2018-09-19 13:54:49 +00:00
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
RSpec.describe 'Api Auth', type: :request do
|
|
|
|
|
2019-04-15 01:41:17 +00:00
|
|
|
around do |example|
|
2019-01-21 10:36:41 +00:00
|
|
|
orig = ActionController::Base.allow_forgery_protection
|
|
|
|
|
|
|
|
begin
|
|
|
|
ActionController::Base.allow_forgery_protection = true
|
|
|
|
example.run
|
|
|
|
ensure
|
|
|
|
ActionController::Base.allow_forgery_protection = orig
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
let(:admin) do
|
|
|
|
create(:admin)
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
2020-06-19 09:17:18 +00:00
|
|
|
let(:agent) do
|
|
|
|
create(:agent)
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
2020-06-19 09:17:18 +00:00
|
|
|
let(:customer) do
|
|
|
|
create(:customer)
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
describe 'request handling' do
|
|
|
|
|
|
|
|
it 'does basic auth - admin' do
|
|
|
|
|
|
|
|
Setting.set('api_password_access', false)
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(admin)
|
2018-09-19 13:54:49 +00:00
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API password access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_password_access', true)
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does basic auth - agent' do
|
|
|
|
|
|
|
|
Setting.set('api_password_access', false)
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(agent)
|
2018-09-19 13:54:49 +00:00
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API password access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_password_access', true)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does basic auth - customer' do
|
|
|
|
|
|
|
|
Setting.set('api_password_access', false)
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(customer)
|
2018-09-19 13:54:49 +00:00
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API password access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_password_access', true)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
end
|
|
|
|
|
2018-09-28 12:52:06 +00:00
|
|
|
it 'does token auth - admin', last_admin_check: false do
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
admin_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: admin.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
preferences: {
|
|
|
|
permission: ['admin.session'],
|
|
|
|
},
|
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(admin, token: admin_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
Setting.set('api_token_access', false)
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API token access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['admin.session_not_existing']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('Not authorized (token)!')
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = []
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('Not authorized (token)!')
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
admin.active = false
|
|
|
|
admin.save!
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
2020-08-14 12:52:20 +00:00
|
|
|
expect(json_response['error']).to eq('Login failed. Have you double-checked your credentials and completed the email verification step?')
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['admin.session']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
2020-08-14 12:52:20 +00:00
|
|
|
expect(json_response['error']).to eq('Login failed. Have you double-checked your credentials and completed the email verification step?')
|
2018-09-19 13:54:49 +00:00
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
admin.active = true
|
|
|
|
admin.save!
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
get '/api/v1/roles', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('Not authorized (token)!')
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['admin.session_not_existing', 'admin.role']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/roles', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['ticket.agent']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/organizations', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)}"
|
|
|
|
post '/api/v1/organizations', params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:created)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)} - 2"
|
|
|
|
put "/api/v1/organizations/#{json_response['id']}", params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['admin.organization']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/organizations', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)}"
|
|
|
|
post '/api/v1/organizations', params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:created)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)} - 2"
|
|
|
|
put "/api/v1/organizations/#{json_response['id']}", params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
admin_token.preferences[:permission] = ['admin']
|
|
|
|
admin_token.save!
|
|
|
|
|
|
|
|
get '/api/v1/organizations', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)}"
|
|
|
|
post '/api/v1/organizations', params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:created)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)} - 2"
|
|
|
|
put "/api/v1/organizations/#{json_response['id']}", params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['name']).to eq(name)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does token auth - agent' do
|
|
|
|
|
|
|
|
agent_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: agent.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(agent, token: agent_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
Setting.set('api_token_access', false)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API token access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
get '/api/v1/organizations', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)}"
|
|
|
|
post '/api/v1/organizations', params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does token auth - customer' do
|
|
|
|
|
|
|
|
customer_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: customer.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(customer, token: customer_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
Setting.set('api_token_access', false)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API token access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
get '/api/v1/organizations', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
name = "some org name #{rand(999_999_999)}"
|
|
|
|
post '/api/v1/organizations', params: { name: name }, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
|
|
|
|
2018-09-28 12:52:06 +00:00
|
|
|
it 'does token auth - invalid user - admin', last_admin_check: false do
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
admin_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: admin.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(admin, token: admin_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
admin.active = false
|
|
|
|
admin.save!
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
Setting.set('api_token_access', false)
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('API token access disabled!')
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
get '/api/v1/sessions', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
2020-08-14 12:52:20 +00:00
|
|
|
expect(json_response['error']).to eq('Login failed. Have you double-checked your credentials and completed the email verification step?')
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
it 'does token auth - expired' do
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
|
|
|
|
admin_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: admin.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
expires_at: Time.zone.today
|
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(admin, token: admin_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response['error']).to eq('Not authorized (token expired)!')
|
|
|
|
|
|
|
|
admin_token.reload
|
|
|
|
expect(admin_token.last_used_at).to be_within(1.second).of(Time.zone.now)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does token auth - not expired' do
|
|
|
|
|
|
|
|
Setting.set('api_token_access', true)
|
|
|
|
|
|
|
|
admin_token = create(
|
|
|
|
:token,
|
|
|
|
action: 'api',
|
|
|
|
persistent: true,
|
2020-06-19 09:17:18 +00:00
|
|
|
user_id: admin.id,
|
2018-09-19 13:54:49 +00:00
|
|
|
expires_at: Time.zone.tomorrow
|
|
|
|
)
|
|
|
|
|
2020-06-19 09:17:18 +00:00
|
|
|
authenticated_as(admin, token: admin_token)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
get '/api/v1/tickets', params: {}, as: :json
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(response.header['Access-Control-Allow-Origin']).to eq('*')
|
2020-02-11 15:29:31 +00:00
|
|
|
expect(response.header['Cache-Control']).to match(/no-cache, no-store/)
|
|
|
|
expect(response.header['Pragma']).to eq('no-cache')
|
|
|
|
expect(response.header['Expires']).to eq('-1')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Array)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
|
|
|
|
admin_token.reload
|
|
|
|
expect(admin_token.last_used_at).to be_within(1.second).of(Time.zone.now)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'does session auth - admin' do
|
2020-06-19 09:17:18 +00:00
|
|
|
create(:admin, login: 'api-admin@example.com', password: 'adminpw')
|
2018-09-19 13:54:49 +00:00
|
|
|
|
2019-01-21 10:36:41 +00:00
|
|
|
get '/'
|
|
|
|
token = response.headers['CSRF-TOKEN']
|
|
|
|
|
|
|
|
post '/api/v1/signin', params: { username: 'api-admin@example.com', password: 'adminpw', fingerprint: '123456789' }, headers: { 'X-CSRF-Token' => token }
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
|
|
|
expect(response).to have_http_status(:created)
|
2018-09-19 13:54:49 +00:00
|
|
|
|
|
|
|
get '/api/v1/sessions', params: {}
|
2019-04-15 01:41:17 +00:00
|
|
|
expect(response).to have_http_status(:ok)
|
|
|
|
expect(response.header).not_to be_key('Access-Control-Allow-Origin')
|
2018-09-19 13:54:49 +00:00
|
|
|
expect(json_response).to be_a_kind_of(Hash)
|
|
|
|
expect(json_response).to be_truthy
|
|
|
|
end
|
2019-07-04 13:05:18 +00:00
|
|
|
|
|
|
|
it 'does session auth - admin - only with valid CSRF token' do
|
2020-06-19 09:17:18 +00:00
|
|
|
create(:admin, login: 'api-admin@example.com', password: 'adminpw')
|
2019-07-04 13:05:18 +00:00
|
|
|
|
|
|
|
post '/api/v1/signin', params: { username: 'api-admin@example.com', password: 'adminpw', fingerprint: '123456789' }
|
|
|
|
expect(response).to have_http_status(:unauthorized)
|
|
|
|
end
|
2018-09-19 13:54:49 +00:00
|
|
|
end
|
|
|
|
end
|