||
{
|
||||
if ($request->wantsJson()) {
|
||||
if ($request->wantsJson() || $forceJson) {
|
||||
return response()->json([
|
||||
'error' => [
|
||||
'code' => 401,
|
||||
|
@ -1,6 +1,8 @@
|
||||
<?php
|
||||
|
||||
use BookStack\Api\ApiToken;
|
||||
use BookStack\Auth\Permissions\PermissionService;
|
||||
use BookStack\Auth\Permissions\RolePermission;
|
||||
use BookStack\Auth\Role;
|
||||
use BookStack\Auth\User;
|
||||
use BookStack\Entities\Bookshelf;
|
||||
@ -52,6 +54,18 @@ class DummyContentSeeder extends Seeder
|
||||
$shelves = factory(Bookshelf::class, 10)->create($byData);
|
||||
$largeBook->shelves()->attach($shelves->pluck('id'));
|
||||
|
||||
// Assign API permission to editor role and create an API key
|
||||
$apiPermission = RolePermission::getByName('access-api');
|
||||
$editorRole->attachPermission($apiPermission);
|
||||
$token = (new ApiToken())->forceFill([
|
||||
'user_id' => $editorUser->id,
|
||||
'name' => 'Testing API key',
|
||||
'expires_at' => ApiToken::defaultExpiry(),
|
||||
'secret' => Hash::make('password'),
|
||||
'token_id' => 'apitoken',
|
||||
]);
|
||||
$token->save();
|
||||
|
||||
app(PermissionService::class)->buildJointPermissions();
|
||||
app(SearchService::class)->indexAllEntities();
|
||||
}
|
||||
|
82
tests/Api/ApiAuthTest.php
Normal file
82
tests/Api/ApiAuthTest.php
Normal file
@ -0,0 +1,82 @@
|
||||
<?php
|
||||
|
||||
namespace Tests;
|
||||
|
||||
use BookStack\Auth\Permissions\RolePermission;
|
||||
|
||||
class ApiAuthTest extends TestCase
|
||||
{
|
||||
use TestsApi;
|
||||
|
||||
protected $endpoint = '/api/books';
|
||||
|
||||
public function test_requests_succeed_with_default_auth()
|
||||
{
|
||||
$viewer = $this->getViewer();
|
||||
$resp = $this->get($this->endpoint);
|
||||
$resp->assertStatus(401);
|
||||
|
||||
$this->actingAs($viewer, 'web');
|
||||
|
||||
$resp = $this->get($this->endpoint);
|
||||
$resp->assertStatus(200);
|
||||
}
|
||||
|
||||
public function test_no_token_throws_error()
|
||||
{
|
||||
$resp = $this->get($this->endpoint);
|
||||
$resp->assertStatus(401);
|
||||
$resp->assertJson($this->errorResponse("No authorization token found on the request", 401));
|
||||
}
|
||||
|
||||
public function test_bad_token_format_throws_error()
|
||||
{
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token abc123"]);
|
||||
$resp->assertStatus(401);
|
||||
$resp->assertJson($this->errorResponse("An authorization token was found on the request but the format appeared incorrect", 401));
|
||||
}
|
||||
|
||||
public function test_token_with_non_existing_id_throws_error()
|
||||
{
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token abc:123"]);
|
||||
$resp->assertStatus(401);
|
||||
$resp->assertJson($this->errorResponse("No matching API token was found for the provided authorization token", 401));
|
||||
}
|
||||
|
||||
public function test_token_with_bad_secret_value_throws_error()
|
||||
{
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token {$this->apiTokenId}:123"]);
|
||||
$resp->assertStatus(401);
|
||||
$resp->assertJson($this->errorResponse("The secret provided for the given used API token is incorrect", 401));
|
||||
}
|
||||
|
||||
public function test_api_access_permission_required_to_access_api()
|
||||
{
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token {$this->apiTokenId}:{$this->apiTokenSecret}"]);
|
||||
$resp->assertStatus(200);
|
||||
auth()->logout();
|
||||
|
||||
$accessApiPermission = RolePermission::getByName('access-api');
|
||||
$editorRole = $this->getEditor()->roles()->first();
|
||||
$editorRole->detachPermission($accessApiPermission);
|
||||
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token {$this->apiTokenId}:{$this->apiTokenSecret}"]);
|
||||
$resp->assertJson($this->errorResponse("The owner of the used API token does not have permission to make API calls", 403));
|
||||
}
|
||||
|
||||
|
||||
public function test_email_confirmation_checked_on_auth_requets()
|
||||
{
|
||||
$editor = $this->getEditor();
|
||||
$editor->email_confirmed = false;
|
||||
$editor->save();
|
||||
|
||||
// Set settings and get user instance
|
||||
$this->setSettings(['registration-enabled' => 'true', 'registration-confirmation' => 'true']);
|
||||
|
||||
$resp = $this->get($this->endpoint, ['Authorization' => "Token {$this->apiTokenId}:{$this->apiTokenSecret}"]);
|
||||
$resp->assertStatus(401);
|
||||
$resp->assertJson($this->errorResponse("The email address for the account in use needs to be confirmed", 401));
|
||||
}
|
||||
|
||||
}
|
16
tests/TestsApi.php
Normal file
16
tests/TestsApi.php
Normal file
@ -0,0 +1,16 @@
|
||||
<?php
|
||||
|
||||
namespace Tests;
|
||||
|
||||
trait TestsApi
|
||||
{
|
||||
|
||||
protected $apiTokenId = 'apitoken';
|
||||
protected $apiTokenSecret = 'password';
|
||||
|
||||
protected function errorResponse(string $messge, int $code)
|
||||
{
|
||||
return ["error" => ["code" => $code, "message" => $messge]];
|
||||
}
|
||||
|
||||
}
|
@ -14,7 +14,7 @@ class UserApiTokenTest extends TestCase
|
||||
|
||||
public function test_tokens_section_not_visible_without_access_api_permission()
|
||||
{
|
||||
$user = $this->getEditor();
|
||||
$user = $this->getViewer();
|
||||
|
||||
$resp = $this->actingAs($user)->get($user->getEditUrl());
|
||||
$resp->assertDontSeeText('API Tokens');
|
||||
@ -30,9 +30,9 @@ class UserApiTokenTest extends TestCase
|
||||
{
|
||||
$viewer = $this->getViewer();
|
||||
$editor = $this->getEditor();
|
||||
$this->giveUserPermissions($editor, ['users-manage']);
|
||||
$this->giveUserPermissions($viewer, ['users-manage']);
|
||||
|
||||
$resp = $this->actingAs($editor)->get($viewer->getEditUrl());
|
||||
$resp = $this->actingAs($viewer)->get($editor->getEditUrl());
|
||||
$resp->assertSeeText('API Tokens');
|
||||
$resp->assertDontSeeText('Create Token');
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user