github.com/mook-as/cf-cli@v7.0.0-beta.28.0.20200120190804-b91c115fae48+incompatible/cf/commands/securitygroup/update_security_group_test.go (about) 1 package securitygroup_test 2 3 import ( 4 "io/ioutil" 5 "os" 6 7 "code.cloudfoundry.org/cli/cf/api/securitygroups/securitygroupsfakes" 8 "code.cloudfoundry.org/cli/cf/commandregistry" 9 "code.cloudfoundry.org/cli/cf/configuration/coreconfig" 10 "code.cloudfoundry.org/cli/cf/errors" 11 "code.cloudfoundry.org/cli/cf/models" 12 "code.cloudfoundry.org/cli/cf/requirements" 13 "code.cloudfoundry.org/cli/cf/requirements/requirementsfakes" 14 testcmd "code.cloudfoundry.org/cli/cf/util/testhelpers/commands" 15 testconfig "code.cloudfoundry.org/cli/cf/util/testhelpers/configuration" 16 testterm "code.cloudfoundry.org/cli/cf/util/testhelpers/terminal" 17 18 . "code.cloudfoundry.org/cli/cf/util/testhelpers/matchers" 19 . "github.com/onsi/ginkgo" 20 . "github.com/onsi/gomega" 21 ) 22 23 var _ = Describe("update-security-group command", func() { 24 var ( 25 ui *testterm.FakeUI 26 securityGroupRepo *securitygroupsfakes.FakeSecurityGroupRepo 27 requirementsFactory *requirementsfakes.FakeFactory 28 configRepo coreconfig.Repository 29 deps commandregistry.Dependency 30 ) 31 32 updateCommandDependency := func(pluginCall bool) { 33 deps.UI = ui 34 deps.RepoLocator = deps.RepoLocator.SetSecurityGroupRepository(securityGroupRepo) 35 deps.Config = configRepo 36 commandregistry.Commands.SetCommand(commandregistry.Commands.FindCommand("update-security-group").SetDependency(deps, pluginCall)) 37 } 38 39 BeforeEach(func() { 40 ui = &testterm.FakeUI{} 41 requirementsFactory = new(requirementsfakes.FakeFactory) 42 securityGroupRepo = new(securitygroupsfakes.FakeSecurityGroupRepo) 43 configRepo = testconfig.NewRepositoryWithDefaults() 44 }) 45 46 runCommand := func(args ...string) bool { 47 return testcmd.RunCLICommand("update-security-group", args, requirementsFactory, updateCommandDependency, false, ui) 48 } 49 50 Describe("requirements", func() { 51 It("fails when the user is not logged in", func() { 52 requirementsFactory.NewLoginRequirementReturns(requirements.Failing{Message: "not logged in"}) 53 Expect(runCommand("the-security-group")).To(BeFalse()) 54 }) 55 56 It("fails with usage when a name is not provided", func() { 57 requirementsFactory.NewLoginRequirementReturns(requirements.Passing{}) 58 runCommand() 59 Expect(ui.Outputs()).To(ContainSubstrings( 60 []string{"Incorrect Usage", "Requires", "arguments"}, 61 )) 62 }) 63 64 It("fails with usage when a file path is not provided", func() { 65 requirementsFactory.NewLoginRequirementReturns(requirements.Passing{}) 66 runCommand("my-group-name") 67 Expect(ui.Outputs()).To(ContainSubstrings( 68 []string{"Incorrect Usage", "Requires", "arguments"}, 69 )) 70 }) 71 }) 72 73 Context("when the user is logged in", func() { 74 var tempFile *os.File 75 BeforeEach(func() { 76 requirementsFactory.NewLoginRequirementReturns(requirements.Passing{}) 77 securityGroup := models.SecurityGroup{ 78 SecurityGroupFields: models.SecurityGroupFields{ 79 Name: "my-group-name", 80 GUID: "my-group-guid", 81 }, 82 } 83 securityGroupRepo.ReadReturns(securityGroup, nil) 84 tempFile, _ = ioutil.TempFile("", "") 85 }) 86 87 AfterEach(func() { 88 tempFile.Close() 89 os.Remove(tempFile.Name()) 90 }) 91 92 JustBeforeEach(func() { 93 runCommand("my-group-name", tempFile.Name()) 94 }) 95 96 Context("when the file specified has valid json", func() { 97 BeforeEach(func() { 98 tempFile.Write([]byte(`[{"protocol":"udp","port":"8080-9090","destination":"198.41.191.47/1"}]`)) 99 }) 100 101 It("displays a message describing what its going to do", func() { 102 Expect(ui.Outputs()).To(ContainSubstrings( 103 []string{"Updating security group", "my-group-name", "my-user"}, 104 []string{"OK"}, 105 []string{"TIP: Changes will not apply to existing running applications until they are restarted."}, 106 )) 107 }) 108 109 It("updates the security group with those rules, obviously", func() { 110 jsonData := []map[string]interface{}{ 111 {"protocol": "udp", "port": "8080-9090", "destination": "198.41.191.47/1"}, 112 } 113 114 _, jsonArg := securityGroupRepo.UpdateArgsForCall(0) 115 116 Expect(jsonArg).To(Equal(jsonData)) 117 }) 118 119 Context("when the API returns an error", func() { 120 Context("some sort of awful terrible error that we were not prescient enough to anticipate", func() { 121 BeforeEach(func() { 122 securityGroupRepo.UpdateReturns(errors.New("Wops I failed")) 123 }) 124 125 It("fails loudly", func() { 126 Expect(ui.Outputs()).To(ContainSubstrings( 127 []string{"Updating security group", "my-group-name"}, 128 []string{"FAILED"}, 129 )) 130 }) 131 }) 132 }) 133 134 Context("when the file specified has invalid json", func() { 135 BeforeEach(func() { 136 tempFile.Write([]byte(`[{noquote: thiswontwork}]`)) 137 }) 138 139 It("freaks out", func() { 140 Expect(ui.Outputs()).To(ContainSubstrings( 141 []string{"FAILED"}, 142 )) 143 }) 144 }) 145 }) 146 }) 147 })