X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/060d38d627bd1e51dd2b3c6e7de9af6aa7d7b6f3..91cd750b78b39195b0e8f3328a3e7f34484172a3:/services/api/test/functional/arvados/v1/container_requests_controller_test.rb diff --git a/services/api/test/functional/arvados/v1/container_requests_controller_test.rb b/services/api/test/functional/arvados/v1/container_requests_controller_test.rb index 4ebda977a1..e77e2ed3c6 100644 --- a/services/api/test/functional/arvados/v1/container_requests_controller_test.rb +++ b/services/api/test/functional/arvados/v1/container_requests_controller_test.rb @@ -5,22 +5,97 @@ require 'test_helper' class Arvados::V1::ContainerRequestsControllerTest < ActionController::TestCase + def minimal_cr + { + command: ['echo', 'hello'], + container_image: 'test', + output_path: 'test', + } + end + test 'create with scheduling parameters' do - authorize_with :system_user + authorize_with :active sp = {'partitions' => ['test1', 'test2']} - post :create, { - container_request: { - command: ['echo', 'hello'], - container_image: 'test', - output_path: 'test', - scheduling_parameters: sp, - }, - } + post :create, params: { + container_request: minimal_cr.merge(scheduling_parameters: sp.dup) + } assert_response :success cr = JSON.parse(@response.body) assert_not_nil cr, 'Expected container request' assert_equal sp, cr['scheduling_parameters'] end + + test "secret_mounts not in #create responses" do + authorize_with :active + + post :create, params: { + container_request: minimal_cr.merge( + secret_mounts: {'/foo' => {'kind' => 'json', 'content' => 'bar'}}), + } + assert_response :success + + resp = JSON.parse(@response.body) + refute resp.has_key?('secret_mounts') + + req = ContainerRequest.where(uuid: resp['uuid']).first + assert_equal 'bar', req.secret_mounts['/foo']['content'] + end + + test "update with secret_mounts" do + authorize_with :active + req = container_requests(:uncommitted) + + patch :update, params: { + id: req.uuid, + container_request: { + secret_mounts: {'/foo' => {'kind' => 'json', 'content' => 'bar'}}, + }, + } + assert_response :success + + resp = JSON.parse(@response.body) + refute resp.has_key?('secret_mounts') + + req.reload + assert_equal 'bar', req.secret_mounts['/foo']['content'] + end + + test "update without deleting secret_mounts" do + authorize_with :active + req = container_requests(:uncommitted) + req.update_attributes!(secret_mounts: {'/foo' => {'kind' => 'json', 'content' => 'bar'}}) + + patch :update, params: { + id: req.uuid, + container_request: { + command: ['echo', 'test'], + }, + } + assert_response :success + + resp = JSON.parse(@response.body) + refute resp.has_key?('secret_mounts') + + req.reload + assert_equal 'bar', req.secret_mounts['/foo']['content'] + end + + test "runtime_token not in #create responses" do + authorize_with :active + + post :create, params: { + container_request: minimal_cr.merge( + runtime_token: api_client_authorizations(:spectator).token) + } + assert_response :success + + resp = JSON.parse(@response.body) + refute resp.has_key?('runtime_token') + + req = ContainerRequest.where(uuid: resp['uuid']).first + assert_equal api_client_authorizations(:spectator).token, req.runtime_token + end + end