mirror of
https://github.com/we-promise/sure.git
synced 2026-05-07 21:04:12 +00:00
* feat(api): expose rule export endpoints * fix(api): tighten rule export contracts * fix(api): document balance sheet auth errors * test(api): align rule API key fixtures * Update docs/api/openapi.yaml Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> Signed-off-by: Juan José Mata <jjmata@jjmata.com> * Quick win Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com> Signed-off-by: Juan José Mata <jjmata@jjmata.com> --------- Signed-off-by: Juan José Mata <juanjo.mata@gmail.com> Signed-off-by: Juan José Mata <jjmata@jjmata.com> Co-authored-by: Juan José Mata <juanjo.mata@gmail.com> Co-authored-by: Juan José Mata <jjmata@jjmata.com> Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
161 lines
4.1 KiB
Ruby
161 lines
4.1 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'swagger_helper'
|
|
|
|
RSpec.describe 'API V1 Rules', type: :request do
|
|
let(:family) do
|
|
Family.create!(
|
|
name: 'API Family',
|
|
currency: 'USD',
|
|
locale: 'en',
|
|
date_format: '%m-%d-%Y'
|
|
)
|
|
end
|
|
|
|
let(:user) do
|
|
family.users.create!(
|
|
email: 'api-user@example.com',
|
|
password: 'password123',
|
|
password_confirmation: 'password123'
|
|
)
|
|
end
|
|
|
|
let(:api_key) do
|
|
key = ApiKey.generate_secure_key
|
|
ApiKey.create!(
|
|
user: user,
|
|
name: 'API Docs Key',
|
|
key: key,
|
|
scopes: %w[read],
|
|
source: 'web'
|
|
)
|
|
end
|
|
|
|
let(:api_key_without_read_scope) do
|
|
key = ApiKey.generate_secure_key
|
|
# Valid persisted API keys can only be read/read_write; this intentionally
|
|
# bypasses validations to document the runtime insufficient-scope response.
|
|
ApiKey.new(
|
|
user: user,
|
|
name: 'No Read Docs Key',
|
|
key: key,
|
|
scopes: [],
|
|
display_key: key,
|
|
source: 'mobile'
|
|
).tap { |api_key| api_key.save!(validate: false) }
|
|
end
|
|
|
|
let(:'X-Api-Key') { api_key.plain_key }
|
|
|
|
let!(:rule) do
|
|
family.rules.build(
|
|
name: 'Coffee cleanup',
|
|
resource_type: 'transaction',
|
|
active: true,
|
|
effective_date: Date.new(2024, 1, 1)
|
|
).tap do |rule|
|
|
rule.conditions.build(condition_type: 'transaction_name', operator: 'like', value: 'coffee')
|
|
rule.actions.build(action_type: 'set_transaction_name', value: 'Coffee')
|
|
rule.save!
|
|
end
|
|
end
|
|
|
|
path '/api/v1/rules' do
|
|
get 'List rules' do
|
|
tags 'Rules'
|
|
security [ { apiKeyAuth: [] } ]
|
|
produces 'application/json'
|
|
parameter name: :page, in: :query, type: :integer, required: false,
|
|
description: 'Page number (default: 1)'
|
|
parameter name: :per_page, in: :query, type: :integer, required: false,
|
|
description: 'Items per page (default: 25, max: 100)'
|
|
parameter name: :resource_type, in: :query, required: false,
|
|
description: 'Filter by rule resource type',
|
|
schema: { type: :string, enum: %w[transaction] }
|
|
parameter name: :active, in: :query, required: false,
|
|
description: 'Filter by active status',
|
|
schema: { type: :boolean }
|
|
|
|
response '200', 'rules listed' do
|
|
schema '$ref' => '#/components/schemas/RuleCollection'
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '401', 'unauthorized' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:'X-Api-Key') { nil }
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '403', 'forbidden - requires read scope' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:'X-Api-Key') { api_key_without_read_scope.plain_key }
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '422', 'invalid active filter' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:active) { 'not_boolean' }
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '422', 'unsupported resource type' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:resource_type) { 'account' }
|
|
|
|
run_test!
|
|
end
|
|
end
|
|
end
|
|
|
|
path '/api/v1/rules/{id}' do
|
|
parameter name: :id, in: :path, type: :string, required: true, description: 'Rule ID'
|
|
|
|
get 'Retrieve a rule' do
|
|
tags 'Rules'
|
|
security [ { apiKeyAuth: [] } ]
|
|
produces 'application/json'
|
|
|
|
let(:id) { rule.id }
|
|
|
|
response '200', 'rule retrieved' do
|
|
schema '$ref' => '#/components/schemas/RuleResponse'
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '401', 'unauthorized' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:'X-Api-Key') { nil }
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '403', 'forbidden - requires read scope' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:'X-Api-Key') { api_key_without_read_scope.plain_key }
|
|
|
|
run_test!
|
|
end
|
|
|
|
response '404', 'rule not found' do
|
|
schema '$ref' => '#/components/schemas/ErrorResponse'
|
|
|
|
let(:id) { SecureRandom.uuid }
|
|
|
|
run_test!
|
|
end
|
|
end
|
|
end
|
|
end
|