/* jshint expr:true */ import { describe, it, beforeEach, afterEach } from 'mocha'; import { expect } from 'chai'; import Ember from 'ember'; import startApp from '../helpers/start-app'; import destroyApp from '../helpers/destroy-app'; import { authenticateSession, currentSession, invalidateSession } from 'ghost-admin/tests/helpers/ember-simple-auth'; import Mirage from 'ember-cli-mirage'; import windowProxy from 'ghost-admin/utils/window-proxy'; import ghostPaths from 'ghost-admin/utils/ghost-paths'; const {$, run} = Ember; const Ghost = ghostPaths(); describe('Acceptance: Authentication', function () { let application, originalReplaceLocation; beforeEach(function () { application = startApp(); }); afterEach(function () { destroyApp(application); }); describe('general page', function () { beforeEach(function () { originalReplaceLocation = windowProxy.replaceLocation; windowProxy.replaceLocation = function (url) { visit(url); }; server.loadFixtures(); let role = server.create('role', {name: 'Administrator'}); let user = server.create('user', {roles: [role], slug: 'test-user'}); }); afterEach(function () { windowProxy.replaceLocation = originalReplaceLocation; }); it('invalidates session on 401 API response', function () { // return a 401 when attempting to retrieve users server.get('/users/', (db, request) => { return new Mirage.Response(401, {}, { errors: [ {message: 'Access denied.', errorType: 'UnauthorizedError'} ] }); }); authenticateSession(application); visit('/team'); andThen(() => { expect(currentURL(), 'url after 401').to.equal('/signin'); }); }); it('doesn\'t show navigation menu on invalid url when not authenticated', function () { invalidateSession(application); visit('/'); andThen(() => { expect(currentURL(), 'current url').to.equal('/signin'); expect(find('nav.gh-nav').length, 'nav menu presence').to.equal(0); }); visit('/signin/invalidurl/'); andThen(() => { expect(currentURL(), 'url after invalid url').to.equal('/signin/invalidurl/'); expect(currentPath(), 'path after invalid url').to.equal('error404'); expect(find('nav.gh-nav').length, 'nav menu presence').to.equal(0); }); }); it('shows nav menu on invalid url when authenticated', function () { authenticateSession(application); visit('/signin/invalidurl/'); andThen(() => { expect(currentURL(), 'url after invalid url').to.equal('/signin/invalidurl/'); expect(currentPath(), 'path after invalid url').to.equal('error404'); expect(find('nav.gh-nav').length, 'nav menu presence').to.equal(1); }); }); }); describe('editor', function () { let origDebounce = run.debounce; let origThrottle = run.throttle; // we don't want the autosave interfering in this test beforeEach(function () { run.debounce = function () { }; run.throttle = function () { }; }); it('displays re-auth modal attempting to save with invalid session', function () { let role = server.create('role', {name: 'Administrator'}); let user = server.create('user', {roles: [role]}); // simulate an invalid session when saving the edited post server.put('/posts/:id/', (db, request) => { let post = db.posts.find(request.params.id); let [attrs] = JSON.parse(request.requestBody).posts; if (attrs.markdown === 'Edited post body') { return new Mirage.Response(401, {}, { errors: [ {message: 'Access denied.', errorType: 'UnauthorizedError'} ] }); } else { return { posts: [post] }; } }); server.loadFixtures(); authenticateSession(application); visit('/editor'); // create the post fillIn('#entry-title', 'Test Post'); fillIn('textarea.markdown-editor', 'Test post body'); click('.js-publish-button'); andThen(() => { // we shouldn't have a modal at this point expect(find('.modal-container #login').length, 'modal exists').to.equal(0); // we also shouldn't have any alerts expect(find('.gh-alert').length, 'no of alerts').to.equal(0); }); // update the post fillIn('textarea.markdown-editor', 'Edited post body'); click('.js-publish-button'); andThen(() => { // we should see a re-auth modal expect(find('.fullscreen-modal #login').length, 'modal exists').to.equal(1); }); }); // don't clobber debounce/throttle for future tests afterEach(function () { run.debounce = origDebounce; run.throttle = origThrottle; }); }); it('adds auth headers to jquery ajax', function (done) { let role = server.create('role', {name: 'Administrator'}); let user = server.create('user', {roles: [role]}); server.post('/uploads', (db, request) => { return request; }); server.loadFixtures(); // jscs:disable requireCamelCaseOrUpperCaseIdentifiers authenticateSession(application, { access_token: 'test_token', expires_in: 3600, token_type: 'Bearer' }); // jscs:enable requireCamelCaseOrUpperCaseIdentifiers // necessary to visit a page to fully boot the app in testing visit('/').andThen(() => { $.ajax({ type: 'POST', url: `${Ghost.apiRoot}/uploads/`, data: {test: 'Test'} }).then((request) => { expect(request.requestHeaders.Authorization, 'Authorization header') .to.exist; expect(request.requestHeaders.Authorization, 'Authotization header content') .to.equal('Bearer test_token'); }).always(() => { done(); }); }); }); });