mirror of
https://github.com/strapi/strapi.git
synced 2025-06-27 00:41:25 +00:00
933 lines
25 KiB
TypeScript
933 lines
25 KiB
TypeScript
'use strict';
|
|
|
|
import { omit } from 'lodash';
|
|
import { createStrapiInstance } from 'api-tests/strapi';
|
|
import { createAuthRequest } from 'api-tests/request';
|
|
import constants from '../../../../packages/core/admin/server/src/services/constants';
|
|
|
|
describe('Admin API Token v2 CRUD (api)', () => {
|
|
let rq;
|
|
let strapi;
|
|
let now;
|
|
let nowSpy;
|
|
|
|
const deleteAllTokens = async () => {
|
|
const tokens = await strapi.admin.services['api-token'].list();
|
|
const promises = [];
|
|
tokens.forEach(({ id }) => {
|
|
promises.push(strapi.admin.services['api-token'].revoke(id));
|
|
});
|
|
await Promise.all(promises);
|
|
};
|
|
|
|
// Initialization Actions
|
|
beforeAll(async () => {
|
|
strapi = await createStrapiInstance();
|
|
rq = await createAuthRequest({ strapi });
|
|
// To eliminate latency in the request and predict the expiry timestamp, we freeze Date.now()
|
|
now = Date.now();
|
|
nowSpy = jest.spyOn(Date, 'now').mockImplementation(() => now);
|
|
|
|
// delete tokens
|
|
await deleteAllTokens();
|
|
});
|
|
|
|
// Cleanup actions
|
|
afterAll(async () => {
|
|
nowSpy.mockRestore();
|
|
await strapi.destroy();
|
|
});
|
|
|
|
afterEach(async () => {
|
|
await deleteAllTokens();
|
|
});
|
|
|
|
// create a predictable valid token that we can test with (delete, list, etc)
|
|
let currentTokens = 0;
|
|
const createValidToken = async (token = {}) => {
|
|
currentTokens += 1;
|
|
|
|
const body = {
|
|
type: 'read-only',
|
|
name: `token_${String(currentTokens)}`,
|
|
description: 'generic description',
|
|
...token,
|
|
};
|
|
|
|
const req = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(req.status).toEqual(201);
|
|
return req.body.data;
|
|
};
|
|
|
|
test('Fails to create an api token (missing parameters from the body)', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-failBody',
|
|
description: 'api-token_tests-description',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toStrictEqual({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: 'type is a required field',
|
|
details: {
|
|
errors: [
|
|
{
|
|
path: ['type'],
|
|
name: 'ValidationError',
|
|
message: 'type is a required field',
|
|
},
|
|
],
|
|
},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Fails to create an api token (invalid `type` in the body)', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-failType',
|
|
description: 'api-token_tests-description',
|
|
type: 'invalid-type',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toStrictEqual({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: 'type must be one of the following values: read-only, full-access, custom',
|
|
details: {
|
|
errors: [
|
|
{
|
|
path: ['type'],
|
|
name: 'ValidationError',
|
|
message: 'type must be one of the following values: read-only, full-access, custom',
|
|
},
|
|
],
|
|
},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Creates a read-only api token', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-readonly',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Creates a token without a lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-no-lifespan',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Creates a token with a 7-day lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-lifespan7',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
lifespan: 7 * 24 * 60 * 60 * 1000, // 7 days
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
expiresAt: expect.toBeISODate(),
|
|
lifespan: String(body.lifespan),
|
|
});
|
|
|
|
// Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000);
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000);
|
|
|
|
jest.useRealTimers();
|
|
});
|
|
|
|
test('Creates a token with a 30-day lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-lifespan30',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
lifespan: 30 * 24 * 60 * 60 * 1000, // 30 days
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
expiresAt: expect.toBeISODate(),
|
|
lifespan: String(body.lifespan),
|
|
});
|
|
|
|
// Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000);
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000);
|
|
|
|
jest.useRealTimers();
|
|
});
|
|
|
|
test('Creates a token with a 90-day lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-lifespan90',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
lifespan: 90 * 24 * 60 * 60 * 1000, // 90 days
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
expiresAt: expect.toBeISODate(),
|
|
lifespan: String(body.lifespan),
|
|
});
|
|
|
|
// Datetime stored in some databases may lose ms accuracy, so allow a range of 2 seconds for timing edge cases
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeGreaterThan(now + body.lifespan - 2000);
|
|
expect(Date.parse(res.body.data.expiresAt)).toBeLessThan(now + body.lifespan + 2000);
|
|
|
|
jest.useRealTimers();
|
|
});
|
|
|
|
test('Creates a token with a null lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-nulllifespan',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
lifespan: null,
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toStrictEqual({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
createdAt: expect.toBeISODate(),
|
|
lastUsedAt: null,
|
|
// @ts-expect-error - Add `expect.toBeISODate()` to jest types
|
|
updatedAt: expect.toBeISODate(),
|
|
expiresAt: null,
|
|
lifespan: body.lifespan,
|
|
});
|
|
});
|
|
|
|
test('Fails to create a token with invalid lifespan', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-lifespan',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
lifespan: -1,
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toStrictEqual({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: expect.stringContaining('lifespan must be one of the following values'),
|
|
details: {
|
|
errors: expect.arrayContaining([
|
|
expect.objectContaining({
|
|
message: expect.stringContaining('lifespan must be one of the following values'),
|
|
name: 'ValidationError',
|
|
}),
|
|
]),
|
|
},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Fails to create a non-custom api token with permissions', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-readonlyFailWithPermissions',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
permissions: ['admin::thing.action'],
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toStrictEqual({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: 'Non-custom tokens should not reference permissions',
|
|
details: {},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Creates a non-custom api token with empty permissions attribute', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-fullAccessFailWithEmptyPermissions',
|
|
description: 'api-token_tests-description',
|
|
type: 'full-access',
|
|
permissions: [],
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toMatchObject({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
createdAt: expect.any(String),
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Creates a custom api token', async () => {
|
|
strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => [
|
|
'admin::subject.action',
|
|
'plugin::foo.bar.action',
|
|
]);
|
|
|
|
const body = {
|
|
name: 'api-token_tests-customSuccess',
|
|
description: 'api-token_tests-description',
|
|
type: 'custom',
|
|
permissions: ['admin::subject.action', 'plugin::foo.bar.action'],
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toMatchObject({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: expect.arrayContaining(body.permissions),
|
|
description: body.description,
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
createdAt: expect.any(String),
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Fails to create a custom api token without permissions', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-customFail',
|
|
description: 'api-token_tests-description',
|
|
type: 'custom',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toMatchObject({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: 'Missing permissions attribute for custom token',
|
|
details: {},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Fails to create a custom api token with unknown permissions', async () => {
|
|
strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => ['action-A', 'action-B']);
|
|
|
|
const body = {
|
|
name: 'api-token_tests-customFail',
|
|
description: 'api-token_tests-description',
|
|
type: 'custom',
|
|
permissions: ['action-A', 'action-C'],
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toMatchObject({
|
|
data: null,
|
|
error: {
|
|
status: 400,
|
|
name: 'ValidationError',
|
|
message: 'Unknown permissions provided: action-C',
|
|
details: {},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Creates an api token without a description (successfully)', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-without-description',
|
|
type: 'full-access',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toMatchObject({
|
|
accessKey: expect.any(String),
|
|
name: body.name,
|
|
permissions: [],
|
|
description: '',
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
createdAt: expect.any(String),
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Creates an api token with trimmed description and name (successfully)', async () => {
|
|
const body = {
|
|
name: ' api-token_tests-spaces-at-the-end ',
|
|
description: ' api-token_tests-description-with-spaces-at-the-end ',
|
|
type: 'read-only',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toMatchObject({
|
|
accessKey: expect.any(String),
|
|
name: 'api-token_tests-spaces-at-the-end',
|
|
permissions: [],
|
|
description: 'api-token_tests-description-with-spaces-at-the-end',
|
|
type: body.type,
|
|
id: expect.any(Number),
|
|
createdAt: expect.any(String),
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('List all tokens (successfully)', async () => {
|
|
await deleteAllTokens();
|
|
|
|
strapi.contentAPI.permissions.providers.action.keys = jest.fn(() => [
|
|
'admin::model.model.read',
|
|
'admin::model.model.create',
|
|
]);
|
|
|
|
// create 4 tokens
|
|
const tokens = [];
|
|
tokens.push(
|
|
await createValidToken({
|
|
type: 'custom',
|
|
permissions: ['admin::model.model.read', 'admin::model.model.create'],
|
|
})
|
|
);
|
|
tokens.push(await createValidToken({ type: 'full-access' }));
|
|
tokens.push(await createValidToken({ type: 'read-only' }));
|
|
tokens.push(await createValidToken({ lifespan: constants.API_TOKEN_LIFESPANS.DAYS_7 }));
|
|
tokens.push(await createValidToken());
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'GET',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data.length).toBe(tokens.length);
|
|
// check that each token exists in data
|
|
tokens.forEach((token) => {
|
|
const t = res.body.data.find((t) => t.id === token.id);
|
|
if (t.permissions) {
|
|
t.permissions = t.permissions.sort();
|
|
Object.assign(token, { permissions: token.permissions.sort() });
|
|
}
|
|
expect(t).toStrictEqual(omit(token, ['accessKey']));
|
|
});
|
|
});
|
|
|
|
test('Deletes a token (successfully)', async () => {
|
|
const token = await createValidToken();
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'DELETE',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: token.name,
|
|
permissions: token.permissions,
|
|
description: token.description,
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Does not return an error if the ressource to delete does not exist', async () => {
|
|
const res = await rq({
|
|
url: '/admin/api-tokens/42',
|
|
method: 'DELETE',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toBeNull();
|
|
});
|
|
|
|
test('Retrieves a non-custom token (successfully)', async () => {
|
|
const token = await createValidToken({
|
|
type: 'read-only',
|
|
});
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'GET',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: token.name,
|
|
permissions: token.permissions,
|
|
description: token.description,
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Retrieves a custom token (successfully)', async () => {
|
|
const token = await createValidToken({
|
|
type: 'custom',
|
|
permissions: ['admin::model.model.read'],
|
|
});
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'GET',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: token.name,
|
|
permissions: token.permissions,
|
|
description: token.description,
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Returns a 404 if the ressource to retrieve does not exist', async () => {
|
|
const res = await rq({
|
|
url: '/admin/api-tokens/42',
|
|
method: 'GET',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(404);
|
|
expect(res.body).toMatchObject({
|
|
data: null,
|
|
error: {
|
|
status: 404,
|
|
name: 'NotFoundError',
|
|
message: 'API Token not found',
|
|
details: {},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Updates a token (successfully)', async () => {
|
|
// create a token
|
|
const body = {
|
|
name: 'api-token_tests-name',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
};
|
|
const res = await rq({
|
|
url: '/admin/api-tokens',
|
|
method: 'POST',
|
|
body,
|
|
});
|
|
|
|
const token = res.body.data;
|
|
|
|
const updatedBody = {
|
|
name: 'api-token_tests-updated-name',
|
|
description: 'api-token_tests-description',
|
|
type: 'read-only',
|
|
};
|
|
|
|
const updatedRes = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'PUT',
|
|
body: updatedBody,
|
|
});
|
|
|
|
expect(updatedRes.statusCode).toBe(200);
|
|
expect(updatedRes.body.data).toMatchObject({
|
|
name: updatedBody.name,
|
|
permissions: [],
|
|
description: updatedBody.description,
|
|
type: updatedBody.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
// expect(updatedRes.body.data.updated)
|
|
});
|
|
|
|
test('Returns a 404 if the ressource to update does not exist', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-updated-name',
|
|
description: 'api-token_tests-updated-description',
|
|
type: 'read-only',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens/42',
|
|
method: 'PUT',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(404);
|
|
expect(res.body).toMatchObject({
|
|
data: null,
|
|
error: {
|
|
status: 404,
|
|
name: 'NotFoundError',
|
|
message: 'API Token not found',
|
|
details: {},
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Updates a token with partial payload (successfully)', async () => {
|
|
const token = await createValidToken();
|
|
|
|
const body = {
|
|
description: 'api-token_tests-re-updated-description',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'PUT',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: token.name,
|
|
permissions: token.permissions,
|
|
description: body.description, // updated field
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Fails to update an api token (invalid `type` in the body)', async () => {
|
|
const body = {
|
|
name: 'api-token_tests-name',
|
|
description: 'api-token_tests-description',
|
|
type: 'invalid-type',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: '/admin/api-tokens/1',
|
|
method: 'PUT',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(400);
|
|
expect(res.body).toMatchObject({
|
|
data: null,
|
|
error: {
|
|
details: {
|
|
errors: [
|
|
{
|
|
message: 'type must be one of the following values: read-only, full-access, custom',
|
|
name: 'ValidationError',
|
|
path: ['type'],
|
|
},
|
|
],
|
|
},
|
|
message: 'type must be one of the following values: read-only, full-access, custom',
|
|
name: 'ValidationError',
|
|
status: 400,
|
|
},
|
|
});
|
|
});
|
|
|
|
test('Updates a token when passing a `null` description (successfully)', async () => {
|
|
const token = await createValidToken();
|
|
|
|
const body = {
|
|
description: null,
|
|
};
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'PUT',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: token.name,
|
|
permissions: token.permissions,
|
|
description: '',
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Updates a token but not the description if no description is passed (successfully)', async () => {
|
|
const token = await createValidToken();
|
|
|
|
const body = {
|
|
name: 'api-token_tests-newNameWithoutDescUpdate',
|
|
};
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}`,
|
|
method: 'PUT',
|
|
body,
|
|
});
|
|
|
|
expect(res.statusCode).toBe(200);
|
|
expect(res.body.data).toMatchObject({
|
|
name: body.name,
|
|
description: token.description,
|
|
permissions: token.permissions,
|
|
type: token.type,
|
|
id: token.id,
|
|
createdAt: token.createdAt,
|
|
lastUsedAt: null,
|
|
updatedAt: expect.any(String),
|
|
expiresAt: null,
|
|
lifespan: null,
|
|
});
|
|
});
|
|
|
|
test('Regenerates an api token access key', async () => {
|
|
const token = await createValidToken();
|
|
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/${token.id}/regenerate`,
|
|
method: 'POST',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(201);
|
|
expect(res.body.data).toMatchObject({
|
|
accessKey: expect.any(String),
|
|
});
|
|
expect(res.body.data.accessKey).not.toEqual(token.accessKey);
|
|
});
|
|
|
|
test('Regenerate throws a NotFound if provided an invalid id', async () => {
|
|
const res = await rq({
|
|
url: `/admin/api-tokens/999999/regenerate`,
|
|
method: 'POST',
|
|
});
|
|
|
|
expect(res.statusCode).toBe(404);
|
|
expect(res.body.error).toMatchObject({
|
|
name: 'NotFoundError',
|
|
status: 404,
|
|
});
|
|
});
|
|
|
|
test.todo('Custom token can only be created with valid permissions that exist');
|
|
});
|