mirror of
https://github.com/amnezia-vpn/amnezia-client.git
synced 2026-05-08 14:33:23 +00:00
* refactor: move business logic from servers model * refactor: move containersModel initialization * refactor: added protocol ui controller and removed settings class from protocols model * refactor: moved cli management to separate controller * refactor: moved app split to separate controller * refactor: moved site split to separate controller * refactor: moved allowed dns to separate controller * refactor: moved language logic to separate ui controller * refactor: removed Settings from devices model * refactor: moved configs and services api logit to separate core controller * refactor: added a layer with a repository between the storage and controllers * refactor: use child parent system instead of smart pointers for controllers and models initialization * refactor: moved install functions from server controller to install controller * refactor: install controller refactoring * chore: renamed exportController to exportUiController * refactor: separate export controller * refactor: removed VpnConfigurationsController * chore: renamed ServerController to SshSession * refactor: replaced ServerController to SshSession * chore: moved qml controllers to separate folder * chore: include fixes * chore: moved utils from core root to core/utils * chore: include fixes * chore: rename core/utils files to camelCase foramt * chore: include fixes * chore: moved some utils to api and selfhosted folders * chore: include fixes * chore: remove unused file * chore: moved serialization folder to core/utils * chore: include fixes * chore: moved some files from client root to core/utils * chore: include fixes * chore: moved ui utils to ui/utils folder * chore: include fixes * chore: move utils from root to ui/utils * chore: include fixes * chore: moved configurators to core/configurators * chore: include fixes * refactor: moved iap logic from ui controller to core * refactor: moved remaining core logic from ApiConfigsController to SubscriptionController * chore: rename apiNewsController to apiNewsUiController * refactor: moved core logic from news ui controller to core * chore: renamed apiConfigsController to subscriptionUiController * chore: include fixes * refactor: merge ApiSettingsController with SubscriptionUiController * chore: moved ui selfhosted controllers to separate folder * chore: include fixes * chore: rename connectionController to connectiomUiController * refactor: moved core logic from connectionUiController * chore: rename settingsController to settingsUiController * refactor: move core logic from settingsUiController * refactor: moved core controller signal/slot connections to separate class * fix: newsController fixes after refactoring * chore: rename model to camelCase * chore: include fixes * chore: remove unused code * chore: move selfhosted core to separate folder * chore: include fixes * chore: rename importController to importUiController * refactor: move core logic from importUiController * chore: minor fixes * chore: remove prem v1 migration * refactor: remove openvpn over cloak and openvpn over shadowsocks * refactor: removed protocolsForContainer function * refactor: add core models * refactor: replace json with c++ structs for server config * refactor: move getDnsPair to ServerConfigUtils * feat: add admin selfhosted config export test * feat: add multi import test * refactor: use coreController for tests * feat: add few simple tests * chore: qrepos in all core controllers * feat: add test for settings * refactor: remove repo dependency from configurators * chore: moved protocols to core folder * chore: include fixes * refactor: moved containersDefs, defs, apiDefs, protocolsDefs to different places * chore: include fixes * chore: build fixes * chore: build fixes * refactor: remove q repo and interface repo * feat: add test for ui servers model and controller * chore: renamed to camelCase * chore: include fixes * refactor: moved core logic from sites ui controller * fix: fixed api config processing * fix: fixed processed server index processing * refactor: protocol models now use c++ structs instead of json configs * refactor: servers model now use c++ struct instead of json config * fix: fixed default server index processing * fix: fix logs init * fix: fix secure settings load keys * chore: build fixes * fix: fixed clear settings * fix: fixed restore backup * fix: sshSession usage * fix: fixed export functions signatures * fix: return missing part from buildContainerWorker * fix: fixed server description on page home * refactor: add container config helpers functions * refactor: c++ structs instead of json * chore: add dns protocol config struct * refactor: move config utils functions to config structs * feat: add test for selfhosted server setup * refactor: separate resources.qrc * fix: fixed server rename * chore: return nameOverriddenByUser * fix: build fixes * fix: fixed models init * refactor: cleanup models usage * fix: fixed models init * chore: cleanup connections and functions signatures * chore: cleanup updateModel calls * feat: added cache to servers repo * chore: cleanup unused functions * chore: ssxray processing * chore: remove transportProtoWithDefault and portWithDefault functions * chore: removed proto types any and l2tp * refactor: moved some constants * fix: fixed native configs export * refactor: remove json from processConfigWith functions * fix: fixed processed server index usage * fix: qml warning fixes * chore: merge fixes * chore: update tests * fix: fixed xray config processing * fix: fixed split tunneling processing * chore: rename sites controllers and model * chore: rename fixes * chore: minor fixes * chore: remove ability to load backup from "file with connection settings" button * fix: fixed api device revoke * fix: remove full model update when renaming a user * fix: fixed premium/free server rename * fix: fixed selfhosted new server install * fix: fixed updateContainer function * fix: fixed revoke for external premium configs * feat: add native configs qr processing * chore: codestyle fixes * fix: fixed admin config create * chore: again remove ability to load backup from "file with connection settings" button * chore: minor fixes * fix: fixed variables initialization * fix: fixed qml imports * fix: minor fixes * fix: fix vpnConnection function calls * feat: add buckup error handling * fix: fixed admin config revok * fix: fixed selfhosted awg installation * fix: ad visability * feat: add empty check for primary dns * chore: minor fixes
374 lines
19 KiB
C++
374 lines
19 KiB
C++
#include <QTest>
|
|
#include <QJsonDocument>
|
|
#include <QJsonObject>
|
|
#include <QUuid>
|
|
#include <QSignalSpy>
|
|
#include <QProcessEnvironment>
|
|
#include <QDebug>
|
|
|
|
#include "core/controllers/coreController.h"
|
|
#include "core/models/serverConfig.h"
|
|
#include "core/models/selfhosted/selfHostedServerConfig.h"
|
|
#include "core/models/containerConfig.h"
|
|
#include "core/models/protocols/awgProtocolConfig.h"
|
|
#include "core/models/protocols/dnsProtocolConfig.h"
|
|
#include "core/utils/commonStructs.h"
|
|
#include "core/utils/containerEnum.h"
|
|
#include "core/utils/containers/containerUtils.h"
|
|
#include "core/utils/protocolEnum.h"
|
|
#include "core/utils/errorCodes.h"
|
|
#include "ui/models/serversModel.h"
|
|
#include "vpnConnection.h"
|
|
#include "secureQSettings.h"
|
|
|
|
using namespace amnezia;
|
|
|
|
class TestSelfHostedServerSetup : public QObject
|
|
{
|
|
Q_OBJECT
|
|
|
|
private:
|
|
CoreController* m_coreController;
|
|
SecureQSettings* m_settings;
|
|
|
|
ServerCredentials getCredentialsFromEnv() {
|
|
QProcessEnvironment env = QProcessEnvironment::systemEnvironment();
|
|
|
|
QString hostName = env.value("TEST_SERVER_HOST");
|
|
QString userName = env.value("TEST_SERVER_USER");
|
|
QString password = env.value("TEST_SERVER_PASSWORD");
|
|
QString portStr = env.value("TEST_SERVER_PORT", "22");
|
|
int port = portStr.toInt();
|
|
|
|
ServerCredentials credentials;
|
|
credentials.hostName = hostName;
|
|
credentials.userName = userName;
|
|
credentials.secretData = password;
|
|
credentials.port = port;
|
|
|
|
return credentials;
|
|
}
|
|
|
|
void verifySshConnection(const ServerCredentials& credentials) {
|
|
QString sshOutput;
|
|
ErrorCode sshError = m_coreController->m_installController->checkSshConnection(credentials, sshOutput);
|
|
QVERIFY2(sshError == ErrorCode::NoError,
|
|
QString("SSH connection should succeed. Error: %1, Output: %2")
|
|
.arg(static_cast<int>(sshError))
|
|
.arg(sshOutput)
|
|
.toUtf8().constData());
|
|
qDebug() << "SSH connection successful. Output:" << sshOutput;
|
|
}
|
|
|
|
void verifyAdminAccess(int serverIndex) {
|
|
ServerConfig server = m_coreController->m_serversRepository->server(serverIndex);
|
|
const SelfHostedServerConfig* selfHosted = server.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHosted != nullptr, "Server config should be SelfHostedServerConfig");
|
|
|
|
QVERIFY2(selfHosted->hasCredentials(),
|
|
"Server should have credentials (admin access)");
|
|
|
|
QVERIFY2(selfHosted->userName.has_value() && !selfHosted->userName.value().isEmpty(),
|
|
"Server should have userName for admin access");
|
|
|
|
QVERIFY2(selfHosted->password.has_value() && !selfHosted->password.value().isEmpty(),
|
|
"Server should have password for admin access");
|
|
|
|
QVERIFY2(!selfHosted->isReadOnly(),
|
|
"Server should not be read-only (should have admin access)");
|
|
|
|
if (m_coreController->m_serversModel) {
|
|
bool hasWriteAccess = m_coreController->m_serversModel->data(
|
|
m_coreController->m_serversModel->index(serverIndex, 0),
|
|
ServersModel::HasWriteAccessRole
|
|
).toBool();
|
|
|
|
QVERIFY2(hasWriteAccess,
|
|
"Server should have write access (admin access) according to ServersModel");
|
|
}
|
|
|
|
qDebug() << "Admin access verified for server at index:" << serverIndex;
|
|
}
|
|
|
|
void verifyClientConfig(const ContainerConfig& containerConfig, DockerContainer container) {
|
|
QString containerName = ContainerUtils::containerToString(container);
|
|
qDebug() << "Checking container:" << containerName;
|
|
|
|
if (ContainerUtils::containerService(container) != ServiceType::Other) {
|
|
bool hasClientConfig = containerConfig.protocolConfig.hasClientConfig();
|
|
|
|
QVERIFY2(hasClientConfig,
|
|
QString("Container %1 should have client config initialized")
|
|
.arg(containerName)
|
|
.toUtf8().constData());
|
|
|
|
if (container == DockerContainer::Awg) {
|
|
const AwgProtocolConfig* awgProtocolConfig = containerConfig.protocolConfig.as<AwgProtocolConfig>();
|
|
QVERIFY2(awgProtocolConfig != nullptr, "Protocol config should be AwgProtocolConfig");
|
|
QVERIFY2(awgProtocolConfig->hasClientConfig(), "AwgProtocolConfig should have client config");
|
|
const std::optional<AwgClientConfig>& clientCfgOpt = awgProtocolConfig->clientConfig;
|
|
QVERIFY2(clientCfgOpt.has_value(), "Awg client config should exist");
|
|
|
|
const AwgClientConfig& awgClientConfig = *clientCfgOpt;
|
|
QVERIFY2(!awgClientConfig.hostName.isEmpty(), "Awg client config should have hostName");
|
|
QVERIFY2(awgClientConfig.port > 0, "Awg client config should have valid port");
|
|
QVERIFY2(!awgClientConfig.clientPrivateKey.isEmpty(), "Awg client config should have clientPrivateKey");
|
|
QVERIFY2(!awgClientConfig.clientPublicKey.isEmpty(), "Awg client config should have clientPublicKey");
|
|
QVERIFY2(!awgClientConfig.serverPublicKey.isEmpty(), "Awg client config should have serverPublicKey");
|
|
QVERIFY2(!awgClientConfig.clientId.isEmpty(), "Awg client config should have clientId");
|
|
QVERIFY2(!awgClientConfig.nativeConfig.isEmpty(), "Awg client config should have nativeConfig");
|
|
}
|
|
|
|
qDebug() << "Container" << containerName << "has valid client config initialized";
|
|
} else {
|
|
qDebug() << "Container" << containerName << "is service type Other, skipping client config check";
|
|
}
|
|
}
|
|
|
|
private slots:
|
|
void initTestCase() {
|
|
QString testOrg = "AmneziaVPN-Test-" + QUuid::createUuid().toString();
|
|
m_settings = new SecureQSettings(testOrg, "amnezia-client", nullptr, false);
|
|
|
|
auto vpnConnection = QSharedPointer<VpnConnection>::create(nullptr, nullptr);
|
|
m_coreController = new CoreController(vpnConnection, m_settings, nullptr, this);
|
|
}
|
|
|
|
void cleanupTestCase() {
|
|
m_settings->clearSettings();
|
|
delete m_coreController;
|
|
delete m_settings;
|
|
}
|
|
|
|
void init() {
|
|
m_settings->clearSettings();
|
|
if (m_coreController->m_serversModel) {
|
|
m_coreController->m_serversModel->updateModel(QVector<ServerConfig>(), -1, false);
|
|
}
|
|
}
|
|
|
|
void testSelfHostedServerSetup() {
|
|
ServerCredentials credentials = getCredentialsFromEnv();
|
|
|
|
if (credentials.hostName.isEmpty() || credentials.userName.isEmpty() || credentials.secretData.isEmpty()) {
|
|
QSKIP("Test requires TEST_SERVER_HOST, TEST_SERVER_USER, TEST_SERVER_PASSWORD environment variables");
|
|
}
|
|
|
|
QVERIFY2(credentials.isValid(), "Server credentials should be valid");
|
|
qDebug() << "Using server:" << credentials.hostName << "user:" << credentials.userName << "port:" << credentials.port;
|
|
|
|
verifySshConnection(credentials);
|
|
|
|
int awgPort = 55424;
|
|
TransportProto awgTransportProto = TransportProto::Udp;
|
|
bool wasAwgInstalled = false;
|
|
|
|
QSignalSpy serverAddedSpy(m_coreController->m_serversRepository, &SecureServersRepository::serverAdded);
|
|
ErrorCode installServerError = m_coreController->m_installController->installServer(
|
|
credentials, DockerContainer::Awg, awgPort, awgTransportProto, wasAwgInstalled);
|
|
|
|
QVERIFY2(installServerError == ErrorCode::NoError,
|
|
QString("installServer for Awg should succeed. Error: %1")
|
|
.arg(static_cast<int>(installServerError))
|
|
.toUtf8().constData());
|
|
QVERIFY2(serverAddedSpy.count() == 1, "serverAdded signal should be emitted");
|
|
QVERIFY2(m_coreController->m_serversRepository->serversCount() > 0, "Server should be added");
|
|
|
|
int serverIndex = m_coreController->m_serversRepository->serversCount() - 1;
|
|
qDebug() << "Server with Awg container added at index:" << serverIndex;
|
|
|
|
ServerConfig serverAfterAwg = m_coreController->m_serversRepository->server(serverIndex);
|
|
QVERIFY2(serverAfterAwg.isSelfHosted(), "Server should be self-hosted");
|
|
const SelfHostedServerConfig* selfHostedAfterAwg = serverAfterAwg.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHostedAfterAwg != nullptr, "Server config should be SelfHostedServerConfig");
|
|
QVERIFY2(selfHostedAfterAwg->defaultContainer == DockerContainer::Awg, "Default container should be Awg");
|
|
QVERIFY2(selfHostedAfterAwg->containers.contains(DockerContainer::Awg), "Server should have Awg container");
|
|
|
|
ContainerConfig awgConfig = selfHostedAfterAwg->containers.value(DockerContainer::Awg);
|
|
QVERIFY2(awgConfig.container == DockerContainer::Awg, "Awg container config should be valid");
|
|
QVERIFY2(selfHostedAfterAwg->containers.size() == 1,
|
|
QString("Server should have exactly 1 container after Awg installation, but has %1")
|
|
.arg(selfHostedAfterAwg->containers.size())
|
|
.toUtf8().constData());
|
|
verifyClientConfig(awgConfig, DockerContainer::Awg);
|
|
|
|
qDebug() << "Awg container installed and configured successfully with valid client config";
|
|
|
|
int dnsPort = 53;
|
|
TransportProto dnsTransportProto = TransportProto::Udp;
|
|
bool wasDnsInstalled = false;
|
|
|
|
ErrorCode installContainerError = m_coreController->m_installController->installContainer(
|
|
serverIndex, DockerContainer::Dns, dnsPort, dnsTransportProto, wasDnsInstalled);
|
|
|
|
QVERIFY2(installContainerError == ErrorCode::NoError,
|
|
QString("installContainer for Dns should succeed. Error: %1")
|
|
.arg(static_cast<int>(installContainerError))
|
|
.toUtf8().constData());
|
|
qDebug() << "Dns container installed:" << wasDnsInstalled;
|
|
|
|
ServerConfig serverAfterDns = m_coreController->m_serversRepository->server(serverIndex);
|
|
const SelfHostedServerConfig* selfHostedAfterDns = serverAfterDns.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHostedAfterDns != nullptr, "Server config should be SelfHostedServerConfig");
|
|
QVERIFY2(selfHostedAfterDns->containers.contains(DockerContainer::Awg), "Server should still have Awg container");
|
|
QVERIFY2(selfHostedAfterDns->containers.contains(DockerContainer::Dns), "Server should have Dns container");
|
|
QVERIFY2(selfHostedAfterDns->containers.size() == 2,
|
|
QString("Server should have exactly 2 containers after Dns installation, but has %1")
|
|
.arg(selfHostedAfterDns->containers.size())
|
|
.toUtf8().constData());
|
|
|
|
ContainerConfig dnsConfig = selfHostedAfterDns->containers.value(DockerContainer::Dns);
|
|
QVERIFY2(dnsConfig.container == DockerContainer::Dns, "Dns container config should be valid");
|
|
|
|
const DnsProtocolConfig* dnsProtocolConfig = dnsConfig.protocolConfig.as<DnsProtocolConfig>();
|
|
QVERIFY2(dnsProtocolConfig != nullptr, "Protocol config should be DnsProtocolConfig");
|
|
|
|
qDebug() << "Dns container installed and configured successfully";
|
|
|
|
verifyAdminAccess(serverIndex);
|
|
|
|
qDebug() << "Test completed successfully. Server setup with Awg and Dns containers is complete.";
|
|
}
|
|
|
|
void testSelfHostedServerEmptyRecover() {
|
|
ServerCredentials credentials = getCredentialsFromEnv();
|
|
|
|
if (credentials.hostName.isEmpty() || credentials.userName.isEmpty() || credentials.secretData.isEmpty()) {
|
|
QSKIP("Test requires TEST_SERVER_HOST, TEST_SERVER_USER, TEST_SERVER_PASSWORD environment variables");
|
|
}
|
|
|
|
QVERIFY2(credentials.isValid(), "Server credentials should be valid");
|
|
qDebug() << "Using server:" << credentials.hostName << "user:" << credentials.userName << "port:" << credentials.port;
|
|
|
|
verifySshConnection(credentials);
|
|
|
|
SelfHostedServerConfig serverConfig;
|
|
serverConfig.hostName = credentials.hostName;
|
|
serverConfig.userName = credentials.userName;
|
|
serverConfig.password = credentials.secretData;
|
|
serverConfig.port = credentials.port;
|
|
serverConfig.description = m_coreController->m_appSettingsRepository->nextAvailableServerName();
|
|
serverConfig.defaultContainer = DockerContainer::None;
|
|
|
|
QSignalSpy serverAddedSpy(m_coreController->m_serversRepository, &SecureServersRepository::serverAdded);
|
|
m_coreController->m_serversController->addServer(ServerConfig(serverConfig));
|
|
|
|
QVERIFY2(serverAddedSpy.count() == 1, "serverAdded signal should be emitted");
|
|
QVERIFY2(m_coreController->m_serversRepository->serversCount() > 0, "Server should be added");
|
|
|
|
int serverIndex = m_coreController->m_serversRepository->serversCount() - 1;
|
|
qDebug() << "Empty server added at index:" << serverIndex;
|
|
|
|
ServerConfig addedServer = m_coreController->m_serversRepository->server(serverIndex);
|
|
QVERIFY2(addedServer.isSelfHosted(), "Added server should be self-hosted");
|
|
const SelfHostedServerConfig* selfHosted = addedServer.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHosted != nullptr, "Server config should be SelfHostedServerConfig");
|
|
QVERIFY2(selfHosted->containers.isEmpty(), "Server should have no containers initially");
|
|
QVERIFY2(selfHosted->defaultContainer == DockerContainer::None, "Default container should be None");
|
|
|
|
ErrorCode scanError = m_coreController->m_installController->scanServerForInstalledContainers(serverIndex);
|
|
QVERIFY2(scanError == ErrorCode::NoError,
|
|
QString("Server scan should succeed. Error: %1")
|
|
.arg(static_cast<int>(scanError))
|
|
.toUtf8().constData());
|
|
qDebug() << "Server scan completed successfully";
|
|
|
|
ServerConfig scannedServer = m_coreController->m_serversRepository->server(serverIndex);
|
|
const SelfHostedServerConfig* scannedSelfHosted = scannedServer.as<SelfHostedServerConfig>();
|
|
QVERIFY2(scannedSelfHosted != nullptr, "Scanned server config should be SelfHostedServerConfig");
|
|
|
|
QMap<DockerContainer, ContainerConfig> containers = scannedSelfHosted->containers;
|
|
int containersCount = containers.size();
|
|
qDebug() << "Found containers count:" << containersCount;
|
|
|
|
QVERIFY2(containersCount >= 0,
|
|
QString("Containers count should be non-negative, but got %1")
|
|
.arg(containersCount)
|
|
.toUtf8().constData());
|
|
|
|
if (containersCount > 0) {
|
|
qDebug() << "Server has" << containersCount << "installed container(s)";
|
|
} else {
|
|
qDebug() << "Server has no installed containers";
|
|
}
|
|
|
|
for (auto it = containers.begin(); it != containers.end(); ++it) {
|
|
verifyClientConfig(it.value(), it.key());
|
|
}
|
|
|
|
QVERIFY2(scannedSelfHosted->containers.size() == containersCount,
|
|
QString("Scanned containers count should match. Expected: %1, Actual: %2")
|
|
.arg(containersCount)
|
|
.arg(scannedSelfHosted->containers.size())
|
|
.toUtf8().constData());
|
|
|
|
verifyAdminAccess(serverIndex);
|
|
|
|
qDebug() << "Test completed successfully. Server has admin access and all containers are initialized.";
|
|
}
|
|
|
|
void testRemoveAllContainers() {
|
|
ServerCredentials credentials = getCredentialsFromEnv();
|
|
|
|
if (credentials.hostName.isEmpty() || credentials.userName.isEmpty() || credentials.secretData.isEmpty()) {
|
|
QSKIP("Test requires TEST_SERVER_HOST, TEST_SERVER_USER, TEST_SERVER_PASSWORD environment variables");
|
|
}
|
|
|
|
QVERIFY2(credentials.isValid(), "Server credentials should be valid");
|
|
qDebug() << "Using server:" << credentials.hostName << "user:" << credentials.userName << "port:" << credentials.port;
|
|
|
|
verifySshConnection(credentials);
|
|
|
|
int awgPort = 55424;
|
|
TransportProto awgTransportProto = TransportProto::Udp;
|
|
bool wasAwgInstalled = false;
|
|
|
|
QSignalSpy serverAddedSpy(m_coreController->m_serversRepository, &SecureServersRepository::serverAdded);
|
|
ErrorCode installServerError = m_coreController->m_installController->installServer(
|
|
credentials, DockerContainer::Awg, awgPort, awgTransportProto, wasAwgInstalled);
|
|
|
|
QVERIFY2(installServerError == ErrorCode::NoError,
|
|
QString("installServer for Awg should succeed. Error: %1")
|
|
.arg(static_cast<int>(installServerError))
|
|
.toUtf8().constData());
|
|
QVERIFY2(serverAddedSpy.count() == 1, "serverAdded signal should be emitted");
|
|
|
|
int serverIndex = m_coreController->m_serversRepository->serversCount() - 1;
|
|
qDebug() << "Server with Awg container added at index:" << serverIndex;
|
|
|
|
ServerConfig serverBeforeRemoval = m_coreController->m_serversRepository->server(serverIndex);
|
|
const SelfHostedServerConfig* selfHostedBeforeRemoval = serverBeforeRemoval.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHostedBeforeRemoval != nullptr, "Server config should be SelfHostedServerConfig");
|
|
QVERIFY2(!selfHostedBeforeRemoval->containers.isEmpty(), "Server should have containers before removal");
|
|
QVERIFY2(selfHostedBeforeRemoval->defaultContainer != DockerContainer::None, "Server should have default container before removal");
|
|
|
|
qDebug() << "Containers before removal:" << selfHostedBeforeRemoval->containers.size();
|
|
|
|
ErrorCode removeError = m_coreController->m_installController->removeAllContainers(serverIndex);
|
|
QVERIFY2(removeError == ErrorCode::NoError,
|
|
QString("removeAllContainers should succeed. Error: %1")
|
|
.arg(static_cast<int>(removeError))
|
|
.toUtf8().constData());
|
|
qDebug() << "All containers removed successfully";
|
|
|
|
ServerConfig serverAfterRemoval = m_coreController->m_serversRepository->server(serverIndex);
|
|
const SelfHostedServerConfig* selfHostedAfterRemoval = serverAfterRemoval.as<SelfHostedServerConfig>();
|
|
QVERIFY2(selfHostedAfterRemoval != nullptr, "Server config should be SelfHostedServerConfig");
|
|
|
|
QVERIFY2(selfHostedAfterRemoval->containers.isEmpty(),
|
|
"Server should have no containers after removal");
|
|
QVERIFY2(selfHostedAfterRemoval->defaultContainer == DockerContainer::None,
|
|
"Default container should be None after removal");
|
|
|
|
qDebug() << "Containers after removal:" << selfHostedAfterRemoval->containers.size();
|
|
|
|
verifyAdminAccess(serverIndex);
|
|
|
|
qDebug() << "Test completed successfully. All containers removed and server is empty.";
|
|
}
|
|
};
|
|
|
|
QTEST_MAIN(TestSelfHostedServerSetup)
|
|
#include "testSelfHostedServerSetup.moc"
|
|
|