|
require 'test_helper'
|
|
|
|
class Api::TestableController < Api::V1::BaseController
|
|
def index
|
|
render :text => 'dummy', :status => 200
|
|
end
|
|
|
|
def raise_error
|
|
render_error 'standard_error', :status => :internal_server_error,
|
|
:locals => { :exception => StandardError }
|
|
end
|
|
end
|
|
|
|
class Api::TestableControllerTest < ActionController::TestCase
|
|
tests Api::TestableController
|
|
|
|
context "api base headers" do
|
|
test "should contain version in headers" do
|
|
get :index
|
|
assert_match /\d+\.\d+/, @response.headers["Foreman_version"]
|
|
end
|
|
|
|
test "should contain version as string in headers" do
|
|
get :index
|
|
assert @response.headers["Foreman_version"].is_a? String
|
|
end
|
|
end
|
|
|
|
context "API session expiration" do
|
|
test "request succeeds if no session[:expires_at] is included" do
|
|
# this would be typical of API initiated directly or from cli
|
|
get :index
|
|
assert_response :success
|
|
end
|
|
|
|
test "request fails if session expired" do
|
|
# this would be typical of API initiated from a web ui session
|
|
get :index, {}, { :expires_at => 5.days.ago.utc }
|
|
assert_response :unauthorized
|
|
end
|
|
|
|
test "request succeeds if session has not expired" do
|
|
# this would be typical of API initiated from a web ui session
|
|
get :index, {}, { :expires_at => 5.days.from_now.utc }
|
|
assert_response :success
|
|
end
|
|
end
|
|
|
|
context "API usage when authentication is disabled" do
|
|
setup do
|
|
User.current = nil
|
|
request.env['HTTP_AUTHORIZATION'] = nil
|
|
SETTINGS[:login] = false
|
|
end
|
|
|
|
teardown do
|
|
SETTINGS[:login] = true
|
|
end
|
|
|
|
it "does not need a username and password" do
|
|
get :index
|
|
assert_response :success
|
|
end
|
|
|
|
it "does not set session data for API requests" do
|
|
get :index
|
|
assert_not session[:user]
|
|
end
|
|
end
|
|
|
|
context "API usage when authentication is enabled" do
|
|
setup do
|
|
User.current = nil
|
|
request.env['HTTP_AUTHORIZATION'] = nil
|
|
SETTINGS[:login] = true
|
|
end
|
|
|
|
it "requires a username and password" do
|
|
@controller.stubs(:available_sso).returns(nil)
|
|
get :index
|
|
assert_response :unauthorized
|
|
end
|
|
|
|
context "and SSO (plain) authenticates" do
|
|
setup do
|
|
@sso = mock('dummy_sso')
|
|
@sso.stubs(:authenticated?).returns(true)
|
|
@sso.stubs(:user).returns(users(:admin).login)
|
|
@controller.stubs(:available_sso).returns(@sso)
|
|
end
|
|
|
|
it "doesn't escalate privileges in the session" do
|
|
get :index
|
|
refute session[:user], "session contains user #{session[:user]}"
|
|
end
|
|
end
|
|
end
|
|
|
|
context 'errors' do
|
|
test "top level key is error, no metadata included" do
|
|
get :raise_error
|
|
assert_equal ['error'], ActiveSupport::JSON.decode(@response.body).keys
|
|
end
|
|
end
|
|
|
|
context 'CSRF' do
|
|
setup do
|
|
ActionController::Base.allow_forgery_protection = true
|
|
SETTINGS[:login] = true
|
|
User.current = nil
|
|
request.env['HTTP_AUTHORIZATION'] = nil
|
|
end
|
|
|
|
teardown do
|
|
ActionController::Base.allow_forgery_protection = false
|
|
end
|
|
|
|
it "blocks access without CSRF token when there is a session user" do
|
|
request.headers['X-CSRF-Token'] = nil
|
|
post :index, {}, set_session_user
|
|
assert_response :unauthorized
|
|
end
|
|
|
|
it "works with a CSRF token when there is a session user" do
|
|
request.headers['X-CSRF-Token'] = 'TEST_TOKEN'
|
|
post :index, {:authenticity_token => 'TEST_TOKEN'}, set_session_user.merge(:_csrf_token => 'TEST_TOKEN')
|
|
assert_response :success
|
|
end
|
|
end
|
|
|
|
context 'nested objects' do
|
|
it "should use auth scope of nested object" do
|
|
ctrl = Api::TestableController.new
|
|
ctrl.expects(:params).at_least_once.returns(HashWithIndifferentAccess.new(:domain_id => 1, :action => 'index'))
|
|
ctrl.expects(:allowed_nested_id).at_least_once.returns(['domain_id'])
|
|
ctrl.expects(:resource_identifying_attributes).at_least_once.returns(['id'])
|
|
scope = mock('scope')
|
|
obj = mock('domain')
|
|
scope.expects(:find_by_id).with(1).returns(obj)
|
|
Domain.expects(:authorized).with('view_domains').returns(scope)
|
|
assert_equal obj, ctrl.send(:find_required_nested_object)
|
|
end
|
|
end
|
|
end
|