'use strict'; import { omit } from 'lodash'; import { createStrapiInstance } from 'api-tests/strapi'; import { createAuthRequest } from 'api-tests/request'; import constants from '../../../../packages/core/admin/server/src/services/constants'; describe('Admin API Token v2 CRUD (api)', () => { let rq; let strapi; let now; let nowSpy; const deleteAllTokens = async () => { const tokens = await strapi.admin.services['api-token'].list(); const promises = []; tokens.forEach(({ id }) => { promises.push(strapi.admin.services['api-token'].revoke(id)); }); await Promise.all(promises); }; // Initialization Actions beforeAll(async () => { strapi = await createStrapiInstance(); rq = await createAuthRequest({ strapi }); // To eliminate latency in the request and predict the expiry timestamp, we freeze Date.now() now = Date.now(); nowSpy = jest.spyOn(Date, 'now').mockImplementation(() => now); // delete tokens await deleteAllTokens(); }); // Cleanup actions afterAll(async () => { nowSpy.mockRestore(); await strapi.destroy(); }); afterEach(async () => { await deleteAllTokens(); }); // create a predictable valid token that we can test with (delete, list, etc) let currentTokens = 0; const createValidToken = async (token = {}) => { currentTokens += 1; const body = { type: 'read-only', name: `token_${String(currentTokens)}`, description: 'generic description', ...token, }; const req = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(req.status).toEqual(201); return req.body.data; }; test('Fails to create an api token (missing parameters from the body)', async () => { const body = { name: 'api-token_tests-failBody', description: 'api-token_tests-description', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toStrictEqual({ data: null, error: { status: 400, name: 'ValidationError', message: 'type is a required field', details: { errors: [ { path: ['type'], name: 'ValidationError', message: 'type is a required field', }, ], }, }, }); }); test('Fails to create an api token (invalid `type` in the body)', async () => { const body = { name: 'api-token_tests-failType', description: 'api-token_tests-description', type: 'invalid-type', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toStrictEqual({ data: null, error: { status: 400, name: 'ValidationError', message: 'type must be one of the following values: read-only, full-access, custom', details: { errors: [ { path: ['type'], name: 'ValidationError', message: 'type must be one of the following values: read-only, full-access, custom', }, ], }, }, }); }); test('Creates a read-only api token', async () => { const body = { name: 'api-token_tests-readonly', description: 'api-token_tests-description', type: 'read-only', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), expiresAt: null, lifespan: null, }); }); test('Creates a token without a lifespan', async () => { const body = { name: 'api-token_tests-no-lifespan', description: 'api-token_tests-description', type: 'read-only', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), expiresAt: null, lifespan: null, }); }); test('Creates a token with a 7-day lifespan', async () => { const body = { name: 'api-token_tests-lifespan7', description: 'api-token_tests-description', type: 'read-only', lifespan: 7 * 24 * 60 * 60 * 1000, // 7 days }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), // @ts-expect-error - Add `expect.toBeISODate()` to jest types expiresAt: expect.toBeISODate(), lifespan: String(body.lifespan), }); // Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000); expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000); jest.useRealTimers(); }); test('Creates a token with a 30-day lifespan', async () => { const body = { name: 'api-token_tests-lifespan30', description: 'api-token_tests-description', type: 'read-only', lifespan: 30 * 24 * 60 * 60 * 1000, // 30 days }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), // @ts-expect-error - Add `expect.toBeISODate()` to jest types expiresAt: expect.toBeISODate(), lifespan: String(body.lifespan), }); // Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000); expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000); jest.useRealTimers(); }); test('Creates a token with a 90-day lifespan', async () => { const body = { name: 'api-token_tests-lifespan90', description: 'api-token_tests-description', type: 'read-only', lifespan: 90 * 24 * 60 * 60 * 1000, // 90 days }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), // @ts-expect-error - Add `expect.toBeISODate()` to jest types expiresAt: expect.toBeISODate(), lifespan: String(body.lifespan), }); // Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000); expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000); jest.useRealTimers(); }); test('Creates a token with a null lifespan', async () => { const body = { name: 'api-token_tests-nulllifespan', description: 'api-token_tests-description', type: 'read-only', lifespan: null, }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toStrictEqual({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), // @ts-expect-error - Add `expect.toBeISODate()` to jest types createdAt: expect.toBeISODate(), lastUsedAt: null, // @ts-expect-error - Add `expect.toBeISODate()` to jest types updatedAt: expect.toBeISODate(), expiresAt: null, lifespan: body.lifespan, }); }); test('Fails to create a token with invalid lifespan', async () => { const body = { name: 'api-token_tests-lifespan', description: 'api-token_tests-description', type: 'read-only', lifespan: -1, }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toStrictEqual({ data: null, error: { status: 400, name: 'ValidationError', message: expect.stringContaining('lifespan must be one of the following values'), details: { errors: expect.arrayContaining([ expect.objectContaining({ message: expect.stringContaining('lifespan must be one of the following values'), name: 'ValidationError', }), ]), }, }, }); }); test('Fails to create a non-custom api token with permissions', async () => { const body = { name: 'api-token_tests-readonlyFailWithPermissions', description: 'api-token_tests-description', type: 'read-only', permissions: ['admin::thing.action'], }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toStrictEqual({ data: null, error: { status: 400, name: 'ValidationError', message: 'Non-custom tokens should not reference permissions', details: {}, }, }); }); test('Creates a non-custom api token with empty permissions attribute', async () => { const body = { name: 'api-token_tests-fullAccessFailWithEmptyPermissions', description: 'api-token_tests-description', type: 'full-access', permissions: [], }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toMatchObject({ accessKey: expect.any(String), name: body.name, permissions: [], description: body.description, type: body.type, id: expect.any(Number), createdAt: expect.any(String), lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Creates a custom api token', async () => { strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => [ 'admin::subject.action', 'plugin::foo.bar.action', ]); const body = { name: 'api-token_tests-customSuccess', description: 'api-token_tests-description', type: 'custom', permissions: ['admin::subject.action', 'plugin::foo.bar.action'], }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toMatchObject({ accessKey: expect.any(String), name: body.name, permissions: expect.arrayContaining(body.permissions), description: body.description, type: body.type, id: expect.any(Number), createdAt: expect.any(String), lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Fails to create a custom api token without permissions', async () => { const body = { name: 'api-token_tests-customFail', description: 'api-token_tests-description', type: 'custom', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toMatchObject({ data: null, error: { status: 400, name: 'ValidationError', message: 'Missing permissions attribute for custom token', details: {}, }, }); }); test('Fails to create a custom api token with unknown permissions', async () => { strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => ['action-A', 'action-B']); const body = { name: 'api-token_tests-customFail', description: 'api-token_tests-description', type: 'custom', permissions: ['action-A', 'action-C'], }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(400); expect(res.body).toMatchObject({ data: null, error: { status: 400, name: 'ValidationError', message: 'Unknown permissions provided: action-C', details: {}, }, }); }); test('Creates an api token without a description (successfully)', async () => { const body = { name: 'api-token_tests-without-description', type: 'full-access', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toMatchObject({ accessKey: expect.any(String), name: body.name, permissions: [], description: '', type: body.type, id: expect.any(Number), createdAt: expect.any(String), lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Creates an api token with trimmed description and name (successfully)', async () => { const body = { name: ' api-token_tests-spaces-at-the-end ', description: ' api-token_tests-description-with-spaces-at-the-end ', type: 'read-only', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); expect(res.statusCode).toBe(201); expect(res.body.data).toMatchObject({ accessKey: expect.any(String), name: 'api-token_tests-spaces-at-the-end', permissions: [], description: 'api-token_tests-description-with-spaces-at-the-end', type: body.type, id: expect.any(Number), createdAt: expect.any(String), lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('List all tokens (successfully)', async () => { await deleteAllTokens(); strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => [ 'admin::model.model.read', 'admin::model.model.create', ]); // create 4 tokens const tokens = []; tokens.push( await createValidToken({ type: 'custom', permissions: ['admin::model.model.read', 'admin::model.model.create'], }) ); tokens.push(await createValidToken({ type: 'full-access' })); tokens.push(await createValidToken({ type: 'read-only' })); tokens.push(await createValidToken({ lifespan: constants.API_TOKEN_LIFESPANS.DAYS_7 })); tokens.push(await createValidToken()); const res = await rq({ url: '/admin/api-tokens', method: 'GET', }); expect(res.statusCode).toBe(200); expect(res.body.data.length).toBe(tokens.length); // check that each token exists in data tokens.forEach((token) => { const t = res.body.data.find((t) => t.id === token.id); if (t.permissions) { t.permissions = t.permissions.sort(); Object.assign(token, { permissions: token.permissions.sort() }); } expect(t).toStrictEqual(omit(token, ['accessKey'])); }); }); test('Deletes a token (successfully)', async () => { const token = await createValidToken(); const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'DELETE', }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: token.name, permissions: token.permissions, description: token.description, type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Does not return an error if the ressource to delete does not exist', async () => { const res = await rq({ url: '/admin/api-tokens/42', method: 'DELETE', }); expect(res.statusCode).toBe(200); expect(res.body.data).toBeNull(); }); test('Retrieves a non-custom token (successfully)', async () => { const token = await createValidToken({ type: 'read-only', }); const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'GET', }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: token.name, permissions: token.permissions, description: token.description, type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Retrieves a custom token (successfully)', async () => { const token = await createValidToken({ type: 'custom', permissions: ['admin::model.model.read'], }); const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'GET', }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: token.name, permissions: token.permissions, description: token.description, type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Returns a 404 if the ressource to retrieve does not exist', async () => { const res = await rq({ url: '/admin/api-tokens/42', method: 'GET', }); expect(res.statusCode).toBe(404); expect(res.body).toMatchObject({ data: null, error: { status: 404, name: 'NotFoundError', message: 'API Token not found', details: {}, }, }); }); test('Updates a token (successfully)', async () => { // create a token const body = { name: 'api-token_tests-name', description: 'api-token_tests-description', type: 'read-only', }; const res = await rq({ url: '/admin/api-tokens', method: 'POST', body, }); const token = res.body.data; const updatedBody = { name: 'api-token_tests-updated-name', description: 'api-token_tests-description', type: 'read-only', }; const updatedRes = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'PUT', body: updatedBody, }); expect(updatedRes.statusCode).toBe(200); expect(updatedRes.body.data).toMatchObject({ name: updatedBody.name, permissions: [], description: updatedBody.description, type: updatedBody.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); // expect(updatedRes.body.data.updated) }); test('Returns a 404 if the ressource to update does not exist', async () => { const body = { name: 'api-token_tests-updated-name', description: 'api-token_tests-updated-description', type: 'read-only', }; const res = await rq({ url: '/admin/api-tokens/42', method: 'PUT', body, }); expect(res.statusCode).toBe(404); expect(res.body).toMatchObject({ data: null, error: { status: 404, name: 'NotFoundError', message: 'API Token not found', details: {}, }, }); }); test('Updates a token with partial payload (successfully)', async () => { const token = await createValidToken(); const body = { description: 'api-token_tests-re-updated-description', }; const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'PUT', body, }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: token.name, permissions: token.permissions, description: body.description, // updated field type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Fails to update an api token (invalid `type` in the body)', async () => { const body = { name: 'api-token_tests-name', description: 'api-token_tests-description', type: 'invalid-type', }; const res = await rq({ url: '/admin/api-tokens/1', method: 'PUT', body, }); expect(res.statusCode).toBe(400); expect(res.body).toMatchObject({ data: null, error: { details: { errors: [ { message: 'type must be one of the following values: read-only, full-access, custom', name: 'ValidationError', path: ['type'], }, ], }, message: 'type must be one of the following values: read-only, full-access, custom', name: 'ValidationError', status: 400, }, }); }); test('Updates a token when passing a `null` description (successfully)', async () => { const token = await createValidToken(); const body = { description: null, }; const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'PUT', body, }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: token.name, permissions: token.permissions, description: '', type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Updates a token but not the description if no description is passed (successfully)', async () => { const token = await createValidToken(); const body = { name: 'api-token_tests-newNameWithoutDescUpdate', }; const res = await rq({ url: `/admin/api-tokens/${token.id}`, method: 'PUT', body, }); expect(res.statusCode).toBe(200); expect(res.body.data).toMatchObject({ name: body.name, description: token.description, permissions: token.permissions, type: token.type, id: token.id, createdAt: token.createdAt, lastUsedAt: null, updatedAt: expect.any(String), expiresAt: null, lifespan: null, }); }); test('Regenerates an api token access key', async () => { const token = await createValidToken(); const res = await rq({ url: `/admin/api-tokens/${token.id}/regenerate`, method: 'POST', }); expect(res.statusCode).toBe(201); expect(res.body.data).toMatchObject({ accessKey: expect.any(String), }); expect(res.body.data.accessKey).not.toEqual(token.accessKey); }); test('Regenerate throws a NotFound if provided an invalid id', async () => { const res = await rq({ url: `/admin/api-tokens/999999/regenerate`, method: 'POST', }); expect(res.statusCode).toBe(404); expect(res.body.error).toMatchObject({ name: 'NotFoundError', status: 404, }); }); test.todo('Custom token can only be created with valid permissions that exist'); });