foreman/test/functional/api/v2/reports_controller_test.rb @ be0b9bee
91ad276d | Greg Sutcliffe | require 'test_helper'
|
|
be0b9bee | Daniel Lobato | require 'functional/shared/report_host_permissions_test'
|
|
91ad276d | Greg Sutcliffe | ||
class Api::V2::ReportsControllerTest < ActionController::TestCase
|
|||
be0b9bee | Daniel Lobato | include ::ReportHostPermissionsTest
|
|
dc38aad3 | Joseph Magen | describe "Non Admin User" do
|
|
def setup
|
|||
be0b9bee | Daniel Lobato | User.current = users(:one) #use an unprivileged user, not apiadmin
|
|
dc38aad3 | Joseph Magen | end
|
|
def create_a_puppet_transaction_report
|
|||
@log ||= JSON.parse(File.read(File.expand_path(File.dirname(__FILE__) + "/../../../fixtures/report-empty.json")))
|
|||
end
|
|||
def test_create_valid
|
|||
User.current=nil
|
|||
post :create, {:report => create_a_puppet_transaction_report }, set_session_user
|
|||
assert_response :success
|
|||
end
|
|||
def test_create_invalid
|
|||
User.current=nil
|
|||
post :create, {:report => ["not a hash", "throw an error"] }, set_session_user
|
|||
assert_response :unprocessable_entity
|
|||
end
|
|||
def test_create_duplicate
|
|||
User.current=nil
|
|||
post :create, {:report => create_a_puppet_transaction_report }, set_session_user
|
|||
assert_response :success
|
|||
post :create, {:report => create_a_puppet_transaction_report }, set_session_user
|
|||
assert_response :unprocessable_entity
|
|||
end
|
|||
c3b33536 | Stephen Benjamin | test 'when ":restrict_registered_smart_proxies" is false, HTTP requests should be able to create a report' do
|
|
Setting[:restrict_registered_smart_proxies] = false
|
|||
dc38aad3 | Joseph Magen | SETTINGS[:require_ssl] = false
|
|
Resolv.any_instance.stubs(:getnames).returns(['else.where'])
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_nil @controller.detected_proxy
|
|||
assert_response :success
|
|||
end
|
|||
test 'hosts with a registered smart proxy on should create a report successfully' do
|
|||
c3b33536 | Stephen Benjamin | Setting[:restrict_registered_smart_proxies] = true
|
|
Setting[:require_ssl_smart_proxies] = false
|
|||
dc38aad3 | Joseph Magen | ||
proxy = smart_proxies(:puppetmaster)
|
|||
host = URI.parse(proxy.url).host
|
|||
Resolv.any_instance.stubs(:getnames).returns([host])
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_equal proxy, @controller.detected_proxy
|
|||
assert_response :success
|
|||
end
|
|||
test 'hosts without a registered smart proxy on should not be able to create a report' do
|
|||
c3b33536 | Stephen Benjamin | Setting[:restrict_registered_smart_proxies] = true
|
|
Setting[:require_ssl_smart_proxies] = false
|
|||
dc38aad3 | Joseph Magen | ||
Resolv.any_instance.stubs(:getnames).returns(['another.host'])
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_equal 403, @response.status
|
|||
end
|
|||
test 'hosts with a registered smart proxy and SSL cert should create a report successfully' do
|
|||
c3b33536 | Stephen Benjamin | Setting[:restrict_registered_smart_proxies] = true
|
|
Setting[:require_ssl_smart_proxies] = true
|
|||
dc38aad3 | Joseph Magen | ||
@request.env['HTTPS'] = 'on'
|
|||
@request.env['SSL_CLIENT_S_DN'] = 'CN=else.where'
|
|||
@request.env['SSL_CLIENT_VERIFY'] = 'SUCCESS'
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_response :success
|
|||
end
|
|||
test 'hosts without a registered smart proxy but with an SSL cert should not be able to create a report' do
|
|||
c3b33536 | Stephen Benjamin | Setting[:restrict_registered_smart_proxies] = true
|
|
Setting[:require_ssl_smart_proxies] = true
|
|||
dc38aad3 | Joseph Magen | ||
@request.env['HTTPS'] = 'on'
|
|||
@request.env['SSL_CLIENT_S_DN'] = 'CN=another.host'
|
|||
@request.env['SSL_CLIENT_VERIFY'] = 'SUCCESS'
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_equal 403, @response.status
|
|||
end
|
|||
test 'hosts with an unverified SSL cert should not be able to create a report' do
|
|||
c3b33536 | Stephen Benjamin | Setting[:restrict_registered_smart_proxies] = true
|
|
Setting[:require_ssl_smart_proxies] = true
|
|||
dc38aad3 | Joseph Magen | ||
@request.env['HTTPS'] = 'on'
|
|||
@request.env['SSL_CLIENT_S_DN'] = 'CN=else.where'
|
|||
@request.env['SSL_CLIENT_VERIFY'] = 'FAILED'
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_equal 403, @response.status
|
|||
end
|
|||
c3b33536 | Stephen Benjamin | test 'when "require_ssl_smart_proxies" and "require_ssl" are true, HTTP requests should not be able to create a report' do
|
|
Setting[:restrict_registered_smart_proxies] = true
|
|||
Setting[:require_ssl_smart_proxies] = true
|
|||
dc38aad3 | Joseph Magen | SETTINGS[:require_ssl] = true
|
|
Resolv.any_instance.stubs(:getnames).returns(['else.where'])
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_equal 403, @response.status
|
|||
end
|
|||
c3b33536 | Stephen Benjamin | test 'when "require_ssl_smart_proxies" is true and "require_ssl" is false, HTTP requests should be able to create reports' do
|
|
# since require_ssl_smart_proxies is only applicable to HTTPS connections, both should be set
|
|||
Setting[:restrict_registered_smart_proxies] = true
|
|||
Setting[:require_ssl_smart_proxies] = true
|
|||
dc38aad3 | Joseph Magen | SETTINGS[:require_ssl] = false
|
|
Resolv.any_instance.stubs(:getnames).returns(['else.where'])
|
|||
post :create, {:report => create_a_puppet_transaction_report }
|
|||
assert_response :success
|
|||
end
|
|||
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should get index" do
|
|
get :index, { }
|
|||
91ad276d | Greg Sutcliffe | assert_response :success
|
|
dc38aad3 | Joseph Magen | assert_not_nil assigns(:reports)
|
|
reports = ActiveSupport::JSON.decode(@response.body)
|
|||
cc739ab4 | Joseph Mitchell Magen | assert !reports['results'].empty?
|
|
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should show individual record" do
|
|
get :show, { :id => reports(:report).to_param }
|
|||
91ad276d | Greg Sutcliffe | assert_response :success
|
|
dc38aad3 | Joseph Magen | show_response = ActiveSupport::JSON.decode(@response.body)
|
|
assert !show_response.empty?
|
|||
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should destroy report" do
|
|
assert_difference('Report.count', -1) do
|
|||
delete :destroy, { :id => reports(:report).to_param }
|
|||
end
|
|||
91ad276d | Greg Sutcliffe | assert_response :success
|
|
end
|
|||
dc38aad3 | Joseph Magen | test "should get reports for given host only" do
|
|
e14b5758 | Greg Sutcliffe | report = FactoryGirl.create(:report)
|
|
get :index, {:host_id => report.host.to_param }
|
|||
91ad276d | Greg Sutcliffe | assert_response :success
|
|
dc38aad3 | Joseph Magen | assert_not_nil assigns(:reports)
|
|
reports = ActiveSupport::JSON.decode(@response.body)
|
|||
cc739ab4 | Joseph Mitchell Magen | assert !reports['results'].empty?
|
|
assert_equal 1, reports['results'].count
|
|||
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should return empty result for host with no reports" do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
get :index, {:host_id => host.to_param }
|
|||
91ad276d | Greg Sutcliffe | assert_response :success
|
|
dc38aad3 | Joseph Magen | assert_not_nil assigns(:reports)
|
|
reports = ActiveSupport::JSON.decode(@response.body)
|
|||
cc739ab4 | Joseph Mitchell Magen | assert reports['results'].empty?
|
|
assert_equal 0, reports['results'].count
|
|||
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should get last report" do
|
|
e14b5758 | Greg Sutcliffe | reports = FactoryGirl.create_list(:report, 5)
|
|
dc38aad3 | Joseph Magen | get :last
|
|
assert_response :success
|
|||
assert_not_nil assigns(:report)
|
|||
report = ActiveSupport::JSON.decode(@response.body)
|
|||
assert !report.empty?
|
|||
e14b5758 | Greg Sutcliffe | assert_equal reports.last, Report.find(report['id'])
|
|
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should get last report for given host only" do
|
|
2312cccf | Daniel Lobato | main_report = FactoryGirl.create(:report)
|
|
FactoryGirl.create_list(:report, 5)
|
|||
e14b5758 | Greg Sutcliffe | get :last, {:host_id => main_report.host.to_param }
|
|
dc38aad3 | Joseph Magen | assert_response :success
|
|
assert_not_nil assigns(:report)
|
|||
report = ActiveSupport::JSON.decode(@response.body)
|
|||
assert !report.empty?
|
|||
e14b5758 | Greg Sutcliffe | assert_equal main_report, Report.find(report['id'])
|
|
91ad276d | Greg Sutcliffe | end
|
|
dc38aad3 | Joseph Magen | test "should give error if no last report for given host" do
|
|
e14b5758 | Greg Sutcliffe | host = FactoryGirl.create(:host)
|
|
get :last, {:host_id => host.to_param }
|
|||
46338cd7 | Daniel Lobato | assert_response :not_found
|
|
91ad276d | Greg Sutcliffe | end
|
|
be0b9bee | Daniel Lobato | ||
test 'cannot view the last report without hosts view permission' do
|
|||
setup_user('view', 'reports')
|
|||
report = FactoryGirl.create(:report)
|
|||
get :last, { :host_id => report.host.id }, set_session_user.merge(:user => User.current)
|
|||
assert_response :not_found
|
|||
end
|
|||
39dfa4be | Lukas Zapletal | end
|