mirror of
https://github.com/pelican-dev/panel.git
synced 2025-05-19 17:34:45 +02:00

* chore: yarn upgrade * chore: composer upgrade * chore: php artisan filament:upgrade * chore: update filament-monaco-editor-views * chore: update filament-monaco-editor-configs * chore: move turnstile-views to plugins * fix monaco-editor loader & css
178 lines
6.9 KiB
PHP
178 lines
6.9 KiB
PHP
<?php
|
|
|
|
namespace App\Tests\Integration\Api\Client\Server\ScheduleTask;
|
|
|
|
use App\Models\Task;
|
|
use Illuminate\Http\Response;
|
|
use App\Models\Schedule;
|
|
use App\Models\Permission;
|
|
use App\Tests\Integration\Api\Client\ClientApiIntegrationTestCase;
|
|
use PHPUnit\Framework\Attributes\DataProvider;
|
|
|
|
class CreateServerScheduleTaskTest extends ClientApiIntegrationTestCase
|
|
{
|
|
/**
|
|
* Test that a task can be created.
|
|
*/
|
|
#[DataProvider('permissionsDataProvider')]
|
|
public function test_task_can_be_created(array $permissions): void
|
|
{
|
|
[$user, $server] = $this->generateTestAccount($permissions);
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server->id]);
|
|
$this->assertEmpty($schedule->tasks);
|
|
|
|
$response = $this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'command',
|
|
'payload' => 'say Test',
|
|
'time_offset' => 10,
|
|
'sequence_id' => 1,
|
|
]);
|
|
|
|
$response->assertOk();
|
|
/** @var \App\Models\Task $task */
|
|
$task = Task::query()->findOrFail($response->json('attributes.id'));
|
|
|
|
$this->assertSame($schedule->id, $task->schedule_id);
|
|
$this->assertSame(1, $task->sequence_id);
|
|
$this->assertSame('command', $task->action);
|
|
$this->assertSame('say Test', $task->payload);
|
|
$this->assertSame(10, $task->time_offset);
|
|
$this->assertJsonTransformedWith($response->json('attributes'), $task);
|
|
}
|
|
|
|
/**
|
|
* Test that validation errors are returned correctly if bad data is passed into the API.
|
|
*/
|
|
public function test_validation_errors_are_returned(): void
|
|
{
|
|
[$user, $server] = $this->generateTestAccount();
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server->id]);
|
|
|
|
$response = $this->actingAs($user)->postJson($this->link($schedule, '/tasks'))->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY);
|
|
|
|
foreach (['action', 'payload', 'time_offset'] as $i => $field) {
|
|
$response->assertJsonPath("errors.$i.meta.rule", $field === 'payload' ? 'required_unless' : 'required');
|
|
$response->assertJsonPath("errors.$i.meta.source_field", $field);
|
|
}
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'hodor',
|
|
'payload' => 'say Test',
|
|
'time_offset' => 0,
|
|
])
|
|
->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY)
|
|
->assertJsonPath('errors.0.meta.rule', 'in')
|
|
->assertJsonPath('errors.0.meta.source_field', 'action');
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'command',
|
|
'time_offset' => 0,
|
|
])
|
|
->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY)
|
|
->assertJsonPath('errors.0.meta.rule', 'required_unless')
|
|
->assertJsonPath('errors.0.meta.source_field', 'payload');
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'command',
|
|
'payload' => 'say Test',
|
|
'time_offset' => 0,
|
|
'sequence_id' => 'hodor',
|
|
])
|
|
->assertStatus(Response::HTTP_UNPROCESSABLE_ENTITY)
|
|
->assertJsonPath('errors.0.meta.rule', 'numeric')
|
|
->assertJsonPath('errors.0.meta.source_field', 'sequence_id');
|
|
}
|
|
|
|
/**
|
|
* Test that backups can not be tasked when the backup limit is 0.
|
|
*/
|
|
public function test_backups_can_not_be_tasked_if_limit0(): void
|
|
{
|
|
[$user, $server] = $this->generateTestAccount();
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server->id]);
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'backup',
|
|
'time_offset' => 0,
|
|
])
|
|
->assertStatus(Response::HTTP_FORBIDDEN)
|
|
->assertJsonPath('errors.0.detail', 'A backup task cannot be created when the server\'s backup limit is set to 0.');
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'backup',
|
|
'payload' => "file.txt\nfile2.log",
|
|
'time_offset' => 0,
|
|
])
|
|
->assertStatus(Response::HTTP_FORBIDDEN)
|
|
->assertJsonPath('errors.0.detail', 'A backup task cannot be created when the server\'s backup limit is set to 0.');
|
|
}
|
|
|
|
/**
|
|
* Test that an error is returned if the user attempts to create an additional task that
|
|
* would put the schedule over the task limit.
|
|
*/
|
|
public function test_error_is_returned_if_too_many_tasks_exist_for_schedule(): void
|
|
{
|
|
config()->set('panel.client_features.schedules.per_schedule_task_limit', 2);
|
|
|
|
[$user, $server] = $this->generateTestAccount();
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server->id]);
|
|
Task::factory()->times(2)->create(['schedule_id' => $schedule->id]);
|
|
|
|
$this->actingAs($user)->postJson($this->link($schedule, '/tasks'), [
|
|
'action' => 'command',
|
|
'payload' => 'say test',
|
|
'time_offset' => 0,
|
|
])
|
|
->assertStatus(Response::HTTP_BAD_REQUEST)
|
|
->assertJsonPath('errors.0.code', 'ServiceLimitExceededException')
|
|
->assertJsonPath('errors.0.detail', 'Schedules may not have more than 2 tasks associated with them. Creating this task would put this schedule over the limit.');
|
|
}
|
|
|
|
/**
|
|
* Test that an error is returned if the targeted schedule does not belong to the server
|
|
* in the request.
|
|
*/
|
|
public function test_error_is_returned_if_schedule_does_not_belong_to_server(): void
|
|
{
|
|
[$user, $server] = $this->generateTestAccount();
|
|
$server2 = $this->createServerModel(['owner_id' => $user->id]);
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server2->id]);
|
|
|
|
$this->actingAs($user)
|
|
->postJson("/api/client/servers/$server->uuid/schedules/$schedule->id/tasks")
|
|
->assertNotFound();
|
|
}
|
|
|
|
/**
|
|
* Test that an error is returned if the subuser making the request does not have permission
|
|
* to update a schedule.
|
|
*/
|
|
public function test_error_is_returned_if_subuser_does_not_have_schedule_update_permissions(): void
|
|
{
|
|
[$user, $server] = $this->generateTestAccount([Permission::ACTION_SCHEDULE_CREATE]);
|
|
|
|
/** @var \App\Models\Schedule $schedule */
|
|
$schedule = Schedule::factory()->create(['server_id' => $server->id]);
|
|
|
|
$this->actingAs($user)
|
|
->postJson($this->link($schedule, '/tasks'))
|
|
->assertForbidden();
|
|
}
|
|
|
|
public static function permissionsDataProvider(): array
|
|
{
|
|
return [[[]], [[Permission::ACTION_SCHEDULE_UPDATE]]];
|
|
}
|
|
}
|