2011-10-29 16:19:11 +04:00
|
|
|
#-- encoding: UTF-8
|
2011-05-30 00:11:52 +04:00
|
|
|
#-- copyright
|
|
|
|
# ChiliProject is a project management system.
|
2011-05-30 22:52:25 +04:00
|
|
|
#
|
2012-01-03 23:36:40 +04:00
|
|
|
# Copyright (C) 2010-2012 the ChiliProject Team
|
2011-05-30 22:52:25 +04:00
|
|
|
#
|
2006-07-09 20:30:01 +04:00
|
|
|
# This program is free software; you can redistribute it and/or
|
|
|
|
# modify it under the terms of the GNU General Public License
|
|
|
|
# as published by the Free Software Foundation; either version 2
|
|
|
|
# of the License, or (at your option) any later version.
|
2011-05-30 22:52:25 +04:00
|
|
|
#
|
2011-05-30 00:11:52 +04:00
|
|
|
# See doc/COPYRIGHT.rdoc for more details.
|
|
|
|
#++
|
2006-07-09 20:30:01 +04:00
|
|
|
|
2010-07-09 17:46:20 +04:00
|
|
|
ENV["RAILS_ENV"] = "test"
|
2006-06-28 22:11:03 +04:00
|
|
|
require File.expand_path(File.dirname(__FILE__) + "/../config/environment")
|
|
|
|
require 'test_help'
|
2007-09-03 00:41:47 +04:00
|
|
|
require File.expand_path(File.dirname(__FILE__) + '/helper_testcase')
|
2009-02-11 22:07:23 +03:00
|
|
|
require File.join(RAILS_ROOT,'test', 'mocks', 'open_id_authentication_mock.rb')
|
2006-06-28 22:11:03 +04:00
|
|
|
|
2009-10-20 04:36:55 +04:00
|
|
|
require File.expand_path(File.dirname(__FILE__) + '/object_daddy_helpers')
|
|
|
|
include ObjectDaddyHelpers
|
2011-12-02 06:13:27 +04:00
|
|
|
require File.expand_path(File.dirname(__FILE__) + '/integration_test_helpers')
|
2009-10-20 04:36:51 +04:00
|
|
|
|
2009-09-13 21:14:35 +04:00
|
|
|
class ActiveSupport::TestCase
|
2006-06-28 22:11:03 +04:00
|
|
|
# Transactional fixtures accelerate your tests by wrapping each test method
|
|
|
|
# in a transaction that's rolled back on completion. This ensures that the
|
|
|
|
# test database remains unchanged so your fixtures don't have to be reloaded
|
|
|
|
# between every test method. Fewer database queries means faster tests.
|
|
|
|
#
|
|
|
|
# Read Mike Clark's excellent walkthrough at
|
|
|
|
# http://clarkware.com/cgi/blosxom/2005/10/24#Rails10FastTesting
|
|
|
|
#
|
|
|
|
# Every Active Record database supports transactions except MyISAM tables
|
|
|
|
# in MySQL. Turn off transactional fixtures in this case; however, if you
|
|
|
|
# don't care one way or the other, switching from MyISAM to InnoDB tables
|
|
|
|
# is recommended.
|
|
|
|
self.use_transactional_fixtures = true
|
|
|
|
|
|
|
|
# Instantiated fixtures are slow, but give you @david where otherwise you
|
|
|
|
# would need people(:david). If you don't want to migrate your existing
|
|
|
|
# test cases which use the @david style and don't mind the speed hit (each
|
|
|
|
# instantiated fixtures translates to a database query per test method),
|
|
|
|
# then set this back to true.
|
|
|
|
self.use_instantiated_fixtures = false
|
|
|
|
|
|
|
|
# Add more helper methods to be used by all tests here...
|
2011-05-28 02:52:24 +04:00
|
|
|
def setup
|
|
|
|
super
|
2011-12-19 19:56:01 +04:00
|
|
|
Rails.cache.clear
|
2011-05-28 02:52:24 +04:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2006-07-09 20:30:01 +04:00
|
|
|
def log_user(login, password)
|
2009-12-06 13:28:20 +03:00
|
|
|
User.anonymous
|
2009-02-21 14:04:50 +03:00
|
|
|
get "/login"
|
2006-07-29 13:32:58 +04:00
|
|
|
assert_equal nil, session[:user_id]
|
2006-07-09 20:30:01 +04:00
|
|
|
assert_response :success
|
|
|
|
assert_template "account/login"
|
2009-02-21 14:04:50 +03:00
|
|
|
post "/login", :username => login, :password => password
|
2006-07-29 13:32:58 +04:00
|
|
|
assert_equal login, User.find(session[:user_id]).login
|
2006-07-09 20:30:01 +04:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2009-10-10 18:56:29 +04:00
|
|
|
def uploaded_test_file(name, mime)
|
2011-01-01 15:24:18 +03:00
|
|
|
ActionController::TestUploadedFile.new(ActiveSupport::TestCase.fixture_path + "/files/#{name}", mime, true)
|
2008-01-06 20:06:14 +03:00
|
|
|
end
|
2010-06-19 07:54:23 +04:00
|
|
|
|
|
|
|
# Mock out a file
|
2010-08-20 02:24:42 +04:00
|
|
|
def self.mock_file
|
2010-06-19 07:54:23 +04:00
|
|
|
file = 'a_file.png'
|
|
|
|
file.stubs(:size).returns(32)
|
|
|
|
file.stubs(:original_filename).returns('a_file.png')
|
|
|
|
file.stubs(:content_type).returns('image/png')
|
|
|
|
file.stubs(:read).returns(false)
|
|
|
|
file
|
|
|
|
end
|
2010-08-20 02:24:42 +04:00
|
|
|
|
|
|
|
def mock_file
|
|
|
|
self.class.mock_file
|
|
|
|
end
|
|
|
|
|
2008-06-09 22:40:59 +04:00
|
|
|
# Use a temporary directory for attachment related tests
|
|
|
|
def set_tmp_attachments_directory
|
2008-06-26 18:59:03 +04:00
|
|
|
Dir.mkdir "#{RAILS_ROOT}/tmp/test" unless File.directory?("#{RAILS_ROOT}/tmp/test")
|
2008-06-09 22:40:59 +04:00
|
|
|
Dir.mkdir "#{RAILS_ROOT}/tmp/test/attachments" unless File.directory?("#{RAILS_ROOT}/tmp/test/attachments")
|
|
|
|
Attachment.storage_path = "#{RAILS_ROOT}/tmp/test/attachments"
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2009-02-21 19:04:51 +03:00
|
|
|
def with_settings(options, &block)
|
|
|
|
saved_settings = options.keys.inject({}) {|h, k| h[k] = Setting[k].dup; h}
|
|
|
|
options.each {|k, v| Setting[k] = v}
|
|
|
|
yield
|
2011-03-27 19:41:05 +04:00
|
|
|
ensure
|
2009-02-21 19:04:51 +03:00
|
|
|
saved_settings.each {|k, v| Setting[k] = v}
|
|
|
|
end
|
2009-12-30 22:42:19 +03:00
|
|
|
|
2010-08-19 05:28:33 +04:00
|
|
|
def change_user_password(login, new_password)
|
|
|
|
user = User.first(:conditions => {:login => login})
|
|
|
|
user.password, user.password_confirmation = new_password, new_password
|
|
|
|
user.save!
|
|
|
|
end
|
|
|
|
|
2010-02-16 19:40:50 +03:00
|
|
|
def self.ldap_configured?
|
|
|
|
@test_ldap = Net::LDAP.new(:host => '127.0.0.1', :port => 389)
|
|
|
|
return @test_ldap.bind
|
2010-02-17 21:08:15 +03:00
|
|
|
rescue Exception => e
|
|
|
|
# LDAP is not listening
|
|
|
|
return nil
|
2010-02-16 19:40:50 +03:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-05-01 12:32:21 +04:00
|
|
|
# Returns the path to the test +vendor+ repository
|
|
|
|
def self.repository_path(vendor)
|
|
|
|
File.join(RAILS_ROOT.gsub(%r{config\/\.\.}, ''), "/tmp/test/#{vendor.downcase}_repository")
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2011-03-21 02:10:11 +03:00
|
|
|
# Returns the url of the subversion test repository
|
2011-03-20 21:25:38 +03:00
|
|
|
def self.subversion_repository_url
|
|
|
|
path = repository_path('subversion')
|
|
|
|
path = '/' + path unless path.starts_with?('/')
|
|
|
|
"file://#{path}"
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-05-01 12:32:21 +04:00
|
|
|
# Returns true if the +vendor+ test repository is configured
|
|
|
|
def self.repository_configured?(vendor)
|
|
|
|
File.directory?(repository_path(vendor))
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-10-23 15:07:04 +04:00
|
|
|
def assert_error_tag(options={})
|
2010-11-27 13:34:44 +03:00
|
|
|
assert_tag({:attributes => { :id => 'errorExplanation' }}.merge(options))
|
2010-10-23 15:07:04 +04:00
|
|
|
end
|
2010-02-16 19:40:50 +03:00
|
|
|
|
2009-12-30 22:42:19 +03:00
|
|
|
# Shoulda macros
|
|
|
|
def self.should_render_404
|
|
|
|
should_respond_with :not_found
|
2010-10-23 15:07:04 +04:00
|
|
|
should_render_template 'common/error'
|
2009-12-30 22:42:19 +03:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.should_have_before_filter(expected_method, options = {})
|
|
|
|
should_have_filter('before', expected_method, options)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.should_have_after_filter(expected_method, options = {})
|
|
|
|
should_have_filter('after', expected_method, options)
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.should_have_filter(filter_type, expected_method, options)
|
|
|
|
description = "have #{filter_type}_filter :#{expected_method}"
|
|
|
|
description << " with #{options.inspect}" unless options.empty?
|
|
|
|
|
|
|
|
should description do
|
|
|
|
klass = "action_controller/filters/#{filter_type}_filter".classify.constantize
|
|
|
|
expected = klass.new(:filter, expected_method.to_sym, options)
|
|
|
|
assert_equal 1, @controller.class.filter_chain.select { |filter|
|
|
|
|
filter.method == expected.method && filter.kind == expected.kind &&
|
|
|
|
filter.options == expected.options && filter.class == expected.class
|
|
|
|
}.size
|
|
|
|
end
|
|
|
|
end
|
2010-03-08 19:47:47 +03:00
|
|
|
|
|
|
|
def self.should_show_the_old_and_new_values_for(prop_key, model, &block)
|
|
|
|
context "" do
|
|
|
|
setup do
|
|
|
|
if block_given?
|
|
|
|
instance_eval &block
|
|
|
|
else
|
|
|
|
@old_value = model.generate!
|
|
|
|
@new_value = model.generate!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
should "use the new value's name" do
|
2010-09-14 16:25:19 +04:00
|
|
|
@detail = IssueJournal.generate(:version => 1, :journaled => Issue.last)
|
2010-08-05 21:05:04 +04:00
|
|
|
@detail.update_attribute(:changes, {prop_key => [@old_value.id, @new_value.id]}.to_yaml)
|
|
|
|
|
2010-09-14 17:19:26 +04:00
|
|
|
assert_match @new_value.class.find(@new_value.id).name, @detail.render_detail(prop_key, true)
|
2010-03-08 19:47:47 +03:00
|
|
|
end
|
|
|
|
|
|
|
|
should "use the old value's name" do
|
2010-09-14 16:25:19 +04:00
|
|
|
@detail = IssueJournal.generate(:version => 1, :journaled => Issue.last)
|
2010-08-05 21:05:04 +04:00
|
|
|
@detail.update_attribute(:changes, {prop_key => [@old_value.id, @new_value.id]}.to_yaml)
|
|
|
|
|
2010-09-14 17:19:26 +04:00
|
|
|
assert_match @old_value.class.find(@old_value.id).name, @detail.render_detail(prop_key, true)
|
2010-03-08 19:47:47 +03:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2010-08-02 19:43:04 +04:00
|
|
|
|
|
|
|
def self.should_create_a_new_user(&block)
|
|
|
|
should "create a new user" do
|
|
|
|
user = instance_eval &block
|
|
|
|
assert user
|
|
|
|
assert_kind_of User, user
|
|
|
|
assert !user.new_record?
|
|
|
|
end
|
|
|
|
end
|
2010-11-01 18:45:03 +03:00
|
|
|
|
2010-11-04 19:22:47 +03:00
|
|
|
# Test that a request allows the three types of API authentication
|
|
|
|
#
|
|
|
|
# * HTTP Basic with username and password
|
|
|
|
# * HTTP Basic with an api key for the username
|
|
|
|
# * Key based with the key=X parameter
|
|
|
|
#
|
|
|
|
# @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
|
|
|
|
# @param [String] url the request url
|
|
|
|
# @param [optional, Hash] parameters additional request parameters
|
2010-11-05 19:29:56 +03:00
|
|
|
# @param [optional, Hash] options additional options
|
|
|
|
# @option options [Symbol] :success_code Successful response code (:success)
|
|
|
|
# @option options [Symbol] :failure_code Failure response code (:unauthorized)
|
|
|
|
def self.should_allow_api_authentication(http_method, url, parameters={}, options={})
|
|
|
|
should_allow_http_basic_auth_with_username_and_password(http_method, url, parameters, options)
|
|
|
|
should_allow_http_basic_auth_with_key(http_method, url, parameters, options)
|
|
|
|
should_allow_key_based_auth(http_method, url, parameters, options)
|
2010-11-04 19:22:47 +03:00
|
|
|
end
|
|
|
|
|
2010-11-02 18:52:06 +03:00
|
|
|
# Test that a request allows the username and password for HTTP BASIC
|
|
|
|
#
|
|
|
|
# @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
|
|
|
|
# @param [String] url the request url
|
|
|
|
# @param [optional, Hash] parameters additional request parameters
|
2010-11-05 19:29:56 +03:00
|
|
|
# @param [optional, Hash] options additional options
|
|
|
|
# @option options [Symbol] :success_code Successful response code (:success)
|
|
|
|
# @option options [Symbol] :failure_code Failure response code (:unauthorized)
|
|
|
|
def self.should_allow_http_basic_auth_with_username_and_password(http_method, url, parameters={}, options={})
|
|
|
|
success_code = options[:success_code] || :success
|
|
|
|
failure_code = options[:failure_code] || :unauthorized
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-02 18:52:06 +03:00
|
|
|
context "should allow http basic auth using a username and password for #{http_method} #{url}" do
|
|
|
|
context "with a valid HTTP authentication" do
|
|
|
|
setup do
|
|
|
|
@user = User.generate_with_protected!(:password => 'my_password', :password_confirmation => 'my_password', :admin => true) # Admin so they can access the project
|
|
|
|
@authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@user.login, 'my_password')
|
|
|
|
send(http_method, url, parameters, {:authorization => @authorization})
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with success_code
|
2010-11-02 18:52:06 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should "login as the user" do
|
|
|
|
assert_equal @user, User.current
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with an invalid HTTP authentication" do
|
|
|
|
setup do
|
|
|
|
@user = User.generate_with_protected!
|
|
|
|
@authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@user.login, 'wrong_password')
|
|
|
|
send(http_method, url, parameters, {:authorization => @authorization})
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with failure_code
|
2010-11-02 18:52:06 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should "not login as the user" do
|
|
|
|
assert_equal User.anonymous, User.current
|
|
|
|
end
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-02 18:52:06 +03:00
|
|
|
context "without credentials" do
|
|
|
|
setup do
|
|
|
|
send(http_method, url, parameters, {:authorization => ''})
|
|
|
|
end
|
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with failure_code
|
2010-11-02 18:52:06 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should "include_www_authenticate_header" do
|
|
|
|
assert @controller.response.headers.has_key?('WWW-Authenticate')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|
|
|
|
|
2010-11-03 19:48:23 +03:00
|
|
|
# Test that a request allows the API key with HTTP BASIC
|
|
|
|
#
|
|
|
|
# @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
|
|
|
|
# @param [String] url the request url
|
|
|
|
# @param [optional, Hash] parameters additional request parameters
|
2010-11-05 19:29:56 +03:00
|
|
|
# @param [optional, Hash] options additional options
|
|
|
|
# @option options [Symbol] :success_code Successful response code (:success)
|
|
|
|
# @option options [Symbol] :failure_code Failure response code (:unauthorized)
|
|
|
|
def self.should_allow_http_basic_auth_with_key(http_method, url, parameters={}, options={})
|
|
|
|
success_code = options[:success_code] || :success
|
|
|
|
failure_code = options[:failure_code] || :unauthorized
|
|
|
|
|
2010-11-03 19:48:23 +03:00
|
|
|
context "should allow http basic auth with a key for #{http_method} #{url}" do
|
|
|
|
context "with a valid HTTP authentication using the API token" do
|
|
|
|
setup do
|
2010-11-04 19:22:47 +03:00
|
|
|
@user = User.generate_with_protected!(:admin => true)
|
2010-11-03 19:48:23 +03:00
|
|
|
@token = Token.generate!(:user => @user, :action => 'api')
|
|
|
|
@authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@token.value, 'X')
|
|
|
|
send(http_method, url, parameters, {:authorization => @authorization})
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with success_code
|
2010-11-03 19:48:23 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
2010-11-04 19:22:47 +03:00
|
|
|
should_be_a_valid_response_string_based_on_url(url)
|
2010-11-03 19:48:23 +03:00
|
|
|
should "login as the user" do
|
|
|
|
assert_equal @user, User.current
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with an invalid HTTP authentication" do
|
|
|
|
setup do
|
|
|
|
@user = User.generate_with_protected!
|
|
|
|
@token = Token.generate!(:user => @user, :action => 'feeds')
|
|
|
|
@authorization = ActionController::HttpAuthentication::Basic.encode_credentials(@token.value, 'X')
|
|
|
|
send(http_method, url, parameters, {:authorization => @authorization})
|
|
|
|
end
|
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with failure_code
|
2010-11-03 19:48:23 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should "not login as the user" do
|
|
|
|
assert_equal User.anonymous, User.current
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-01 18:45:03 +03:00
|
|
|
# Test that a request allows full key authentication
|
|
|
|
#
|
|
|
|
# @param [Symbol] http_method the HTTP method for request (:get, :post, :put, :delete)
|
|
|
|
# @param [String] url the request url, without the key=ZXY parameter
|
2010-11-04 19:22:47 +03:00
|
|
|
# @param [optional, Hash] parameters additional request parameters
|
2010-11-05 19:29:56 +03:00
|
|
|
# @param [optional, Hash] options additional options
|
|
|
|
# @option options [Symbol] :success_code Successful response code (:success)
|
|
|
|
# @option options [Symbol] :failure_code Failure response code (:unauthorized)
|
|
|
|
def self.should_allow_key_based_auth(http_method, url, parameters={}, options={})
|
|
|
|
success_code = options[:success_code] || :success
|
|
|
|
failure_code = options[:failure_code] || :unauthorized
|
|
|
|
|
2010-11-02 18:52:06 +03:00
|
|
|
context "should allow key based auth using key=X for #{http_method} #{url}" do
|
2010-11-01 18:45:03 +03:00
|
|
|
context "with a valid api token" do
|
|
|
|
setup do
|
2010-11-04 19:22:47 +03:00
|
|
|
@user = User.generate_with_protected!(:admin => true)
|
2010-11-01 18:45:03 +03:00
|
|
|
@token = Token.generate!(:user => @user, :action => 'api')
|
2010-11-04 19:22:47 +03:00
|
|
|
# Simple url parse to add on ?key= or &key=
|
|
|
|
request_url = if url.match(/\?/)
|
|
|
|
url + "&key=#{@token.value}"
|
|
|
|
else
|
|
|
|
url + "?key=#{@token.value}"
|
|
|
|
end
|
|
|
|
send(http_method, request_url, parameters)
|
2010-11-01 18:45:03 +03:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with success_code
|
2010-11-01 18:45:03 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
2010-11-04 19:22:47 +03:00
|
|
|
should_be_a_valid_response_string_based_on_url(url)
|
2010-11-01 18:45:03 +03:00
|
|
|
should "login as the user" do
|
|
|
|
assert_equal @user, User.current
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context "with an invalid api token" do
|
|
|
|
setup do
|
|
|
|
@user = User.generate_with_protected!
|
|
|
|
@token = Token.generate!(:user => @user, :action => 'feeds')
|
2010-11-05 19:29:56 +03:00
|
|
|
# Simple url parse to add on ?key= or &key=
|
|
|
|
request_url = if url.match(/\?/)
|
|
|
|
url + "&key=#{@token.value}"
|
|
|
|
else
|
|
|
|
url + "?key=#{@token.value}"
|
|
|
|
end
|
|
|
|
send(http_method, request_url, parameters)
|
2010-11-01 18:45:03 +03:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-05 19:29:56 +03:00
|
|
|
should_respond_with failure_code
|
2010-11-01 18:45:03 +03:00
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should "not login as the user" do
|
|
|
|
assert_equal User.anonymous, User.current
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2011-02-20 07:38:50 +03:00
|
|
|
context "should allow key based auth using X-ChiliProject-API-Key header for #{http_method} #{url}" do
|
2010-12-23 17:49:14 +03:00
|
|
|
setup do
|
|
|
|
@user = User.generate_with_protected!(:admin => true)
|
|
|
|
@token = Token.generate!(:user => @user, :action => 'api')
|
2011-02-20 07:38:50 +03:00
|
|
|
send(http_method, url, parameters, {'X-ChiliProject-API-Key' => @token.value.to_s})
|
2010-12-23 17:49:14 +03:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-12-23 17:49:14 +03:00
|
|
|
should_respond_with success_code
|
|
|
|
should_respond_with_content_type_based_on_url(url)
|
|
|
|
should_be_a_valid_response_string_based_on_url(url)
|
|
|
|
should "login as the user" do
|
|
|
|
assert_equal @user, User.current
|
|
|
|
end
|
|
|
|
end
|
2010-11-01 18:45:03 +03:00
|
|
|
end
|
|
|
|
|
|
|
|
# Uses should_respond_with_content_type based on what's in the url:
|
|
|
|
#
|
|
|
|
# '/project/issues.xml' => should_respond_with_content_type :xml
|
|
|
|
# '/project/issues.json' => should_respond_with_content_type :json
|
|
|
|
#
|
|
|
|
# @param [String] url Request
|
|
|
|
def self.should_respond_with_content_type_based_on_url(url)
|
|
|
|
case
|
|
|
|
when url.match(/xml/i)
|
|
|
|
should_respond_with_content_type :xml
|
|
|
|
when url.match(/json/i)
|
|
|
|
should_respond_with_content_type :json
|
|
|
|
else
|
|
|
|
raise "Unknown content type for should_respond_with_content_type_based_on_url: #{url}"
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-01 18:45:03 +03:00
|
|
|
end
|
2010-11-04 19:22:47 +03:00
|
|
|
|
|
|
|
# Uses the url to assert which format the response should be in
|
|
|
|
#
|
|
|
|
# '/project/issues.xml' => should_be_a_valid_xml_string
|
|
|
|
# '/project/issues.json' => should_be_a_valid_json_string
|
|
|
|
#
|
|
|
|
# @param [String] url Request
|
|
|
|
def self.should_be_a_valid_response_string_based_on_url(url)
|
|
|
|
case
|
|
|
|
when url.match(/xml/i)
|
|
|
|
should_be_a_valid_xml_string
|
|
|
|
when url.match(/json/i)
|
|
|
|
should_be_a_valid_json_string
|
|
|
|
else
|
|
|
|
raise "Unknown content type for should_be_a_valid_response_based_on_url: #{url}"
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-04 19:22:47 +03:00
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2010-11-04 19:22:47 +03:00
|
|
|
# Checks that the response is a valid JSON string
|
|
|
|
def self.should_be_a_valid_json_string
|
2010-11-05 20:49:20 +03:00
|
|
|
should "be a valid JSON string (or empty)" do
|
2011-03-16 21:30:37 +03:00
|
|
|
assert(response.body.blank? || ActiveSupport::JSON.decode(response.body))
|
2010-11-04 19:22:47 +03:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Checks that the response is a valid XML string
|
|
|
|
def self.should_be_a_valid_xml_string
|
|
|
|
should "be a valid XML string" do
|
|
|
|
assert REXML::Document.new(response.body)
|
|
|
|
end
|
|
|
|
end
|
2011-05-30 22:52:25 +04:00
|
|
|
|
2006-06-28 22:11:03 +04:00
|
|
|
end
|
2010-11-01 18:26:05 +03:00
|
|
|
|
2011-12-02 06:13:27 +04:00
|
|
|
class ActionController::IntegrationTest
|
|
|
|
include IntegrationTestHelpers
|
|
|
|
end
|
|
|
|
|
2010-11-01 18:26:05 +03:00
|
|
|
# Simple module to "namespace" all of the API tests
|
|
|
|
module ApiTest
|
|
|
|
end
|