2017-04-25 15:24:51 +08:00
|
|
|
// Copyright 2017 The Gitea Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a MIT-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package integrations
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2019-12-15 17:51:28 +08:00
|
|
|
"context"
|
2017-04-30 14:30:12 +08:00
|
|
|
"database/sql"
|
2017-04-25 15:24:51 +08:00
|
|
|
"fmt"
|
2021-04-07 00:44:02 +08:00
|
|
|
"hash"
|
|
|
|
"hash/fnv"
|
2017-04-25 15:24:51 +08:00
|
|
|
"io"
|
|
|
|
"net/http"
|
2017-05-02 08:49:55 +08:00
|
|
|
"net/http/cookiejar"
|
2017-12-04 06:46:01 +08:00
|
|
|
"net/http/httptest"
|
2017-05-02 08:49:55 +08:00
|
|
|
"net/url"
|
2017-04-25 15:24:51 +08:00
|
|
|
"os"
|
2017-06-10 02:13:46 +08:00
|
|
|
"path"
|
2017-11-03 01:51:03 +08:00
|
|
|
"path/filepath"
|
2019-11-11 23:15:29 +08:00
|
|
|
"runtime"
|
2017-05-02 08:49:55 +08:00
|
|
|
"strings"
|
2017-04-25 15:24:51 +08:00
|
|
|
"testing"
|
2020-06-02 09:39:44 +08:00
|
|
|
"time"
|
2017-04-25 15:24:51 +08:00
|
|
|
|
|
|
|
"code.gitea.io/gitea/models"
|
2021-11-12 22:36:47 +08:00
|
|
|
"code.gitea.io/gitea/models/unittest"
|
2019-04-18 00:06:35 +08:00
|
|
|
"code.gitea.io/gitea/modules/base"
|
2021-06-26 19:28:55 +08:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
2019-12-15 17:51:28 +08:00
|
|
|
"code.gitea.io/gitea/modules/graceful"
|
2021-07-25 00:03:58 +08:00
|
|
|
"code.gitea.io/gitea/modules/json"
|
2020-11-01 04:51:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2020-05-30 02:16:20 +08:00
|
|
|
"code.gitea.io/gitea/modules/queue"
|
2017-04-25 15:24:51 +08:00
|
|
|
"code.gitea.io/gitea/modules/setting"
|
2020-11-01 04:51:48 +08:00
|
|
|
"code.gitea.io/gitea/modules/storage"
|
2020-08-12 04:05:34 +08:00
|
|
|
"code.gitea.io/gitea/modules/util"
|
2021-01-26 23:36:53 +08:00
|
|
|
"code.gitea.io/gitea/modules/web"
|
2017-04-25 15:24:51 +08:00
|
|
|
"code.gitea.io/gitea/routers"
|
|
|
|
|
2017-12-11 10:15:27 +08:00
|
|
|
"github.com/PuerkitoBio/goquery"
|
2017-04-28 21:23:28 +08:00
|
|
|
"github.com/stretchr/testify/assert"
|
2017-04-25 15:24:51 +08:00
|
|
|
)
|
|
|
|
|
2021-01-26 23:36:53 +08:00
|
|
|
var c *web.Route
|
2017-04-25 15:24:51 +08:00
|
|
|
|
2019-02-12 23:09:43 +08:00
|
|
|
type NilResponseRecorder struct {
|
|
|
|
httptest.ResponseRecorder
|
|
|
|
Length int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (n *NilResponseRecorder) Write(b []byte) (int, error) {
|
2019-06-13 03:41:28 +08:00
|
|
|
n.Length += len(b)
|
2019-02-12 23:09:43 +08:00
|
|
|
return len(b), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRecorder returns an initialized ResponseRecorder.
|
|
|
|
func NewNilResponseRecorder() *NilResponseRecorder {
|
|
|
|
return &NilResponseRecorder{
|
|
|
|
ResponseRecorder: *httptest.NewRecorder(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-04-07 00:44:02 +08:00
|
|
|
type NilResponseHashSumRecorder struct {
|
|
|
|
httptest.ResponseRecorder
|
|
|
|
Hash hash.Hash
|
|
|
|
Length int
|
|
|
|
}
|
|
|
|
|
|
|
|
func (n *NilResponseHashSumRecorder) Write(b []byte) (int, error) {
|
|
|
|
_, _ = n.Hash.Write(b)
|
|
|
|
n.Length += len(b)
|
|
|
|
return len(b), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewRecorder returns an initialized ResponseRecorder.
|
|
|
|
func NewNilResponseHashSumRecorder() *NilResponseHashSumRecorder {
|
|
|
|
return &NilResponseHashSumRecorder{
|
|
|
|
Hash: fnv.New32(),
|
|
|
|
ResponseRecorder: *httptest.NewRecorder(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-25 15:24:51 +08:00
|
|
|
func TestMain(m *testing.M) {
|
2020-11-01 04:51:48 +08:00
|
|
|
defer log.Close()
|
|
|
|
|
2019-12-15 17:51:28 +08:00
|
|
|
managerCtx, cancel := context.WithCancel(context.Background())
|
|
|
|
graceful.InitManager(managerCtx)
|
|
|
|
defer cancel()
|
|
|
|
|
2017-04-30 14:30:12 +08:00
|
|
|
initIntegrationTest()
|
2021-06-09 07:33:54 +08:00
|
|
|
c = routers.NormalRoutes()
|
2017-04-25 15:24:51 +08:00
|
|
|
|
2020-06-02 09:39:44 +08:00
|
|
|
// integration test settings...
|
|
|
|
if setting.Cfg != nil {
|
|
|
|
testingCfg := setting.Cfg.Section("integration-tests")
|
|
|
|
slowTest = testingCfg.Key("SLOW_TEST").MustDuration(slowTest)
|
|
|
|
slowFlush = testingCfg.Key("SLOW_FLUSH").MustDuration(slowFlush)
|
|
|
|
}
|
|
|
|
|
|
|
|
if os.Getenv("GITEA_SLOW_TEST_TIME") != "" {
|
|
|
|
duration, err := time.ParseDuration(os.Getenv("GITEA_SLOW_TEST_TIME"))
|
|
|
|
if err == nil {
|
|
|
|
slowTest = duration
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if os.Getenv("GITEA_SLOW_FLUSH_TIME") != "" {
|
|
|
|
duration, err := time.ParseDuration(os.Getenv("GITEA_SLOW_FLUSH_TIME"))
|
|
|
|
if err == nil {
|
|
|
|
slowFlush = duration
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-11-12 22:36:47 +08:00
|
|
|
err := unittest.InitFixtures(
|
|
|
|
unittest.FixturesOptions{
|
2021-09-24 19:32:56 +08:00
|
|
|
Dir: filepath.Join(filepath.Dir(setting.AppPath), "models/fixtures/"),
|
|
|
|
},
|
2017-04-25 15:24:51 +08:00
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
fmt.Printf("Error initializing test database: %v\n", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2017-09-17 04:16:21 +08:00
|
|
|
exitCode := m.Run()
|
|
|
|
|
2021-09-01 21:05:04 +08:00
|
|
|
writerCloser.Reset()
|
2019-04-11 19:49:49 +08:00
|
|
|
|
2020-08-12 04:05:34 +08:00
|
|
|
if err = util.RemoveAll(setting.Indexer.IssuePath); err != nil {
|
|
|
|
fmt.Printf("util.RemoveAll: %v\n", err)
|
2017-09-17 04:16:21 +08:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2020-08-12 04:05:34 +08:00
|
|
|
if err = util.RemoveAll(setting.Indexer.RepoPath); err != nil {
|
2017-10-27 14:10:54 +08:00
|
|
|
fmt.Printf("Unable to remove repo indexer: %v\n", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2017-09-17 04:16:21 +08:00
|
|
|
|
|
|
|
os.Exit(exitCode)
|
2017-04-25 15:24:51 +08:00
|
|
|
}
|
|
|
|
|
2017-04-30 14:30:12 +08:00
|
|
|
func initIntegrationTest() {
|
2019-04-18 00:06:35 +08:00
|
|
|
giteaRoot := base.SetupGiteaRoot()
|
2017-06-10 10:27:13 +08:00
|
|
|
if giteaRoot == "" {
|
|
|
|
fmt.Println("Environment variable $GITEA_ROOT not set")
|
2017-04-30 14:30:12 +08:00
|
|
|
os.Exit(1)
|
|
|
|
}
|
2019-11-11 23:15:29 +08:00
|
|
|
giteaBinary := "gitea"
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
giteaBinary += ".exe"
|
|
|
|
}
|
|
|
|
setting.AppPath = path.Join(giteaRoot, giteaBinary)
|
2017-09-18 16:35:42 +08:00
|
|
|
if _, err := os.Stat(setting.AppPath); err != nil {
|
|
|
|
fmt.Printf("Could not find gitea binary at %s\n", setting.AppPath)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2017-06-10 10:27:13 +08:00
|
|
|
|
|
|
|
giteaConf := os.Getenv("GITEA_CONF")
|
|
|
|
if giteaConf == "" {
|
|
|
|
fmt.Println("Environment variable $GITEA_CONF not set")
|
2017-05-02 08:49:55 +08:00
|
|
|
os.Exit(1)
|
2017-06-10 10:27:13 +08:00
|
|
|
} else if !path.IsAbs(giteaConf) {
|
|
|
|
setting.CustomConf = path.Join(giteaRoot, giteaConf)
|
2017-06-10 02:13:46 +08:00
|
|
|
} else {
|
2017-06-10 10:27:13 +08:00
|
|
|
setting.CustomConf = giteaConf
|
2017-05-02 08:49:55 +08:00
|
|
|
}
|
2017-04-30 14:30:12 +08:00
|
|
|
|
2019-05-14 23:20:35 +08:00
|
|
|
setting.SetCustomPathAndConf("", "", "")
|
2021-12-01 15:50:01 +08:00
|
|
|
setting.LoadForTest()
|
|
|
|
_ = util.RemoveAll(models.LocalCopyPath())
|
2021-06-26 19:28:55 +08:00
|
|
|
git.CheckLFSVersion()
|
2019-08-24 17:24:45 +08:00
|
|
|
setting.InitDBConfig()
|
2020-11-01 04:51:48 +08:00
|
|
|
if err := storage.Init(); err != nil {
|
|
|
|
fmt.Printf("Init storage failed: %v", err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2017-04-30 14:30:12 +08:00
|
|
|
|
|
|
|
switch {
|
2019-08-24 17:24:45 +08:00
|
|
|
case setting.Database.UseMySQL:
|
2017-04-30 14:30:12 +08:00
|
|
|
db, err := sql.Open("mysql", fmt.Sprintf("%s:%s@tcp(%s)/",
|
2019-08-24 17:24:45 +08:00
|
|
|
setting.Database.User, setting.Database.Passwd, setting.Database.Host))
|
2017-04-30 14:30:12 +08:00
|
|
|
defer db.Close()
|
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("sql.Open: %v", err)
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2019-09-25 20:13:18 +08:00
|
|
|
if _, err = db.Exec(fmt.Sprintf("CREATE DATABASE IF NOT EXISTS %s", setting.Database.Name)); err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Exec: %v", err)
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2019-08-24 17:24:45 +08:00
|
|
|
case setting.Database.UsePostgreSQL:
|
2017-04-30 14:30:12 +08:00
|
|
|
db, err := sql.Open("postgres", fmt.Sprintf("postgres://%s:%s@%s/?sslmode=%s",
|
2019-08-24 17:24:45 +08:00
|
|
|
setting.Database.User, setting.Database.Passwd, setting.Database.Host, setting.Database.SSLMode))
|
2017-04-30 14:30:12 +08:00
|
|
|
defer db.Close()
|
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("sql.Open: %v", err)
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2020-01-20 23:45:14 +08:00
|
|
|
dbrows, err := db.Query(fmt.Sprintf("SELECT 1 FROM pg_database WHERE datname = '%s'", setting.Database.Name))
|
2017-04-30 14:30:12 +08:00
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Query: %v", err)
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2020-01-20 23:45:14 +08:00
|
|
|
defer dbrows.Close()
|
2017-05-08 10:55:27 +08:00
|
|
|
|
2020-01-20 23:45:14 +08:00
|
|
|
if !dbrows.Next() {
|
|
|
|
if _, err = db.Exec(fmt.Sprintf("CREATE DATABASE %s", setting.Database.Name)); err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Exec: CREATE DATABASE: %v", err)
|
2020-01-20 23:45:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// Check if we need to setup a specific schema
|
|
|
|
if len(setting.Database.Schema) == 0 {
|
2017-05-11 23:32:43 +08:00
|
|
|
break
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2020-01-20 23:45:14 +08:00
|
|
|
db.Close()
|
|
|
|
|
|
|
|
db, err = sql.Open("postgres", fmt.Sprintf("postgres://%s:%s@%s/%s?sslmode=%s",
|
|
|
|
setting.Database.User, setting.Database.Passwd, setting.Database.Host, setting.Database.Name, setting.Database.SSLMode))
|
|
|
|
// This is a different db object; requires a different Close()
|
|
|
|
defer db.Close()
|
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("sql.Open: %v", err)
|
2020-01-20 23:45:14 +08:00
|
|
|
}
|
|
|
|
schrows, err := db.Query(fmt.Sprintf("SELECT 1 FROM information_schema.schemata WHERE schema_name = '%s'", setting.Database.Schema))
|
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Query: %v", err)
|
2020-01-20 23:45:14 +08:00
|
|
|
}
|
|
|
|
defer schrows.Close()
|
|
|
|
|
|
|
|
if !schrows.Next() {
|
|
|
|
// Create and setup a DB schema
|
|
|
|
if _, err = db.Exec(fmt.Sprintf("CREATE SCHEMA %s", setting.Database.Schema)); err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Exec: CREATE SCHEMA: %v", err)
|
2020-01-20 23:45:14 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-08-24 17:24:45 +08:00
|
|
|
case setting.Database.UseMSSQL:
|
|
|
|
host, port := setting.ParseMSSQLHostPort(setting.Database.Host)
|
2018-12-12 09:01:41 +08:00
|
|
|
db, err := sql.Open("mssql", fmt.Sprintf("server=%s; port=%s; database=%s; user id=%s; password=%s;",
|
2019-08-24 17:24:45 +08:00
|
|
|
host, port, "master", setting.Database.User, setting.Database.Passwd))
|
2018-12-12 09:01:41 +08:00
|
|
|
if err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("sql.Open: %v", err)
|
2018-12-12 09:01:41 +08:00
|
|
|
}
|
2019-09-25 20:13:18 +08:00
|
|
|
if _, err := db.Exec(fmt.Sprintf("If(db_id(N'%s') IS NULL) BEGIN CREATE DATABASE %s; END;", setting.Database.Name, setting.Database.Name)); err != nil {
|
2020-11-01 04:51:48 +08:00
|
|
|
log.Fatal("db.Exec: %v", err)
|
2018-12-12 09:01:41 +08:00
|
|
|
}
|
|
|
|
defer db.Close()
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
2021-12-01 15:50:01 +08:00
|
|
|
|
|
|
|
routers.GlobalInitInstalled(graceful.GetManager().HammerContext())
|
2017-04-30 14:30:12 +08:00
|
|
|
}
|
|
|
|
|
2019-11-26 07:21:37 +08:00
|
|
|
func prepareTestEnv(t testing.TB, skip ...int) func() {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2019-04-07 08:25:14 +08:00
|
|
|
ourSkip := 2
|
|
|
|
if len(skip) > 0 {
|
|
|
|
ourSkip += skip[0]
|
|
|
|
}
|
2019-11-26 07:21:37 +08:00
|
|
|
deferFn := PrintCurrentTest(t, ourSkip)
|
2021-11-12 22:36:47 +08:00
|
|
|
assert.NoError(t, unittest.LoadFixtures())
|
2020-08-12 04:05:34 +08:00
|
|
|
assert.NoError(t, util.RemoveAll(setting.RepoRootPath))
|
2017-11-03 01:51:03 +08:00
|
|
|
|
2020-12-25 17:59:32 +08:00
|
|
|
assert.NoError(t, util.CopyDir(path.Join(filepath.Dir(setting.AppPath), "integrations/gitea-repositories-meta"), setting.RepoRootPath))
|
2021-12-17 03:01:14 +08:00
|
|
|
ownerDirs, err := os.ReadDir(setting.RepoRootPath)
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err, "unable to read the new repo root: %v\n", err)
|
|
|
|
}
|
|
|
|
for _, ownerDir := range ownerDirs {
|
|
|
|
if !ownerDir.Type().IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
repoDirs, err := os.ReadDir(filepath.Join(setting.RepoRootPath, ownerDir.Name()))
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err, "unable to read the new repo root: %v\n", err)
|
|
|
|
}
|
|
|
|
for _, repoDir := range repoDirs {
|
2022-01-21 01:46:10 +08:00
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "objects", "pack"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "objects", "info"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "refs", "heads"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "refs", "tag"), 0o755)
|
2021-12-17 03:01:14 +08:00
|
|
|
}
|
|
|
|
}
|
2021-12-01 15:50:01 +08:00
|
|
|
|
2019-11-26 07:21:37 +08:00
|
|
|
return deferFn
|
2017-04-28 21:23:28 +08:00
|
|
|
}
|
|
|
|
|
2017-05-02 08:49:55 +08:00
|
|
|
type TestSession struct {
|
|
|
|
jar http.CookieJar
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *TestSession) GetCookie(name string) *http.Cookie {
|
|
|
|
baseURL, err := url.Parse(setting.AppURL)
|
|
|
|
if err != nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, c := range s.jar.Cookies(baseURL) {
|
|
|
|
if c.Name == name {
|
|
|
|
return c
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-12-04 06:46:01 +08:00
|
|
|
func (s *TestSession) MakeRequest(t testing.TB, req *http.Request, expectedStatus int) *httptest.ResponseRecorder {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-05-02 08:49:55 +08:00
|
|
|
baseURL, err := url.Parse(setting.AppURL)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
for _, c := range s.jar.Cookies(baseURL) {
|
|
|
|
req.AddCookie(c)
|
|
|
|
}
|
2017-07-08 03:36:47 +08:00
|
|
|
resp := MakeRequest(t, req, expectedStatus)
|
2017-05-02 08:49:55 +08:00
|
|
|
|
|
|
|
ch := http.Header{}
|
2019-06-13 03:41:28 +08:00
|
|
|
ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
|
2017-05-02 08:49:55 +08:00
|
|
|
cr := http.Request{Header: ch}
|
|
|
|
s.jar.SetCookies(baseURL, cr.Cookies())
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2019-02-12 23:09:43 +08:00
|
|
|
func (s *TestSession) MakeRequestNilResponseRecorder(t testing.TB, req *http.Request, expectedStatus int) *NilResponseRecorder {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2019-02-12 23:09:43 +08:00
|
|
|
baseURL, err := url.Parse(setting.AppURL)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
for _, c := range s.jar.Cookies(baseURL) {
|
|
|
|
req.AddCookie(c)
|
|
|
|
}
|
|
|
|
resp := MakeRequestNilResponseRecorder(t, req, expectedStatus)
|
|
|
|
|
|
|
|
ch := http.Header{}
|
2019-06-13 03:41:28 +08:00
|
|
|
ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
|
2019-02-12 23:09:43 +08:00
|
|
|
cr := http.Request{Header: ch}
|
|
|
|
s.jar.SetCookies(baseURL, cr.Cookies())
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2021-04-07 00:44:02 +08:00
|
|
|
func (s *TestSession) MakeRequestNilResponseHashSumRecorder(t testing.TB, req *http.Request, expectedStatus int) *NilResponseHashSumRecorder {
|
|
|
|
t.Helper()
|
|
|
|
baseURL, err := url.Parse(setting.AppURL)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
for _, c := range s.jar.Cookies(baseURL) {
|
|
|
|
req.AddCookie(c)
|
|
|
|
}
|
|
|
|
resp := MakeRequestNilResponseHashSumRecorder(t, req, expectedStatus)
|
|
|
|
|
|
|
|
ch := http.Header{}
|
|
|
|
ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
|
|
|
|
cr := http.Request{Header: ch}
|
|
|
|
s.jar.SetCookies(baseURL, cr.Cookies())
|
|
|
|
|
|
|
|
return resp
|
|
|
|
}
|
|
|
|
|
2017-06-17 12:49:45 +08:00
|
|
|
const userPassword = "password"
|
|
|
|
|
2017-07-09 10:07:29 +08:00
|
|
|
var loginSessionCache = make(map[string]*TestSession, 10)
|
|
|
|
|
2017-08-23 15:30:33 +08:00
|
|
|
func emptyTestSession(t testing.TB) *TestSession {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-08-23 15:30:33 +08:00
|
|
|
jar, err := cookiejar.New(nil)
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
return &TestSession{jar: jar}
|
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func loginUser(t testing.TB, userName string) *TestSession {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-07-09 10:07:29 +08:00
|
|
|
if session, ok := loginSessionCache[userName]; ok {
|
|
|
|
return session
|
|
|
|
}
|
|
|
|
session := loginUserWithPassword(t, userName, userPassword)
|
|
|
|
loginSessionCache[userName] = session
|
|
|
|
return session
|
2017-06-17 12:49:45 +08:00
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func loginUserWithPassword(t testing.TB, userName, password string) *TestSession {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-06-10 08:41:36 +08:00
|
|
|
req := NewRequest(t, "GET", "/user/login")
|
2017-07-08 03:36:47 +08:00
|
|
|
resp := MakeRequest(t, req, http.StatusOK)
|
2017-05-02 08:49:55 +08:00
|
|
|
|
2017-06-18 00:29:59 +08:00
|
|
|
doc := NewHTMLParser(t, resp.Body)
|
2017-06-17 12:49:45 +08:00
|
|
|
req = NewRequestWithValues(t, "POST", "/user/login", map[string]string{
|
|
|
|
"_csrf": doc.GetCSRF(),
|
|
|
|
"user_name": userName,
|
|
|
|
"password": password,
|
|
|
|
})
|
2017-07-08 03:36:47 +08:00
|
|
|
resp = MakeRequest(t, req, http.StatusFound)
|
2017-05-02 08:49:55 +08:00
|
|
|
|
|
|
|
ch := http.Header{}
|
2019-06-13 03:41:28 +08:00
|
|
|
ch.Add("Cookie", strings.Join(resp.Header()["Set-Cookie"], ";"))
|
2017-05-02 08:49:55 +08:00
|
|
|
cr := http.Request{Header: ch}
|
|
|
|
|
2017-08-23 15:30:33 +08:00
|
|
|
session := emptyTestSession(t)
|
|
|
|
|
2017-05-02 08:49:55 +08:00
|
|
|
baseURL, err := url.Parse(setting.AppURL)
|
|
|
|
assert.NoError(t, err)
|
2017-08-23 15:30:33 +08:00
|
|
|
session.jar.SetCookies(baseURL, cr.Cookies())
|
2017-05-02 08:49:55 +08:00
|
|
|
|
2017-08-23 15:30:33 +08:00
|
|
|
return session
|
2017-05-02 08:49:55 +08:00
|
|
|
}
|
|
|
|
|
2022-01-21 01:46:10 +08:00
|
|
|
// token has to be unique this counter take care of
|
2020-04-14 03:02:48 +08:00
|
|
|
var tokenCounter int64
|
|
|
|
|
2018-09-11 00:15:52 +08:00
|
|
|
func getTokenForLoggedInUser(t testing.TB, session *TestSession) string {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2020-04-14 03:02:48 +08:00
|
|
|
tokenCounter++
|
2018-09-11 00:15:52 +08:00
|
|
|
req := NewRequest(t, "GET", "/user/settings/applications")
|
|
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
doc := NewHTMLParser(t, resp.Body)
|
|
|
|
req = NewRequestWithValues(t, "POST", "/user/settings/applications", map[string]string{
|
|
|
|
"_csrf": doc.GetCSRF(),
|
2020-04-14 03:02:48 +08:00
|
|
|
"name": fmt.Sprintf("api-testing-token-%d", tokenCounter),
|
2018-09-11 00:15:52 +08:00
|
|
|
})
|
|
|
|
resp = session.MakeRequest(t, req, http.StatusFound)
|
|
|
|
req = NewRequest(t, "GET", "/user/settings/applications")
|
|
|
|
resp = session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
htmlDoc := NewHTMLParser(t, resp.Body)
|
|
|
|
token := htmlDoc.doc.Find(".ui.info p").Text()
|
|
|
|
return token
|
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func NewRequest(t testing.TB, method, urlStr string) *http.Request {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-06-17 12:49:45 +08:00
|
|
|
return NewRequestWithBody(t, method, urlStr, nil)
|
|
|
|
}
|
|
|
|
|
2017-06-25 08:15:42 +08:00
|
|
|
func NewRequestf(t testing.TB, method, urlFormat string, args ...interface{}) *http.Request {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-06-25 08:15:42 +08:00
|
|
|
return NewRequest(t, method, fmt.Sprintf(urlFormat, args...))
|
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func NewRequestWithValues(t testing.TB, method, urlStr string, values map[string]string) *http.Request {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-06-17 12:49:45 +08:00
|
|
|
urlValues := url.Values{}
|
|
|
|
for key, value := range values {
|
|
|
|
urlValues[key] = []string{value}
|
|
|
|
}
|
2017-06-25 08:15:42 +08:00
|
|
|
req := NewRequestWithBody(t, method, urlStr, bytes.NewBufferString(urlValues.Encode()))
|
|
|
|
req.Header.Add("Content-Type", "application/x-www-form-urlencoded")
|
|
|
|
return req
|
2017-06-17 12:49:45 +08:00
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func NewRequestWithJSON(t testing.TB, method, urlStr string, v interface{}) *http.Request {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2021-03-02 05:08:10 +08:00
|
|
|
|
2017-06-17 12:49:45 +08:00
|
|
|
jsonBytes, err := json.Marshal(v)
|
|
|
|
assert.NoError(t, err)
|
2017-06-25 07:52:51 +08:00
|
|
|
req := NewRequestWithBody(t, method, urlStr, bytes.NewBuffer(jsonBytes))
|
|
|
|
req.Header.Add("Content-Type", "application/json")
|
|
|
|
return req
|
2017-06-10 08:41:36 +08:00
|
|
|
}
|
|
|
|
|
2017-06-17 23:01:03 +08:00
|
|
|
func NewRequestWithBody(t testing.TB, method, urlStr string, body io.Reader) *http.Request {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2021-01-26 23:36:53 +08:00
|
|
|
if !strings.HasPrefix(urlStr, "http") && !strings.HasPrefix(urlStr, "/") {
|
|
|
|
urlStr = "/" + urlStr
|
|
|
|
}
|
2017-06-17 12:49:45 +08:00
|
|
|
request, err := http.NewRequest(method, urlStr, body)
|
2017-06-10 08:41:36 +08:00
|
|
|
assert.NoError(t, err)
|
2017-06-17 12:49:45 +08:00
|
|
|
request.RequestURI = urlStr
|
2017-06-10 08:41:36 +08:00
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
2018-07-07 09:54:30 +08:00
|
|
|
func AddBasicAuthHeader(request *http.Request, username string) *http.Request {
|
|
|
|
request.SetBasicAuth(username, userPassword)
|
|
|
|
return request
|
|
|
|
}
|
|
|
|
|
2017-07-08 03:36:47 +08:00
|
|
|
const NoExpectedStatus = -1
|
|
|
|
|
2017-12-04 06:46:01 +08:00
|
|
|
func MakeRequest(t testing.TB, req *http.Request, expectedStatus int) *httptest.ResponseRecorder {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-12-04 06:46:01 +08:00
|
|
|
recorder := httptest.NewRecorder()
|
2020-11-13 20:51:07 +08:00
|
|
|
c.ServeHTTP(recorder, req)
|
2017-07-08 03:36:47 +08:00
|
|
|
if expectedStatus != NoExpectedStatus {
|
2017-12-11 10:15:27 +08:00
|
|
|
if !assert.EqualValues(t, expectedStatus, recorder.Code,
|
|
|
|
"Request: %s %s", req.Method, req.URL.String()) {
|
|
|
|
logUnexpectedResponse(t, recorder)
|
|
|
|
}
|
2017-07-08 03:36:47 +08:00
|
|
|
}
|
2017-12-04 06:46:01 +08:00
|
|
|
return recorder
|
2017-04-25 15:24:51 +08:00
|
|
|
}
|
2017-06-18 17:06:17 +08:00
|
|
|
|
2019-02-12 23:09:43 +08:00
|
|
|
func MakeRequestNilResponseRecorder(t testing.TB, req *http.Request, expectedStatus int) *NilResponseRecorder {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2019-02-12 23:09:43 +08:00
|
|
|
recorder := NewNilResponseRecorder()
|
2020-11-13 20:51:07 +08:00
|
|
|
c.ServeHTTP(recorder, req)
|
2019-02-12 23:09:43 +08:00
|
|
|
if expectedStatus != NoExpectedStatus {
|
2021-04-07 00:44:02 +08:00
|
|
|
if !assert.EqualValues(t, expectedStatus, recorder.Code,
|
|
|
|
"Request: %s %s", req.Method, req.URL.String()) {
|
|
|
|
logUnexpectedResponse(t, &recorder.ResponseRecorder)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return recorder
|
|
|
|
}
|
|
|
|
|
|
|
|
func MakeRequestNilResponseHashSumRecorder(t testing.TB, req *http.Request, expectedStatus int) *NilResponseHashSumRecorder {
|
|
|
|
t.Helper()
|
|
|
|
recorder := NewNilResponseHashSumRecorder()
|
|
|
|
c.ServeHTTP(recorder, req)
|
|
|
|
if expectedStatus != NoExpectedStatus {
|
2019-02-12 23:09:43 +08:00
|
|
|
if !assert.EqualValues(t, expectedStatus, recorder.Code,
|
|
|
|
"Request: %s %s", req.Method, req.URL.String()) {
|
|
|
|
logUnexpectedResponse(t, &recorder.ResponseRecorder)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return recorder
|
|
|
|
}
|
|
|
|
|
2017-12-11 10:15:27 +08:00
|
|
|
// logUnexpectedResponse logs the contents of an unexpected response.
|
|
|
|
func logUnexpectedResponse(t testing.TB, recorder *httptest.ResponseRecorder) {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-12-11 10:15:27 +08:00
|
|
|
respBytes := recorder.Body.Bytes()
|
|
|
|
if len(respBytes) == 0 {
|
|
|
|
return
|
|
|
|
} else if len(respBytes) < 500 {
|
|
|
|
// if body is short, just log the whole thing
|
|
|
|
t.Log("Response:", string(respBytes))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// log the "flash" error message, if one exists
|
|
|
|
// we must create a new buffer, so that we don't "use up" resp.Body
|
|
|
|
htmlDoc, err := goquery.NewDocumentFromReader(bytes.NewBuffer(respBytes))
|
|
|
|
if err != nil {
|
|
|
|
return // probably a non-HTML response
|
|
|
|
}
|
|
|
|
errMsg := htmlDoc.Find(".ui.negative.message").Text()
|
|
|
|
if len(errMsg) > 0 {
|
|
|
|
t.Log("A flash error message was found:", errMsg)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-12-04 06:46:01 +08:00
|
|
|
func DecodeJSON(t testing.TB, resp *httptest.ResponseRecorder, v interface{}) {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2021-03-02 05:08:10 +08:00
|
|
|
|
2017-12-04 06:46:01 +08:00
|
|
|
decoder := json.NewDecoder(resp.Body)
|
2017-06-18 17:06:17 +08:00
|
|
|
assert.NoError(t, decoder.Decode(v))
|
|
|
|
}
|
2017-07-08 03:36:47 +08:00
|
|
|
|
|
|
|
func GetCSRF(t testing.TB, session *TestSession, urlStr string) string {
|
2019-07-29 12:15:18 +08:00
|
|
|
t.Helper()
|
2017-07-08 03:36:47 +08:00
|
|
|
req := NewRequest(t, "GET", urlStr)
|
|
|
|
resp := session.MakeRequest(t, req, http.StatusOK)
|
|
|
|
doc := NewHTMLParser(t, resp.Body)
|
|
|
|
return doc.GetCSRF()
|
|
|
|
}
|
2020-05-30 02:16:20 +08:00
|
|
|
|
|
|
|
// resetFixtures flushes queues, reloads fixtures and resets test repositories within a single test.
|
|
|
|
// Most tests should call defer prepareTestEnv(t)() (or have onGiteaRun do that for them) but sometimes
|
|
|
|
// within a single test this is required
|
|
|
|
func resetFixtures(t *testing.T) {
|
|
|
|
assert.NoError(t, queue.GetManager().FlushAll(context.Background(), -1))
|
2021-11-12 22:36:47 +08:00
|
|
|
assert.NoError(t, unittest.LoadFixtures())
|
2020-08-12 04:05:34 +08:00
|
|
|
assert.NoError(t, util.RemoveAll(setting.RepoRootPath))
|
2020-12-25 17:59:32 +08:00
|
|
|
assert.NoError(t, util.CopyDir(path.Join(filepath.Dir(setting.AppPath), "integrations/gitea-repositories-meta"), setting.RepoRootPath))
|
2021-12-17 03:01:14 +08:00
|
|
|
ownerDirs, err := os.ReadDir(setting.RepoRootPath)
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err, "unable to read the new repo root: %v\n", err)
|
|
|
|
}
|
|
|
|
for _, ownerDir := range ownerDirs {
|
|
|
|
if !ownerDir.Type().IsDir() {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
repoDirs, err := os.ReadDir(filepath.Join(setting.RepoRootPath, ownerDir.Name()))
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err, "unable to read the new repo root: %v\n", err)
|
|
|
|
}
|
|
|
|
for _, repoDir := range repoDirs {
|
2022-01-21 01:46:10 +08:00
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "objects", "pack"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "objects", "info"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "refs", "heads"), 0o755)
|
|
|
|
_ = os.MkdirAll(filepath.Join(setting.RepoRootPath, ownerDir.Name(), repoDir.Name(), "refs", "tag"), 0o755)
|
2021-12-17 03:01:14 +08:00
|
|
|
}
|
|
|
|
}
|
2020-05-30 02:16:20 +08:00
|
|
|
}
|