2020-02-24 14:36:15 +01:00
|
|
|
using System;
|
|
|
|
using System.Collections.Generic;
|
|
|
|
using System.Linq;
|
|
|
|
using System.Net.Http;
|
|
|
|
using System.Net.Http.Headers;
|
|
|
|
using System.Threading.Tasks;
|
2020-03-02 16:50:28 +01:00
|
|
|
using BTCPayServer.Client;
|
2020-03-20 05:22:10 +01:00
|
|
|
using BTCPayServer.Client.Models;
|
2020-02-24 14:36:15 +01:00
|
|
|
using BTCPayServer.Data;
|
2020-03-27 04:55:21 +01:00
|
|
|
using BTCPayServer.Security.GreenField;
|
2020-02-24 14:36:15 +01:00
|
|
|
using BTCPayServer.Tests.Logging;
|
|
|
|
using BTCPayServer.Views.Manage;
|
|
|
|
using Newtonsoft.Json;
|
|
|
|
using OpenQA.Selenium;
|
|
|
|
using Xunit;
|
|
|
|
using Xunit.Abstractions;
|
|
|
|
|
|
|
|
namespace BTCPayServer.Tests
|
|
|
|
{
|
|
|
|
public class ApiKeysTests
|
|
|
|
{
|
|
|
|
public const int TestTimeout = TestUtils.TestTimeout;
|
|
|
|
|
|
|
|
public const string TestApiPath = "api/test/apikey";
|
|
|
|
public ApiKeysTests(ITestOutputHelper helper)
|
|
|
|
{
|
2020-03-20 05:22:10 +01:00
|
|
|
Logs.Tester = new XUnitLog(helper) { Name = "Tests" };
|
2020-02-24 14:36:15 +01:00
|
|
|
Logs.LogProvider = new XUnitLogProvider(helper);
|
|
|
|
}
|
|
|
|
|
|
|
|
[Fact(Timeout = TestTimeout)]
|
|
|
|
[Trait("Selenium", "Selenium")]
|
|
|
|
public async Task CanCreateApiKeys()
|
|
|
|
{
|
|
|
|
//there are 2 ways to create api keys:
|
|
|
|
//as a user through your profile
|
|
|
|
//as an external application requesting an api key from a user
|
|
|
|
|
|
|
|
using (var s = SeleniumTester.Create())
|
|
|
|
{
|
|
|
|
await s.StartAsync();
|
|
|
|
var tester = s.Server;
|
|
|
|
|
|
|
|
var user = tester.NewAccount();
|
|
|
|
user.GrantAccess();
|
2020-03-19 11:11:15 +01:00
|
|
|
await user.MakeAdmin(false);
|
2020-02-24 14:36:15 +01:00
|
|
|
s.GoToLogin();
|
|
|
|
s.Login(user.RegisterDetails.Email, user.RegisterDetails.Password);
|
|
|
|
s.GoToProfile(ManageNavPages.APIKeys);
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
//not an admin, so this permission should not show
|
|
|
|
Assert.DoesNotContain("btcpay.server.canmodifyserversettings", s.Driver.PageSource);
|
|
|
|
await user.MakeAdmin();
|
|
|
|
s.Logout();
|
|
|
|
s.GoToLogin();
|
|
|
|
s.Login(user.RegisterDetails.Email, user.RegisterDetails.Password);
|
|
|
|
s.GoToProfile(ManageNavPages.APIKeys);
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
|
|
|
Assert.Contains("btcpay.server.canmodifyserversettings", s.Driver.PageSource);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
//server management should show now
|
2020-03-19 11:11:15 +01:00
|
|
|
s.SetCheckbox(s, "btcpay.server.canmodifyserversettings", true);
|
|
|
|
s.SetCheckbox(s, "btcpay.store.canmodifystoresettings", true);
|
2020-03-20 05:22:10 +01:00
|
|
|
s.SetCheckbox(s, "btcpay.user.canviewprofile", true);
|
2020-02-24 14:36:15 +01:00
|
|
|
s.Driver.FindElement(By.Id("Generate")).Click();
|
|
|
|
var superApiKey = s.AssertHappyMessage().FindElement(By.TagName("code")).Text;
|
|
|
|
|
|
|
|
//this api key has access to everything
|
2020-04-02 08:59:20 +02:00
|
|
|
await TestApiAgainstAccessToken(superApiKey, tester, user, Policies.CanModifyServerSettings,Policies.CanModifyStoreSettings, Policies.CanViewProfile);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
2020-03-19 11:11:15 +01:00
|
|
|
s.SetCheckbox(s, "btcpay.server.canmodifyserversettings", true);
|
2020-02-24 14:36:15 +01:00
|
|
|
s.Driver.FindElement(By.Id("Generate")).Click();
|
|
|
|
var serverOnlyApiKey = s.AssertHappyMessage().FindElement(By.TagName("code")).Text;
|
|
|
|
await TestApiAgainstAccessToken(serverOnlyApiKey, tester, user,
|
2020-03-20 05:41:47 +01:00
|
|
|
Policies.CanModifyServerSettings);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
2020-03-19 11:11:15 +01:00
|
|
|
s.SetCheckbox(s, "btcpay.store.canmodifystoresettings", true);
|
2020-02-24 14:36:15 +01:00
|
|
|
s.Driver.FindElement(By.Id("Generate")).Click();
|
|
|
|
var allStoreOnlyApiKey = s.AssertHappyMessage().FindElement(By.TagName("code")).Text;
|
|
|
|
await TestApiAgainstAccessToken(allStoreOnlyApiKey, tester, user,
|
2020-03-20 05:41:47 +01:00
|
|
|
Policies.CanModifyStoreSettings);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
|
|
|
s.Driver.FindElement(By.CssSelector("button[value=change-store-mode]")).Click();
|
|
|
|
//there should be a store already by default in the dropdown
|
|
|
|
var dropdown = s.Driver.FindElement(By.Name("SpecificStores[0]"));
|
|
|
|
var option = dropdown.FindElement(By.TagName("option"));
|
|
|
|
var storeId = option.GetAttribute("value");
|
|
|
|
option.Click();
|
|
|
|
s.Driver.FindElement(By.Id("Generate")).Click();
|
|
|
|
var selectiveStoreApiKey = s.AssertHappyMessage().FindElement(By.TagName("code")).Text;
|
|
|
|
await TestApiAgainstAccessToken(selectiveStoreApiKey, tester, user,
|
2020-03-20 05:41:47 +01:00
|
|
|
Permission.Create(Policies.CanModifyStoreSettings, storeId).ToString());
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
s.Driver.FindElement(By.Id("AddApiKey")).Click();
|
|
|
|
s.Driver.FindElement(By.Id("Generate")).Click();
|
|
|
|
var noPermissionsApiKey = s.AssertHappyMessage().FindElement(By.TagName("code")).Text;
|
2020-04-02 08:59:20 +02:00
|
|
|
await TestApiAgainstAccessToken(noPermissionsApiKey, tester, user);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>("incorrect key", $"{TestApiPath}/me/id",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
//let's test the authorized screen now
|
|
|
|
//options for authorize are:
|
|
|
|
//applicationName
|
|
|
|
//redirect
|
|
|
|
//permissions
|
|
|
|
//strict
|
|
|
|
//selectiveStores
|
2020-03-02 16:50:28 +01:00
|
|
|
var authUrl = BTCPayServerClient.GenerateAuthorizeUri(tester.PayTester.ServerUri,
|
2020-03-20 05:41:47 +01:00
|
|
|
new[] { Policies.CanModifyStoreSettings, Policies.CanModifyServerSettings }).ToString();
|
2020-02-24 14:36:15 +01:00
|
|
|
s.Driver.Navigate().GoToUrl(authUrl);
|
|
|
|
s.Driver.PageSource.Contains("kukksappname");
|
2020-03-19 11:11:15 +01:00
|
|
|
Assert.Equal("hidden", s.Driver.FindElement(By.Id("btcpay.store.canmodifystoresettings")).GetAttribute("type").ToLowerInvariant());
|
|
|
|
Assert.Equal("true", s.Driver.FindElement(By.Id("btcpay.store.canmodifystoresettings")).GetAttribute("value").ToLowerInvariant());
|
|
|
|
Assert.Equal("hidden", s.Driver.FindElement(By.Id("btcpay.server.canmodifyserversettings")).GetAttribute("type").ToLowerInvariant());
|
2020-03-20 05:22:10 +01:00
|
|
|
Assert.Equal("true", s.Driver.FindElement(By.Id("btcpay.server.canmodifyserversettings")).GetAttribute("value").ToLowerInvariant());
|
2020-02-24 14:36:15 +01:00
|
|
|
Assert.DoesNotContain("change-store-mode", s.Driver.PageSource);
|
|
|
|
s.Driver.FindElement(By.Id("consent-yes")).Click();
|
|
|
|
var url = s.Driver.Url;
|
|
|
|
IEnumerable<KeyValuePair<string, string>> results = url.Split("?").Last().Split("&")
|
|
|
|
.Select(s1 => new KeyValuePair<string, string>(s1.Split("=")[0], s1.Split("=")[1]));
|
|
|
|
|
|
|
|
var apiKeyRepo = s.Server.PayTester.GetService<APIKeyRepository>();
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-02-24 14:36:15 +01:00
|
|
|
await TestApiAgainstAccessToken(results.Single(pair => pair.Key == "key").Value, tester, user,
|
2020-04-02 08:59:20 +02:00
|
|
|
(await apiKeyRepo.GetKey(results.Single(pair => pair.Key == "key").Value)).GetBlob().Permissions);
|
2020-02-24 14:36:15 +01:00
|
|
|
|
2020-03-02 16:50:28 +01:00
|
|
|
authUrl = BTCPayServerClient.GenerateAuthorizeUri(tester.PayTester.ServerUri,
|
2020-03-20 05:41:47 +01:00
|
|
|
new[] { Policies.CanModifyStoreSettings, Policies.CanModifyServerSettings }, false, true).ToString();
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-02-24 14:36:15 +01:00
|
|
|
s.Driver.Navigate().GoToUrl(authUrl);
|
|
|
|
Assert.DoesNotContain("kukksappname", s.Driver.PageSource);
|
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
Assert.Equal("checkbox", s.Driver.FindElement(By.Id("btcpay.store.canmodifystoresettings")).GetAttribute("type").ToLowerInvariant());
|
|
|
|
Assert.Equal("true", s.Driver.FindElement(By.Id("btcpay.store.canmodifystoresettings")).GetAttribute("value").ToLowerInvariant());
|
|
|
|
Assert.Equal("checkbox", s.Driver.FindElement(By.Id("btcpay.server.canmodifyserversettings")).GetAttribute("type").ToLowerInvariant());
|
2020-03-20 05:22:10 +01:00
|
|
|
Assert.Equal("true", s.Driver.FindElement(By.Id("btcpay.server.canmodifyserversettings")).GetAttribute("value").ToLowerInvariant());
|
2020-02-24 14:36:15 +01:00
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
s.SetCheckbox(s, "btcpay.server.canmodifyserversettings", false);
|
2020-02-24 14:36:15 +01:00
|
|
|
Assert.Contains("change-store-mode", s.Driver.PageSource);
|
|
|
|
s.Driver.FindElement(By.Id("consent-yes")).Click();
|
|
|
|
url = s.Driver.Url;
|
|
|
|
results = url.Split("?").Last().Split("&")
|
|
|
|
.Select(s1 => new KeyValuePair<string, string>(s1.Split("=")[0], s1.Split("=")[1]));
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-02-24 14:36:15 +01:00
|
|
|
await TestApiAgainstAccessToken(results.Single(pair => pair.Key == "key").Value, tester, user,
|
2020-04-02 08:59:20 +02:00
|
|
|
(await apiKeyRepo.GetKey(results.Single(pair => pair.Key == "key").Value)).GetBlob().Permissions);
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
async Task TestApiAgainstAccessToken(string accessToken, ServerTester tester, TestAccount testAccount,
|
2020-04-02 08:59:20 +02:00
|
|
|
params string[] expectedPermissionsArr)
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
2020-04-02 08:59:20 +02:00
|
|
|
var expectedPermissions = Permission.ToPermissions(expectedPermissionsArr).ToArray();
|
2020-03-20 05:22:10 +01:00
|
|
|
expectedPermissions ??= new Permission[0];
|
|
|
|
var apikeydata = await TestApiAgainstAccessToken<ApiKeyData>(accessToken, $"api/v1/api-keys/current", tester.PayTester.HttpClient);
|
2020-03-20 06:01:51 +01:00
|
|
|
var permissions = apikeydata.Permissions;
|
2020-03-20 05:22:10 +01:00
|
|
|
Assert.Equal(expectedPermissions.Length, permissions.Length);
|
|
|
|
foreach (var expectPermission in expectedPermissions)
|
|
|
|
{
|
|
|
|
Assert.True(permissions.Any(p => p == expectPermission), $"Missing expected permission {expectPermission}");
|
|
|
|
}
|
2020-02-24 14:36:15 +01:00
|
|
|
|
2020-03-20 05:41:47 +01:00
|
|
|
if (permissions.Contains(Permission.Create(Policies.CanViewProfile)))
|
2020-03-20 05:22:10 +01:00
|
|
|
{
|
|
|
|
var resultUser = await TestApiAgainstAccessToken<string>(accessToken, $"{TestApiPath}/me/id", tester.PayTester.HttpClient);
|
|
|
|
Assert.Equal(testAccount.UserId, resultUser);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<string>(accessToken, $"{TestApiPath}/me/id", tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
}
|
2020-02-24 14:36:15 +01:00
|
|
|
//create a second user to see if any of its data gets messed upin our results.
|
|
|
|
var secondUser = tester.NewAccount();
|
|
|
|
secondUser.GrantAccess();
|
|
|
|
|
2020-03-20 05:41:47 +01:00
|
|
|
var canModifyAllStores = Permission.Create(Policies.CanModifyStoreSettings, null);
|
|
|
|
var canModifyServer = Permission.Create(Policies.CanModifyServerSettings, null);
|
|
|
|
var unrestricted = Permission.Create(Policies.Unrestricted, null);
|
|
|
|
var selectiveStorePermissions = permissions.Where(p => p.StoreId != null && p.Policy == Policies.CanModifyStoreSettings);
|
2020-03-19 11:11:15 +01:00
|
|
|
if (permissions.Contains(canModifyAllStores) || selectiveStorePermissions.Any())
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
|
|
|
var resultStores =
|
|
|
|
await TestApiAgainstAccessToken<StoreData[]>(accessToken, $"{TestApiPath}/me/stores",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
foreach (var selectiveStorePermission in selectiveStorePermissions)
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
|
|
|
Assert.True(await TestApiAgainstAccessToken<bool>(accessToken,
|
2020-03-19 11:11:15 +01:00
|
|
|
$"{TestApiPath}/me/stores/{selectiveStorePermission.StoreId}/can-edit",
|
2020-02-24 14:36:15 +01:00
|
|
|
tester.PayTester.HttpClient));
|
|
|
|
|
|
|
|
Assert.Contains(resultStores,
|
2020-03-19 11:11:15 +01:00
|
|
|
data => data.Id.Equals(selectiveStorePermission.StoreId, StringComparison.InvariantCultureIgnoreCase));
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
bool shouldBeAuthorized = false;
|
2020-03-20 05:41:47 +01:00
|
|
|
if (permissions.Contains(canModifyAllStores) || selectiveStorePermissions.Contains(Permission.Create(Policies.CanViewStoreSettings, testAccount.StoreId)))
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
|
|
|
Assert.True(await TestApiAgainstAccessToken<bool>(accessToken,
|
2020-03-19 11:11:15 +01:00
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-view",
|
|
|
|
tester.PayTester.HttpClient));
|
|
|
|
Assert.Contains(resultStores,
|
|
|
|
data => data.Id.Equals(testAccount.StoreId, StringComparison.InvariantCultureIgnoreCase));
|
|
|
|
shouldBeAuthorized = true;
|
|
|
|
}
|
2020-03-20 05:41:47 +01:00
|
|
|
if (permissions.Contains(canModifyAllStores) || selectiveStorePermissions.Contains(Permission.Create(Policies.CanModifyStoreSettings, testAccount.StoreId)))
|
2020-03-19 11:11:15 +01:00
|
|
|
{
|
|
|
|
Assert.True(await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-view",
|
2020-02-24 14:36:15 +01:00
|
|
|
tester.PayTester.HttpClient));
|
|
|
|
Assert.True(await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient));
|
|
|
|
Assert.Contains(resultStores,
|
|
|
|
data => data.Id.Equals(testAccount.StoreId, StringComparison.InvariantCultureIgnoreCase));
|
2020-03-19 11:11:15 +01:00
|
|
|
shouldBeAuthorized = true;
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
if (!shouldBeAuthorized)
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken,
|
2020-03-19 11:11:15 +01:00
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-view",
|
|
|
|
tester.PayTester.HttpClient);
|
2020-02-24 14:36:15 +01:00
|
|
|
});
|
2020-03-19 11:11:15 +01:00
|
|
|
Assert.DoesNotContain(resultStores,
|
|
|
|
data => data.Id.Equals(testAccount.StoreId, StringComparison.InvariantCultureIgnoreCase));
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
|
|
|
}
|
2020-03-20 05:22:10 +01:00
|
|
|
else if (!permissions.Contains(unrestricted))
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
2020-03-20 05:22:10 +01:00
|
|
|
|
2020-02-24 14:36:15 +01:00
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
}
|
2020-03-16 08:13:44 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/stores/{testAccount.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
}
|
2020-02-24 14:36:15 +01:00
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
if (!permissions.Contains(unrestricted))
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
2020-03-13 07:58:09 +01:00
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken, $"{TestApiPath}/me/stores/{secondUser.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
}
|
2020-03-16 08:13:44 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken, $"{TestApiPath}/me/stores/{secondUser.StoreId}/can-edit",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
}
|
2020-02-24 14:36:15 +01:00
|
|
|
|
2020-03-19 11:11:15 +01:00
|
|
|
if (permissions.Contains(canModifyServer))
|
2020-02-24 14:36:15 +01:00
|
|
|
{
|
|
|
|
Assert.True(await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/is-admin",
|
|
|
|
tester.PayTester.HttpClient));
|
|
|
|
}
|
2020-03-16 08:13:44 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
await Assert.ThrowsAnyAsync<HttpRequestException>(async () =>
|
|
|
|
{
|
|
|
|
await TestApiAgainstAccessToken<bool>(accessToken,
|
|
|
|
$"{TestApiPath}/me/is-admin",
|
|
|
|
tester.PayTester.HttpClient);
|
|
|
|
});
|
|
|
|
}
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
public async Task<T> TestApiAgainstAccessToken<T>(string apikey, string url, HttpClient client)
|
|
|
|
{
|
|
|
|
var httpRequest = new HttpRequestMessage(HttpMethod.Get,
|
|
|
|
new Uri(client.BaseAddress, url));
|
|
|
|
httpRequest.Headers.Authorization = new AuthenticationHeaderValue("token", apikey);
|
|
|
|
var result = await client.SendAsync(httpRequest);
|
|
|
|
result.EnsureSuccessStatusCode();
|
|
|
|
|
|
|
|
var rawJson = await result.Content.ReadAsStringAsync();
|
|
|
|
if (typeof(T).IsPrimitive || typeof(T) == typeof(string))
|
|
|
|
{
|
|
|
|
return (T)Convert.ChangeType(rawJson, typeof(T));
|
|
|
|
}
|
|
|
|
|
2020-03-20 10:56:30 +01:00
|
|
|
return JsonConvert.DeserializeObject<T>(rawJson);
|
2020-02-24 14:36:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|