kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
148 lines
5.6 KiB
148 lines
5.6 KiB
#-- copyright
|
|
# OpenProject is a project management system.
|
|
# Copyright (C) 2012-2018 the OpenProject Foundation (OPF)
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2017 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See docs/COPYRIGHT.rdoc for more details.
|
|
#++
|
|
|
|
require 'spec_helper'
|
|
|
|
describe 'authorization for BCF api', type: :feature, js: true do
|
|
let!(:user) { FactoryBot.create(:admin) }
|
|
let(:client_secret) { app.plaintext_secret }
|
|
let(:scope) { 'bcf_v2_1' }
|
|
let!(:project) { FactoryBot.create(:project) }
|
|
|
|
def oauth_path(client_id)
|
|
"/oauth/authorize?response_type=code&client_id=#{client_id}&redirect_uri=urn:ietf:wg:oauth:2.0:oob&scope=#{scope}"
|
|
end
|
|
|
|
before do
|
|
login_with user.login, 'adminADMIN!'
|
|
|
|
visit oauth_applications_path
|
|
end
|
|
|
|
it 'can create and later authorize and manage an OAuth application grant and then use the access token for the bcf api' do
|
|
# Initially empty
|
|
expect(page).to have_selector('.generic-table--empty-row', text: 'There is currently nothing to display')
|
|
|
|
# Create application
|
|
find('.button', text: 'Add').click
|
|
fill_in 'application_name', with: 'My API application'
|
|
# Limit to bcf access
|
|
check scope
|
|
# Fill invalid redirect_uri
|
|
fill_in 'application_redirect_uri', with: "not a url!"
|
|
click_on 'Create'
|
|
|
|
expect(page).to have_selector('.errorExplanation', text: 'Redirect URI must be an absolute URI.')
|
|
fill_in 'application_redirect_uri', with: "urn:ietf:wg:oauth:2.0:oob\nhttps://localhost/my/callback"
|
|
click_on 'Create'
|
|
|
|
expect(page).to have_selector('.flash.notice', text: 'Successful creation.')
|
|
|
|
expect(page).to have_selector('.attributes-key-value--key',
|
|
text: 'Client ID')
|
|
expect(page).to have_selector('.attributes-key-value--value',
|
|
text: "urn:ietf:wg:oauth:2.0:oob\nhttps://localhost/my/callback")
|
|
|
|
# Should print secret on initial visit
|
|
expect(page).to have_selector('.attributes-key-value--key', text: 'Client secret')
|
|
client_secret = page.first('.attributes-key-value--value code').text
|
|
expect(client_secret).to match /\w+/
|
|
|
|
app = ::Doorkeeper::Application.first
|
|
|
|
visit oauth_path app.uid
|
|
|
|
# We get to the authorization screen
|
|
expect(page).to have_selector('h2', text: 'Authorize My API application')
|
|
|
|
# With the correct scope printed
|
|
expect(page).to have_selector('li strong', text: I18n.t('oauth.scopes.bcf_v2_1'))
|
|
expect(page).to have_selector('li', text: I18n.t('oauth.scopes.bcf_v2_1_text'))
|
|
|
|
# Authorize
|
|
find('input.button[value="Authorize"]').click
|
|
|
|
# Expect auth token
|
|
code = find('#authorization_code').text
|
|
|
|
# And also have a grant for this application
|
|
user.oauth_grants.reload
|
|
expect(user.oauth_grants.count).to eq 1
|
|
expect(user.oauth_grants.first.application).to eq app
|
|
|
|
parameters = {
|
|
client_id: app.uid,
|
|
client_secret: client_secret,
|
|
code: code,
|
|
grant_type: :authorization_code,
|
|
redirect_uri: app.redirect_uri.split.first
|
|
}
|
|
|
|
session = ActionDispatch::Integration::Session.new(Rails.application)
|
|
response = session.post("/oauth/token", params: parameters)
|
|
expect(response).to eq 200
|
|
body = JSON.parse(session.response.body)
|
|
|
|
expect(body['access_token']).to be_present
|
|
expect(body['refresh_token']).to be_present
|
|
expect(body['scope']).to eq scope
|
|
|
|
access_token = body['access_token']
|
|
|
|
# Should show that grant in my account
|
|
visit my_account_path
|
|
click_on 'Access token'
|
|
|
|
expect(page).to have_selector("#oauth-application-grant-#{app.id}", text: app.name)
|
|
expect(page).to have_selector('td', text: app.name)
|
|
|
|
# While being logged in, the api can be accessed with the session
|
|
visit("/api/bcf/2.1/projects/#{project.id}")
|
|
expect(page)
|
|
.to have_content(JSON.dump(project_id: project.id, name: project.name))
|
|
|
|
logout
|
|
|
|
# While not being logged in and without a token, the api cannot be accessed
|
|
visit("/api/bcf/2.1/projects/#{project.id}")
|
|
expect(page)
|
|
.to have_content(JSON.dump(message: "The requested resource could not be found."))
|
|
|
|
## Without the access token, access is denied
|
|
api_session = ActionDispatch::Integration::Session.new(Rails.application)
|
|
response = api_session.get("/api/bcf/2.1/projects/#{project.id}")
|
|
expect(response).to eq 404
|
|
|
|
# With the access token, access is allowed
|
|
response = api_session.get("/api/bcf/2.1/projects/#{project.id}",
|
|
headers: { 'Authorization': "Bearer #{access_token}" })
|
|
expect(response).to eq 200
|
|
expect(api_session.response.body)
|
|
.to be_json_eql({ project_id: project.id, name: project.name }.to_json)
|
|
end
|
|
end
|
|
|