github.com/willmadison/cli@v6.40.1-0.20181018160101-29d5937903ff+incompatible/cf/commands/securitygroup/create_security_group_test.go (about)

     1  package securitygroup_test
     2  
     3  import (
     4  	"io/ioutil"
     5  	"os"
     6  
     7  	"code.cloudfoundry.org/cli/cf/api/securitygroups/securitygroupsfakes"
     8  	"code.cloudfoundry.org/cli/cf/commandregistry"
     9  	"code.cloudfoundry.org/cli/cf/configuration/coreconfig"
    10  	"code.cloudfoundry.org/cli/cf/errors"
    11  	"code.cloudfoundry.org/cli/cf/requirements"
    12  	"code.cloudfoundry.org/cli/cf/requirements/requirementsfakes"
    13  	testcmd "code.cloudfoundry.org/cli/cf/util/testhelpers/commands"
    14  	testconfig "code.cloudfoundry.org/cli/cf/util/testhelpers/configuration"
    15  	testterm "code.cloudfoundry.org/cli/cf/util/testhelpers/terminal"
    16  
    17  	. "code.cloudfoundry.org/cli/cf/util/testhelpers/matchers"
    18  	. "github.com/onsi/ginkgo"
    19  	. "github.com/onsi/gomega"
    20  )
    21  
    22  var _ = Describe("create-security-group command", func() {
    23  	var (
    24  		ui                  *testterm.FakeUI
    25  		securityGroupRepo   *securitygroupsfakes.FakeSecurityGroupRepo
    26  		requirementsFactory *requirementsfakes.FakeFactory
    27  		configRepo          coreconfig.Repository
    28  		deps                commandregistry.Dependency
    29  	)
    30  
    31  	updateCommandDependency := func(pluginCall bool) {
    32  		deps.UI = ui
    33  		deps.RepoLocator = deps.RepoLocator.SetSecurityGroupRepository(securityGroupRepo)
    34  		deps.Config = configRepo
    35  		commandregistry.Commands.SetCommand(commandregistry.Commands.FindCommand("create-security-group").SetDependency(deps, pluginCall))
    36  	}
    37  
    38  	BeforeEach(func() {
    39  		ui = &testterm.FakeUI{}
    40  		requirementsFactory = new(requirementsfakes.FakeFactory)
    41  		securityGroupRepo = new(securitygroupsfakes.FakeSecurityGroupRepo)
    42  		configRepo = testconfig.NewRepositoryWithDefaults()
    43  	})
    44  
    45  	runCommand := func(args ...string) bool {
    46  		return testcmd.RunCLICommand("create-security-group", args, requirementsFactory, updateCommandDependency, false, ui)
    47  	}
    48  
    49  	Describe("requirements", func() {
    50  		It("fails when the user is not logged in", func() {
    51  			requirementsFactory.NewLoginRequirementReturns(requirements.Failing{Message: "not logged in"})
    52  			Expect(runCommand("the-security-group")).To(BeFalse())
    53  		})
    54  
    55  		It("fails with usage when a name is not provided", func() {
    56  			requirementsFactory.NewLoginRequirementReturns(requirements.Passing{})
    57  			runCommand()
    58  			Expect(ui.Outputs()).To(ContainSubstrings(
    59  				[]string{"Incorrect Usage", "Requires", "arguments"},
    60  			))
    61  		})
    62  
    63  		It("fails with usage when a rules file is not provided", func() {
    64  			requirementsFactory.NewLoginRequirementReturns(requirements.Passing{})
    65  			runCommand("AWESOME_SECURITY_GROUP_NAME")
    66  			Expect(ui.Outputs()).To(ContainSubstrings(
    67  				[]string{"Incorrect Usage", "Requires", "arguments"},
    68  			))
    69  		})
    70  	})
    71  
    72  	Context("when the user is logged in", func() {
    73  		var tempFile *os.File
    74  
    75  		BeforeEach(func() {
    76  			tempFile, _ = ioutil.TempFile("", "")
    77  			requirementsFactory.NewLoginRequirementReturns(requirements.Passing{})
    78  		})
    79  
    80  		AfterEach(func() {
    81  			tempFile.Close()
    82  			os.Remove(tempFile.Name())
    83  		})
    84  
    85  		JustBeforeEach(func() {
    86  			runCommand("my-group", tempFile.Name())
    87  		})
    88  
    89  		Context("when the file specified has valid json", func() {
    90  			BeforeEach(func() {
    91  				tempFile.Write([]byte(`[{"protocol":"udp","ports":"8080-9090","destination":"198.41.191.47/1"}]`))
    92  			})
    93  
    94  			It("displays a message describing what its going to do", func() {
    95  				Expect(ui.Outputs()).To(ContainSubstrings(
    96  					[]string{"Creating security group", "my-group", "my-user"},
    97  					[]string{"OK"},
    98  				))
    99  			})
   100  
   101  			It("creates the security group with those rules", func() {
   102  				_, rules := securityGroupRepo.CreateArgsForCall(0)
   103  				Expect(rules).To(Equal([]map[string]interface{}{
   104  					{"protocol": "udp", "ports": "8080-9090", "destination": "198.41.191.47/1"},
   105  				}))
   106  			})
   107  
   108  			Context("when the API returns an error", func() {
   109  				Context("some sort of awful terrible error that we were not prescient enough to anticipate", func() {
   110  					BeforeEach(func() {
   111  						securityGroupRepo.CreateReturns(errors.New("Wops I failed"))
   112  					})
   113  
   114  					It("fails loudly", func() {
   115  						Expect(ui.Outputs()).To(ContainSubstrings(
   116  							[]string{"Creating security group", "my-group"},
   117  							[]string{"FAILED"},
   118  						))
   119  					})
   120  				})
   121  
   122  				Context("when the group already exists", func() {
   123  					BeforeEach(func() {
   124  						securityGroupRepo.CreateReturns(errors.NewHTTPError(400, errors.SecurityGroupNameTaken, "The security group is taken: my-group"))
   125  					})
   126  
   127  					It("warns the user when group already exists", func() {
   128  						Expect(ui.Outputs()).ToNot(ContainSubstrings([]string{"FAILED"}))
   129  						Expect(ui.WarnOutputs).To(ContainSubstrings([]string{"already exists"}))
   130  					})
   131  				})
   132  			})
   133  		})
   134  
   135  		Context("when the file specified has invalid json", func() {
   136  			BeforeEach(func() {
   137  				tempFile.Write([]byte(`[{noquote: thiswontwork}]`))
   138  			})
   139  
   140  			It("freaks out", func() {
   141  				Expect(ui.Outputs()).To(ContainSubstrings(
   142  					[]string{"FAILED"},
   143  					[]string{"Incorrect json format: file:", tempFile.Name()},
   144  					[]string{"Valid json file exampl"},
   145  				))
   146  			})
   147  		})
   148  	})
   149  })