test_helper.rb 16.3 KB
Newer Older
1
#-- encoding: UTF-8
2 3
#-- copyright
# ChiliProject is a project management system.
4
#
Holger Just's avatar
Holger Just committed
5
# Copyright (C) 2010-2013 the ChiliProject Team
6
#
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
7 8 9 10
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
11
#
12 13
# See doc/COPYRIGHT.rdoc for more details.
#++
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
14

15
ENV["RAILS_ENV"] = "test"
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
16 17
require File.expand_path(File.dirname(__FILE__) + "/../config/environment")
require 'test_help'
18
require File.expand_path(File.dirname(__FILE__) + '/helper_testcase')
19
require File.join(RAILS_ROOT,'test', 'mocks', 'open_id_authentication_mock.rb')
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
20

21 22
require File.expand_path(File.dirname(__FILE__) + '/object_daddy_helpers')
include ObjectDaddyHelpers
23

24
class ActiveSupport::TestCase
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46
  # Transactional fixtures accelerate your tests by wrapping each test method
  # in a transaction that's rolled back on completion.  This ensures that the
  # test database remains unchanged so your fixtures don't have to be reloaded
  # between every test method.  Fewer database queries means faster tests.
  #
  # Read Mike Clark's excellent walkthrough at
  #   http://clarkware.com/cgi/blosxom/2005/10/24#Rails10FastTesting
  #
  # Every Active Record database supports transactions except MyISAM tables
  # in MySQL.  Turn off transactional fixtures in this case; however, if you
  # don't care one way or the other, switching from MyISAM to InnoDB tables
  # is recommended.
  self.use_transactional_fixtures = true

  # Instantiated fixtures are slow, but give you @david where otherwise you
  # would need people(:david).  If you don't want to migrate your existing
  # test cases which use the @david style and don't mind the speed hit (each
  # instantiated fixtures translates to a database query per test method),
  # then set this back to true.
  self.use_instantiated_fixtures  = false

  # Add more helper methods to be used by all tests here...
47 48 49 50
  def setup
    super
    Setting.clear_cache
  end
51

Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
52
  def log_user(login, password)
53
    User.anonymous
54
    get "/login"
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
55
    assert_equal nil, session[:user_id]
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
56 57
    assert_response :success
    assert_template "account/login"
58
    post "/login", :username => login, :password => password
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
59
    assert_equal login, User.find(session[:user_id]).login
Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
60
  end
61

62
  def uploaded_test_file(name, mime)
63
    ActionController::TestUploadedFile.new(ActiveSupport::TestCase.fixture_path + "/files/#{name}", mime, true)
64
  end
65 66

  # Mock out a file
67
  def self.mock_file
68 69 70 71 72 73 74
    file = 'a_file.png'
    file.stubs(:size).returns(32)
    file.stubs(:original_filename).returns('a_file.png')
    file.stubs(:content_type).returns('image/png')
    file.stubs(:read).returns(false)
    file
  end
75 76 77 78 79

  def mock_file
    self.class.mock_file
  end

80 81
  # Use a temporary directory for attachment related tests
  def set_tmp_attachments_directory
82
    Dir.mkdir "#{RAILS_ROOT}/tmp/test" unless File.directory?("#{RAILS_ROOT}/tmp/test")
83 84 85
    Dir.mkdir "#{RAILS_ROOT}/tmp/test/attachments" unless File.directory?("#{RAILS_ROOT}/tmp/test/attachments")
    Attachment.storage_path = "#{RAILS_ROOT}/tmp/test/attachments"
  end
86

87 88 89 90
  def with_settings(options, &block)
    saved_settings = options.keys.inject({}) {|h, k| h[k] = Setting[k].dup; h}
    options.each {|k, v| Setting[k] = v}
    yield
91
  ensure
92 93
    saved_settings.each {|k, v| Setting[k] = v}
  end
94

95 96 97 98 99 100
  def change_user_password(login, new_password)
    user = User.first(:conditions => {:login => login})
    user.password, user.password_confirmation = new_password, new_password
    user.save!
  end

101 102 103
  def self.ldap_configured?
    @test_ldap = Net::LDAP.new(:host => '127.0.0.1', :port => 389)
    return @test_ldap.bind
104 105 106
  rescue Exception => e
    # LDAP is not listening
    return nil
107
  end
108

109 110 111 112
  # Returns the path to the test +vendor+ repository
  def self.repository_path(vendor)
    File.join(RAILS_ROOT.gsub(%r{config\/\.\.}, ''), "/tmp/test/#{vendor.downcase}_repository")
  end
113

114
  # Returns the url of the subversion test repository
115 116 117 118 119
  def self.subversion_repository_url
    path = repository_path('subversion')
    path = '/' + path unless path.starts_with?('/')
    "file://#{path}"
  end
120

121 122 123 124
  # Returns true if the +vendor+ test repository is configured
  def self.repository_configured?(vendor)
    File.directory?(repository_path(vendor))
  end
125

126
  def assert_error_tag(options={})
127
    assert_tag({:attributes => { :id => 'errorExplanation' }}.merge(options))
128
  end
129

130 131 132
  # Shoulda macros
  def self.should_render_404
    should_respond_with :not_found
133
    should_render_template 'common/error'
134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156
  end

  def self.should_have_before_filter(expected_method, options = {})
    should_have_filter('before', expected_method, options)
  end

  def self.should_have_after_filter(expected_method, options = {})
    should_have_filter('after', expected_method, options)
  end

  def self.should_have_filter(filter_type, expected_method, options)
    description = "have #{filter_type}_filter :#{expected_method}"
    description << " with #{options.inspect}" unless options.empty?

    should description do
      klass = "action_controller/filters/#{filter_type}_filter".classify.constantize
      expected = klass.new(:filter, expected_method.to_sym, options)
      assert_equal 1, @controller.class.filter_chain.select { |filter|
        filter.method == expected.method && filter.kind == expected.kind &&
        filter.options == expected.options && filter.class == expected.class
      }.size
    end
  end
157 158 159 160 161 162 163 164 165 166 167 168 169

  def self.should_show_the_old_and_new_values_for(prop_key, model, &block)
    context "" do
      setup do
        if block_given?
          instance_eval &block
        else
          @old_value = model.generate!
          @new_value = model.generate!
        end
      end

      should "use the new value's name" do
170
        @detail = IssueJournal.generate(:version => 1, :journaled => Issue.last)
171 172
        @detail.update_attribute(:changes, {prop_key => [@old_value.id, @new_value.id]}.to_yaml)

173
        assert_match @new_value.class.find(@new_value.id).name, @detail.render_detail(prop_key, true)
174 175 176
      end

      should "use the old value's name" do
177
        @detail = IssueJournal.generate(:version => 1, :journaled => Issue.last)
178 179
        @detail.update_attribute(:changes, {prop_key => [@old_value.id, @new_value.id]}.to_yaml)

180
        assert_match @old_value.class.find(@old_value.id).name, @detail.render_detail(prop_key, true)
181 182 183
      end
    end
  end
184 185 186 187 188 189 190 191 192

  def self.should_create_a_new_user(&block)
    should "create a new user" do
      user = instance_eval &block
      assert user
      assert_kind_of User, user
      assert !user.new_record?
    end
  end
193

194 195 196 197 198 199 200 201 202
  # Test that a request allows the three types of API authentication
  #
  # * HTTP Basic with username and password
  # * HTTP Basic with an api key for the username
  # * Key based with the key=X parameter
  #
  # @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
  # @param [String] url the request url
  # @param [optional, Hash] parameters additional request parameters
203 204 205 206 207 208 209
  # @param [optional, Hash] options additional options
  # @option options [Symbol] :success_code Successful response code (:success)
  # @option options [Symbol] :failure_code Failure response code (:unauthorized)
  def self.should_allow_api_authentication(http_method, url, parameters={}, options={})
    should_allow_http_basic_auth_with_username_and_password(http_method, url, parameters, options)
    should_allow_http_basic_auth_with_key(http_method, url, parameters, options)
    should_allow_key_based_auth(http_method, url, parameters, options)
210 211
  end

212 213 214 215 216
  # Test that a request allows the username and password for HTTP BASIC
  #
  # @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
  # @param [String] url the request url
  # @param [optional, Hash] parameters additional request parameters
217 218 219 220 221 222
  # @param [optional, Hash] options additional options
  # @option options [Symbol] :success_code Successful response code (:success)
  # @option options [Symbol] :failure_code Failure response code (:unauthorized)
  def self.should_allow_http_basic_auth_with_username_and_password(http_method, url, parameters={}, options={})
    success_code = options[:success_code] || :success
    failure_code = options[:failure_code] || :unauthorized
223

224 225 226 227 228 229 230
    context "should allow http basic auth using a username and password for #{http_method} #{url}" do
      context "with a valid HTTP authentication" do
        setup do
          @user = User.generate_with_protected!(:password => 'my_password', :password_confirmation => 'my_password', :admin => true) # Admin so they can access the project
          @authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@user.login, 'my_password')
          send(http_method, url, parameters, {:authorization => @authorization})
        end
231

232
        should_respond_with success_code
233 234 235 236 237 238 239 240 241 242 243 244
        should_respond_with_content_type_based_on_url(url)
        should "login as the user" do
          assert_equal @user, User.current
        end
      end

      context "with an invalid HTTP authentication" do
        setup do
          @user = User.generate_with_protected!
          @authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@user.login, 'wrong_password')
          send(http_method, url, parameters, {:authorization => @authorization})
        end
245

246
        should_respond_with failure_code
247 248 249 250 251
        should_respond_with_content_type_based_on_url(url)
        should "not login as the user" do
          assert_equal User.anonymous, User.current
        end
      end
252

253 254 255 256 257
      context "without credentials" do
        setup do
          send(http_method, url, parameters, {:authorization => ''})
        end

258
        should_respond_with failure_code
259 260 261 262 263 264 265 266 267
        should_respond_with_content_type_based_on_url(url)
        should "include_www_authenticate_header" do
          assert @controller.response.headers.has_key?('WWW-Authenticate')
        end
      end
    end

  end

268 269 270 271 272
  # Test that a request allows the API key with HTTP BASIC
  #
  # @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
  # @param [String] url the request url
  # @param [optional, Hash] parameters additional request parameters
273 274 275 276 277 278 279
  # @param [optional, Hash] options additional options
  # @option options [Symbol] :success_code Successful response code (:success)
  # @option options [Symbol] :failure_code Failure response code (:unauthorized)
  def self.should_allow_http_basic_auth_with_key(http_method, url, parameters={}, options={})
    success_code = options[:success_code] || :success
    failure_code = options[:failure_code] || :unauthorized

280 281 282
    context "should allow http basic auth with a key for #{http_method} #{url}" do
      context "with a valid HTTP authentication using the API token" do
        setup do
283
          @user = User.generate_with_protected!(:admin => true)
284 285 286 287
          @token = Token.generate!(:user => @user, :action => 'api')
          @authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@token.value, 'X')
          send(http_method, url, parameters, {:authorization => @authorization})
        end
288

289
        should_respond_with success_code
290
        should_respond_with_content_type_based_on_url(url)
291
        should_be_a_valid_response_string_based_on_url(url)
292 293 294 295 296 297 298 299 300 301 302 303 304
        should "login as the user" do
          assert_equal @user, User.current
        end
      end

      context "with an invalid HTTP authentication" do
        setup do
          @user = User.generate_with_protected!
          @token = Token.generate!(:user => @user, :action => 'feeds')
          @authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@token.value, 'X')
          send(http_method, url, parameters, {:authorization => @authorization})
        end

305
        should_respond_with failure_code
306 307 308 309 310 311 312
        should_respond_with_content_type_based_on_url(url)
        should "not login as the user" do
          assert_equal User.anonymous, User.current
        end
      end
    end
  end
313

314 315 316 317
  # Test that a request allows full key authentication
  #
  # @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
  # @param [String] url the request url, without the key=ZXY parameter
318
  # @param [optional, Hash] parameters additional request parameters
319 320 321 322 323 324 325
  # @param [optional, Hash] options additional options
  # @option options [Symbol] :success_code Successful response code (:success)
  # @option options [Symbol] :failure_code Failure response code (:unauthorized)
  def self.should_allow_key_based_auth(http_method, url, parameters={}, options={})
    success_code = options[:success_code] || :success
    failure_code = options[:failure_code] || :unauthorized

326
    context "should allow key based auth using key=X for #{http_method} #{url}" do
327 328
      context "with a valid api token" do
        setup do
329
          @user = User.generate_with_protected!(:admin => true)
330
          @token = Token.generate!(:user => @user, :action => 'api')
331 332 333 334 335 336 337
          # Simple url parse to add on ?key= or &key=
          request_url = if url.match(/\?/)
                          url + "&key=#{@token.value}"
                        else
                          url + "?key=#{@token.value}"
                        end
          send(http_method, request_url, parameters)
338
        end
339

340
        should_respond_with success_code
341
        should_respond_with_content_type_based_on_url(url)
342
        should_be_a_valid_response_string_based_on_url(url)
343 344 345 346 347 348 349 350 351
        should "login as the user" do
          assert_equal @user, User.current
        end
      end

      context "with an invalid api token" do
        setup do
          @user = User.generate_with_protected!
          @token = Token.generate!(:user => @user, :action => 'feeds')
352 353 354 355 356 357 358
          # Simple url parse to add on ?key= or &key=
          request_url = if url.match(/\?/)
                          url + "&key=#{@token.value}"
                        else
                          url + "?key=#{@token.value}"
                        end
          send(http_method, request_url, parameters)
359
        end
360

361
        should_respond_with failure_code
362 363 364 365 366 367
        should_respond_with_content_type_based_on_url(url)
        should "not login as the user" do
          assert_equal User.anonymous, User.current
        end
      end
    end
368

369
    context "should allow key based auth using X-ChiliProject-API-Key header for #{http_method} #{url}" do
370 371 372
      setup do
        @user = User.generate_with_protected!(:admin => true)
        @token = Token.generate!(:user => @user, :action => 'api')
373
        send(http_method, url, parameters, {'X-ChiliProject-API-Key' => @token.value.to_s})
374
      end
375

376 377 378 379 380 381 382
      should_respond_with success_code
      should_respond_with_content_type_based_on_url(url)
      should_be_a_valid_response_string_based_on_url(url)
      should "login as the user" do
        assert_equal @user, User.current
      end
    end
383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399
  end

  # Uses should_respond_with_content_type based on what's in the url:
  #
  # '/project/issues.xml' => should_respond_with_content_type :xml
  # '/project/issues.json' => should_respond_with_content_type :json
  #
  # @param [String] url Request
  def self.should_respond_with_content_type_based_on_url(url)
    case
    when url.match(/xml/i)
      should_respond_with_content_type :xml
    when url.match(/json/i)
      should_respond_with_content_type :json
    else
      raise "Unknown content type for should_respond_with_content_type_based_on_url: #{url}"
    end
400

401
  end
402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417

  # Uses the url to assert which format the response should be in
  #
  # '/project/issues.xml' => should_be_a_valid_xml_string
  # '/project/issues.json' => should_be_a_valid_json_string
  #
  # @param [String] url Request
  def self.should_be_a_valid_response_string_based_on_url(url)
    case
    when url.match(/xml/i)
      should_be_a_valid_xml_string
    when url.match(/json/i)
      should_be_a_valid_json_string
    else
      raise "Unknown content type for should_be_a_valid_response_based_on_url: #{url}"
    end
418

419
  end
420

421 422
  # Checks that the response is a valid JSON string
  def self.should_be_a_valid_json_string
423
    should "be a valid JSON string (or empty)" do
424
      assert(response.body.blank? || ActiveSupport::JSON.decode(response.body))
425 426 427 428 429 430 431 432 433
    end
  end

  # Checks that the response is a valid XML string
  def self.should_be_a_valid_xml_string
    should "be a valid XML string" do
      assert REXML::Document.new(response.body)
    end
  end
434

Jean-Philippe Lang's avatar
Jean-Philippe Lang committed
435
end
436 437 438 439

# Simple module to "namespace" all of the API tests
module ApiTest
end