core_flow.rs 64 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923
  1. use std::{
  2. fs,
  3. path::{Path, PathBuf},
  4. process::Command,
  5. sync::Arc,
  6. time::{SystemTime, UNIX_EPOCH},
  7. };
  8. use actix_http::Request;
  9. use actix_web::{
  10. App,
  11. body::BoxBody,
  12. dev::{Service, ServiceResponse},
  13. http::StatusCode,
  14. test,
  15. };
  16. use gitr::{
  17. app::AppState,
  18. conf::{AppConfig, CoreAppConfig, DatabaseConfig, RepositoryConfig, ServerConfig},
  19. db::Database,
  20. http::build_scope,
  21. models::{
  22. AccessMode, ApiCollaboratorResponse, ApiLoginResponse, ApiPullRequestDetailResponse,
  23. ApiPullRequestResponse, ApiRepositoryResponse, ApiUser, Branch, CompareResponse,
  24. CreateAccessTokenResponse, PullRequestStatus,
  25. },
  26. };
  27. use serde_json::Value;
  28. #[actix_web::test]
  29. async fn create_user_and_bare_repo_via_http() {
  30. let env = TestEnv::new("bare");
  31. let app = env.app().await;
  32. let user = create_user(&app, "alice").await;
  33. assert_eq!(user.name, "alice");
  34. let token = login(&app, "alice").await.token;
  35. let repo = create_repo(&app, &token, "demo", false).await;
  36. assert_eq!(repo.owner.name, "alice");
  37. assert_eq!(repo.repo.name, "demo");
  38. assert!(repo.repo.is_bare);
  39. let repo_path = env.repo_path("alice", "demo");
  40. assert!(repo_path.exists());
  41. assert!(repo_path.join("HEAD").exists());
  42. assert_eq!(
  43. git(&repo_path, &["symbolic-ref", "HEAD"]),
  44. "refs/heads/main"
  45. );
  46. }
  47. #[actix_web::test]
  48. async fn create_repo_with_auto_init_creates_first_commit() {
  49. let env = TestEnv::new("autoinit");
  50. let app = env.app().await;
  51. create_user(&app, "bob").await;
  52. let token = login(&app, "bob").await.token;
  53. let repo = create_repo(&app, &token, "seeded", true).await;
  54. assert!(!repo.repo.is_bare);
  55. let repo_path = env.repo_path("bob", "seeded");
  56. let head = git(&repo_path, &["rev-parse", "refs/heads/main"]);
  57. assert_eq!(head.len(), 40);
  58. let readme = git(&repo_path, &["show", "refs/heads/main:README.md"]);
  59. assert_eq!(readme, "# seeded");
  60. }
  61. #[actix_web::test]
  62. async fn duplicate_user_is_rejected() {
  63. let env = TestEnv::new("duplicate-user");
  64. let app = env.app().await;
  65. create_user(&app, "carol").await;
  66. let admin_token = login(&app, "carol").await.token;
  67. let request = test::TestRequest::post()
  68. .uri("/api/admin/users")
  69. .insert_header(("authorization", format!("Bearer {admin_token}")))
  70. .insert_header(("content-type", "application/json"))
  71. .set_payload(r#"{"username":"carol","email":"carol@example.com","password":"password123"}"#)
  72. .to_request();
  73. let response = test::call_service(&app, request).await;
  74. assert_eq!(response.status(), StatusCode::CONFLICT);
  75. assert_error_response(
  76. response,
  77. StatusCode::CONFLICT,
  78. "conflict",
  79. "user already exists: carol",
  80. )
  81. .await;
  82. }
  83. #[actix_web::test]
  84. async fn duplicate_repo_is_rejected() {
  85. let env = TestEnv::new("duplicate-repo");
  86. let app = env.app().await;
  87. create_user(&app, "dave").await;
  88. let token = login(&app, "dave").await.token;
  89. create_repo(&app, &token, "demo", false).await;
  90. let request = test::TestRequest::post()
  91. .uri("/api/repos")
  92. .insert_header(("authorization", format!("Bearer {token}")))
  93. .insert_header(("content-type", "application/json"))
  94. .set_payload(r#"{"name":"demo","description":"again","auto_init":false}"#)
  95. .to_request();
  96. let response = test::call_service(&app, request).await;
  97. assert_eq!(response.status(), StatusCode::CONFLICT);
  98. }
  99. #[actix_web::test]
  100. async fn missing_authorization_is_rejected() {
  101. let env = TestEnv::new("missing-auth");
  102. let app = env.app().await;
  103. let request = test::TestRequest::post()
  104. .uri("/api/repos")
  105. .insert_header(("content-type", "application/json"))
  106. .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
  107. .to_request();
  108. let response = test::call_service(&app, request).await;
  109. assert_error_response(
  110. response,
  111. StatusCode::UNAUTHORIZED,
  112. "unauthorized",
  113. "missing authorization header",
  114. )
  115. .await;
  116. }
  117. #[actix_web::test]
  118. async fn invalid_repo_name_is_rejected() {
  119. let env = TestEnv::new("invalid-repo");
  120. let app = env.app().await;
  121. create_user(&app, "erin").await;
  122. let token = login(&app, "erin").await.token;
  123. let request = test::TestRequest::post()
  124. .uri("/api/repos")
  125. .insert_header(("authorization", format!("Bearer {token}")))
  126. .insert_header(("content-type", "application/json"))
  127. .set_payload(r#"{"name":"bad/name","description":"demo","auto_init":false}"#)
  128. .to_request();
  129. let response = test::call_service(&app, request).await;
  130. assert_error_response(
  131. response,
  132. StatusCode::BAD_REQUEST,
  133. "validation_error",
  134. "repository name must contain only ASCII letters, digits, '-', '_' or '.'",
  135. )
  136. .await;
  137. }
  138. #[actix_web::test]
  139. async fn invalid_user_name_is_rejected() {
  140. let env = TestEnv::new("invalid-user");
  141. let app = env.app().await;
  142. let request = test::TestRequest::post()
  143. .uri("/api/admin/users")
  144. .insert_header(("content-type", "application/json"))
  145. .set_payload(
  146. r#"{"username":"bad/name","email":"bad@example.com","password":"password123"}"#,
  147. )
  148. .to_request();
  149. let response = test::call_service(&app, request).await;
  150. assert_eq!(response.status(), StatusCode::BAD_REQUEST);
  151. }
  152. #[actix_web::test]
  153. async fn git_init_failure_does_not_leave_repo_record() {
  154. let env = TestEnv::new("git-init-failure");
  155. let app = env
  156. .app_with_git_binary("definitely-not-a-real-git-binary")
  157. .await;
  158. create_user(&app, "frank").await;
  159. let token = login(&app, "frank").await.token;
  160. let request = test::TestRequest::post()
  161. .uri("/api/repos")
  162. .insert_header(("authorization", format!("Bearer {token}")))
  163. .insert_header(("content-type", "application/json"))
  164. .set_payload(r#"{"name":"blocked","description":"demo","auto_init":false}"#)
  165. .to_request();
  166. let response = test::call_service(&app, request).await;
  167. assert_error_response(
  168. response,
  169. StatusCode::INTERNAL_SERVER_ERROR,
  170. "internal_error",
  171. "internal server error",
  172. )
  173. .await;
  174. let get_request = test::TestRequest::get()
  175. .uri("/api/repos/frank/blocked")
  176. .to_request();
  177. let get_response = test::call_service(&app, get_request).await;
  178. assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
  179. }
  180. #[actix_web::test]
  181. async fn login_rejects_bad_password() {
  182. let env = TestEnv::new("bad-login");
  183. let app = env.app().await;
  184. create_user(&app, "grace").await;
  185. let request = test::TestRequest::post()
  186. .uri("/api/user/login")
  187. .insert_header(("content-type", "application/json"))
  188. .set_payload(r#"{"login":"grace","password":"wrong-password"}"#)
  189. .to_request();
  190. let response = test::call_service(&app, request).await;
  191. assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
  192. }
  193. #[actix_web::test]
  194. async fn token_endpoint_creates_second_token() {
  195. let env = TestEnv::new("token-endpoint");
  196. let app = env.app().await;
  197. create_user(&app, "heidi").await;
  198. let login = login(&app, "heidi").await;
  199. let request = test::TestRequest::post()
  200. .uri("/api/user/tokens")
  201. .insert_header(("authorization", format!("Bearer {}", login.token)))
  202. .insert_header(("content-type", "application/json"))
  203. .set_payload(r#"{"name":"cli"}"#)
  204. .to_request();
  205. let response = test::call_service(&app, request).await;
  206. assert_eq!(response.status(), StatusCode::OK);
  207. let token: CreateAccessTokenResponse = test::read_body_json(response).await;
  208. assert_eq!(token.name, "cli");
  209. assert!(!token.token.is_empty());
  210. assert_eq!(token.updated_unix, 0);
  211. }
  212. #[actix_web::test]
  213. async fn access_token_names_must_be_unique_per_user() {
  214. let env = TestEnv::new("token-unique");
  215. let app = env.app().await;
  216. create_user(&app, "alice").await;
  217. let login = login(&app, "alice").await;
  218. let first = test::TestRequest::post()
  219. .uri("/api/user/tokens")
  220. .insert_header(("authorization", format!("Bearer {}", login.token)))
  221. .insert_header(("content-type", "application/json"))
  222. .set_payload(r#"{"name":"cli"}"#)
  223. .to_request();
  224. let first_response = test::call_service(&app, first).await;
  225. assert_eq!(first_response.status(), StatusCode::OK);
  226. let second = test::TestRequest::post()
  227. .uri("/api/user/tokens")
  228. .insert_header(("authorization", format!("Bearer {}", login.token)))
  229. .insert_header(("content-type", "application/json"))
  230. .set_payload(r#"{"name":"cli"}"#)
  231. .to_request();
  232. let second_response = test::call_service(&app, second).await;
  233. assert_eq!(second_response.status(), StatusCode::CONFLICT);
  234. }
  235. #[actix_web::test]
  236. async fn access_token_can_be_listed_and_deleted() {
  237. let env = TestEnv::new("token-list-delete");
  238. let app = env.app().await;
  239. create_user(&app, "alice").await;
  240. let login = login(&app, "alice").await;
  241. let create = test::TestRequest::post()
  242. .uri("/api/user/tokens")
  243. .insert_header(("authorization", format!("Bearer {}", login.token)))
  244. .insert_header(("content-type", "application/json"))
  245. .set_payload(r#"{"name":"cli"}"#)
  246. .to_request();
  247. let create_response = test::call_service(&app, create).await;
  248. assert_eq!(create_response.status(), StatusCode::OK);
  249. let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
  250. assert_eq!(token.updated_unix, 0);
  251. let list = test::TestRequest::get()
  252. .uri("/api/user/tokens")
  253. .insert_header(("authorization", format!("Bearer {}", login.token)))
  254. .to_request();
  255. let list_response = test::call_service(&app, list).await;
  256. assert_eq!(list_response.status(), StatusCode::OK);
  257. let list_body: Value = test::read_body_json(list_response).await;
  258. let list_entries = list_body
  259. .as_array()
  260. .expect("token list response should be an array");
  261. assert_eq!(list_entries.len(), 2);
  262. assert!(list_entries
  263. .iter()
  264. .any(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id)));
  265. assert!(list_entries.iter().all(|entry| entry.get("token").is_none()));
  266. let delete = test::TestRequest::delete()
  267. .uri(&format!("/api/user/tokens/{}", token.id))
  268. .insert_header(("authorization", format!("Bearer {}", login.token)))
  269. .to_request();
  270. let delete_response = test::call_service(&app, delete).await;
  271. assert_eq!(delete_response.status(), StatusCode::NO_CONTENT);
  272. let list_again = test::TestRequest::get()
  273. .uri("/api/user/tokens")
  274. .insert_header(("authorization", format!("Bearer {}", login.token)))
  275. .to_request();
  276. let list_again_response = test::call_service(&app, list_again).await;
  277. assert_eq!(list_again_response.status(), StatusCode::OK);
  278. let list_again_body: Value = test::read_body_json(list_again_response).await;
  279. let list_again_entries = list_again_body
  280. .as_array()
  281. .expect("token list response should be an array");
  282. assert_eq!(list_again_entries.len(), 1);
  283. assert!(list_again_entries
  284. .iter()
  285. .all(|entry| entry.get("id").and_then(Value::as_i64) != Some(token.id)));
  286. }
  287. #[actix_web::test]
  288. async fn access_token_updated_unix_changes_after_use() {
  289. let env = TestEnv::new("token-touch");
  290. let app = env.app().await;
  291. create_user(&app, "alice").await;
  292. let login = login(&app, "alice").await;
  293. let create = test::TestRequest::post()
  294. .uri("/api/user/tokens")
  295. .insert_header(("authorization", format!("Bearer {}", login.token)))
  296. .insert_header(("content-type", "application/json"))
  297. .set_payload(r#"{"name":"cli"}"#)
  298. .to_request();
  299. let create_response = test::call_service(&app, create).await;
  300. assert_eq!(create_response.status(), StatusCode::OK);
  301. let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
  302. assert_eq!(token.updated_unix, 0);
  303. let use_cli = test::TestRequest::get()
  304. .uri("/api/user/tokens")
  305. .insert_header(("authorization", format!("Bearer {}", token.token)))
  306. .to_request();
  307. let use_cli_response = test::call_service(&app, use_cli).await;
  308. assert_eq!(use_cli_response.status(), StatusCode::OK);
  309. let list = test::TestRequest::get()
  310. .uri("/api/user/tokens")
  311. .insert_header(("authorization", format!("Bearer {}", login.token)))
  312. .to_request();
  313. let list_response = test::call_service(&app, list).await;
  314. assert_eq!(list_response.status(), StatusCode::OK);
  315. let list_body: Value = test::read_body_json(list_response).await;
  316. let list_entries = list_body
  317. .as_array()
  318. .expect("token list response should be an array");
  319. let cli_entry = list_entries
  320. .iter()
  321. .find(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id))
  322. .expect("cli token should exist");
  323. assert!(
  324. cli_entry
  325. .get("updated_unix")
  326. .and_then(Value::as_i64)
  327. .unwrap_or_default()
  328. > 0
  329. );
  330. }
  331. #[actix_web::test]
  332. async fn admin_user_creation_requires_bootstrap_or_admin_token() {
  333. let env = TestEnv::new("admin-auth");
  334. let app = env.app().await;
  335. create_user(&app, "admin").await;
  336. let admin_token = login(&app, "admin").await.token;
  337. let anonymous = test::TestRequest::post()
  338. .uri("/api/admin/users")
  339. .insert_header(("content-type", "application/json"))
  340. .set_payload(r#"{"username":"member","email":"member@example.com","password":"password123"}"#)
  341. .to_request();
  342. let anonymous_response = test::call_service(&app, anonymous).await;
  343. assert_eq!(anonymous_response.status(), StatusCode::UNAUTHORIZED);
  344. let member = create_user_as_admin(&app, &admin_token, "member").await;
  345. assert_eq!(member.name, "member");
  346. }
  347. #[actix_web::test]
  348. async fn api_responses_do_not_expose_password_hash() {
  349. let env = TestEnv::new("redaction");
  350. let app = env.app().await;
  351. create_user(&app, "alice").await;
  352. let token = login(&app, "alice").await.token;
  353. let user_request = test::TestRequest::get().uri("/api/users/alice").to_request();
  354. let user_response = test::call_service(&app, user_request).await;
  355. assert_eq!(user_response.status(), StatusCode::OK);
  356. let user_body: Value = test::read_body_json(user_response).await;
  357. assert!(user_body.get("password_hash").is_none());
  358. assert_eq!(user_body.get("email").and_then(Value::as_str), Some(""));
  359. let repo_request = test::TestRequest::post()
  360. .uri("/api/repos")
  361. .insert_header(("authorization", format!("Bearer {token}")))
  362. .insert_header(("content-type", "application/json"))
  363. .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
  364. .to_request();
  365. let repo_response = test::call_service(&app, repo_request).await;
  366. assert_eq!(repo_response.status(), StatusCode::OK);
  367. let repo_body: Value = test::read_body_json(repo_response).await;
  368. assert!(
  369. repo_body
  370. .get("owner")
  371. .and_then(|owner| owner.get("password_hash"))
  372. .is_none()
  373. );
  374. }
  375. #[actix_web::test]
  376. async fn private_repo_metadata_is_not_visible_without_read_access() {
  377. let env = TestEnv::new("private-repo-opaque");
  378. let app = env.app().await;
  379. create_user(&app, "owner").await;
  380. let owner_token = login(&app, "owner").await.token;
  381. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  382. create_user_as_admin(&app, &owner_token, "outsider").await;
  383. let outsider_token = login(&app, "outsider").await.token;
  384. let anonymous = test::TestRequest::get()
  385. .uri("/api/repos/owner/secret")
  386. .to_request();
  387. let anonymous_response = test::call_service(&app, anonymous).await;
  388. assert_error_response(
  389. anonymous_response,
  390. StatusCode::NOT_FOUND,
  391. "not_found",
  392. "repository not found: owner/secret",
  393. )
  394. .await;
  395. let outsider = test::TestRequest::get()
  396. .uri("/api/repos/owner/secret")
  397. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  398. .to_request();
  399. let outsider_response = test::call_service(&app, outsider).await;
  400. assert_error_response(
  401. outsider_response,
  402. StatusCode::NOT_FOUND,
  403. "not_found",
  404. "repository not found: owner/secret",
  405. )
  406. .await;
  407. }
  408. #[actix_web::test]
  409. async fn private_repo_read_endpoints_are_not_visible_without_access() {
  410. let env = TestEnv::new("private-repo-read-opaque");
  411. let app = env.app().await;
  412. create_user(&app, "owner").await;
  413. let owner_token = login(&app, "owner").await.token;
  414. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  415. create_user_as_admin(&app, &owner_token, "outsider").await;
  416. let outsider_token = login(&app, "outsider").await.token;
  417. let branches = test::TestRequest::get()
  418. .uri("/api/repos/owner/secret/branches")
  419. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  420. .to_request();
  421. let branches_response = test::call_service(&app, branches).await;
  422. assert_eq!(branches_response.status(), StatusCode::NOT_FOUND);
  423. let pulls = test::TestRequest::get()
  424. .uri("/api/repos/owner/secret/pulls")
  425. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  426. .to_request();
  427. let pulls_response = test::call_service(&app, pulls).await;
  428. assert_eq!(pulls_response.status(), StatusCode::NOT_FOUND);
  429. let forks = test::TestRequest::post()
  430. .uri("/api/repos/owner/secret/forks")
  431. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  432. .insert_header(("content-type", "application/json"))
  433. .set_payload(r#"{"name":"secret-fork","description":"x"}"#)
  434. .to_request();
  435. let forks_response = test::call_service(&app, forks).await;
  436. assert_eq!(forks_response.status(), StatusCode::NOT_FOUND);
  437. let compare = test::TestRequest::get()
  438. .uri("/api/repos/owner/secret/compare?base=main&head_owner=owner&head_repo=secret&head_branch=main")
  439. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  440. .to_request();
  441. let compare_response = test::call_service(&app, compare).await;
  442. assert_eq!(compare_response.status(), StatusCode::NOT_FOUND);
  443. let create_pr = test::TestRequest::post()
  444. .uri("/api/repos/owner/secret/pulls")
  445. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  446. .insert_header(("content-type", "application/json"))
  447. .set_payload(
  448. r#"{"head_owner":"owner","head_repo":"secret","head_branch":"main","base_branch":"main","title":"x","body":""}"#,
  449. )
  450. .to_request();
  451. let create_pr_response = test::call_service(&app, create_pr).await;
  452. assert_eq!(create_pr_response.status(), StatusCode::NOT_FOUND);
  453. }
  454. #[actix_web::test]
  455. async fn list_user_repositories_hides_private_repos_without_access() {
  456. let env = TestEnv::new("list-user-repos");
  457. let app = env.app().await;
  458. create_user(&app, "owner").await;
  459. let owner_token = login(&app, "owner").await.token;
  460. create_repo_with_visibility(&app, &owner_token, "public", true, false).await;
  461. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  462. create_user_as_admin(&app, &owner_token, "outsider").await;
  463. let outsider_token = login(&app, "outsider").await.token;
  464. let anonymous_repos = list_user_repositories(&app, None, "owner", "").await;
  465. assert_eq!(anonymous_repos.len(), 1);
  466. assert_eq!(anonymous_repos[0].repo.name, "public");
  467. assert_eq!(anonymous_repos[0].permission.mode, AccessMode::Read);
  468. let outsider_repos = list_user_repositories(&app, Some(&outsider_token), "owner", "").await;
  469. assert_eq!(outsider_repos.len(), 1);
  470. assert_eq!(outsider_repos[0].repo.name, "public");
  471. assert!(outsider_repos[0].permission.can_read);
  472. assert!(!outsider_repos[0].permission.can_write);
  473. let owner_repos = list_user_repositories(&app, Some(&owner_token), "owner", "").await;
  474. assert_eq!(owner_repos.len(), 2);
  475. assert!(owner_repos.iter().any(|repo| repo.repo.name == "secret"));
  476. assert!(owner_repos.iter().all(|repo| repo.permission.is_owner));
  477. }
  478. #[actix_web::test]
  479. async fn current_user_repo_list_includes_visible_repositories() {
  480. let env = TestEnv::new("current-user-repos");
  481. let app = env.app().await;
  482. create_user(&app, "alice").await;
  483. let alice_token = login(&app, "alice").await.token;
  484. create_repo_with_visibility(&app, &alice_token, "own-public", true, false).await;
  485. create_repo_with_visibility(&app, &alice_token, "own-private", true, true).await;
  486. create_user_as_admin(&app, &alice_token, "bob").await;
  487. let bob_token = login(&app, "bob").await.token;
  488. create_repo_with_visibility(&app, &bob_token, "bob-public", true, false).await;
  489. create_repo_with_visibility(&app, &bob_token, "bob-shared", true, true).await;
  490. add_collaborator(&app, &bob_token, "bob", "bob-shared", "alice", "read").await;
  491. let repos = list_current_user_repositories(&app, &alice_token, "").await;
  492. assert_eq!(repos.len(), 4);
  493. assert!(repos.iter().any(|repo| {
  494. repo.owner.name == "alice" && repo.repo.name == "own-private" && repo.permission.is_owner
  495. }));
  496. assert!(repos.iter().any(|repo| {
  497. repo.owner.name == "bob"
  498. && repo.repo.name == "bob-public"
  499. && repo.permission.can_read
  500. && !repo.permission.can_write
  501. }));
  502. assert!(repos.iter().any(|repo| {
  503. repo.owner.name == "bob"
  504. && repo.repo.name == "bob-shared"
  505. && repo.permission.can_read
  506. && !repo.permission.can_write
  507. }));
  508. }
  509. #[actix_web::test]
  510. async fn repository_search_filters_to_visible_results() {
  511. let env = TestEnv::new("search-repos");
  512. let app = env.app().await;
  513. create_user(&app, "searcher").await;
  514. let searcher_token = login(&app, "searcher").await.token;
  515. create_user_as_admin(&app, &searcher_token, "owner").await;
  516. let owner_token = login(&app, "owner").await.token;
  517. create_repo_with_visibility(&app, &owner_token, "rust-public", true, false).await;
  518. create_repo_with_visibility(&app, &owner_token, "python-public", true, false).await;
  519. create_repo_with_visibility(&app, &owner_token, "rust-secret", true, true).await;
  520. add_collaborator(&app, &owner_token, "owner", "rust-secret", "searcher", "read").await;
  521. let anonymous = search_repositories(&app, None, "rust").await;
  522. assert_eq!(anonymous.len(), 1);
  523. assert_eq!(anonymous[0].repo.name, "rust-public");
  524. let authed = search_repositories(&app, Some(&searcher_token), "rust").await;
  525. assert_eq!(authed.len(), 2);
  526. assert!(authed.iter().any(|repo| repo.repo.name == "rust-public"));
  527. assert!(authed.iter().any(|repo| repo.repo.name == "rust-secret"));
  528. }
  529. #[actix_web::test]
  530. async fn invalid_collaborator_permission_is_rejected() {
  531. let env = TestEnv::new("invalid-collab-permission");
  532. let app = env.app().await;
  533. create_user(&app, "owner").await;
  534. let owner_token = login(&app, "owner").await.token;
  535. create_user_as_admin(&app, &owner_token, "guest").await;
  536. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  537. let request = test::TestRequest::post()
  538. .uri("/api/repos/owner/shared/collaborators")
  539. .insert_header(("authorization", format!("Bearer {owner_token}")))
  540. .insert_header(("content-type", "application/json"))
  541. .set_payload(r#"{"username":"guest","permission":"super"}"#)
  542. .to_request();
  543. let response = test::call_service(&app, request).await;
  544. assert_eq!(response.status(), StatusCode::BAD_REQUEST);
  545. }
  546. #[actix_web::test]
  547. async fn collaborator_list_and_check_return_expected_permissions() {
  548. let env = TestEnv::new("list-collaborators");
  549. let app = env.app().await;
  550. create_user(&app, "owner").await;
  551. let owner_token = login(&app, "owner").await.token;
  552. create_user_as_admin(&app, &owner_token, "reader").await;
  553. create_user_as_admin(&app, &owner_token, "adminer").await;
  554. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  555. add_collaborator(&app, &owner_token, "owner", "shared", "reader", "read").await;
  556. add_collaborator(&app, &owner_token, "owner", "shared", "adminer", "admin").await;
  557. let collaborators = list_collaborators(&app, Some(&owner_token), "owner", "shared").await;
  558. assert_eq!(collaborators.len(), 2);
  559. assert_eq!(collaborators[0].user.name, "adminer");
  560. assert_eq!(collaborators[1].user.name, "reader");
  561. let reader = get_collaborator(&app, Some(&owner_token), "owner", "shared", "reader").await;
  562. assert_eq!(reader.user.name, "reader");
  563. assert_eq!(format!("{:?}", reader.mode), "Read");
  564. }
  565. #[actix_web::test]
  566. async fn private_collaborator_endpoints_are_not_visible_without_access() {
  567. let env = TestEnv::new("private-collaborator-opaque");
  568. let app = env.app().await;
  569. create_user(&app, "owner").await;
  570. let owner_token = login(&app, "owner").await.token;
  571. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  572. create_user_as_admin(&app, &owner_token, "outsider").await;
  573. let outsider_token = login(&app, "outsider").await.token;
  574. let list = test::TestRequest::get()
  575. .uri("/api/repos/owner/secret/collaborators")
  576. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  577. .to_request();
  578. let list_response = test::call_service(&app, list).await;
  579. assert_eq!(list_response.status(), StatusCode::NOT_FOUND);
  580. let get = test::TestRequest::get()
  581. .uri("/api/repos/owner/secret/collaborators/outsider")
  582. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  583. .to_request();
  584. let get_response = test::call_service(&app, get).await;
  585. assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
  586. }
  587. #[actix_web::test]
  588. async fn public_git_info_refs_allows_anonymous_pull() {
  589. let env = TestEnv::new("public-git-http");
  590. let app = env.app().await;
  591. create_user(&app, "ivan").await;
  592. let token = login(&app, "ivan").await.token;
  593. create_repo_with_visibility(&app, &token, "public", true, false).await;
  594. let request = test::TestRequest::get()
  595. .uri("/ivan/public.git/info/refs?service=git-upload-pack")
  596. .to_request();
  597. let response = test::call_service(&app, request).await;
  598. assert_eq!(response.status(), StatusCode::OK);
  599. assert_eq!(
  600. response
  601. .headers()
  602. .get("content-type")
  603. .and_then(|v| v.to_str().ok()),
  604. Some("application/x-git-upload-pack-advertisement")
  605. );
  606. }
  607. #[actix_web::test]
  608. async fn private_git_info_refs_requires_basic_auth() {
  609. let env = TestEnv::new("private-git-http");
  610. let app = env.app().await;
  611. create_user(&app, "judy").await;
  612. let token = login(&app, "judy").await.token;
  613. create_repo_with_visibility(&app, &token, "private", true, true).await;
  614. let unauthenticated = test::TestRequest::get()
  615. .uri("/judy/private.git/info/refs?service=git-upload-pack")
  616. .to_request();
  617. let unauthenticated_response = test::call_service(&app, unauthenticated).await;
  618. assert_eq!(unauthenticated_response.status(), StatusCode::UNAUTHORIZED);
  619. let basic = basic_auth_header("judy", "password123");
  620. let authenticated = test::TestRequest::get()
  621. .uri("/judy/private.git/info/refs?service=git-upload-pack")
  622. .insert_header(("authorization", basic))
  623. .to_request();
  624. let authenticated_response = test::call_service(&app, authenticated).await;
  625. assert_eq!(authenticated_response.status(), StatusCode::OK);
  626. }
  627. #[actix_web::test]
  628. async fn private_git_info_refs_allows_read_collaborator() {
  629. let env = TestEnv::new("private-collab-read");
  630. let app = env.app().await;
  631. create_user(&app, "kate").await;
  632. let owner_token = login(&app, "kate").await.token;
  633. create_user_as_admin(&app, &owner_token, "louis").await;
  634. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  635. add_collaborator(&app, &owner_token, "kate", "shared", "louis", "read").await;
  636. let collaborator = test::TestRequest::get()
  637. .uri("/kate/shared.git/info/refs?service=git-upload-pack")
  638. .insert_header(("authorization", basic_auth_header("louis", "password123")))
  639. .to_request();
  640. let collaborator_response = test::call_service(&app, collaborator).await;
  641. assert_eq!(collaborator_response.status(), StatusCode::OK);
  642. }
  643. #[actix_web::test]
  644. async fn read_collaborator_cannot_advertise_receive_pack() {
  645. let env = TestEnv::new("private-collab-read-no-push");
  646. let app = env.app().await;
  647. create_user(&app, "mike").await;
  648. let owner_token = login(&app, "mike").await.token;
  649. create_user_as_admin(&app, &owner_token, "nina").await;
  650. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  651. add_collaborator(&app, &owner_token, "mike", "shared", "nina", "read").await;
  652. let collaborator = test::TestRequest::get()
  653. .uri("/mike/shared.git/info/refs?service=git-receive-pack")
  654. .insert_header(("authorization", basic_auth_header("nina", "password123")))
  655. .to_request();
  656. let collaborator_response = test::call_service(&app, collaborator).await;
  657. assert_eq!(collaborator_response.status(), StatusCode::FORBIDDEN);
  658. }
  659. #[actix_web::test]
  660. async fn fork_repository_clones_base_repo() {
  661. let env = TestEnv::new("fork-repository");
  662. let app = env.app().await;
  663. create_user(&app, "olivia").await;
  664. let owner_token = login(&app, "olivia").await.token;
  665. create_user_as_admin(&app, &owner_token, "peter").await;
  666. let forker_token = login(&app, "peter").await.token;
  667. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  668. let request = test::TestRequest::post()
  669. .uri("/api/repos/olivia/origin/forks")
  670. .insert_header(("authorization", format!("Bearer {forker_token}")))
  671. .insert_header(("content-type", "application/json"))
  672. .set_payload(r#"{"name":"origin-fork","description":"forked"}"#)
  673. .to_request();
  674. let response = test::call_service(&app, request).await;
  675. assert_eq!(response.status(), StatusCode::OK);
  676. let fork_path = env.repo_path("peter", "origin-fork");
  677. assert!(fork_path.exists());
  678. let head = git(&fork_path, &["rev-parse", "refs/heads/main"]);
  679. assert_eq!(head.len(), 40);
  680. }
  681. #[actix_web::test]
  682. async fn list_branches_returns_main_branch() {
  683. let env = TestEnv::new("list-branches");
  684. let app = env.app().await;
  685. create_user(&app, "quinn").await;
  686. let token = login(&app, "quinn").await.token;
  687. create_repo_with_visibility(&app, &token, "branches", true, false).await;
  688. let request = test::TestRequest::get()
  689. .uri("/api/repos/quinn/branches/branches")
  690. .insert_header(("authorization", format!("Bearer {token}")))
  691. .to_request();
  692. let response = test::call_service(&app, request).await;
  693. assert_eq!(response.status(), StatusCode::OK);
  694. let branches: Vec<Branch> = test::read_body_json(response).await;
  695. assert!(branches.iter().any(|branch| branch.name == "main"));
  696. }
  697. #[actix_web::test]
  698. async fn create_pull_request_from_fork_succeeds() {
  699. let env = TestEnv::new("create-pr");
  700. let app = env.app().await;
  701. create_user(&app, "rachel").await;
  702. let owner_token = login(&app, "rachel").await.token;
  703. create_user_as_admin(&app, &owner_token, "sam").await;
  704. let forker_token = login(&app, "sam").await.token;
  705. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  706. fork_repo(&app, &forker_token, "rachel", "origin", "origin-fork").await;
  707. push_commit_to_branch(
  708. &env.repo_path("sam", "origin-fork"),
  709. "main",
  710. "feature-one",
  711. "sam",
  712. "sam@example.com",
  713. "feature.txt",
  714. "hello from fork\n",
  715. );
  716. let pull = create_pull_request(
  717. &app,
  718. &forker_token,
  719. "rachel",
  720. "origin",
  721. "sam",
  722. "origin-fork",
  723. "feature-one",
  724. "main",
  725. "Add feature one",
  726. )
  727. .await;
  728. assert_eq!(pull.base_repo.owner.name, "rachel");
  729. assert_eq!(pull.base_repo.repo.name, "origin");
  730. assert_eq!(pull.head_repo.owner.name, "sam");
  731. assert_eq!(pull.head_repo.repo.name, "origin-fork");
  732. assert_eq!(pull.pull_request.index, 1);
  733. assert_eq!(pull.pull_request.head_branch, "feature-one");
  734. assert_eq!(pull.pull_request.base_branch, "main");
  735. assert_eq!(pull.pull_request.status, PullRequestStatus::Mergeable);
  736. assert!(!pull.pull_request.merge_base.is_empty());
  737. }
  738. #[actix_web::test]
  739. async fn compare_endpoint_returns_commit_and_file_stats() {
  740. let env = TestEnv::new("compare-pr");
  741. let app = env.app().await;
  742. create_user(&app, "rhea").await;
  743. let owner_token = login(&app, "rhea").await.token;
  744. create_user_as_admin(&app, &owner_token, "sora").await;
  745. let forker_token = login(&app, "sora").await.token;
  746. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  747. fork_repo(&app, &forker_token, "rhea", "origin", "origin-fork").await;
  748. push_commit_to_branch(
  749. &env.repo_path("sora", "origin-fork"),
  750. "main",
  751. "feature-compare",
  752. "sora",
  753. "sora@example.com",
  754. "compare.txt",
  755. "compare body\n",
  756. );
  757. let compare = compare_repositories(
  758. &app,
  759. &forker_token,
  760. "rhea",
  761. "origin",
  762. "main",
  763. "sora",
  764. "origin-fork",
  765. "feature-compare",
  766. )
  767. .await;
  768. assert_eq!(compare.base_branch, "main");
  769. assert_eq!(compare.head_branch, "feature-compare");
  770. assert_eq!(compare.status, PullRequestStatus::Mergeable);
  771. assert_eq!(compare.commits.len(), 1);
  772. assert_eq!(compare.files.len(), 1);
  773. assert_eq!(compare.files[0].path, "compare.txt");
  774. assert!(!compare.head_commit_id.is_empty());
  775. assert!(!compare.merge_base.is_empty());
  776. }
  777. #[actix_web::test]
  778. async fn duplicate_unmerged_pull_request_is_rejected() {
  779. let env = TestEnv::new("duplicate-pr");
  780. let app = env.app().await;
  781. create_user(&app, "tina").await;
  782. let owner_token = login(&app, "tina").await.token;
  783. create_user_as_admin(&app, &owner_token, "uma").await;
  784. let forker_token = login(&app, "uma").await.token;
  785. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  786. fork_repo(&app, &forker_token, "tina", "origin", "origin-fork").await;
  787. push_commit_to_branch(
  788. &env.repo_path("uma", "origin-fork"),
  789. "main",
  790. "feature-one",
  791. "uma",
  792. "uma@example.com",
  793. "feature.txt",
  794. "duplicate pr check\n",
  795. );
  796. let _ = create_pull_request(
  797. &app,
  798. &forker_token,
  799. "tina",
  800. "origin",
  801. "uma",
  802. "origin-fork",
  803. "feature-one",
  804. "main",
  805. "First PR",
  806. )
  807. .await;
  808. let request = test::TestRequest::post()
  809. .uri("/api/repos/tina/origin/pulls")
  810. .insert_header(("authorization", format!("Bearer {forker_token}")))
  811. .insert_header(("content-type", "application/json"))
  812. .set_payload(
  813. r#"{"head_owner":"uma","head_repo":"origin-fork","head_branch":"feature-one","base_branch":"main","title":"First PR","body":""}"#,
  814. )
  815. .to_request();
  816. let response = test::call_service(&app, request).await;
  817. assert_eq!(response.status(), StatusCode::CONFLICT);
  818. }
  819. #[actix_web::test]
  820. async fn list_pull_requests_returns_created_pull_request() {
  821. let env = TestEnv::new("list-prs");
  822. let app = env.app().await;
  823. create_user(&app, "victor").await;
  824. let owner_token = login(&app, "victor").await.token;
  825. create_user_as_admin(&app, &owner_token, "wendy").await;
  826. let forker_token = login(&app, "wendy").await.token;
  827. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  828. fork_repo(&app, &forker_token, "victor", "origin", "origin-fork").await;
  829. push_commit_to_branch(
  830. &env.repo_path("wendy", "origin-fork"),
  831. "main",
  832. "feature-list",
  833. "wendy",
  834. "wendy@example.com",
  835. "list.txt",
  836. "list pull requests\n",
  837. );
  838. let created = create_pull_request(
  839. &app,
  840. &forker_token,
  841. "victor",
  842. "origin",
  843. "wendy",
  844. "origin-fork",
  845. "feature-list",
  846. "main",
  847. "List PR",
  848. )
  849. .await;
  850. let request = test::TestRequest::get()
  851. .uri("/api/repos/victor/origin/pulls")
  852. .insert_header(("authorization", format!("Bearer {owner_token}")))
  853. .to_request();
  854. let response = test::call_service(&app, request).await;
  855. assert_eq!(response.status(), StatusCode::OK);
  856. let pulls: Vec<ApiPullRequestResponse> = test::read_body_json(response).await;
  857. assert_eq!(pulls.len(), 1);
  858. assert_eq!(pulls[0].pull_request.id, created.pull_request.id);
  859. assert_eq!(pulls[0].pull_request.title, "List PR");
  860. assert_eq!(pulls[0].head_repo.repo.name, "origin-fork");
  861. }
  862. #[actix_web::test]
  863. async fn get_pull_request_detail_returns_compare_payload() {
  864. let env = TestEnv::new("pr-detail");
  865. let app = env.app().await;
  866. create_user(&app, "trent").await;
  867. let owner_token = login(&app, "trent").await.token;
  868. create_user_as_admin(&app, &owner_token, "ursula").await;
  869. let forker_token = login(&app, "ursula").await.token;
  870. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  871. fork_repo(&app, &forker_token, "trent", "origin", "origin-fork").await;
  872. push_commit_to_branch(
  873. &env.repo_path("ursula", "origin-fork"),
  874. "main",
  875. "feature-detail",
  876. "ursula",
  877. "ursula@example.com",
  878. "detail.txt",
  879. "detail body\n",
  880. );
  881. let created = create_pull_request(
  882. &app,
  883. &forker_token,
  884. "trent",
  885. "origin",
  886. "ursula",
  887. "origin-fork",
  888. "feature-detail",
  889. "main",
  890. "Detail PR",
  891. )
  892. .await;
  893. let detail = get_pull_request(&app, &owner_token, "trent", "origin", 1).await;
  894. assert_eq!(detail.pull_request.id, created.pull_request.id);
  895. assert_eq!(detail.pull_request.title, "Detail PR");
  896. assert_eq!(detail.compare.status, PullRequestStatus::Mergeable);
  897. assert_eq!(detail.compare.commits.len(), 1);
  898. assert_eq!(detail.compare.files.len(), 1);
  899. assert_eq!(detail.compare.files[0].path, "detail.txt");
  900. }
  901. #[actix_web::test]
  902. async fn merge_pull_request_updates_base_branch() {
  903. let env = TestEnv::new("merge-pr");
  904. let app = env.app().await;
  905. create_user(&app, "xavier").await;
  906. let owner_token = login(&app, "xavier").await.token;
  907. create_user_as_admin(&app, &owner_token, "yara").await;
  908. let forker_token = login(&app, "yara").await.token;
  909. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  910. fork_repo(&app, &forker_token, "xavier", "origin", "origin-fork").await;
  911. push_commit_to_branch(
  912. &env.repo_path("yara", "origin-fork"),
  913. "main",
  914. "feature-merge",
  915. "yara",
  916. "yara@example.com",
  917. "merged.txt",
  918. "merged by pr\n",
  919. );
  920. let created = create_pull_request(
  921. &app,
  922. &forker_token,
  923. "xavier",
  924. "origin",
  925. "yara",
  926. "origin-fork",
  927. "feature-merge",
  928. "main",
  929. "Merge PR",
  930. )
  931. .await;
  932. let merged = merge_pull_request(&app, &owner_token, "xavier", "origin", 1).await;
  933. assert_eq!(merged.pull_request.id, created.pull_request.id);
  934. assert!(merged.pull_request.has_merged);
  935. assert!(merged.pull_request.is_closed);
  936. let merged_file = git(
  937. &env.repo_path("xavier", "origin"),
  938. &["show", "refs/heads/main:merged.txt"],
  939. );
  940. assert_eq!(merged_file, "merged by pr");
  941. }
  942. #[actix_web::test]
  943. async fn merged_pull_request_detail_excludes_base_only_commits() {
  944. let env = TestEnv::new("merged-pr-compare");
  945. let app = env.app().await;
  946. create_user(&app, "owner").await;
  947. let owner_token = login(&app, "owner").await.token;
  948. create_user_as_admin(&app, &owner_token, "forker").await;
  949. let forker_token = login(&app, "forker").await.token;
  950. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  951. fork_repo(&app, &forker_token, "owner", "origin", "origin-fork").await;
  952. push_commit_to_branch(
  953. &env.repo_path("forker", "origin-fork"),
  954. "main",
  955. "feature-merged",
  956. "forker",
  957. "forker@example.com",
  958. "feature.txt",
  959. "feature body\n",
  960. );
  961. let _ = create_pull_request(
  962. &app,
  963. &forker_token,
  964. "owner",
  965. "origin",
  966. "forker",
  967. "origin-fork",
  968. "feature-merged",
  969. "main",
  970. "Merged PR",
  971. )
  972. .await;
  973. push_commit_to_existing_branch(
  974. &env.repo_path("owner", "origin"),
  975. "main",
  976. "owner",
  977. "owner@example.com",
  978. "base.txt",
  979. "base only\n",
  980. );
  981. let merged = merge_pull_request(&app, &owner_token, "owner", "origin", 1).await;
  982. assert!(merged.pull_request.has_merged);
  983. let detail = get_pull_request(&app, &owner_token, "owner", "origin", 1).await;
  984. assert_eq!(detail.compare.commits.len(), 1);
  985. assert_eq!(detail.compare.files.len(), 1);
  986. assert_eq!(detail.compare.files[0].path, "feature.txt");
  987. }
  988. #[actix_web::test]
  989. async fn pull_request_poster_can_close_and_reopen() {
  990. let env = TestEnv::new("close-reopen-pr");
  991. let app = env.app().await;
  992. create_user(&app, "zoe").await;
  993. let owner_token = login(&app, "zoe").await.token;
  994. create_user_as_admin(&app, &owner_token, "abby").await;
  995. let forker_token = login(&app, "abby").await.token;
  996. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  997. fork_repo(&app, &forker_token, "zoe", "origin", "origin-fork").await;
  998. push_commit_to_branch(
  999. &env.repo_path("abby", "origin-fork"),
  1000. "main",
  1001. "feature-close",
  1002. "abby",
  1003. "abby@example.com",
  1004. "close.txt",
  1005. "close reopen\n",
  1006. );
  1007. let created = create_pull_request(
  1008. &app,
  1009. &forker_token,
  1010. "zoe",
  1011. "origin",
  1012. "abby",
  1013. "origin-fork",
  1014. "feature-close",
  1015. "main",
  1016. "Close PR",
  1017. )
  1018. .await;
  1019. assert!(!created.pull_request.is_closed);
  1020. let closed = close_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
  1021. assert!(closed.pull_request.is_closed);
  1022. assert!(!closed.pull_request.has_merged);
  1023. let reopened = reopen_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
  1024. assert!(!reopened.pull_request.is_closed);
  1025. assert_eq!(reopened.pull_request.status, PullRequestStatus::Mergeable);
  1026. }
  1027. #[actix_web::test]
  1028. async fn reopen_pull_request_rejects_duplicate_open_pair() {
  1029. let env = TestEnv::new("reopen-duplicate-pr");
  1030. let app = env.app().await;
  1031. create_user(&app, "brad").await;
  1032. let owner_token = login(&app, "brad").await.token;
  1033. create_user_as_admin(&app, &owner_token, "cora").await;
  1034. let forker_token = login(&app, "cora").await.token;
  1035. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  1036. fork_repo(&app, &forker_token, "brad", "origin", "origin-fork").await;
  1037. push_commit_to_branch(
  1038. &env.repo_path("cora", "origin-fork"),
  1039. "main",
  1040. "feature-dup",
  1041. "cora",
  1042. "cora@example.com",
  1043. "dup.txt",
  1044. "duplicate reopen\n",
  1045. );
  1046. let _ = create_pull_request(
  1047. &app,
  1048. &forker_token,
  1049. "brad",
  1050. "origin",
  1051. "cora",
  1052. "origin-fork",
  1053. "feature-dup",
  1054. "main",
  1055. "Closed PR",
  1056. )
  1057. .await;
  1058. let _ = close_pull_request(&app, &forker_token, "brad", "origin", 1).await;
  1059. let _ = create_pull_request(
  1060. &app,
  1061. &forker_token,
  1062. "brad",
  1063. "origin",
  1064. "cora",
  1065. "origin-fork",
  1066. "feature-dup",
  1067. "main",
  1068. "Open PR",
  1069. )
  1070. .await;
  1071. let request = test::TestRequest::post()
  1072. .uri("/api/repos/brad/origin/pulls/1/reopen")
  1073. .insert_header(("authorization", format!("Bearer {forker_token}")))
  1074. .to_request();
  1075. let response = test::call_service(&app, request).await;
  1076. assert_eq!(response.status(), StatusCode::CONFLICT);
  1077. }
  1078. async fn create_user<S>(app: &S, username: &str) -> ApiUser
  1079. where
  1080. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1081. {
  1082. let email = format!("{username}@example.com");
  1083. let body = format!(
  1084. r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
  1085. );
  1086. let request = test::TestRequest::post()
  1087. .uri("/api/admin/users")
  1088. .insert_header(("content-type", "application/json"))
  1089. .set_payload(body)
  1090. .to_request();
  1091. let response = test::call_service(app, request).await;
  1092. assert_eq!(response.status(), StatusCode::OK);
  1093. test::read_body_json(response).await
  1094. }
  1095. async fn create_user_as_admin<S>(app: &S, admin_token: &str, username: &str) -> ApiUser
  1096. where
  1097. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1098. {
  1099. let email = format!("{username}@example.com");
  1100. let body = format!(
  1101. r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
  1102. );
  1103. let request = test::TestRequest::post()
  1104. .uri("/api/admin/users")
  1105. .insert_header(("authorization", format!("Bearer {admin_token}")))
  1106. .insert_header(("content-type", "application/json"))
  1107. .set_payload(body)
  1108. .to_request();
  1109. let response = test::call_service(app, request).await;
  1110. assert_eq!(response.status(), StatusCode::OK);
  1111. test::read_body_json(response).await
  1112. }
  1113. async fn login<S>(app: &S, login: &str) -> ApiLoginResponse
  1114. where
  1115. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1116. {
  1117. let body = format!(r#"{{"login":"{login}","password":"password123"}}"#);
  1118. let request = test::TestRequest::post()
  1119. .uri("/api/user/login")
  1120. .insert_header(("content-type", "application/json"))
  1121. .set_payload(body)
  1122. .to_request();
  1123. let response = test::call_service(app, request).await;
  1124. assert_eq!(response.status(), StatusCode::OK);
  1125. test::read_body_json(response).await
  1126. }
  1127. async fn create_repo<S>(
  1128. app: &S,
  1129. token: &str,
  1130. name: &str,
  1131. auto_init: bool,
  1132. ) -> ApiRepositoryResponse
  1133. where
  1134. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1135. {
  1136. create_repo_with_visibility(app, token, name, auto_init, false).await
  1137. }
  1138. async fn create_repo_with_visibility<S>(
  1139. app: &S,
  1140. token: &str,
  1141. name: &str,
  1142. auto_init: bool,
  1143. is_private: bool,
  1144. ) -> ApiRepositoryResponse
  1145. where
  1146. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1147. {
  1148. let body = format!(
  1149. r#"{{"name":"{name}","description":"repo {name}","auto_init":{auto_init},"is_private":{is_private}}}"#
  1150. );
  1151. let request = test::TestRequest::post()
  1152. .uri("/api/repos")
  1153. .insert_header(("authorization", format!("Bearer {token}")))
  1154. .insert_header(("content-type", "application/json"))
  1155. .set_payload(body)
  1156. .to_request();
  1157. let response = test::call_service(app, request).await;
  1158. assert_eq!(response.status(), StatusCode::OK);
  1159. test::read_body_json(response).await
  1160. }
  1161. async fn fork_repo<S>(
  1162. app: &S,
  1163. token: &str,
  1164. owner: &str,
  1165. repo: &str,
  1166. fork_name: &str,
  1167. ) -> ApiRepositoryResponse
  1168. where
  1169. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1170. {
  1171. let body = format!(r#"{{"name":"{fork_name}","description":"fork {fork_name}"}}"#);
  1172. let request = test::TestRequest::post()
  1173. .uri(&format!("/api/repos/{owner}/{repo}/forks"))
  1174. .insert_header(("authorization", format!("Bearer {token}")))
  1175. .insert_header(("content-type", "application/json"))
  1176. .set_payload(body)
  1177. .to_request();
  1178. let response = test::call_service(app, request).await;
  1179. assert_eq!(response.status(), StatusCode::OK);
  1180. test::read_body_json(response).await
  1181. }
  1182. async fn create_pull_request<S>(
  1183. app: &S,
  1184. token: &str,
  1185. owner: &str,
  1186. repo: &str,
  1187. head_owner: &str,
  1188. head_repo: &str,
  1189. head_branch: &str,
  1190. base_branch: &str,
  1191. title: &str,
  1192. ) -> ApiPullRequestResponse
  1193. where
  1194. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1195. {
  1196. let body = format!(
  1197. r#"{{"head_owner":"{head_owner}","head_repo":"{head_repo}","head_branch":"{head_branch}","base_branch":"{base_branch}","title":"{title}","body":"{title} body"}}"#
  1198. );
  1199. let request = test::TestRequest::post()
  1200. .uri(&format!("/api/repos/{owner}/{repo}/pulls"))
  1201. .insert_header(("authorization", format!("Bearer {token}")))
  1202. .insert_header(("content-type", "application/json"))
  1203. .set_payload(body)
  1204. .to_request();
  1205. let response = test::call_service(app, request).await;
  1206. assert_eq!(response.status(), StatusCode::OK);
  1207. test::read_body_json(response).await
  1208. }
  1209. async fn compare_repositories<S>(
  1210. app: &S,
  1211. token: &str,
  1212. owner: &str,
  1213. repo: &str,
  1214. base: &str,
  1215. head_owner: &str,
  1216. head_repo: &str,
  1217. head_branch: &str,
  1218. ) -> CompareResponse
  1219. where
  1220. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1221. {
  1222. let request = test::TestRequest::get()
  1223. .uri(&format!(
  1224. "/api/repos/{owner}/{repo}/compare?base={base}&head_owner={head_owner}&head_repo={head_repo}&head_branch={head_branch}"
  1225. ))
  1226. .insert_header(("authorization", format!("Bearer {token}")))
  1227. .to_request();
  1228. let response = test::call_service(app, request).await;
  1229. assert_eq!(response.status(), StatusCode::OK);
  1230. test::read_body_json(response).await
  1231. }
  1232. async fn get_pull_request<S>(
  1233. app: &S,
  1234. token: &str,
  1235. owner: &str,
  1236. repo: &str,
  1237. index: i64,
  1238. ) -> ApiPullRequestDetailResponse
  1239. where
  1240. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1241. {
  1242. let request = test::TestRequest::get()
  1243. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}"))
  1244. .insert_header(("authorization", format!("Bearer {token}")))
  1245. .to_request();
  1246. let response = test::call_service(app, request).await;
  1247. assert_eq!(response.status(), StatusCode::OK);
  1248. test::read_body_json(response).await
  1249. }
  1250. async fn merge_pull_request<S>(
  1251. app: &S,
  1252. token: &str,
  1253. owner: &str,
  1254. repo: &str,
  1255. index: i64,
  1256. ) -> ApiPullRequestResponse
  1257. where
  1258. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1259. {
  1260. let request = test::TestRequest::post()
  1261. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/merge"))
  1262. .insert_header(("authorization", format!("Bearer {token}")))
  1263. .insert_header(("content-type", "application/json"))
  1264. .set_payload(r#"{"message":""}"#)
  1265. .to_request();
  1266. let response = test::call_service(app, request).await;
  1267. assert_eq!(response.status(), StatusCode::OK);
  1268. test::read_body_json(response).await
  1269. }
  1270. async fn close_pull_request<S>(
  1271. app: &S,
  1272. token: &str,
  1273. owner: &str,
  1274. repo: &str,
  1275. index: i64,
  1276. ) -> ApiPullRequestResponse
  1277. where
  1278. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1279. {
  1280. let request = test::TestRequest::post()
  1281. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/close"))
  1282. .insert_header(("authorization", format!("Bearer {token}")))
  1283. .to_request();
  1284. let response = test::call_service(app, request).await;
  1285. assert_eq!(response.status(), StatusCode::OK);
  1286. test::read_body_json(response).await
  1287. }
  1288. async fn reopen_pull_request<S>(
  1289. app: &S,
  1290. token: &str,
  1291. owner: &str,
  1292. repo: &str,
  1293. index: i64,
  1294. ) -> ApiPullRequestResponse
  1295. where
  1296. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1297. {
  1298. let request = test::TestRequest::post()
  1299. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/reopen"))
  1300. .insert_header(("authorization", format!("Bearer {token}")))
  1301. .to_request();
  1302. let response = test::call_service(app, request).await;
  1303. assert_eq!(response.status(), StatusCode::OK);
  1304. test::read_body_json(response).await
  1305. }
  1306. fn basic_auth_header(username: &str, password: &str) -> String {
  1307. format!("Basic {}", encode_base64(&format!("{username}:{password}")))
  1308. }
  1309. async fn add_collaborator<S>(
  1310. app: &S,
  1311. owner_token: &str,
  1312. owner: &str,
  1313. repo: &str,
  1314. username: &str,
  1315. permission: &str,
  1316. ) where
  1317. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1318. {
  1319. let body = format!(r#"{{"username":"{username}","permission":"{permission}"}}"#);
  1320. let request = test::TestRequest::post()
  1321. .uri(&format!("/api/repos/{owner}/{repo}/collaborators"))
  1322. .insert_header(("authorization", format!("Bearer {owner_token}")))
  1323. .insert_header(("content-type", "application/json"))
  1324. .set_payload(body)
  1325. .to_request();
  1326. let response = test::call_service(app, request).await;
  1327. assert_eq!(response.status(), StatusCode::OK);
  1328. }
  1329. async fn assert_error_response(
  1330. response: ServiceResponse<BoxBody>,
  1331. expected_status: StatusCode,
  1332. expected_code: &str,
  1333. expected_message: &str,
  1334. ) {
  1335. assert_eq!(response.status(), expected_status);
  1336. let body: Value = test::read_body_json(response).await;
  1337. assert_eq!(body.get("code").and_then(Value::as_str), Some(expected_code));
  1338. assert_eq!(
  1339. body.get("message").and_then(Value::as_str),
  1340. Some(expected_message)
  1341. );
  1342. assert_eq!(
  1343. body.get("status").and_then(Value::as_u64),
  1344. Some(expected_status.as_u16() as u64)
  1345. );
  1346. }
  1347. async fn list_current_user_repositories<S>(
  1348. app: &S,
  1349. token: &str,
  1350. query: &str,
  1351. ) -> Vec<ApiRepositoryResponse>
  1352. where
  1353. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1354. {
  1355. let request = test::TestRequest::get()
  1356. .uri(&format!("/api/user/repos?q={query}"))
  1357. .insert_header(("authorization", format!("Bearer {token}")))
  1358. .to_request();
  1359. let response = test::call_service(app, request).await;
  1360. assert_eq!(response.status(), StatusCode::OK);
  1361. test::read_body_json(response).await
  1362. }
  1363. async fn list_user_repositories<S>(
  1364. app: &S,
  1365. token: Option<&str>,
  1366. username: &str,
  1367. query: &str,
  1368. ) -> Vec<ApiRepositoryResponse>
  1369. where
  1370. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1371. {
  1372. let mut request = test::TestRequest::get().uri(&format!("/api/users/{username}/repos?q={query}"));
  1373. if let Some(token) = token {
  1374. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1375. }
  1376. let response = test::call_service(app, request.to_request()).await;
  1377. assert_eq!(response.status(), StatusCode::OK);
  1378. test::read_body_json(response).await
  1379. }
  1380. async fn search_repositories<S>(
  1381. app: &S,
  1382. token: Option<&str>,
  1383. query: &str,
  1384. ) -> Vec<ApiRepositoryResponse>
  1385. where
  1386. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1387. {
  1388. let mut request = test::TestRequest::get().uri(&format!("/api/repos/search?q={query}"));
  1389. if let Some(token) = token {
  1390. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1391. }
  1392. let response = test::call_service(app, request.to_request()).await;
  1393. assert_eq!(response.status(), StatusCode::OK);
  1394. test::read_body_json(response).await
  1395. }
  1396. async fn list_collaborators<S>(
  1397. app: &S,
  1398. token: Option<&str>,
  1399. owner: &str,
  1400. repo: &str,
  1401. ) -> Vec<ApiCollaboratorResponse>
  1402. where
  1403. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1404. {
  1405. let mut request =
  1406. test::TestRequest::get().uri(&format!("/api/repos/{owner}/{repo}/collaborators"));
  1407. if let Some(token) = token {
  1408. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1409. }
  1410. let response = test::call_service(app, request.to_request()).await;
  1411. assert_eq!(response.status(), StatusCode::OK);
  1412. test::read_body_json(response).await
  1413. }
  1414. async fn get_collaborator<S>(
  1415. app: &S,
  1416. token: Option<&str>,
  1417. owner: &str,
  1418. repo: &str,
  1419. username: &str,
  1420. ) -> ApiCollaboratorResponse
  1421. where
  1422. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1423. {
  1424. let mut request = test::TestRequest::get()
  1425. .uri(&format!("/api/repos/{owner}/{repo}/collaborators/{username}"));
  1426. if let Some(token) = token {
  1427. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1428. }
  1429. let response = test::call_service(app, request.to_request()).await;
  1430. assert_eq!(response.status(), StatusCode::OK);
  1431. test::read_body_json(response).await
  1432. }
  1433. fn encode_base64(input: &str) -> String {
  1434. const TABLE: &[u8; 64] = b"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
  1435. let bytes = input.as_bytes();
  1436. let mut out = String::new();
  1437. let mut index = 0;
  1438. while index < bytes.len() {
  1439. let b0 = bytes[index];
  1440. let b1 = *bytes.get(index + 1).unwrap_or(&0);
  1441. let b2 = *bytes.get(index + 2).unwrap_or(&0);
  1442. out.push(TABLE[(b0 >> 2) as usize] as char);
  1443. out.push(TABLE[((b0 & 0b0000_0011) << 4 | (b1 >> 4)) as usize] as char);
  1444. if index + 1 < bytes.len() {
  1445. out.push(TABLE[((b1 & 0b0000_1111) << 2 | (b2 >> 6)) as usize] as char);
  1446. } else {
  1447. out.push('=');
  1448. }
  1449. if index + 2 < bytes.len() {
  1450. out.push(TABLE[(b2 & 0b0011_1111) as usize] as char);
  1451. } else {
  1452. out.push('=');
  1453. }
  1454. index += 3;
  1455. }
  1456. out
  1457. }
  1458. fn git(repo_path: &Path, args: &[&str]) -> String {
  1459. let output = Command::new("git")
  1460. .arg("--git-dir")
  1461. .arg(repo_path)
  1462. .args(args)
  1463. .output()
  1464. .expect("run git");
  1465. assert!(
  1466. output.status.success(),
  1467. "git command failed: {}",
  1468. String::from_utf8_lossy(&output.stderr)
  1469. );
  1470. String::from_utf8_lossy(&output.stdout).trim().to_string()
  1471. }
  1472. fn push_commit_to_branch(
  1473. repo_path: &Path,
  1474. base_branch: &str,
  1475. branch: &str,
  1476. author_name: &str,
  1477. author_email: &str,
  1478. file_name: &str,
  1479. content: &str,
  1480. ) {
  1481. let unique = SystemTime::now()
  1482. .duration_since(UNIX_EPOCH)
  1483. .expect("clock")
  1484. .as_nanos();
  1485. let worktree = std::env::temp_dir().join(format!("gitr-pr-work-{branch}-{unique}"));
  1486. let _ = fs::remove_dir_all(&worktree);
  1487. let clone = Command::new("git")
  1488. .arg("clone")
  1489. .arg(repo_path)
  1490. .arg(&worktree)
  1491. .output()
  1492. .expect("clone repo");
  1493. assert!(
  1494. clone.status.success(),
  1495. "git clone failed: {}",
  1496. String::from_utf8_lossy(&clone.stderr)
  1497. );
  1498. let checkout = Command::new("git")
  1499. .current_dir(&worktree)
  1500. .arg("checkout")
  1501. .arg("-b")
  1502. .arg(branch)
  1503. .arg(format!("origin/{base_branch}"))
  1504. .output()
  1505. .expect("checkout branch");
  1506. assert!(
  1507. checkout.status.success(),
  1508. "git checkout failed: {}",
  1509. String::from_utf8_lossy(&checkout.stderr)
  1510. );
  1511. fs::write(worktree.join(file_name), content).expect("write test file");
  1512. let add = Command::new("git")
  1513. .current_dir(&worktree)
  1514. .arg("add")
  1515. .arg(file_name)
  1516. .output()
  1517. .expect("git add");
  1518. assert!(
  1519. add.status.success(),
  1520. "git add failed: {}",
  1521. String::from_utf8_lossy(&add.stderr)
  1522. );
  1523. let commit = Command::new("git")
  1524. .current_dir(&worktree)
  1525. .env("GIT_AUTHOR_NAME", author_name)
  1526. .env("GIT_AUTHOR_EMAIL", author_email)
  1527. .env("GIT_COMMITTER_NAME", author_name)
  1528. .env("GIT_COMMITTER_EMAIL", author_email)
  1529. .arg("commit")
  1530. .arg("-m")
  1531. .arg(format!("Add {file_name}"))
  1532. .output()
  1533. .expect("git commit");
  1534. assert!(
  1535. commit.status.success(),
  1536. "git commit failed: {}",
  1537. String::from_utf8_lossy(&commit.stderr)
  1538. );
  1539. let push = Command::new("git")
  1540. .current_dir(&worktree)
  1541. .arg("push")
  1542. .arg("origin")
  1543. .arg(format!("HEAD:refs/heads/{branch}"))
  1544. .output()
  1545. .expect("git push");
  1546. assert!(
  1547. push.status.success(),
  1548. "git push failed: {}",
  1549. String::from_utf8_lossy(&push.stderr)
  1550. );
  1551. let _ = fs::remove_dir_all(&worktree);
  1552. }
  1553. fn push_commit_to_existing_branch(
  1554. repo_path: &Path,
  1555. branch: &str,
  1556. author_name: &str,
  1557. author_email: &str,
  1558. file_name: &str,
  1559. content: &str,
  1560. ) {
  1561. let unique = SystemTime::now()
  1562. .duration_since(UNIX_EPOCH)
  1563. .expect("clock")
  1564. .as_nanos();
  1565. let worktree = std::env::temp_dir().join(format!("gitr-base-work-{branch}-{unique}"));
  1566. let _ = fs::remove_dir_all(&worktree);
  1567. let clone = Command::new("git")
  1568. .arg("clone")
  1569. .arg(repo_path)
  1570. .arg(&worktree)
  1571. .output()
  1572. .expect("clone repo");
  1573. assert!(
  1574. clone.status.success(),
  1575. "git clone failed: {}",
  1576. String::from_utf8_lossy(&clone.stderr)
  1577. );
  1578. let checkout = Command::new("git")
  1579. .current_dir(&worktree)
  1580. .arg("checkout")
  1581. .arg(branch)
  1582. .output()
  1583. .expect("checkout branch");
  1584. assert!(
  1585. checkout.status.success(),
  1586. "git checkout failed: {}",
  1587. String::from_utf8_lossy(&checkout.stderr)
  1588. );
  1589. fs::write(worktree.join(file_name), content).expect("write test file");
  1590. let add = Command::new("git")
  1591. .current_dir(&worktree)
  1592. .arg("add")
  1593. .arg(file_name)
  1594. .output()
  1595. .expect("git add");
  1596. assert!(
  1597. add.status.success(),
  1598. "git add failed: {}",
  1599. String::from_utf8_lossy(&add.stderr)
  1600. );
  1601. let commit = Command::new("git")
  1602. .current_dir(&worktree)
  1603. .env("GIT_AUTHOR_NAME", author_name)
  1604. .env("GIT_AUTHOR_EMAIL", author_email)
  1605. .env("GIT_COMMITTER_NAME", author_name)
  1606. .env("GIT_COMMITTER_EMAIL", author_email)
  1607. .arg("commit")
  1608. .arg("-m")
  1609. .arg(format!("Add {file_name}"))
  1610. .output()
  1611. .expect("git commit");
  1612. assert!(
  1613. commit.status.success(),
  1614. "git commit failed: {}",
  1615. String::from_utf8_lossy(&commit.stderr)
  1616. );
  1617. let push = Command::new("git")
  1618. .current_dir(&worktree)
  1619. .arg("push")
  1620. .arg("origin")
  1621. .arg(format!("HEAD:refs/heads/{branch}"))
  1622. .output()
  1623. .expect("git push");
  1624. assert!(
  1625. push.status.success(),
  1626. "git push failed: {}",
  1627. String::from_utf8_lossy(&push.stderr)
  1628. );
  1629. let _ = fs::remove_dir_all(&worktree);
  1630. }
  1631. struct TestEnv {
  1632. root: PathBuf,
  1633. }
  1634. impl TestEnv {
  1635. fn new(label: &str) -> Self {
  1636. let unique = SystemTime::now()
  1637. .duration_since(UNIX_EPOCH)
  1638. .expect("clock")
  1639. .as_nanos();
  1640. let root = std::env::temp_dir().join(format!("gitr-test-{label}-{unique}"));
  1641. fs::create_dir_all(&root).expect("create temp root");
  1642. Self { root }
  1643. }
  1644. async fn app(
  1645. &self,
  1646. ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
  1647. self.app_with_git_binary("git").await
  1648. }
  1649. async fn app_with_git_binary(
  1650. &self,
  1651. git_binary: &str,
  1652. ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
  1653. let database_path = self.root.join("data").join("gitr.db");
  1654. let repository_root = self.root.join("data").join("repositories");
  1655. fs::create_dir_all(&repository_root).expect("repo root");
  1656. let config = AppConfig {
  1657. server: ServerConfig {
  1658. bind: "127.0.0.1:0".to_string(),
  1659. external_url: "http://127.0.0.1:3000/".to_string(),
  1660. },
  1661. database: DatabaseConfig {
  1662. path: database_path,
  1663. },
  1664. repository: RepositoryConfig {
  1665. root: repository_root,
  1666. default_branch: "main".to_string(),
  1667. git_binary: git_binary.to_string(),
  1668. },
  1669. app: CoreAppConfig {
  1670. run_user: "git".to_string(),
  1671. },
  1672. };
  1673. config.prepare().expect("prepare config");
  1674. let db = Database::open(&config.database.path).expect("open db");
  1675. db.init_schema().expect("init schema");
  1676. test::init_service(App::new().service(build_scope(Arc::new(AppState::new(config, db)))))
  1677. .await
  1678. }
  1679. fn repo_path(&self, owner: &str, repo: &str) -> PathBuf {
  1680. self.root
  1681. .join("data")
  1682. .join("repositories")
  1683. .join(owner)
  1684. .join(format!("{repo}.git"))
  1685. }
  1686. }
  1687. impl Drop for TestEnv {
  1688. fn drop(&mut self) {
  1689. let _ = fs::remove_dir_all(&self.root);
  1690. }
  1691. }