require "coveralls"
Coveralls.wear!("rails")
+# Override the simplecov output message, since it is mostly unwanted noise
+module SimpleCov
+ module Formatter
+ class HTMLFormatter
+ def output_message(_result); end
+ end
+ end
+end
+
+# Output both the local simplecov html and the coveralls report
+SimpleCov.formatter = SimpleCov::Formatter::MultiFormatter.new(
+ [SimpleCov::Formatter::HTMLFormatter,
+ Coveralls::SimpleCov::Formatter]
+)
+
+require "securerandom"
+require "digest/sha1"
+
ENV["RAILS_ENV"] = "test"
-require File.expand_path("../config/environment", __dir__)
+require_relative "../config/environment"
require "rails/test_help"
require "webmock/minitest"
+WebMock.disable_net_connect!(:allow_localhost => true)
+
module ActiveSupport
class TestCase
include FactoryBot::Syntax::Methods
+ include ActiveJob::TestHelper
+
+ # Run tests in parallel with specified workers
+ parallelize(:workers => :number_of_processors)
##
# takes a block which is executed in the context of a different
end
end
+ ##
+ # execute a block with missing translation exceptions suppressed
+ def without_i18n_exceptions
+ exception_handler = I18n.exception_handler
+ begin
+ I18n.exception_handler = nil
+ yield
+ ensure
+ I18n.exception_handler = exception_handler
+ end
+ end
+
##
# work round minitest insanity that causes it to tell you
# to use assert_nil to test for nil, which is fine if you're
end
##
- # set request headers for HTTP basic authentication
- def basic_authorization(user, pass)
- @request.env["HTTP_AUTHORIZATION"] = format("Basic %{auth}", :auth => Base64.encode64("#{user}:#{pass}"))
+ # return request header for HTTP Basic Authorization
+ def basic_authorization_header(user, pass)
+ { "Authorization" => format("Basic %{auth}", :auth => Base64.encode64("#{user}:#{pass}")) }
end
##
- # set oauth token permissions
- def grant_oauth_token(*tokens)
- request.env["oauth.token"] = AccessToken.new do |token|
- tokens.each do |t|
- token.public_send("#{t}=", true)
- end
- end
+ # make an OAuth signed request
+ def signed_request(method, uri, options = {})
+ uri = URI.parse(uri)
+ uri.scheme ||= "http"
+ uri.host ||= "www.example.com"
+
+ oauth = options.delete(:oauth)
+ params = options.fetch(:params, {}).transform_keys(&:to_s)
+
+ oauth[:consumer] ||= oauth[:token].client_application
+
+ helper = OAuth::Client::Helper.new(nil, oauth)
+
+ request = OAuth::RequestProxy.proxy(
+ "method" => method.to_s.upcase,
+ "uri" => uri,
+ "parameters" => params.merge(helper.oauth_parameters)
+ )
+
+ request.sign!(oauth)
+
+ method(method).call(request.signed_uri, options)
+ end
+
+ ##
+ # make an OAuth signed GET request
+ def signed_get(uri, options = {})
+ signed_request(:get, uri, options)
+ end
+
+ ##
+ # make an OAuth signed POST request
+ def signed_post(uri, options = {})
+ signed_request(:post, uri, options)
end
##
- # set request readers to ask for a particular error format
- def error_format(format)
- @request.env["HTTP_X_ERROR_FORMAT"] = format
+ # return request header for HTTP Accept
+ def accept_format_header(format)
+ { "Accept" => format }
end
##
- # set the raw body to be sent with a POST request
- def content(c)
- @request.env["RAW_POST_DATA"] = c.to_s
+ # return request header to ask for a particular error format
+ def error_format_header(f)
+ { "X-Error-Format" => f }
end
##
end
def stub_gravatar_request(email, status = 200, body = nil)
- hash = Digest::MD5.hexdigest(email.downcase)
+ hash = ::Digest::MD5.hexdigest(email.downcase)
url = "https://www.gravatar.com/avatar/#{hash}?d=404"
stub_request(:get, url).and_return(:status => status, :body => body)
end
- def stub_hostip_requests
- # Controller tests and integration tests use different IPs
- stub_request(:get, "http://api.hostip.info/country.php?ip=0.0.0.0")
- stub_request(:get, "http://api.hostip.info/country.php?ip=127.0.0.1")
- end
-
def email_text_parts(message)
message.parts.each_with_object([]) do |part, text_parts|
if part.content_type.start_with?("text/")
end
def sign_in_as(user)
- stub_hostip_requests
visit login_path
fill_in "username", :with => user.email
fill_in "password", :with => "test"
click_on "Login", :match => :first
end
+
+ def session_for(user)
+ post login_path, :params => { :username => user.display_name, :password => "test" }
+ follow_redirect!
+ end
+
+ def xml_for_node(node)
+ doc = OSM::API.new.get_xml_doc
+ doc.root << xml_node_for_node(node)
+ doc
+ end
+
+ def xml_node_for_node(node)
+ el = XML::Node.new "node"
+ el["id"] = node.id.to_s
+
+ OMHelper.add_metadata_to_xml_node(el, node, {}, {})
+
+ if node.visible?
+ el["lat"] = node.lat.to_s
+ el["lon"] = node.lon.to_s
+ end
+
+ OMHelper.add_tags_to_xml_node(el, node.node_tags)
+
+ el
+ end
+
+ def xml_for_way(way)
+ doc = OSM::API.new.get_xml_doc
+ doc.root << xml_node_for_way(way)
+ doc
+ end
+
+ def xml_node_for_way(way)
+ el = XML::Node.new "way"
+ el["id"] = way.id.to_s
+
+ OMHelper.add_metadata_to_xml_node(el, way, {}, {})
+
+ # make sure nodes are output in sequence_id order
+ ordered_nodes = []
+ way.way_nodes.each do |nd|
+ ordered_nodes[nd.sequence_id] = nd.node_id.to_s if nd.node&.visible?
+ end
+
+ ordered_nodes.each do |nd_id|
+ next unless nd_id && nd_id != "0"
+
+ node_el = XML::Node.new "nd"
+ node_el["ref"] = nd_id
+ el << node_el
+ end
+
+ OMHelper.add_tags_to_xml_node(el, way.way_tags)
+
+ el
+ end
+
+ def xml_for_relation(relation)
+ doc = OSM::API.new.get_xml_doc
+ doc.root << xml_node_for_relation(relation)
+ doc
+ end
+
+ def xml_node_for_relation(relation)
+ el = XML::Node.new "relation"
+ el["id"] = relation.id.to_s
+
+ OMHelper.add_metadata_to_xml_node(el, relation, {}, {})
+
+ relation.relation_members.each do |member|
+ member_el = XML::Node.new "member"
+ member_el["type"] = member.member_type.downcase
+ member_el["ref"] = member.member_id.to_s
+ member_el["role"] = member.member_role
+ el << member_el
+ end
+
+ OMHelper.add_tags_to_xml_node(el, relation.relation_tags)
+
+ el
+ end
+
+ class OMHelper
+ extend ObjectMetadata
+ end
end
end