|
require 'test_helper'
|
|
|
|
class SeedsTest < ActiveSupport::TestCase
|
|
# Disable AR transactional fixtures as we use DatabaseCleaner's truncation
|
|
# to empty the DB of fixtures for testing the seed script
|
|
self.use_transactional_fixtures = false
|
|
|
|
setup do
|
|
DatabaseCleaner.clean_with :truncation
|
|
Setting.stubs(:[]).with(:administrator).returns("root@localhost")
|
|
Setting.stubs(:[]).with(:send_welcome_email).returns(false)
|
|
end
|
|
|
|
def seed
|
|
# Authorisation is disabled usually when run from a rake db:* task
|
|
User.current = FactoryGirl.build(:user, :admin => true)
|
|
load File.expand_path('../../../../db/seeds.rb', __FILE__)
|
|
end
|
|
|
|
teardown do
|
|
User.current = nil
|
|
end
|
|
|
|
test 'populates features' do
|
|
count = Feature.count
|
|
seed
|
|
assert_not_equal count, Feature.count
|
|
end
|
|
|
|
test 'populates hidden admin users' do
|
|
assert_difference 'User.unscoped.where(:login => [User::ANONYMOUS_ADMIN, User::ANONYMOUS_API_ADMIN]).count', 2 do
|
|
seed
|
|
end
|
|
[User::ANONYMOUS_ADMIN, User::ANONYMOUS_API_ADMIN].each do |login|
|
|
user = User.unscoped.find_by_login(login)
|
|
assert_present user, "cannot find user #{login}"
|
|
assert_blank user.password_hash
|
|
assert_blank user.password_salt
|
|
assert user.admin?
|
|
assert user.hidden?
|
|
assert_valid user
|
|
end
|
|
end
|
|
|
|
context 'populating an initial admin user' do
|
|
test 'with defaults' do
|
|
assert_difference 'User.where(:login => "admin").count', 1 do
|
|
seed
|
|
end
|
|
user = User.find_by_login('admin')
|
|
assert_present user.password_hash
|
|
assert_present user.password_salt
|
|
assert user.admin?
|
|
assert_valid user
|
|
end
|
|
|
|
test 'with environment overrides' do
|
|
assert_difference 'User.where(:login => "seed_test").count', 1 do
|
|
with_env('SEED_ADMIN_USER' => 'seed_test',
|
|
'SEED_ADMIN_PASSWORD' => 'seed_secret',
|
|
'SEED_ADMIN_FIRST_NAME' => 'Seed',
|
|
'SEED_ADMIN_LAST_NAME' => 'Test',
|
|
'SEED_ADMIN_EMAIL' => 'seed@example.net') do
|
|
seed
|
|
end
|
|
end
|
|
user = User.find_by_login('seed_test')
|
|
assert user.matching_password? 'seed_secret'
|
|
assert user.admin?
|
|
refute user.hidden?
|
|
assert_valid user
|
|
end
|
|
end
|
|
|
|
test 'populates partition tables' do
|
|
count = Ptable.count
|
|
seed
|
|
assert_not_equal count, Ptable.count
|
|
refute Ptable.where(:os_family => nil).any?
|
|
end
|
|
|
|
test 'populates installation media' do
|
|
count = Medium.count
|
|
seed
|
|
assert_not_equal count, Medium.count
|
|
refute Medium.where(:os_family => nil).any?
|
|
end
|
|
|
|
test 'populates config templates' do
|
|
count = ProvisioningTemplate.count
|
|
seed
|
|
assert_not_equal count, ProvisioningTemplate.count
|
|
|
|
Dir["#{Rails.root}/app/views/unattended/**/*.erb"].each do |tmpl|
|
|
if tmpl =~ /disklayout/
|
|
assert Ptable.where(:template => File.read(tmpl)).any?, "No partition table containing #{tmpl}"
|
|
else
|
|
assert ProvisioningTemplate.where(:template => File.read(tmpl)).any?, "No template containing #{tmpl}"
|
|
end
|
|
end
|
|
end
|
|
|
|
test 'populates bookmarks' do
|
|
count = Bookmark.where(:public => true).count
|
|
seed
|
|
assert_not_equal count, Bookmark.where(:public => true).count
|
|
end
|
|
|
|
test 'is idempotent' do
|
|
seed
|
|
ActiveRecord::Base.any_instance.expects(:save).never
|
|
seed
|
|
end
|
|
|
|
test "doesn't add a template back that was deleted" do
|
|
seed
|
|
assert_equal 1, ProvisioningTemplate.destroy_all(:name => 'Kickstart default').size
|
|
seed
|
|
refute ProvisioningTemplate.find_by_name('Kickstart default')
|
|
end
|
|
|
|
test "doesn't add a template back that was renamed" do
|
|
seed
|
|
tmpl = ProvisioningTemplate.find_by_name('Kickstart default')
|
|
tmpl.name = 'test'
|
|
tmpl.save!
|
|
seed
|
|
refute ProvisioningTemplate.find_by_name('Kickstart default')
|
|
end
|
|
|
|
test "no audits are recorded" do
|
|
seed
|
|
assert_equal [], Audit.all
|
|
end
|
|
|
|
test "seed organization when environment SEED_ORGANIZATION specified" do
|
|
Organization.stubs(:any?).returns(false)
|
|
with_env('SEED_ORGANIZATION' => 'seed_test') do
|
|
seed
|
|
end
|
|
assert Organization.find_by_name('seed_test')
|
|
end
|
|
|
|
test "don't seed organization when an org already exists" do
|
|
Organization.stubs(:any?).returns(true)
|
|
with_env('SEED_ORGANIZATION' => 'seed_test') do
|
|
seed
|
|
end
|
|
refute Organization.find_by_name('seed_test')
|
|
end
|
|
|
|
test "seed location when environment SEED_LOCATION specified" do
|
|
Location.stubs(:any?).returns(false)
|
|
with_env('SEED_LOCATION' => 'seed_test') do
|
|
seed
|
|
end
|
|
assert Location.find_by_name('seed_test')
|
|
end
|
|
|
|
test "don't seed location when a location already exists" do
|
|
Location.stubs(:any?).returns(true)
|
|
with_env('SEED_LOCATION' => 'seed_test') do
|
|
seed
|
|
end
|
|
refute Location.find_by_name('seed_test')
|
|
end
|
|
|
|
test "all access permissions are created by permissions seed" do
|
|
seed
|
|
access_permissions = Foreman::AccessControl.permissions.reject(&:public?).reject(&:plugin?).map(&:name).map(&:to_s)
|
|
seeded_permissions = Permission.pluck('permissions.name')
|
|
# Check all access control have a matching seeded permission
|
|
assert_equal [], access_permissions - seeded_permissions
|
|
# Check all seeded permissions have a matching access control
|
|
assert_equal [], seeded_permissions - access_permissions
|
|
end
|
|
|
|
test "viewer role contains all view permissions" do
|
|
seed
|
|
view_permissions = Permission.all.select { |permission| permission.name.match(/view/) }
|
|
assert_equal [], view_permissions - Role.find_by_name('Viewer').permissions
|
|
end
|
|
end
|