Introduction
This is the API documentation of Spring Lemon Demo application. This API can be called from browser based front-ends (e.g. AngularJS single page applications), as well as non-browser clients.
Basics
Before we dive in, let’s first look at a few key thing to keep in mind when using the API.
CORS
Your API could be accessed from multiple clients. One of those could be a JavaScript web front-end, such as an AngularJS single page application.
When developing a JavaScript web front-end, you will have two choices:
-
Put it in the same project, say inside src/main/resources/static, and deploy both the server and the client as a single unit.
-
Keep it separate, say as a Grunt project, and deploy it in a different domain. For example, your API could be hosted at
example.cfapps.io
, whereas your AngularJS application could be hosted atwww.example.com
.
If you go for the second option, your JavaScript can’t call your API unless you deal with the same origin policy.
Spring Lemon uses CORS at the server side to deal with this. You just have to add a line like this in application.properties:
lemon.cors.allowed-origins: http://localhost:9000,http://www.example.com
You may also need a little configuration at the client side. For example, in AngularJS, you will need to set the withCredentials
flag of $http service, like this:
angular.module('myApp', ['ngCookies', ... ])
.config(['$httpProvider', function ($httpProvider) {
$httpProvider.defaults.withCredentials = true;
...
}]);
Refer documentation and resources for more details.
CSRF
CSRF is a well known security vulnerability. If you do not know about it, Spring Security reference material explains it beautifully.
To handle CSRF, Spring Lemon sends a token to the client in each response. The token is sent as a cookie, named XSRF-TOKEN
. Then, in each PATCH
, POST
, PUT
or DELETE
request, it expects the same token as a header named X-XSRF-TOKEN
. An exception is thrown if the tokens do not match.
So, your client application should first send a GET request for getting the token, and then use that in POST kind of requests. Also, be aware that Spring Security removes or changes the cookie after certain events, like logout. Hence, after these events, your client application will again need to send some GET request and get the new token. Ping (see below) can be used for this.
When wrong CSRF token is sent, the response looks like this:
HTTP/1.1 403 Forbidden
{
"status": 403,
"error": "Forbidden",
"message": "Expected CSRF token not found. Has your session expired?",
"path": "/accessed_url"
}
Refer documentation and resources for more details.
CSRF and AngularJS
If your AngularJS client resides in the same project, say inside src/main/resources/static, you don’t have to do anything special for CSRF. When sending a request, the $http service of AngularJS automatically puts the value of the XSRF-TOKEN
cookie in a header named X-XSRF-TOKEN
.
If you have the client as a separate project that is to be hosted separately though, you will have to add the header on your own. The easiest way to do it is to write an AngularJS $http interceptor, like this:
angular.module('myApp')
.factory('XSRFInterceptor', function ($cookies, $log) {
var xsrfToken;
var XSRFInterceptor = {
request: function(config) {
if (xsrfToken) {
config.headers['X-XSRF-TOKEN'] = xsrfToken;
$log.info("X-XSRF-TOKEN being sent to server: " + xsrfToken);
}
return config;
},
response: function(response) {
var newToken = $cookies.get('XSRF-TOKEN');
if (newToken) {
xsrfToken = newToken;
$log.info("XSRF-TOKEN received from server: " + xsrfToken);
}
return response;
}
};
return XSRFInterceptor;
});
You then need to configure the interceptor as below.
angular.module('myApp', [...])
.config(['$httpProvider', function ($httpProvider) {
$httpProvider.defaults.withCredentials = true;
$httpProvider.interceptors.push('XSRFInterceptor');
...
}]);
Handling Errors
If some request data would not comply to the business rules, the API would respond with 422 Unprocessable Entity, with a JSON body holding field-wise error details. For example, trying to sign up with some invalid data could produce the following JSON data:
{
"timestamp": 1494764056076,
"status": 422,
"error": "Unprocessable Entity",
"exception": "javax.validation.ConstraintViolationException",
"message": "Validation Error",
"path": "/api/core/users",
"errors": [
{
"field": "user.password",
"code": "{com.naturalprogrammer.spring.invalid.password.size}",
"message": "Password must be between 6 and 50 characters"
}
]
}
Each error in errors
above will have three fields:
-
field: Name of the field, or null in case of a form level error.
-
code: The error code.
-
message: An internationalized message, which could vary depending on the locale of the user.
Format of the error data
Obviously, the format of the error JSON, its field names and codes would vary from request to request. Maintaining a documentation of each error for each request would be cumbersome. We may take that up sometime in future, but for now, the best way to know the format for any request would be to look at the actual response body by using a tool, such as the google chrome developer tools or Postman.
JSON vulnerability
By default, Spring Lemon prefixes JSON responses with )]}',\n
. This is done as a protection against the JSON vulnerability. Your client application would need to strip this )]}',\n
. It’s done automatically if you are using the $http service of AngularJS.
If you want to disable this protection, maybe because your API is not meant to be called from browsers, add the following line in application.properties:
lemon.enabled.json-prefix: false
Common terms
Some terms that we would be using often in the documentation are given below.
- ADMIN
-
A user having "ADMIN" in his roles collection.
- Unverified user
-
A user having "UNVERIFIED" in his roles collection.
- Blocked user
-
A user having "BLOCKED" in his roles collection.
- Bad user
-
An unverified or blocked user.
- Good user
-
A user who is not bad.
- Bad ADMIN
-
An ADMIN who is a bad user.
- Good ADMIN
-
An ADMIN who is a good user.
Common Business Rules
This section documents the common business rules, which are referred from multiple places in the API documentation.
Accessing Users
Who is permitted to edit a User entity
Editing the fields
A user can be edited either by himself or a good ADMIN.
Adding or removing roles
-
roles can only be edited by good ADMINs.
-
A user can’t edit his own roles even if he is a good ADMIN.
Confidential fields
When fetching a user (either by email or id),
. createdDate
, lastModifiedDate
, password
, verificationCode
and forgotPasswordCode
are not returned.
. email
and username
are not returned if the logged in user does not have right to edit the fields (see above) of the user being fetched.
User entity validation constraints
-
Should not be null
-
Should not be blank
-
Should be between 4 and 250 characters long
-
Should be well-formed email format
-
Should be unique
password
-
Should not be null
-
Should not be blank
-
Should be between 4 and 30 characters long
name
-
Should not be blank
-
Should be between 1 and 50 characters long
Data structure
This section documents some data structures used in the application.
User data
Fetch user by email or id returns data about a user. The data looks like this:
{
"id": 24,
"version": 5,
"email": "admin@example.com",
"roles": [
"ADMIN"
],
"unverified": false,
"blocked": false,
"admin": true,
"goodUser": true,
"goodAdmin": true,
"editable": true,
"rolesEditable": false,
"name": "Administrator",
"username": "admin@example.com",
"authorities": [
{
"authority": "ROLE_ADMIN"
},
{
"authority": "ROLE_GOOD_ADMIN"
},
{
"authority": "ROLE_GOOD_USER"
}
]
}
Note that the fields that the logged in user wouldn’t have rights to view would be omitted. Refer the documentation and resources for more details.
Ping
Sends a GET request to the server. This is useful for fetching the CSRF cookie after an event that would have changed the CSRF token, e.g. logout. See the discussion on CSRF above for more details.
In summary, you may need to call this before any request that results in CSRF mismatch error.
Request
GET /api/core/ping HTTP/1.1
Accept: */*
Host: www.example.com
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=a5aaae27-731c-46eb-a2d6-b36c5fd77057; Path=/
Date: Sun, 21 May 2017 15:55:24 GMT
Notice how we get the CSRF cookie in the response, which is to be sent as a header in next requests.
Business rules
-
Should return a 204 No Content with a cookie named "XSRF-TOKEN"
Positive test cases
-
Should return a 204 No Content with a cookie named "XSRF-TOKEN"
Ping and create session
From a browser based client, you may like to create a session so that you can use cookie based authentication. To do so, call this.
Request
GET /api/core/ping-session HTTP/1.1
Accept: */*
Host: www.example.com
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=03125b3f-d04d-42fd-b3e6-80757bff5080; Path=/
Set-Cookie: JSESSIONID=CF6D03825A4F815F9D1357CF92385C61; Path=/; HttpOnly
Date: Sun, 21 May 2017 15:55:23 GMT
Notice the classic JSESSIONID cookie in the response.
Business rules
-
Should return a 204 No Content with a cookie named "JSESSIONID"
Positive test cases
-
Should return a 204 No Content with a cookie named "JSESSIONID"
Get context
Gets useful application properties and current user data.
Tip
|
Call this to fetch useful application properties and current-user data when an AngularJS application starts. |
Request
GET /api/core/context HTTP/1.1
Accept: application/json;charset=UTF-8
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=d74c6a5c-4d12-413e-83d7-58477e21d5c4; Path=/
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:24 GMT
Content-Length: 733
{
"context" : {
"shared" : {
"fooBar" : "123..."
}
},
"user" : {
"id" : 12,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Administrator",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
}
Fields
Path | Type | Description |
---|---|---|
|
|
Context object containing attributes like reCaptchaSiteKey |
|
|
All the lemon.shared.* properties that are defined in application\*.yml |
|
|
Logged-in user details |
user would be omitted if nobody is logged in.
Refer documentation and resources to know how to customize this response and other details.
Business rules
The current-user data, reCaptchaSiteKey, and the lemon.shared.* properties should be there in the response. Current-user data shouldn’t include any confidential fields.
Positive test cases
-
When not logged in, reCaptchaSiteKey, lemon.shared.* properties should be there in the response. Current user data should be absent.
-
When logged in, reCaptchaSiteKey, lemon.shared.* properties should be there in the response. Current user data should look as above, with confidential fields omitted..
Login
Logs the user in. To remember the user for 15 days, send a rememberMe parameter set as true
.
Request
POST /login HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 2de4bf75-df0e-472b-8aa5-6131970d4b8f
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
username=admin%40example.com&password=admin%21&rememberMe=true
Parameters
Parameter | Description |
---|---|
|
The login id |
|
Password |
|
Whether to remember the login even after session expires |
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: JSESSIONID=6A1271909C372A891F59F1CF20C44D79; Path=/; HttpOnly
Set-Cookie: XSRF-TOKEN=; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: XSRF-TOKEN=14d619d3-9816-4faa-b2ac-0c0b8bcc9a38; Path=/
Set-Cookie: rememberMe=YWRtaW5AZXhhbXBsZS5jb206MTQ5NjU5MTcyMjU1NjphN2I1YzczYTExYjk2ZDNmM2EwNDA2ZTc1NjdkOWEwNA; Max-Age=1209600; Expires=Sun, 04-Jun-2017 15:55:22 GMT; Path=/; HttpOnly
Content-Type: application/json
Content-Length: 590
Date: Sun, 21 May 2017 15:55:21 GMT
{
"id" : 3,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Administrator",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
Upon successful login, current-user data should be returned as the response.
-
Giving wrong credentials should respond with
401 Aunauthorized
. -
Spring security token based remember-me rules apply. Importantly,
-
A
rememberMe
cookie is returned whenrememberMe=true
is passed as a request parameter. -
Sending the remember me cookie from a different session within 15 days would log the user in.
-
Upon logout, the cookie is reset.
-
Positive test cases
-
When a good ADMIN logs in, the response should contain
-
his
name
-
a
roles
collection with role "ADMIN" -
goodAdmin
as true
-
-
When
rememberMe=true
parameter is sent, arememberMe
cookie is received. That cookie can be used in a different session to log the user in. Upon logging out from that session, therememberMe
cookie is reset.
Negative test cases
-
Giving wrong credentials should respond with
401 Aunauthorized
. -
A wrong
rememberMe
cookie should not log a user in.
Logout
Logs a user out.
Request
POST /logout HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 35d2c53a-4981-48b5-9d10-a63082adc33a
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: JSESSIONID=; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: rememberMe=; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: XSRF-TOKEN=; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Date: Sun, 21 May 2017 15:55:23 GMT
Business rules
-
Should log the user out, and send a 200 OK.
Positive test cases
-
Should log the user out, and send a 200 OK.
Switch user
Switching to another user
Let’s a good ADMIN switch to another user. For example, a support guy can switch to another user while examining a complaint.
Request
POST /login/impersonate HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 33e68dfe-b18d-412a-8efc-12b7bbd619a0
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
username=user1%40example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json
Content-Length: 507
Date: Sun, 21 May 2017 15:55:37 GMT
{
"id" : 86,
"email" : "user1@example.com",
"roles" : [ "UNVERIFIED" ],
"unverified" : true,
"blocked" : false,
"admin" : false,
"goodUser" : false,
"goodAdmin" : false,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_UNVERIFIED"
} ],
"name" : "User 1",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "user1@example.com",
"enabled" : true,
"new" : false
}
Switching back
Request
POST /logout/impersonate HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 23ba1635-6248-4dba-b881-8b832eeeda98
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json
Content-Length: 591
Date: Sun, 21 May 2017 15:55:37 GMT
{
"id" : 85,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Administrator",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
Only good ADMINs should be able to switch.
Positive test cases
-
A good ADMIN should be able to switch to another user, and then switch back.
Negative test cases
-
A non-admin should not be able to switch.
-
An unauthenticated user should not be able to switch.
-
A bad ADMIN should not able to switch.
Sign up
Signs up a new user and logs him in. A verification mail is sent to his email.
Request
POST /api/core/users HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 7f2234a6-68ac-460c-91c8-525c6630491e
Content-Type: application/json;charset=UTF-8
Host: www.example.com
Content-Length: 85
{
"email" : "user1@example.com",
"password" : "user1!",
"name" : "User 1"
}
Add captchaResponse
field if you want captcha validation. Sign up let’s you use the new reCAPTCHA from Google. If you use it, captchaResponse
field should hold the captcha response. To use it,
-
At the server side, set a couple of properties, as described in the getting started guide.
-
At the client side, for an AngularJS client, angular-recaptcha works great. Remember to send the captcha response in the
captchaResponse
field.
If you don’t want Captcha, e.g. in a demo app, just don’t provide the captcha related properties in application.yml.
Response
HTTP/1.1 201 Created
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:36 GMT
Content-Length: 507
{
"id" : 80,
"email" : "user1@example.com",
"roles" : [ "UNVERIFIED" ],
"unverified" : true,
"blocked" : false,
"admin" : false,
"goodUser" : false,
"goodAdmin" : false,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_UNVERIFIED"
} ],
"name" : "User 1",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "user1@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
Nobody should have already logged in.
-
Email, password and name should be valid.
-
The role UNVERIFIED is added to the user upon sign up.
-
Password is stored encoded.
-
After successful sign up
-
The user is signed in.
-
A verification mail is sent to the given email id.
-
Positive test cases
-
A user should be able to sign up.
-
After signing up
-
The user should have signed in.
-
His role should be UNVERIFIED.
-
A verification mail should have been sent to the user.
-
Negative test cases
Sign up will respond with errors if you try it
-
After being already logged in.
-
With invalid email, password or name.
-
Using an email id which is already signed up.
-
With invalid captcha.
Resend verification mail
A verification mail is sent to users upon sign up. But, sometimes they may miss it. So, when a unverified user signs in, you may like to show him a button or something to resend the verification mail. Clicking on that should send a request to your API as below.
Request
GET /api/core/users/74/resend-verification-mail HTTP/1.1
Accept: */*
Host: www.example.com
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=7ed7fb98-323f-4d51-9217-90c61817c9a8; Path=/
Date: Sun, 21 May 2017 15:55:35 GMT
Business rules
-
The user should exist.
-
Current-user should have permission to edit the given user.
-
The user should not have been verified.
-
A new verification code isn’t generated. The existing verification code is used instead. It’s because sometimes the user might find the old mail, and try verifying with that.
Test cases
Positive
-
An unverified user should be able to resend his verification code. The verificationCode of the user should not change in the process.
-
A good ADMIN should be able to resend the verification mail of another unverified user.
Negative
-
Providing unknown user id
-
Trying
-
without logging in
-
logging in as a different user
-
logging in as a bad ADMIN
-
while already verified
-
Verify user
After a user signs up, he receives a verification mail. The mail contains a link with an embedded verificationCode
. Clicking on it takes the user to the front-end application, where he is first asked to login if he is not already, and then click a verify button. On clicking verify, a POST request is sent as below.
Request
POST /api/core/users/00a1bf2c-7290-4275-ae7d-91c5c9386f8f/verify HTTP/1.1
Accept: */*
X-XSRF-TOKEN: d8af53a1-e780-4d30-a2d6-282067ce6513
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
Path parameters
Parameter | Description |
---|---|
|
The verification code |
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:41 GMT
Content-Length: 494
{
"id" : 113,
"email" : "user1@example.com",
"roles" : [ ],
"unverified" : false,
"blocked" : false,
"admin" : false,
"goodUser" : true,
"goodAdmin" : false,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_GOOD_USER"
} ],
"name" : "User 1",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "user1@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
The user must have logged in.
-
The user must not have already verified.
-
Verification code shouldn’t be blank.
-
Verification code should match the code that was mailed to the user while signing up.
-
Upon successful verification, the UNVERIFIED role of the user is removed, and the verification code that was stored in the user record is wiped out.
-
Upon successful commit, security principal’s UNVERIFIED role is removed, and it’s flags such as goodUser are computed again.
-
Updated current-user data is returned.
Positive test cases
-
A new user should be able to sign in, get a verification mail, and verify himself. Check that after verification,
-
The same user is returned in the response.
-
His UNVERIFIED role is removed.
-
His verificationCode is set as null.
-
Current-user, which is the user himself, has the following changes:
-
UNVERIFIED role is removed
-
He is now a good user
-
Negative test cases
-
Re-verifying after successful verification.
-
Trying with wrong verification code.
-
Trying without logging the user in.
Forgot Password
When a user forgets his password, he can post a form as below.
Request
POST /api/core/forgot-password HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 904a5204-94ac-43c8-b125-178d1bb3696f
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
email=user1%40example.com
It would create a secret forgotPasswordCode
, and mail the user a link including that code, looking like https://your-front-end.com/users/{forgotPasswordCode}/reset-password
.
Clicking on the link should allow the user to reset his password.
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:31 GMT
Business rules
-
A user with the given email should exist.
-
The email should be well-formed, and not null or blank.
Positive test cases
-
Upon posting,
-
A secret code should be generated and stored in the User entity.
-
A mail containing the code should be sent to the user.
-
Negative test cases
-
Providing a null, blank or not well formed email.
-
Not having a user with the given email address.
Reset password
In the Forgot Password section, we saw how a user gets a link with a forgotPasswordCode
. Clicking on the link should take him to a front-end form, where he should enter a new password. Upon submitting that form, a request as below should be sent.
Request
POST /api/core/users/c7171ffd-e40d-4bea-a8ab-7e557896d758/reset-password HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 904a5204-94ac-43c8-b125-178d1bb3696f
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
newPassword=a-new-password
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:32 GMT
Business rules
-
The user should have initiated the forgot password process.
-
The user shouldn’t already have reset the password.
-
The new password should be valid.
Positive test cases
-
The password of the user should be updated, i.e., the user should then be able to login using the new password.
Negative test cases
The following tries should respond with errors:
-
Trying with wrong forgotPasswordCode.
-
Repeating resetting password.
-
Invalid new password.
Fetch user by email
Example use case - a good ADMIN fetching a user, maybe for changing its roles.
Request
GET /api/core/users/fetch-by-email?email=user1%40example.com HTTP/1.1
Accept: */*
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=d487d066-53d5-4d88-8ba7-b9645061febf; Path=/
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:30 GMT
Content-Length: 525
{
"id" : 42,
"version" : 1,
"email" : "user1@example.com",
"roles" : [ "UNVERIFIED" ],
"unverified" : true,
"blocked" : false,
"admin" : false,
"goodUser" : false,
"goodAdmin" : false,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_UNVERIFIED"
} ],
"name" : "User 1",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "user1@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
Email should be well formed, and not be blank.
-
A user with the given email should exist.
-
The confidential fields would be null in case the current user does not have rights to see those.
Positive test cases
-
A user should be able to fetch his data, including the confidential email and username. But other confidential fields would be omitted.
-
A good ADMIN should be able to fetch another user’s data, including the confidential email and username. But other confidential fields would be omitted.
-
A i) bad ADMIN, ii) non-admin or iii) anonymous user should be able to fetch another user’s data. But all the confidential fields would be omitted.
Negative test cases
-
Providing blank or non-well-formed email.
-
Providing an unknown email id.
Fetch user by ID
Example use case - viewing the profile of a user.
Request
GET /api/core/users/39 HTTP/1.1
Accept: */*
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=281ea03c-d4c9-416a-bce9-b1a497d3a776; Path=/
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:29 GMT
Content-Length: 609
{
"id" : 39,
"version" : 0,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Administrator",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
A user with the given id should exist.
-
The confidential fields would be omitted in case the current-user does not have rights to see them.
Positive test cases
-
A user should be able to fetch his data, including the confidential
email
andusername
. But other confidential fields would be omitted. -
A good ADMIN should be able to fetch another user’s data, including the confidential
email
andusername
. But other confidential fields would be omitted. -
A bad ADMIN, non-admin or an anonymous user should be able to fetch another user’s data. But all the confidential fields would be omitted.
Negative test cases
-
Providing an unknown id.
Update user
Updates the name and roles of a user.
Request
PATCH /api/core/users/97 HTTP/1.1
Accept: */*
X-XSRF-TOKEN: d9aa0bf0-1b3d-4589-9bce-12bc42fffe52
Content-Type: application/json;charset=UTF-8
Host: www.example.com
Content-Length: 371
[ {
"op" : "replace",
"path" : "/name",
"value" : "Edited name"
}, {
"op" : "replace",
"path" : "/email",
"value" : "should.not@get.replaced"
}, {
"op" : "replace",
"path" : "/unverified",
"value" : false
}, {
"op" : "replace",
"path" : "/admin",
"value" : true
}, {
"op" : "replace",
"path" : "/version",
"value" : 0
} ]
If you have added more updatable fields to User, they can also be updated using this request.
What is version
User, like all VersionedEntity, has a version
column, which is incremented on each update.
While updating, it is first checked that the given version is equal to the version in the database record. Otherwise, it is assumed that someone else has updated the record concurrently, and the update fails. To use it, you will typically
-
Along with the data to be updated, fetch the version column as well.
-
When the user submits the updated data, send the version back along with the updated data.
Precisely, we are talking about optimistic locking. Refer documentation and resources for more details.
Response
Please note that the response is the data of the logged-in user, who isn’t necessarily the updated one.
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:39 GMT
Content-Length: 591
{
"id" : 96,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Administrator",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
Business rules
-
A user with the given
id
should exist. -
Current-user should have permission to edit the given user.
-
roles
will be updated only if the current-user haspermission to edit
the roles.-
If UNVERIFIED role is removed from a user, his
verificationCode
should be set to null. -
If UNVERIFIED role is added to a user, a
verificationCode
should also be generated, and a verification mail should be sent to the user.
-
-
The new name should be valid.
-
The version column should be incremented on successful update.
-
The user shouldn’t have been already updated concurrently, i.e. the input
version
should match the version in the database. Otherwise, expect a409
response. -
If a user is updating himself, upon successful commit, the Security principal object is updated with the new name.
Positive test cases
-
A non-admin user should be able to update his own name, but changes in roles should be skipped. The name of security principal object should also change in the process. The version column should be updated.
-
A good ADMIN should be able to update another user’s name and roles. Check that the name of security principal object should NOT change in the process by mistake.
-
When making a user UNVERIFIED, a verificationCode should be generated.
-
When making a user verified, the verificationCode should be set to null.
-
Negative test cases
-
Providing an unknown id in the path.
-
A non-admin trying to update the name and roles of another user.
-
A bad ADMIN trying to update the name and roles of another user.
-
A good ADMIN trying to change his own roles.
-
Providing an invalid name.
-
A change in version occuring.
Change password
Changes the password of a user
Request
POST /api/core/users/36/change-password HTTP/1.1
Accept: */*
X-XSRF-TOKEN: c3d8f682-5611-41ad-8c2d-d6351224c5a5
Content-Type: application/json;charset=UTF-8
Host: www.example.com
Content-Length: 102
{
"oldPassword" : "user1!",
"password" : "new-password",
"retypePassword" : "new-password"
}
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:28 GMT
Business rules
-
A user with the given
id
should exist. -
Current user should have permission to edit the given user.
-
oldPassword
,password
andretypePassword
should not be null or blank, and should be between 6 and 30 characters long.oldPassword
should match the user’s existing password. -
password
andretypePassword
should be same. (Ideally, this validation could have been left to the front-end. But, we thought to make this a server feature, for exibihiting how to code form-level custom validation.) -
If a user is changing his own password, after successful commit, he should be logged out.
Positive test cases
-
A non-admin user should be able to change his password. After changing password, he should have been logged out.
-
A good ADMIN should be able to update another user’s password.
Negative test cases
-
Providing an unknown id in the path.
-
A non-admin trying to update the password of another user.
-
A bad ADMIN trying to update the password of another user.
-
Providing invalid passwords.
-
Providing wrong old password.
-
password
andretypePassword
not being same.
Requesting for changing email
A user (or a good ADMIN) can request for changing email id, by using the following request.
Request
POST /api/core/users/58/request-email-change HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 694add07-5b7b-4654-9f34-4a8496b65d95
Content-Type: application/json;charset=UTF-8
Host: www.example.com
Content-Length: 642
{
"id" : null,
"version" : null,
"email" : null,
"password" : "user1!",
"roles" : [ ],
"verificationCode" : null,
"forgotPasswordCode" : null,
"newEmail" : "new@example.com",
"changeEmailCode" : null,
"apiKey" : null,
"captchaResponse" : null,
"unverified" : false,
"blocked" : false,
"admin" : false,
"goodUser" : false,
"goodAdmin" : false,
"editable" : false,
"rolesEditable" : false,
"authorities" : null,
"name" : null,
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : null,
"enabled" : true,
"new" : true
}
On receiving such a request, an email containing a link is sent to the new email id. A secret changeEmailCode
is embedded in the link. Clicking on the link brings the user back to the front-end, where first he should log in if he is not already. Then, he would click a button for sending the final email change request for doing the final change.
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:33 GMT
Business Rules
-
A user with the given
id
should exist. -
Current user should have permission to edit the given user.
-
password
should match the password of current-user. -
newEmail
should not be blank, should be of a valid email format. -
newEmail
should not already be used by any user. -
The user should be logged out after the email has changed.
Positive test cases
-
A UNVERIFIED non-admin user should be able to request changing his email.
-
A good ADMIN should be able to request changing the email of another user.
Negative test cases
-
Providing an unknown id in the path.
-
A non-admin trying to request changing email of another user.
-
A bad ADMIN trying to request changing email of another user.
-
Providing null password and email.
-
Providing blank password and email.
-
Providing invalid email.
-
Providing wrong password.
-
Providing non-unique email.
Change email
When a user requests for changing his email, a mail is sent to him, which contains a link with a changeEmailCode
embedded. Clicking on the link brings him back to the client, where first he should login if he is not already. He then would click a button for proceeding with the change, which will send the following request to the server.
Request
POST /api/core/users/77e6fcf2-eb71-4d7b-8f3d-0e5d7c69afbd/change-email HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 936d969c-b1f7-4536-8d1e-b8f63611492a
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
Path Parameters
Parameter | Description |
---|---|
|
The code that was mailed to the user |
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:26 GMT
The server will verify the changeEmailCode
, and then do the change and log the user out.
Business rules
-
The given
changeEmailCode
should not be blank. -
The given
changeEmailCode
should match that of the current user in the database. -
Before replacing
email
withnewEmail
, uniqueness should again be checked. -
On success
-
The user should be made verified if he is not already.
-
The user should be logged out.
-
Positive test cases
-
An unverified user, who had requested to change his email and had received the email with the link, should be able to change his email. The
newEmail
andchangeEmailCode
should be made null after the change, and he should have got verified. Also, he should have been logged out.
Negative test cases
-
A good ADMIN trying to post the
changeEmailCode
of another user. -
Providing wrong
changeEmailCode
. -
Trying the operation without having requested first.
-
Trying after some user registers the
newEmail
meanwhile, leaving it non unique.
Create API Key
Creates an API key for a user, which can be used later for authorizing requests.
Request
POST /api/core/users/1/api-key HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 315e4729-90a3-4487-b0b7-35acd52cc5a2
Content-Type: application/x-www-form-urlencoded; charset=ISO-8859-1
Host: www.example.com
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:20 GMT
Content-Length: 57
{
"apiKey" : "859d1e7b-7cbb-485c-b252-6e1c7a017aed"
}
Business Rules
-
A user with the given
id
should exist. -
Current user should have permission to edit the given user.
Use API Key
The API key of a user can be used for custom token authentication, as below.
Request
PATCH /api/core/users/1 HTTP/1.1
Authorization: Bearer 1:859d1e7b-7cbb-485c-b252-6e1c7a017aed
Accept: */*
Content-Type: application/json;charset=UTF-8
Host: www.example.com
Content-Length: 282
[ {
"op" : "replace",
"path" : "/name",
"value" : "Edited name"
}, {
"op" : "replace",
"path" : "/unverified",
"value" : true
}, {
"op" : "replace",
"path" : "/admin",
"value" : true
}, {
"op" : "replace",
"path" : "/version",
"value" : 1
} ]
Headers
Name | Description |
---|---|
|
Custom token authentication - of the format userId:api-key |
Response
HTTP/1.1 200 OK
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Set-Cookie: XSRF-TOKEN=56dc9c2a-4469-4087-8fa9-bd66471d2b17; Path=/
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
Date: Sun, 21 May 2017 15:55:20 GMT
Content-Length: 588
{
"id" : 1,
"email" : "admin@example.com",
"roles" : [ "ADMIN" ],
"unverified" : false,
"blocked" : false,
"admin" : true,
"goodUser" : true,
"goodAdmin" : true,
"editable" : true,
"rolesEditable" : false,
"authorities" : [ {
"authority" : "ROLE_ADMIN"
}, {
"authority" : "ROLE_GOOD_USER"
}, {
"authority" : "ROLE_GOOD_ADMIN"
} ],
"name" : "Edited name",
"accountNonExpired" : true,
"accountNonLocked" : true,
"credentialsNonExpired" : true,
"username" : "admin@example.com",
"enabled" : true,
"new" : false
}
Remove API Key
The API key of a user can be removed as below.
Request
DELETE /api/core/users/1/api-key HTTP/1.1
Accept: */*
X-XSRF-TOKEN: 2d9da505-71ed-4cf3-935c-b9f225d30c61
Host: www.example.com
Response
HTTP/1.1 204 No Content
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Cache-Control: no-cache, no-store, max-age=0, must-revalidate
Pragma: no-cache
Expires: 0
X-Frame-Options: DENY
Date: Sun, 21 May 2017 15:55:21 GMT
Business Rules
-
A user with the given
id
should exist. -
Current user should have permission to edit the given user.