5 use BookStack\Access\Notifications\UserInviteNotification;
6 use BookStack\Activity\ActivityType;
7 use BookStack\Activity\Models\Activity as ActivityModel;
8 use BookStack\Entities\Models\Entity;
9 use BookStack\Facades\Activity;
10 use BookStack\Users\Models\Role;
11 use BookStack\Users\Models\User;
12 use Illuminate\Support\Facades\Hash;
13 use Illuminate\Support\Facades\Notification;
16 class UsersApiTest extends TestCase
20 protected string $baseEndpoint = '/api/users';
22 protected array $endpointMap = [
23 ['get', '/api/users'],
24 ['post', '/api/users'],
25 ['get', '/api/users/1'],
26 ['put', '/api/users/1'],
27 ['delete', '/api/users/1'],
30 public function test_users_manage_permission_needed_for_all_endpoints()
32 $this->actingAsApiEditor();
33 foreach ($this->endpointMap as [$method, $uri]) {
34 $resp = $this->json($method, $uri);
35 $resp->assertStatus(403);
36 $resp->assertJson($this->permissionErrorResponse());
40 public function test_no_endpoints_accessible_in_demo_mode()
42 config()->set('app.env', 'demo');
43 $this->actingAsApiAdmin();
45 foreach ($this->endpointMap as [$method, $uri]) {
46 $resp = $this->json($method, $uri);
47 $resp->assertStatus(403);
48 $resp->assertJson($this->permissionErrorResponse());
52 public function test_index_endpoint_returns_expected_user()
54 $this->actingAsApiAdmin();
55 /** @var User $firstUser */
56 $firstUser = User::query()->orderBy('id', 'asc')->first();
58 $resp = $this->getJson($this->baseEndpoint . '?count=1&sort=+id');
59 $resp->assertJson(['data' => [
61 'id' => $firstUser->id,
62 'name' => $firstUser->name,
63 'slug' => $firstUser->slug,
64 'email' => $firstUser->email,
65 'profile_url' => $firstUser->getProfileUrl(),
66 'edit_url' => $firstUser->getEditUrl(),
67 'avatar_url' => $firstUser->getAvatar(),
72 public function test_index_endpoint_has_correct_created_and_last_activity_dates()
74 $user = $this->users->editor();
75 $user->created_at = now()->subYear();
78 $this->actingAs($user);
79 Activity::add(ActivityType::AUTH_LOGIN, 'test login activity');
80 /** @var ActivityModel $activity */
81 $activity = ActivityModel::query()->where('user_id', '=', $user->id)->latest()->first();
83 $resp = $this->asAdmin()->getJson($this->baseEndpoint . '?filter[id]=3');
84 $resp->assertJson(['data' => [
87 'created_at' => $user->created_at->toJSON(),
88 'last_activity_at' => $activity->created_at->toJson(),
93 public function test_create_endpoint()
95 $this->actingAsApiAdmin();
96 /** @var Role $role */
97 $role = Role::query()->first();
99 $resp = $this->postJson($this->baseEndpoint, [
100 'name' => 'Benny Boris',
102 'password' => 'mysuperpass',
104 'roles' => [$role->id],
105 'send_invite' => false,
108 $resp->assertStatus(200);
110 'name' => 'Benny Boris',
112 'external_auth_id' => '',
116 'display_name' => $role->display_name,
122 /** @var User $user */
124 $this->assertActivityExists(ActivityType::USER_CREATE, null, $user->logDescriptor());
125 $this->assertEquals(1, $user->roles()->count());
126 $this->assertEquals('it', setting()->getUser($user, 'language'));
129 public function test_create_with_send_invite()
131 $this->actingAsApiAdmin();
132 Notification::fake();
134 $resp = $this->postJson($this->baseEndpoint, [
135 'name' => 'Benny Boris',
137 'send_invite' => true,
140 $resp->assertStatus(200);
141 /** @var User $user */
143 Notification::assertSentTo($user, UserInviteNotification::class);
146 public function test_create_name_and_email_validation()
148 $this->actingAsApiAdmin();
149 /** @var User $existingUser */
150 $existingUser = User::query()->first();
152 $resp = $this->postJson($this->baseEndpoint, [
155 $resp->assertStatus(422);
156 $resp->assertJson($this->validationResponse(['name' => ['The name field is required.']]));
158 $resp = $this->postJson($this->baseEndpoint, [
159 'name' => 'Benny Boris',
161 $resp->assertStatus(422);
162 $resp->assertJson($this->validationResponse(['email' => ['The email field is required.']]));
164 $resp = $this->postJson($this->baseEndpoint, [
165 'email' => $existingUser->email,
166 'name' => 'Benny Boris',
168 $resp->assertStatus(422);
169 $resp->assertJson($this->validationResponse(['email' => ['The email has already been taken.']]));
172 public function test_read_endpoint()
174 $this->actingAsApiAdmin();
175 /** @var User $user */
176 $user = User::query()->first();
177 /** @var Role $userRole */
178 $userRole = $user->roles()->first();
180 $resp = $this->getJson($this->baseEndpoint . "/{$user->id}");
182 $resp->assertStatus(200);
185 'slug' => $user->slug,
186 'email' => $user->email,
187 'external_auth_id' => $user->external_auth_id,
190 'id' => $userRole->id,
191 'display_name' => $userRole->display_name,
197 public function test_update_endpoint()
199 $this->actingAsApiAdmin();
200 /** @var User $user */
201 $user = $this->users->admin();
202 $roles = Role::query()->pluck('id');
203 $resp = $this->putJson($this->baseEndpoint . "/{$user->id}", [
204 'name' => 'My updated user',
207 'external_auth_id' => 'btest',
208 'password' => 'barrytester',
212 $resp->assertStatus(200);
215 'name' => 'My updated user',
217 'external_auth_id' => 'btest',
220 $this->assertEquals('fr', setting()->getUser($user, 'language'));
221 $this->assertEquals(count($roles), $user->roles()->count());
222 $this->assertNotEquals('barrytester', $user->password);
223 $this->assertTrue(Hash::check('barrytester', $user->password));
226 public function test_update_endpoint_does_not_remove_info_if_not_provided()
228 $this->actingAsApiAdmin();
229 /** @var User $user */
230 $user = $this->users->admin();
231 $roleCount = $user->roles()->count();
232 $resp = $this->putJson($this->baseEndpoint . "/{$user->id}", []);
234 $resp->assertStatus(200);
235 $this->assertDatabaseHas('users', [
237 'name' => $user->name,
238 'email' => $user->email,
239 'password' => $user->password,
241 $this->assertEquals($roleCount, $user->roles()->count());
244 public function test_delete_endpoint()
246 $this->actingAsApiAdmin();
247 /** @var User $user */
248 $user = User::query()->where('id', '!=', $this->users->admin()->id)
249 ->whereNull('system_name')
252 $resp = $this->deleteJson($this->baseEndpoint . "/{$user->id}");
254 $resp->assertStatus(204);
255 $this->assertActivityExists('user_delete', null, $user->logDescriptor());
258 public function test_delete_endpoint_with_ownership_migration_user()
260 $this->actingAsApiAdmin();
261 /** @var User $user */
262 $user = User::query()->where('id', '!=', $this->users->admin()->id)
263 ->whereNull('system_name')
265 $entityChain = $this->entities->createChainBelongingToUser($user);
266 /** @var User $newOwner */
267 $newOwner = User::query()->where('id', '!=', $user->id)->first();
269 /** @var Entity $entity */
270 foreach ($entityChain as $entity) {
271 $this->assertEquals($user->id, $entity->owned_by);
274 $resp = $this->deleteJson($this->baseEndpoint . "/{$user->id}", [
275 'migrate_ownership_id' => $newOwner->id,
278 $resp->assertStatus(204);
279 /** @var Entity $entity */
280 foreach ($entityChain as $entity) {
281 $this->assertEquals($newOwner->id, $entity->refresh()->owned_by);
285 public function test_delete_endpoint_fails_deleting_only_admin()
287 $this->actingAsApiAdmin();
288 $adminRole = Role::getSystemRole('admin');
289 $adminToDelete = $adminRole->users()->first();
290 $adminRole->users()->where('id', '!=', $adminToDelete->id)->delete();
292 $resp = $this->deleteJson($this->baseEndpoint . "/{$adminToDelete->id}");
294 $resp->assertStatus(500);
295 $resp->assertJson($this->errorResponse('You cannot delete the only admin', 500));
298 public function test_delete_endpoint_fails_deleting_public_user()
300 $this->actingAsApiAdmin();
301 /** @var User $publicUser */
302 $publicUser = User::query()->where('system_name', '=', 'public')->first();
304 $resp = $this->deleteJson($this->baseEndpoint . "/{$publicUser->id}");
306 $resp->assertStatus(500);
307 $resp->assertJson($this->errorResponse('You cannot delete the guest user', 500));