#-- copyright # OpenProject is a project management system. # Copyright (C) 2012-2018 the OpenProject Foundation (OPF) # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License version 3. # # OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows: # Copyright (C) 2006-2017 Jean-Philippe Lang # Copyright (C) 2010-2013 the ChiliProject Team # # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. # # See docs/COPYRIGHT.rdoc for more details. #++ require 'spec_helper' describe 'authorization for BCF api', type: :feature, js: true do let!(:user) { FactoryBot.create(:admin) } let(:client_secret) { app.plaintext_secret } let(:scope) { 'bcf_v2_1' } let!(:project) { FactoryBot.create(:project) } def oauth_path(client_id) "/oauth/authorize?response_type=code&client_id=#{client_id}&redirect_uri=urn:ietf:wg:oauth:2.0:oob&scope=#{scope}" end before do login_with user.login, 'adminADMIN!' visit oauth_applications_path end it 'can create and later authorize and manage an OAuth application grant and then use the access token for the bcf api' do # Initially empty expect(page).to have_selector('.generic-table--empty-row', text: 'There is currently nothing to display') # Create application find('.button', text: 'Add').click fill_in 'application_name', with: 'My API application' # Limit to bcf access check scope # Fill invalid redirect_uri fill_in 'application_redirect_uri', with: "not a url!" click_on 'Create' expect(page).to have_selector('.errorExplanation', text: 'Redirect URI must be an absolute URI.') fill_in 'application_redirect_uri', with: "urn:ietf:wg:oauth:2.0:oob\nhttps://localhost/my/callback" click_on 'Create' expect(page).to have_selector('.flash.notice', text: 'Successful creation.') expect(page).to have_selector('.attributes-key-value--key', text: 'Client ID') expect(page).to have_selector('.attributes-key-value--value', text: "urn:ietf:wg:oauth:2.0:oob\nhttps://localhost/my/callback") # Should print secret on initial visit expect(page).to have_selector('.attributes-key-value--key', text: 'Client secret') client_secret = page.first('.attributes-key-value--value code').text expect(client_secret).to match /\w+/ app = ::Doorkeeper::Application.first visit oauth_path app.uid # We get to the authorization screen expect(page).to have_selector('h2', text: 'Authorize My API application') # With the correct scope printed expect(page).to have_selector('li strong', text: I18n.t('oauth.scopes.bcf_v2_1')) expect(page).to have_selector('li', text: I18n.t('oauth.scopes.bcf_v2_1_text')) # Authorize find('input.button[value="Authorize"]').click # Expect auth token code = find('#authorization_code').text # And also have a grant for this application user.oauth_grants.reload expect(user.oauth_grants.count).to eq 1 expect(user.oauth_grants.first.application).to eq app parameters = { client_id: app.uid, client_secret: client_secret, code: code, grant_type: :authorization_code, redirect_uri: app.redirect_uri.split.first } session = ActionDispatch::Integration::Session.new(Rails.application) response = session.post("/oauth/token", params: parameters) expect(response).to eq 200 body = JSON.parse(session.response.body) expect(body['access_token']).to be_present expect(body['refresh_token']).to be_present expect(body['scope']).to eq scope access_token = body['access_token'] # Should show that grant in my account visit my_account_path click_on 'Access token' expect(page).to have_selector("#oauth-application-grant-#{app.id}", text: app.name) expect(page).to have_selector('td', text: app.name) # While being logged in, the api can be accessed with the session visit("/api/bcf/2.1/projects/#{project.id}") expect(page) .to have_content(JSON.dump(project_id: project.id, name: project.name)) logout # While not being logged in and without a token, the api cannot be accessed visit("/api/bcf/2.1/projects/#{project.id}") expect(page) .to have_content(JSON.dump(message: "The requested resource could not be found.")) ## Without the access token, access is denied api_session = ActionDispatch::Integration::Session.new(Rails.application) response = api_session.get("/api/bcf/2.1/projects/#{project.id}") expect(response).to eq 404 # With the access token, access is allowed response = api_session.get("/api/bcf/2.1/projects/#{project.id}", headers: { 'Authorization': "Bearer #{access_token}" }) expect(response).to eq 200 expect(api_session.response.body) .to be_json_eql({ project_id: project.id, name: project.name }.to_json) end end