It("gets the UAA endpoint and saves it to the config file", func() { requirementsFactory.ApiEndpointSuccess = true testcmd.RunCommand(cmd, testcmd.NewContext("auth", []string{"*****@*****.**", "password"}), requirementsFactory) Expect(repo.GetLoginPromptsWasCalled).To(BeTrue()) }) Describe("when authentication fails", func() { BeforeEach(func() { repo.AuthError = true testcmd.RunCommand(cmd, testcmd.NewContext("auth", []string{"username", "password"}), requirementsFactory) }) It("does not prompt the user when provided username and password", func() { testassert.SliceContains(ui.Outputs, testassert.Lines{ {config.ApiEndpoint()}, {"Authenticating..."}, {"FAILED"}, {"Error authenticating"}, }) }) It("clears the user's session", func() { Expect(config.AccessToken()).To(BeEmpty()) Expect(config.RefreshToken()).To(BeEmpty()) Expect(config.SpaceFields()).To(Equal(models.SpaceFields{})) Expect(config.OrganizationFields()).To(Equal(models.OrganizationFields{})) }) }) }) })
ccGateway.SetTrustedCerts(apiServer.TLS.Certificates) }) AfterEach(func() { apiServer.Close() authServer.Close() }) It("returns the last response if the job completes before the timeout", func() { go func() { time.Sleep(25 * time.Millisecond) jobStatus = "finished" }() request, _ := ccGateway.NewRequest("GET", config.ApiEndpoint()+"/v2/foo", config.AccessToken(), nil) _, apiErr := ccGateway.PerformPollingRequestForJSONResponse(request, new(struct{}), 500*time.Millisecond) Expect(apiErr).NotTo(HaveOccurred()) }) It("returns an error if jobs takes longer than the timeout", func() { request, _ := ccGateway.NewRequest("GET", config.ApiEndpoint()+"/v2/foo", config.AccessToken(), nil) _, apiErr := ccGateway.PerformPollingRequestForJSONResponse(request, new(struct{}), 10*time.Millisecond) Expect(apiErr).To(HaveOccurred()) Expect(apiErr.Error()).To(ContainSubstring("timed out")) }) }) Describe("when uploading a file", func() { var ( err error
l := NewLogin(ui, Config, authRepo, endpointRepo, orgRepo, spaceRepo) testcmd.RunCommand(l, testcmd.NewContext("login", Flags), nil) testassert.SliceContains(ui.Outputs, testassert.Lines{ {"Select an org"}, {"1. some-org"}, {"2. my-new-org"}, {"Select a space"}, {"1. my-space"}, {"2. some-space"}, }) Expect(Config.OrganizationFields().Guid).To(Equal("my-new-org-guid")) Expect(Config.SpaceFields().Guid).To(Equal("my-space-guid")) Expect(Config.AccessToken()).To(Equal("my_access_token")) Expect(Config.RefreshToken()).To(Equal("my_refresh_token")) Expect(endpointRepo.UpdateEndpointReceived).To(Equal("api.example.com")) Expect(orgRepo.FindByNameName).To(Equal("my-new-org")) Expect(spaceRepo.FindByNameName).To(Equal("my-space")) Expect(ui.ShowConfigurationCalled).To(BeTrue()) }) It("lets the user select an org and space by name", func() { ui.Inputs = []string{"api.example.com", "*****@*****.**", "password", "my-new-org", "my-space"} l := NewLogin(ui, Config, authRepo, endpointRepo, orgRepo, spaceRepo) testcmd.RunCommand(l, testcmd.NewContext("login", Flags), nil)
testServerFn = validApiInfoEndpoint org := models.OrganizationFields{} org.Name = "my-org" org.Guid = "my-org-guid" space := models.SpaceFields{} space.Name = "my-space" space.Guid = "my-space-guid" config.SetOrganizationFields(org) config.SetSpaceFields(space) repo.UpdateEndpoint(testServer.URL) Expect(config.AccessToken()).To(Equal("")) Expect(config.AuthorizationEndpoint()).To(Equal("https://login.example.com")) Expect(config.LoggregatorEndpoint()).To(Equal("wss://loggregator.foo.example.org:4443")) Expect(config.ApiEndpoint()).To(Equal(testServer.URL)) Expect(config.ApiVersion()).To(Equal("42.0.0")) Expect(config.HasOrganization()).To(BeFalse()) Expect(config.HasSpace()).To(BeFalse()) }) It("TestUpdateEndpointWhenUrlIsAlreadyTargeted", func() { testServerFn = validApiInfoEndpoint org := models.OrganizationFields{} org.Name = "my-org" org.Guid = "my-org-guid"
testServer.Close() }) It("logs in", func() { testServer, handler, config = setupAuthDependencies(successfulLoginRequest) auth := NewUAAAuthenticationRepository(gateway, config) apiErr := auth.Authenticate(map[string]string{ "username": "******", "password": "******", }) Expect(handler).To(testnet.HaveAllRequestsCalled()) Expect(apiErr).NotTo(HaveOccurred()) Expect(config.AuthenticationEndpoint()).To(Equal(testServer.URL)) Expect(config.AccessToken()).To(Equal("BEARER my_access_token")) Expect(config.RefreshToken()).To(Equal("my_refresh_token")) }) It("returns a failure response when login fails", func() { testServer, handler, config = setupAuthDependencies(unsuccessfulLoginRequest) auth := NewUAAAuthenticationRepository(gateway, config) apiErr := auth.Authenticate(map[string]string{ "username": "******", "password": "******", }) Expect(handler).To(testnet.HaveAllRequestsCalled()) Expect(apiErr).NotTo(BeNil()) Expect(apiErr.Error()).To(Equal("Password is incorrect, please try again."))
ccGateway.SetTokenRefresher(authRepo) ccGateway.PollingThrottle = 3 * time.Millisecond }) AfterEach(func() { apiServer.Close() authServer.Close() }) It("returns the last response if the job completes before the timeout", func() { go func() { time.Sleep(25 * time.Millisecond) jobStatus = "finished" }() request, _ := ccGateway.NewRequest("GET", config.ApiEndpoint()+"/v2/foo", config.AccessToken(), nil) _, apiResponse := ccGateway.PerformPollingRequestForJSONResponse(request, new(struct{}), 500*time.Millisecond) Expect(apiResponse.IsSuccessful()).To(BeTrue()) }) It("returns an error if jobs takes longer than the timeout", func() { request, _ := ccGateway.NewRequest("GET", config.ApiEndpoint()+"/v2/foo", config.AccessToken(), nil) _, apiResponse := ccGateway.PerformPollingRequestForJSONResponse(request, new(struct{}), 10*time.Millisecond) Expect(apiResponse.IsSuccessful()).To(BeFalse()) Expect(apiResponse.Message).To(ContainSubstring("timed out")) }) }) Describe("when uploading a file", func() { var err error var request *Request