1 require 'integration_helper'
3 class UserManageAccountTest < ActionDispatch::IntegrationTest
8 # test manage_account page
9 def verify_manage_account user
11 within('.navbar-fixed-top') do
12 find('a', text: "#{user['email']}").click
13 within('.dropdown-menu') do
14 find('a', text: 'Manage account').click
18 # now in manage account page
19 assert page.has_text?('Virtual Machines'), 'No text - Virtual Machines'
20 assert page.has_text?('Repositories'), 'No text - Repositories'
21 assert page.has_text?('SSH Keys'), 'No text - SSH Keys'
22 assert page.has_text?('Current Token'), 'No text - Current Token'
23 assert page.has_text?('The Arvados API token is a secret key that enables the Arvados SDKs to access Arvados'), 'No text - Arvados API token'
24 add_and_verify_ssh_key
26 within('.navbar-fixed-top') do
27 find('a', text: "#{user['email']}").click
28 within('.dropdown-menu') do
29 assert page.has_no_link?('Manage profile'), 'Found link - Manage profile'
35 def add_and_verify_ssh_key
36 click_link 'Add new SSH key'
38 within '.modal-content' do
39 assert page.has_text?('Public Key'), 'No text - Public Key'
40 assert page.has_button?('Cancel'), 'No button - Cancel'
41 assert page.has_button?('Submit'), 'No button - Submit'
43 page.find_field('public_key').set 'first test with an incorrect ssh key value'
45 assert page.has_text?('Public key does not appear to be a valid ssh-rsa or dsa public key'), 'No text - Public key does not appear to be a valid'
47 public_key_str = api_fixture('authorized_keys')['active']['public_key']
48 page.find_field('public_key').set public_key_str
49 page.find_field('name').set 'added_in_test'
51 assert page.has_text?('Public key already exists in the database, use a different key.'), 'No text - Public key already exists'
53 new_key = SSHKey.generate
54 page.find_field('public_key').set new_key.ssh_public_key
55 page.find_field('name').set 'added_in_test'
59 # key must be added. look for it in the refreshed page
60 assert page.has_text?('added_in_test'), 'No text - added_in_test'
64 ['inactive', api_fixture('users')['inactive']],
65 ['inactive_uninvited', api_fixture('users')['inactive_uninvited']],
66 ['active', api_fixture('users')['active']],
67 ['admin', api_fixture('users')['admin']],
68 ].each do |token, user|
69 test "test manage account for user #{token}" do
70 visit page_with_token(token)
71 verify_manage_account user
75 test "pipeline notification shown even though public pipelines exist" do
76 skip "created_by doesn't work that way"
77 Rails.configuration.anonymous_user_token = api_fixture('api_client_authorizations')['anonymous']['api_token']
78 visit page_with_token 'job_reader'
79 click_link 'notifications-menu'
80 assert_selector 'a', text: 'Click here to learn how to run an Arvados Crunch pipeline'
84 ['job_reader', :ssh, :pipeline],
86 ].each do |user, *expect|
87 test "manage account for #{user} with notifications #{expect.inspect}" do
88 Rails.configuration.anonymous_user_token = false
89 visit page_with_token(user)
90 click_link 'notifications-menu'
91 if expect.include? :ssh
92 assert_selector('a', text: 'Click here to set up an SSH public key for use with Arvados')
93 click_link('Click here to set up an SSH public key for use with Arvados')
94 assert_selector('a', text: 'Add new SSH key')
96 add_and_verify_ssh_key
98 # No more SSH notification
99 click_link 'notifications-menu'
100 assert_no_selector('a', text: 'Click here to set up an SSH public key for use with Arvados')
102 assert_no_selector('a', text: 'Click here to set up an SSH public key for use with Arvados')
103 assert_no_selector('a', text: 'Click here to learn how to run an Arvados Crunch pipeline')
106 if expect.include? :pipeline
107 assert_selector('a', text: 'Click here to learn how to run an Arvados Crunch pipeline')
112 test "verify repositories for active user" do
113 visit page_with_token('active', '/manage_account')
115 repos = [[api_fixture('repositories')['foo'], true, true],
116 [api_fixture('repositories')['repository3'], false, false],
117 [api_fixture('repositories')['repository4'], true, false]]
119 repos.each do |(repo, writable, sharable)|
120 within('tr', text: repo['name']+'.git') do
122 assert_selector 'a', text:'Share'
123 assert_text 'writable'
125 assert_text repo['name']
126 assert_no_selector 'a', text:'Share'
128 assert_text 'writable'
130 assert_text 'read-only'
137 test "request shell access" do
138 ActionMailer::Base.deliveries = []
139 visit page_with_token('spectator', '/manage_account')
140 assert_text 'You do not have access to any virtual machines'
141 click_link 'Send request for shell access'
143 # Button text changes to "sending...", then back to normal. In the
144 # test suite we can't depend on confirming the "sending..." state
145 # before it goes back to normal, though.
146 ## assert_selector 'a', text: 'Sending request...'
147 assert_selector 'a', text: 'Send request for shell access'
148 assert_text 'A request for shell access was sent'
150 # verify that the email was sent
151 user = api_fixture('users')['spectator']
152 full_name = "#{user['first_name']} #{user['last_name']}"
153 expected = "Shell account request from #{full_name} (#{user['email']}, #{user['uuid']})"
155 ActionMailer::Base.deliveries.each do |email|
156 if email.subject.include?(expected)
160 assert_equal 1, found_email, "Expected email after requesting shell access"
162 # Revisit the page and verify the request sent message along with
163 # the request button.
164 within('.navbar-fixed-top') do
165 find('a', text: 'spectator').click
166 within('.dropdown-menu') do
167 find('a', text: 'Manage account').click
170 assert_text 'You do not have access to any virtual machines.'
171 assert_text 'A request for shell access was sent on '
172 assert_selector 'a', text: 'Send request for shell access'