5 use BookStack\Actions\ActivityType;
6 use BookStack\Auth\Role;
7 use BookStack\Auth\User;
8 use BookStack\Entities\Models\Entity;
9 use BookStack\Notifications\UserInvite;
10 use Illuminate\Support\Facades\Hash;
11 use Illuminate\Support\Facades\Notification;
14 class UsersApiTest extends TestCase
18 protected $baseEndpoint = '/api/users';
20 protected $endpointMap = [
21 ['get', '/api/users'],
22 ['post', '/api/users'],
23 ['get', '/api/users/1'],
24 ['put', '/api/users/1'],
25 ['delete', '/api/users/1'],
28 public function test_users_manage_permission_needed_for_all_endpoints()
30 $this->actingAsApiEditor();
31 foreach ($this->endpointMap as [$method, $uri]) {
32 $resp = $this->json($method, $uri);
33 $resp->assertStatus(403);
34 $resp->assertJson($this->permissionErrorResponse());
38 public function test_no_endpoints_accessible_in_demo_mode()
40 config()->set('app.env', 'demo');
41 $this->actingAsApiAdmin();
43 foreach ($this->endpointMap as [$method, $uri]) {
44 $resp = $this->json($method, $uri);
45 $resp->assertStatus(403);
46 $resp->assertJson($this->permissionErrorResponse());
50 public function test_index_endpoint_returns_expected_shelf()
52 $this->actingAsApiAdmin();
53 /** @var User $firstUser */
54 $firstUser = User::query()->orderBy('id', 'asc')->first();
56 $resp = $this->getJson($this->baseEndpoint . '?count=1&sort=+id');
57 $resp->assertJson(['data' => [
59 'id' => $firstUser->id,
60 'name' => $firstUser->name,
61 'slug' => $firstUser->slug,
62 'email' => $firstUser->email,
63 'profile_url' => $firstUser->getProfileUrl(),
64 'edit_url' => $firstUser->getEditUrl(),
65 'avatar_url' => $firstUser->getAvatar(),
70 public function test_create_endpoint()
72 $this->actingAsApiAdmin();
73 /** @var Role $role */
74 $role = Role::query()->first();
76 $resp = $this->postJson($this->baseEndpoint, [
77 'name' => 'Benny Boris',
79 'password' => 'mysuperpass',
81 'roles' => [$role->id],
82 'send_invite' => false,
85 $resp->assertStatus(200);
87 'name' => 'Benny Boris',
89 'external_auth_id' => '',
93 'display_name' => $role->display_name,
99 /** @var User $user */
101 $this->assertActivityExists(ActivityType::USER_CREATE, null, $user->logDescriptor());
102 $this->assertEquals(1, $user->roles()->count());
103 $this->assertEquals('it', setting()->getUser($user, 'language'));
106 public function test_create_with_send_invite()
108 $this->actingAsApiAdmin();
109 Notification::fake();
111 $resp = $this->postJson($this->baseEndpoint, [
112 'name' => 'Benny Boris',
114 'send_invite' => true,
117 $resp->assertStatus(200);
118 /** @var User $user */
120 Notification::assertSentTo($user, UserInvite::class);
123 public function test_create_name_and_email_validation()
125 $this->actingAsApiAdmin();
126 /** @var User $existingUser */
127 $existingUser = User::query()->first();
129 $resp = $this->postJson($this->baseEndpoint, [
132 $resp->assertStatus(422);
133 $resp->assertJson($this->validationResponse(['name' => ['The name field is required.']]));
135 $resp = $this->postJson($this->baseEndpoint, [
136 'name' => 'Benny Boris',
138 $resp->assertStatus(422);
139 $resp->assertJson($this->validationResponse(['email' => ['The email field is required.']]));
141 $resp = $this->postJson($this->baseEndpoint, [
142 'email' => $existingUser->email,
143 'name' => 'Benny Boris',
145 $resp->assertStatus(422);
146 $resp->assertJson($this->validationResponse(['email' => ['The email has already been taken.']]));
149 public function test_read_endpoint()
151 $this->actingAsApiAdmin();
152 /** @var User $user */
153 $user = User::query()->first();
154 /** @var Role $userRole */
155 $userRole = $user->roles()->first();
157 $resp = $this->getJson($this->baseEndpoint . "/{$user->id}");
159 $resp->assertStatus(200);
162 'slug' => $user->slug,
163 'email' => $user->email,
164 'external_auth_id' => $user->external_auth_id,
167 'id' => $userRole->id,
168 'display_name' => $userRole->display_name,
174 public function test_update_endpoint()
176 $this->actingAsApiAdmin();
177 /** @var User $user */
178 $user = $this->users->admin();
179 $roles = Role::query()->pluck('id');
180 $resp = $this->putJson($this->baseEndpoint . "/{$user->id}", [
181 'name' => 'My updated user',
184 'external_auth_id' => 'btest',
185 'password' => 'barrytester',
189 $resp->assertStatus(200);
192 'name' => 'My updated user',
194 'external_auth_id' => 'btest',
197 $this->assertEquals('fr', setting()->getUser($user, 'language'));
198 $this->assertEquals(count($roles), $user->roles()->count());
199 $this->assertNotEquals('barrytester', $user->password);
200 $this->assertTrue(Hash::check('barrytester', $user->password));
203 public function test_update_endpoint_does_not_remove_info_if_not_provided()
205 $this->actingAsApiAdmin();
206 /** @var User $user */
207 $user = $this->users->admin();
208 $roleCount = $user->roles()->count();
209 $resp = $this->putJson($this->baseEndpoint . "/{$user->id}", []);
211 $resp->assertStatus(200);
212 $this->assertDatabaseHas('users', [
214 'name' => $user->name,
215 'email' => $user->email,
216 'password' => $user->password,
218 $this->assertEquals($roleCount, $user->roles()->count());
221 public function test_delete_endpoint()
223 $this->actingAsApiAdmin();
224 /** @var User $user */
225 $user = User::query()->where('id', '!=', $this->users->admin()->id)
226 ->whereNull('system_name')
229 $resp = $this->deleteJson($this->baseEndpoint . "/{$user->id}");
231 $resp->assertStatus(204);
232 $this->assertActivityExists('user_delete', null, $user->logDescriptor());
235 public function test_delete_endpoint_with_ownership_migration_user()
237 $this->actingAsApiAdmin();
238 /** @var User $user */
239 $user = User::query()->where('id', '!=', $this->users->admin()->id)
240 ->whereNull('system_name')
242 $entityChain = $this->entities->createChainBelongingToUser($user);
243 /** @var User $newOwner */
244 $newOwner = User::query()->where('id', '!=', $user->id)->first();
246 /** @var Entity $entity */
247 foreach ($entityChain as $entity) {
248 $this->assertEquals($user->id, $entity->owned_by);
251 $resp = $this->deleteJson($this->baseEndpoint . "/{$user->id}", [
252 'migrate_ownership_id' => $newOwner->id,
255 $resp->assertStatus(204);
256 /** @var Entity $entity */
257 foreach ($entityChain as $entity) {
258 $this->assertEquals($newOwner->id, $entity->refresh()->owned_by);
262 public function test_delete_endpoint_fails_deleting_only_admin()
264 $this->actingAsApiAdmin();
265 $adminRole = Role::getSystemRole('admin');
266 $adminToDelete = $adminRole->users()->first();
267 $adminRole->users()->where('id', '!=', $adminToDelete->id)->delete();
269 $resp = $this->deleteJson($this->baseEndpoint . "/{$adminToDelete->id}");
271 $resp->assertStatus(500);
272 $resp->assertJson($this->errorResponse('You cannot delete the only admin', 500));
275 public function test_delete_endpoint_fails_deleting_public_user()
277 $this->actingAsApiAdmin();
278 /** @var User $publicUser */
279 $publicUser = User::query()->where('system_name', '=', 'public')->first();
281 $resp = $this->deleteJson($this->baseEndpoint . "/{$publicUser->id}");
283 $resp->assertStatus(500);
284 $resp->assertJson($this->errorResponse('You cannot delete the guest user', 500));