|
require 'test_helper'
|
|
|
|
class ComputeResourcesControllerTest < ActionController::TestCase
|
|
setup do
|
|
@compute_resource = compute_resources(:mycompute)
|
|
@your_compute_resource = compute_resources(:yourcompute)
|
|
end
|
|
|
|
test "should not get index when not permitted" do
|
|
setup_user "none"
|
|
get :index, {}, set_session_user
|
|
assert_response 403
|
|
end
|
|
|
|
test "should get index" do
|
|
setup_user "view"
|
|
get :index, {}, set_session_user
|
|
assert_response :success
|
|
assert_template 'index'
|
|
end
|
|
|
|
test "should not get new when not permitted" do
|
|
setup_user "view"
|
|
get :new, {}, set_session_user
|
|
assert_response 403
|
|
end
|
|
|
|
test "should get new" do
|
|
setup_user "create"
|
|
get :new, {}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should not create compute resource when not permitted" do
|
|
setup_user "view"
|
|
assert_difference('ComputeResource.count', 0) do
|
|
attrs = {:name => "test", :provider => "Libvirt", :url => "qemu://host/system"}
|
|
post :create, {:compute_resource => attrs}, set_session_user
|
|
end
|
|
assert_response 403
|
|
end
|
|
|
|
test "should create compute resource" do
|
|
setup_user "create"
|
|
assert_difference('ComputeResource.count', +1) do
|
|
attrs = {:name => "test", :provider => "Libvirt", :url => "qemu://host/system"}
|
|
post :create, {:compute_resource => attrs}, set_session_user
|
|
end
|
|
|
|
assert_redirected_to compute_resource_url(assigns('compute_resource'))
|
|
end
|
|
|
|
test "should not show compute resource when not permitted" do
|
|
setup_user "none"
|
|
get :show, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_response 403
|
|
end
|
|
|
|
test "should not show compute resource when restricted" do
|
|
setup_user "view"
|
|
get :show, {:id => @your_compute_resource.to_param}, set_session_user
|
|
assert_response 404
|
|
end
|
|
|
|
test "should show compute resource" do
|
|
setup_user "view"
|
|
get :show, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should not get edit when not permitted" do
|
|
setup_user "view"
|
|
get :edit, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_response 403
|
|
end
|
|
|
|
test "host update without password in the params does not erase existing password" do
|
|
old_password = @compute_resource.password
|
|
setup_user "edit"
|
|
put :update, {:id => @compute_resource.to_param, :compute_resource => {:name => "editing_self"}}, set_session_user
|
|
@compute_resource = ComputeResource.find(@compute_resource.id)
|
|
assert_equal old_password, @compute_resource.password
|
|
end
|
|
|
|
test 'blank password submitted in compute resource edit form unsets password' do
|
|
setup_user "edit"
|
|
put :update, {:id => @compute_resource.to_param, :compute_resource => {:name => "editing_self", :password => ''}}, set_session_user
|
|
@compute_resource = ComputeResource.find(@compute_resource.id)
|
|
assert @compute_resource.password.empty?
|
|
end
|
|
|
|
test "should not get edit when restricted" do
|
|
setup_user "edit"
|
|
get :edit, {:id => @your_compute_resource.to_param}, set_session_user
|
|
assert_response 404
|
|
end
|
|
|
|
test "should get edit" do
|
|
setup_user "edit"
|
|
get :edit, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_response :success
|
|
end
|
|
|
|
test "should not update compute resource when not permitted" do
|
|
setup_user "view"
|
|
put :update, {:id => @compute_resource.to_param, :compute_resource => {:name => "editing_self"}}, set_session_user
|
|
assert_response 403
|
|
end
|
|
|
|
test "should not update compute resource when restricted" do
|
|
setup_user "edit"
|
|
put :update, {:id => @your_compute_resource.to_param, :compute_resource => {:name => "editing_self"}}, set_session_user
|
|
assert_response 404
|
|
end
|
|
|
|
test "should update compute resource" do
|
|
setup_user "edit"
|
|
put :update, {:id => @compute_resource.to_param, :compute_resource => {:name => "editing_self"}}, set_session_user
|
|
assert_redirected_to compute_resources_path
|
|
end
|
|
|
|
test "should not destroy compute resource when not permitted" do
|
|
setup_user "view"
|
|
assert_difference('ComputeResource.count', 0) do
|
|
delete :destroy, {:id => @compute_resource.to_param}, set_session_user
|
|
end
|
|
|
|
assert_response 403
|
|
end
|
|
|
|
test "should not destroy compute resource when restricted" do
|
|
setup_user "destroy"
|
|
assert_difference('ComputeResource.count', 0) do
|
|
delete :destroy, {:id => @your_compute_resource.to_param}, set_session_user
|
|
end
|
|
|
|
assert_response 404
|
|
end
|
|
|
|
test "should destroy compute resource" do
|
|
setup_user "destroy"
|
|
assert_difference('ComputeResource.count', -1) do
|
|
delete :destroy, {:id => @compute_resource.to_param}, set_session_user
|
|
end
|
|
|
|
assert_redirected_to compute_resources_path
|
|
end
|
|
|
|
context 'search' do
|
|
setup { setup_user 'view' }
|
|
|
|
test 'valid fields' do
|
|
get :index, { :search => 'name = openstack' }, set_session_user
|
|
assert_response :success
|
|
assert flash.empty?
|
|
end
|
|
|
|
test 'invalid fields' do
|
|
@request.env['HTTP_REFERER'] = "http://test.host#{compute_resources_path}"
|
|
get :index, { :search => 'wrongwrong = centos' }, set_session_user
|
|
assert_response :redirect
|
|
assert_redirected_to :back
|
|
assert_match /not recognized for searching/, flash[:error]
|
|
end
|
|
end
|
|
|
|
context 'vmware' do
|
|
setup do
|
|
@compute_resource = compute_resources(:vmware)
|
|
Fog.mock!
|
|
end
|
|
|
|
teardown do
|
|
Fog.unmock!
|
|
end
|
|
|
|
test 'resource_pools' do
|
|
resource_pools = ['swimming-pool', 'fishing-pool']
|
|
Foreman::Model::Vmware.any_instance.stubs(:resource_pools).returns(resource_pools)
|
|
xhr :get, :resource_pools, {:id => @compute_resource, :cluster_id => 'my_cluster'}, set_session_user
|
|
assert_response :success
|
|
assert_equal(resource_pools, JSON.parse(response.body))
|
|
end
|
|
|
|
test 'resource_pools for non-vmware compute resource should return not allowed' do
|
|
compute_resource = compute_resources(:mycompute)
|
|
xhr :get, :resource_pools, {:id => compute_resource, :cluster_id => 'my_cluster'}, set_session_user
|
|
assert_response :method_not_allowed
|
|
end
|
|
|
|
test 'resource_pools should respond only to ajax call' do
|
|
get :resource_pools, {:id => @compute_resource, :cluster_id => 'my_cluster'}, set_session_user
|
|
assert_response :method_not_allowed
|
|
end
|
|
end
|
|
|
|
context 'compute resource cache' do
|
|
test 'should refresh the cache' do
|
|
@compute_resource = compute_resources(:vmware)
|
|
put :refresh_cache, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_redirected_to compute_resource_url(@compute_resource)
|
|
assert_match /Successfully refreshed the cache/, flash[:notice]
|
|
end
|
|
|
|
test 'should not refresh the cache if unsupported' do
|
|
put :refresh_cache, {:id => @compute_resource.to_param}, set_session_user
|
|
assert_redirected_to compute_resource_url(@compute_resource)
|
|
assert_match /Failed to refresh the cache/, flash[:error]
|
|
end
|
|
end
|
|
|
|
def set_session_user
|
|
User.current = users(:admin) unless User.current
|
|
SETTINGS[:login] ? {:user => User.current.id, :expires_at => 5.minutes.from_now} : {}
|
|
end
|
|
|
|
def setup_user(operation, type = 'compute_resources')
|
|
super(operation, type, "id = #{@compute_resource.id}")
|
|
end
|
|
end
|