const should = require('should'); const supertest = require('supertest'); const testUtils = require('../../utils'); const config = require('../../../core/shared/config'); const localUtils = require('./utils'); const configUtils = require('../../utils/configUtils'); const sinon = require('sinon'); const logging = require('@tryghost/logging'); describe('Admin API key authentication', function () { let request; before(async function () { await localUtils.startGhost(); request = supertest.agent(config.get('url')); await testUtils.initFixtures('api_keys'); }); afterEach(function () { sinon.restore(); }); it('Can not access endpoint without a token header', async function () { const loggingStub = sinon.stub(logging, 'error'); await request.get(localUtils.API.getApiQuery('posts/')) .set('Authorization', `Ghost`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(401); sinon.assert.calledOnce(loggingStub); }); it('Can not access endpoint with a wrong endpoint token', async function () { const loggingStub = sinon.stub(logging, 'error'); await request.get(localUtils.API.getApiQuery('posts/')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('https://wrong.com')}`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(401); sinon.assert.calledOnce(loggingStub); }); it('Can access browse endpoint with correct token', async function () { await request.get(localUtils.API.getApiQuery('posts/')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('/admin/')}`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(200); }); it('Can create post', async function () { const post = { title: 'Post created with api_key' }; const res = await request .post(localUtils.API.getApiQuery('posts/?include=authors')) .set('Origin', config.get('url')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('/admin/')}`) .send({ posts: [post] }) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(201); // falls back to owner user res.body.posts[0].authors.length.should.eql(1); }); it('Can read users', async function () { const res = await request .get(localUtils.API.getApiQuery('users/')) .set('Origin', config.get('url')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('/admin/')}`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(200); localUtils.API.checkResponse(res.body.users[0], 'user'); }); describe('Host Settings: custom integration limits', function () { afterEach(function () { configUtils.set('hostSettings:limits', undefined); }); it('Blocks the request when host limit is in place for custom integrations', async function () { configUtils.set('hostSettings:limits', { customIntegrations: { disabled: true, error: 'Custom limit error message' } }); // NOTE: need to do a full reboot to reinitialize hostSettings await localUtils.startGhost(); await testUtils.initFixtures('integrations'); await testUtils.initFixtures('api_keys'); const loggingStub = sinon.stub(logging, 'error'); const firstResponse = await request.get(localUtils.API.getApiQuery('posts/')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('/admin/')}`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(403); firstResponse.body.errors[0].type.should.equal('HostLimitError'); firstResponse.body.errors[0].message.should.equal('Custom limit error message'); sinon.assert.calledOnce(loggingStub); // CASE: Test with a different API key, related to a core integration const secondResponse = await request.get(localUtils.API.getApiQuery('explore/')) .set('Authorization', `Ghost ${localUtils.getValidAdminToken('/admin/', 4)}`) .expect('Content-Type', /json/) .expect('Cache-Control', testUtils.cacheRules.private) .expect(200); should.exist(secondResponse.body.explore); }); }); });