+ include ArvadosTestSupport
+
+ teardown do
+ Thread.current[:api_client_ip_address] = nil
+ Thread.current[:api_client_authorization] = nil
+ Thread.current[:api_client_uuid] = nil
+ Thread.current[:api_client] = nil
+ Thread.current[:user] = nil
+ restore_configuration
+ end
+
+ def assert_not_allowed
+ # Provide a block that calls a Rails boolean "true or false" success value,
+ # like model.save or model.destroy. This method will test that it either
+ # returns false, or raises a Permission Denied exception.
+ begin
+ refute(yield)
+ rescue ArvadosModel::PermissionDeniedError
+ end
+ end
+
+ def add_permission_link from_who, to_what, perm_type
+ act_as_system_user do
+ Link.create!(tail_uuid: from_who.uuid,
+ head_uuid: to_what.uuid,
+ link_class: 'permission',
+ name: perm_type)
+ end
+ end
+
+ def restore_configuration
+ # Restore configuration settings changed during tests
+ $application_config.each do |k,v|
+ if k.match /^[^.]*$/
+ Rails.configuration.send (k + '='), v
+ end
+ end
+ end
+
+ def set_user_from_auth(auth_name)
+ client_auth = api_client_authorizations(auth_name)
+ Thread.current[:api_client_authorization] = client_auth
+ Thread.current[:api_client] = client_auth.api_client
+ Thread.current[:user] = client_auth.user
+ end
+
+ def expect_json
+ self.request.headers["Accept"] = "text/json"
+ end
+
+ def authorize_with api_client_auth_name
+ authorize_with_token api_client_authorizations(api_client_auth_name).api_token
+ end
+
+ def authorize_with_token token
+ t = token
+ t = t.api_token if t.respond_to? :api_token
+ ArvadosApiToken.new.call("rack.input" => "",
+ "HTTP_AUTHORIZATION" => "OAuth2 #{t}")
+ end
+end
+
+class ActionController::TestCase
+ setup do
+ @counter = 0
+ end
+
+ def check_counter action
+ @counter += 1
+ if @counter == 2
+ assert_equal 1, 2, "Multiple actions in functional test"
+ end
+ end
+
+ [:get, :post, :put, :patch, :delete].each do |method|
+ define_method method do |action, *args|
+ check_counter action
+ super action, *args
+ end
+ end