blob: c1cc807a2597f16fc3fde84f07aa2f49282671f4 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the 'License'); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an 'AS IS' BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
import {TestBed, fakeAsync, tick} from '@angular/core/testing';
import initTestBed from 'nf-registry.testbed-factory';
import {of} from 'rxjs';
import NfRegistryApi from 'services/nf-registry.api';
import NfRegistryService from 'services/nf-registry.service';
import NfRegistryManageGroup from 'components/administration/users/sidenav/manage-group/nf-registry-manage-group';
import {ActivatedRoute} from '@angular/router';
describe('NfRegistryManageGroup Component', function () {
let comp;
let fixture;
let nfRegistryService;
let nfRegistryApi;
beforeEach((done) => {
const providers = [
{
provide: ActivatedRoute,
useValue: {
params: of({groupId: '123'})
}
}
];
initTestBed({providers})
.then(() => {
fixture = TestBed.createComponent(NfRegistryManageGroup);
// test instance
comp = fixture.componentInstance;
// from the root injector
nfRegistryService = TestBed.get(NfRegistryService);
nfRegistryApi = TestBed.get(NfRegistryApi);
// because the NfRegistryManageGroup component is a nested route component we need to set up the nfRegistryService service manually
nfRegistryService.sidenav = {
open: function () {
},
close: function () {
}
};
nfRegistryService.group = {
identifier: 999,
identity: 'Group #1',
users: [{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}],
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
};
nfRegistryService.groups = [nfRegistryService.group];
//Spy
spyOn(nfRegistryApi, 'ticketExchange').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(nfRegistryApi, 'loadCurrentUser').and.callFake(function () {
}).and.returnValue(of({}));
done();
});
});
it('should have a defined component', fakeAsync(function () {
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
expect(comp).toBeDefined();
expect(nfRegistryService.group.identifier).toEqual('123');
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
}));
it('should FAIL to get user by id and redirect to admin users perspective', fakeAsync(function () {
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
status: 404
}));
spyOn(comp.router, 'navigateByUrl').and.callFake(function () {
});
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const routerCall = comp.router.navigateByUrl.calls.first();
expect(routerCall.args[0]).toBe('administration/users');
expect(comp.router.navigateByUrl.calls.count()).toBe(1);
}));
it('should FAIL to get user by id and redirect to workflow perspective', fakeAsync(function () {
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
status: 409
}));
spyOn(comp.router, 'navigateByUrl').and.callFake(function () {
});
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const routerCall = comp.router.navigateByUrl.calls.first();
expect(routerCall.args[0]).toBe('administration/workflow');
expect(comp.router.navigateByUrl.calls.count()).toBe(1);
}));
it('should redirect to users perspective', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
spyOn(comp.router, 'navigateByUrl').and.callFake(function () {
});
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
// the function to test
comp.closeSideNav();
//assertions
const routerCall = comp.router.navigateByUrl.calls.first();
expect(routerCall.args[0]).toBe('administration/users');
expect(comp.router.navigateByUrl.calls.count()).toBe(1);
}));
it('should toggle to create the manage bucket privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 404,
userGroups: []
}));
spyOn(nfRegistryApi, 'postPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageBucketsPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.postPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to update the manage bucket privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: []
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageBucketsPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to remove the manage bucket privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 400,
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageBucketsPrivileges({
checked: false
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to create the manage proxy privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 404,
userGroups: []
}));
spyOn(nfRegistryApi, 'postPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageProxyPrivileges({
checked: true
}, 'write');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.postPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to update the manage proxy privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: []
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageProxyPrivileges({
checked: true
}, 'write');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to remove the manage proxy privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 400,
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageProxyPrivileges({
checked: false
}, 'write');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to create the manage policies privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 404,
userGroups: []
}));
spyOn(nfRegistryApi, 'postPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManagePoliciesPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.postPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to update the manage policies privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: []
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManagePoliciesPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to remove the manage policies privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 400,
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManagePoliciesPrivileges({
checked: false
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to create the manage tenants privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 404,
userGroups: []
}));
spyOn(nfRegistryApi, 'postPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageTenantsPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.postPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to update the manage tenants privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: []
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageTenantsPrivileges({
checked: true
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should toggle to remove the manage tenants privileges for the current group', fakeAsync(function () {
// Spy
spyOn(nfRegistryApi, 'getPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({
status: 400,
userGroups: [
{
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}
]
}));
spyOn(nfRegistryApi, 'putPolicyActionResource').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.toggleGroupManageTenantsPrivileges({
checked: false
}, 'read');
//assertions
expect(nfRegistryApi.getPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.putPolicyActionResource.calls.count()).toBe(1);
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
}));
it('should open a modal dialog UX enabling the addition of the current user to a group(s)', fakeAsync(function () {
// Spy
spyOn(comp, 'filterUsers').and.callFake(function () {
});
spyOn(comp.dialog, 'open').and.callFake(function () {
return {
afterClosed: function () {
return of({});
}
};
});
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.addUsersToGroup();
//assertions
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
expect(comp.filterUsers).toHaveBeenCalled();
}));
it('should sort `users` by `column`', fakeAsync(function () {
spyOn(comp, 'filterUsers').and.callFake(function () {
});
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the async calls
fixture.detectChanges();
// object to be updated by the test
const column = {name: 'name', label: 'Display Name', sortable: true};
// The function to test
comp.sortUsers(column);
//assertions
expect(column.active).toBe(true);
const filterUsersCall = comp.filterUsers.calls.first();
expect(filterUsersCall.args[0]).toBe('identity');
expect(filterUsersCall.args[1]).toBe('ASC');
}));
it('should remove user from group', fakeAsync(function () {
// Spy
spyOn(comp, 'filterUsers').and.callFake(function () {
});
spyOn(comp.snackBarService, 'openCoaster');
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
spyOn(nfRegistryApi, 'updateUserGroup').and.callFake(function () {
}).and.returnValue(of({}));
spyOn(comp.router, 'navigateByUrl').and.callFake(function () {
});
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
const user = {
identifier: '123'
};
// the function to test
comp.removeUserFromGroup(user);
//assertions
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(2);
expect(nfRegistryApi.updateUserGroup.calls.count()).toBe(1);
expect(comp.snackBarService.openCoaster.calls.count()).toBe(1);
expect(comp.filterUsers).toHaveBeenCalled();
}));
it('should update group name', fakeAsync(function () {
// Spy
spyOn(comp.dialogService, 'openConfirm').and.callFake(function () {
return {
afterClosed: function () {
return of(true);
}
};
});
spyOn(comp.snackBarService, 'openCoaster');
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
spyOn(nfRegistryApi, 'updateUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'test',
status: 200
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.updateGroupName('test');
//assertions
expect(comp.snackBarService.openCoaster.calls.count()).toBe(1);
expect(comp.nfRegistryService.group.identity).toBe('test');
}));
it('should fail to update group name (409)', fakeAsync(function () {
// Spy
spyOn(comp.dialogService, 'openConfirm').and.callFake(function () {
return {
afterClosed: function () {
return of(true);
}
};
});
spyOn(comp.snackBarService, 'openCoaster');
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
spyOn(nfRegistryApi, 'updateUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'test',
status: 409
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
//assertions
const getUserGroupCall = nfRegistryApi.getUserGroup.calls.first();
expect(getUserGroupCall.args[0]).toBe('123');
expect(nfRegistryApi.getUserGroup.calls.count()).toBe(1);
// the function to test
comp.updateGroupName('test');
//assertions
expect(comp.dialogService.openConfirm.calls.count()).toBe(1);
expect(comp.nfRegistryService.group.identity).toBe('Group #1');
}));
it('should destroy the component', fakeAsync(function () {
spyOn(nfRegistryService.sidenav, 'close');
spyOn(nfRegistryApi, 'getUserGroup').and.callFake(function () {
}).and.returnValue(of({
identifier: '123',
identity: 'Group #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
},
users: [{
identifier: '123',
identity: 'User #1',
resourcePermissions: {
anyTopLevelResource: {
canRead: false,
canWrite: false,
canDelete: false
},
buckets: {
canRead: false,
canWrite: false,
canDelete: false
},
tenants: {
canRead: false,
canWrite: false,
canDelete: false
},
policies: {
canRead: false,
canWrite: false,
canDelete: false
},
proxy: {
canRead: false,
canWrite: false,
canDelete: false
}
}
}]
}));
// 1st change detection triggers ngOnInit
fixture.detectChanges();
// wait for async calls
tick();
// 2nd change detection completes after the getUserGroup calls
fixture.detectChanges();
spyOn(comp.$subscription, 'unsubscribe');
// The function to test
comp.ngOnDestroy();
//assertions
expect(nfRegistryService.sidenav.close).toHaveBeenCalled();
expect(nfRegistryService.group.identity).toBe('Group #1');
expect(comp.$subscription.unsubscribe).toHaveBeenCalled();
}));
});