| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923 |
- use std::{
- fs,
- path::{Path, PathBuf},
- process::Command,
- sync::Arc,
- time::{SystemTime, UNIX_EPOCH},
- };
- use actix_http::Request;
- use actix_web::{
- App,
- body::BoxBody,
- dev::{Service, ServiceResponse},
- http::StatusCode,
- test,
- };
- use gitr::{
- app::AppState,
- conf::{AppConfig, CoreAppConfig, DatabaseConfig, RepositoryConfig, ServerConfig},
- db::Database,
- http::build_scope,
- models::{
- AccessMode, ApiCollaboratorResponse, ApiLoginResponse, ApiPullRequestDetailResponse,
- ApiPullRequestResponse, ApiRepositoryResponse, ApiUser, Branch, CompareResponse,
- CreateAccessTokenResponse, PullRequestStatus,
- },
- };
- use serde_json::Value;
- #[actix_web::test]
- async fn create_user_and_bare_repo_via_http() {
- let env = TestEnv::new("bare");
- let app = env.app().await;
- let user = create_user(&app, "alice").await;
- assert_eq!(user.name, "alice");
- let token = login(&app, "alice").await.token;
- let repo = create_repo(&app, &token, "demo", false).await;
- assert_eq!(repo.owner.name, "alice");
- assert_eq!(repo.repo.name, "demo");
- assert!(repo.repo.is_bare);
- let repo_path = env.repo_path("alice", "demo");
- assert!(repo_path.exists());
- assert!(repo_path.join("HEAD").exists());
- assert_eq!(
- git(&repo_path, &["symbolic-ref", "HEAD"]),
- "refs/heads/main"
- );
- }
- #[actix_web::test]
- async fn create_repo_with_auto_init_creates_first_commit() {
- let env = TestEnv::new("autoinit");
- let app = env.app().await;
- create_user(&app, "bob").await;
- let token = login(&app, "bob").await.token;
- let repo = create_repo(&app, &token, "seeded", true).await;
- assert!(!repo.repo.is_bare);
- let repo_path = env.repo_path("bob", "seeded");
- let head = git(&repo_path, &["rev-parse", "refs/heads/main"]);
- assert_eq!(head.len(), 40);
- let readme = git(&repo_path, &["show", "refs/heads/main:README.md"]);
- assert_eq!(readme, "# seeded");
- }
- #[actix_web::test]
- async fn duplicate_user_is_rejected() {
- let env = TestEnv::new("duplicate-user");
- let app = env.app().await;
- create_user(&app, "carol").await;
- let admin_token = login(&app, "carol").await.token;
- let request = test::TestRequest::post()
- .uri("/api/admin/users")
- .insert_header(("authorization", format!("Bearer {admin_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"username":"carol","email":"carol@example.com","password":"password123"}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::CONFLICT);
- assert_error_response(
- response,
- StatusCode::CONFLICT,
- "conflict",
- "user already exists: carol",
- )
- .await;
- }
- #[actix_web::test]
- async fn duplicate_repo_is_rejected() {
- let env = TestEnv::new("duplicate-repo");
- let app = env.app().await;
- create_user(&app, "dave").await;
- let token = login(&app, "dave").await.token;
- create_repo(&app, &token, "demo", false).await;
- let request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"demo","description":"again","auto_init":false}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::CONFLICT);
- }
- #[actix_web::test]
- async fn missing_authorization_is_rejected() {
- let env = TestEnv::new("missing-auth");
- let app = env.app().await;
- let request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_error_response(
- response,
- StatusCode::UNAUTHORIZED,
- "unauthorized",
- "missing authorization header",
- )
- .await;
- }
- #[actix_web::test]
- async fn invalid_repo_name_is_rejected() {
- let env = TestEnv::new("invalid-repo");
- let app = env.app().await;
- create_user(&app, "erin").await;
- let token = login(&app, "erin").await.token;
- let request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"bad/name","description":"demo","auto_init":false}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_error_response(
- response,
- StatusCode::BAD_REQUEST,
- "validation_error",
- "repository name must contain only ASCII letters, digits, '-', '_' or '.'",
- )
- .await;
- }
- #[actix_web::test]
- async fn invalid_user_name_is_rejected() {
- let env = TestEnv::new("invalid-user");
- let app = env.app().await;
- let request = test::TestRequest::post()
- .uri("/api/admin/users")
- .insert_header(("content-type", "application/json"))
- .set_payload(
- r#"{"username":"bad/name","email":"bad@example.com","password":"password123"}"#,
- )
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::BAD_REQUEST);
- }
- #[actix_web::test]
- async fn git_init_failure_does_not_leave_repo_record() {
- let env = TestEnv::new("git-init-failure");
- let app = env
- .app_with_git_binary("definitely-not-a-real-git-binary")
- .await;
- create_user(&app, "frank").await;
- let token = login(&app, "frank").await.token;
- let request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"blocked","description":"demo","auto_init":false}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_error_response(
- response,
- StatusCode::INTERNAL_SERVER_ERROR,
- "internal_error",
- "internal server error",
- )
- .await;
- let get_request = test::TestRequest::get()
- .uri("/api/repos/frank/blocked")
- .to_request();
- let get_response = test::call_service(&app, get_request).await;
- assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
- }
- #[actix_web::test]
- async fn login_rejects_bad_password() {
- let env = TestEnv::new("bad-login");
- let app = env.app().await;
- create_user(&app, "grace").await;
- let request = test::TestRequest::post()
- .uri("/api/user/login")
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"login":"grace","password":"wrong-password"}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
- }
- #[actix_web::test]
- async fn token_endpoint_creates_second_token() {
- let env = TestEnv::new("token-endpoint");
- let app = env.app().await;
- create_user(&app, "heidi").await;
- let login = login(&app, "heidi").await;
- let request = test::TestRequest::post()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"cli"}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- let token: CreateAccessTokenResponse = test::read_body_json(response).await;
- assert_eq!(token.name, "cli");
- assert!(!token.token.is_empty());
- assert_eq!(token.updated_unix, 0);
- }
- #[actix_web::test]
- async fn access_token_names_must_be_unique_per_user() {
- let env = TestEnv::new("token-unique");
- let app = env.app().await;
- create_user(&app, "alice").await;
- let login = login(&app, "alice").await;
- let first = test::TestRequest::post()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"cli"}"#)
- .to_request();
- let first_response = test::call_service(&app, first).await;
- assert_eq!(first_response.status(), StatusCode::OK);
- let second = test::TestRequest::post()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"cli"}"#)
- .to_request();
- let second_response = test::call_service(&app, second).await;
- assert_eq!(second_response.status(), StatusCode::CONFLICT);
- }
- #[actix_web::test]
- async fn access_token_can_be_listed_and_deleted() {
- let env = TestEnv::new("token-list-delete");
- let app = env.app().await;
- create_user(&app, "alice").await;
- let login = login(&app, "alice").await;
- let create = test::TestRequest::post()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"cli"}"#)
- .to_request();
- let create_response = test::call_service(&app, create).await;
- assert_eq!(create_response.status(), StatusCode::OK);
- let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
- assert_eq!(token.updated_unix, 0);
- let list = test::TestRequest::get()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .to_request();
- let list_response = test::call_service(&app, list).await;
- assert_eq!(list_response.status(), StatusCode::OK);
- let list_body: Value = test::read_body_json(list_response).await;
- let list_entries = list_body
- .as_array()
- .expect("token list response should be an array");
- assert_eq!(list_entries.len(), 2);
- assert!(list_entries
- .iter()
- .any(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id)));
- assert!(list_entries.iter().all(|entry| entry.get("token").is_none()));
- let delete = test::TestRequest::delete()
- .uri(&format!("/api/user/tokens/{}", token.id))
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .to_request();
- let delete_response = test::call_service(&app, delete).await;
- assert_eq!(delete_response.status(), StatusCode::NO_CONTENT);
- let list_again = test::TestRequest::get()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .to_request();
- let list_again_response = test::call_service(&app, list_again).await;
- assert_eq!(list_again_response.status(), StatusCode::OK);
- let list_again_body: Value = test::read_body_json(list_again_response).await;
- let list_again_entries = list_again_body
- .as_array()
- .expect("token list response should be an array");
- assert_eq!(list_again_entries.len(), 1);
- assert!(list_again_entries
- .iter()
- .all(|entry| entry.get("id").and_then(Value::as_i64) != Some(token.id)));
- }
- #[actix_web::test]
- async fn access_token_updated_unix_changes_after_use() {
- let env = TestEnv::new("token-touch");
- let app = env.app().await;
- create_user(&app, "alice").await;
- let login = login(&app, "alice").await;
- let create = test::TestRequest::post()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"cli"}"#)
- .to_request();
- let create_response = test::call_service(&app, create).await;
- assert_eq!(create_response.status(), StatusCode::OK);
- let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
- assert_eq!(token.updated_unix, 0);
- let use_cli = test::TestRequest::get()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", token.token)))
- .to_request();
- let use_cli_response = test::call_service(&app, use_cli).await;
- assert_eq!(use_cli_response.status(), StatusCode::OK);
- let list = test::TestRequest::get()
- .uri("/api/user/tokens")
- .insert_header(("authorization", format!("Bearer {}", login.token)))
- .to_request();
- let list_response = test::call_service(&app, list).await;
- assert_eq!(list_response.status(), StatusCode::OK);
- let list_body: Value = test::read_body_json(list_response).await;
- let list_entries = list_body
- .as_array()
- .expect("token list response should be an array");
- let cli_entry = list_entries
- .iter()
- .find(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id))
- .expect("cli token should exist");
- assert!(
- cli_entry
- .get("updated_unix")
- .and_then(Value::as_i64)
- .unwrap_or_default()
- > 0
- );
- }
- #[actix_web::test]
- async fn admin_user_creation_requires_bootstrap_or_admin_token() {
- let env = TestEnv::new("admin-auth");
- let app = env.app().await;
- create_user(&app, "admin").await;
- let admin_token = login(&app, "admin").await.token;
- let anonymous = test::TestRequest::post()
- .uri("/api/admin/users")
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"username":"member","email":"member@example.com","password":"password123"}"#)
- .to_request();
- let anonymous_response = test::call_service(&app, anonymous).await;
- assert_eq!(anonymous_response.status(), StatusCode::UNAUTHORIZED);
- let member = create_user_as_admin(&app, &admin_token, "member").await;
- assert_eq!(member.name, "member");
- }
- #[actix_web::test]
- async fn api_responses_do_not_expose_password_hash() {
- let env = TestEnv::new("redaction");
- let app = env.app().await;
- create_user(&app, "alice").await;
- let token = login(&app, "alice").await.token;
- let user_request = test::TestRequest::get().uri("/api/users/alice").to_request();
- let user_response = test::call_service(&app, user_request).await;
- assert_eq!(user_response.status(), StatusCode::OK);
- let user_body: Value = test::read_body_json(user_response).await;
- assert!(user_body.get("password_hash").is_none());
- assert_eq!(user_body.get("email").and_then(Value::as_str), Some(""));
- let repo_request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
- .to_request();
- let repo_response = test::call_service(&app, repo_request).await;
- assert_eq!(repo_response.status(), StatusCode::OK);
- let repo_body: Value = test::read_body_json(repo_response).await;
- assert!(
- repo_body
- .get("owner")
- .and_then(|owner| owner.get("password_hash"))
- .is_none()
- );
- }
- #[actix_web::test]
- async fn private_repo_metadata_is_not_visible_without_read_access() {
- let env = TestEnv::new("private-repo-opaque");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
- create_user_as_admin(&app, &owner_token, "outsider").await;
- let outsider_token = login(&app, "outsider").await.token;
- let anonymous = test::TestRequest::get()
- .uri("/api/repos/owner/secret")
- .to_request();
- let anonymous_response = test::call_service(&app, anonymous).await;
- assert_error_response(
- anonymous_response,
- StatusCode::NOT_FOUND,
- "not_found",
- "repository not found: owner/secret",
- )
- .await;
- let outsider = test::TestRequest::get()
- .uri("/api/repos/owner/secret")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let outsider_response = test::call_service(&app, outsider).await;
- assert_error_response(
- outsider_response,
- StatusCode::NOT_FOUND,
- "not_found",
- "repository not found: owner/secret",
- )
- .await;
- }
- #[actix_web::test]
- async fn private_repo_read_endpoints_are_not_visible_without_access() {
- let env = TestEnv::new("private-repo-read-opaque");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
- create_user_as_admin(&app, &owner_token, "outsider").await;
- let outsider_token = login(&app, "outsider").await.token;
- let branches = test::TestRequest::get()
- .uri("/api/repos/owner/secret/branches")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let branches_response = test::call_service(&app, branches).await;
- assert_eq!(branches_response.status(), StatusCode::NOT_FOUND);
- let pulls = test::TestRequest::get()
- .uri("/api/repos/owner/secret/pulls")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let pulls_response = test::call_service(&app, pulls).await;
- assert_eq!(pulls_response.status(), StatusCode::NOT_FOUND);
- let forks = test::TestRequest::post()
- .uri("/api/repos/owner/secret/forks")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"secret-fork","description":"x"}"#)
- .to_request();
- let forks_response = test::call_service(&app, forks).await;
- assert_eq!(forks_response.status(), StatusCode::NOT_FOUND);
- let compare = test::TestRequest::get()
- .uri("/api/repos/owner/secret/compare?base=main&head_owner=owner&head_repo=secret&head_branch=main")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let compare_response = test::call_service(&app, compare).await;
- assert_eq!(compare_response.status(), StatusCode::NOT_FOUND);
- let create_pr = test::TestRequest::post()
- .uri("/api/repos/owner/secret/pulls")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(
- r#"{"head_owner":"owner","head_repo":"secret","head_branch":"main","base_branch":"main","title":"x","body":""}"#,
- )
- .to_request();
- let create_pr_response = test::call_service(&app, create_pr).await;
- assert_eq!(create_pr_response.status(), StatusCode::NOT_FOUND);
- }
- #[actix_web::test]
- async fn list_user_repositories_hides_private_repos_without_access() {
- let env = TestEnv::new("list-user-repos");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_repo_with_visibility(&app, &owner_token, "public", true, false).await;
- create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
- create_user_as_admin(&app, &owner_token, "outsider").await;
- let outsider_token = login(&app, "outsider").await.token;
- let anonymous_repos = list_user_repositories(&app, None, "owner", "").await;
- assert_eq!(anonymous_repos.len(), 1);
- assert_eq!(anonymous_repos[0].repo.name, "public");
- assert_eq!(anonymous_repos[0].permission.mode, AccessMode::Read);
- let outsider_repos = list_user_repositories(&app, Some(&outsider_token), "owner", "").await;
- assert_eq!(outsider_repos.len(), 1);
- assert_eq!(outsider_repos[0].repo.name, "public");
- assert!(outsider_repos[0].permission.can_read);
- assert!(!outsider_repos[0].permission.can_write);
- let owner_repos = list_user_repositories(&app, Some(&owner_token), "owner", "").await;
- assert_eq!(owner_repos.len(), 2);
- assert!(owner_repos.iter().any(|repo| repo.repo.name == "secret"));
- assert!(owner_repos.iter().all(|repo| repo.permission.is_owner));
- }
- #[actix_web::test]
- async fn current_user_repo_list_includes_visible_repositories() {
- let env = TestEnv::new("current-user-repos");
- let app = env.app().await;
- create_user(&app, "alice").await;
- let alice_token = login(&app, "alice").await.token;
- create_repo_with_visibility(&app, &alice_token, "own-public", true, false).await;
- create_repo_with_visibility(&app, &alice_token, "own-private", true, true).await;
- create_user_as_admin(&app, &alice_token, "bob").await;
- let bob_token = login(&app, "bob").await.token;
- create_repo_with_visibility(&app, &bob_token, "bob-public", true, false).await;
- create_repo_with_visibility(&app, &bob_token, "bob-shared", true, true).await;
- add_collaborator(&app, &bob_token, "bob", "bob-shared", "alice", "read").await;
- let repos = list_current_user_repositories(&app, &alice_token, "").await;
- assert_eq!(repos.len(), 4);
- assert!(repos.iter().any(|repo| {
- repo.owner.name == "alice" && repo.repo.name == "own-private" && repo.permission.is_owner
- }));
- assert!(repos.iter().any(|repo| {
- repo.owner.name == "bob"
- && repo.repo.name == "bob-public"
- && repo.permission.can_read
- && !repo.permission.can_write
- }));
- assert!(repos.iter().any(|repo| {
- repo.owner.name == "bob"
- && repo.repo.name == "bob-shared"
- && repo.permission.can_read
- && !repo.permission.can_write
- }));
- }
- #[actix_web::test]
- async fn repository_search_filters_to_visible_results() {
- let env = TestEnv::new("search-repos");
- let app = env.app().await;
- create_user(&app, "searcher").await;
- let searcher_token = login(&app, "searcher").await.token;
- create_user_as_admin(&app, &searcher_token, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_repo_with_visibility(&app, &owner_token, "rust-public", true, false).await;
- create_repo_with_visibility(&app, &owner_token, "python-public", true, false).await;
- create_repo_with_visibility(&app, &owner_token, "rust-secret", true, true).await;
- add_collaborator(&app, &owner_token, "owner", "rust-secret", "searcher", "read").await;
- let anonymous = search_repositories(&app, None, "rust").await;
- assert_eq!(anonymous.len(), 1);
- assert_eq!(anonymous[0].repo.name, "rust-public");
- let authed = search_repositories(&app, Some(&searcher_token), "rust").await;
- assert_eq!(authed.len(), 2);
- assert!(authed.iter().any(|repo| repo.repo.name == "rust-public"));
- assert!(authed.iter().any(|repo| repo.repo.name == "rust-secret"));
- }
- #[actix_web::test]
- async fn invalid_collaborator_permission_is_rejected() {
- let env = TestEnv::new("invalid-collab-permission");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_user_as_admin(&app, &owner_token, "guest").await;
- create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
- let request = test::TestRequest::post()
- .uri("/api/repos/owner/shared/collaborators")
- .insert_header(("authorization", format!("Bearer {owner_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"username":"guest","permission":"super"}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::BAD_REQUEST);
- }
- #[actix_web::test]
- async fn collaborator_list_and_check_return_expected_permissions() {
- let env = TestEnv::new("list-collaborators");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_user_as_admin(&app, &owner_token, "reader").await;
- create_user_as_admin(&app, &owner_token, "adminer").await;
- create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
- add_collaborator(&app, &owner_token, "owner", "shared", "reader", "read").await;
- add_collaborator(&app, &owner_token, "owner", "shared", "adminer", "admin").await;
- let collaborators = list_collaborators(&app, Some(&owner_token), "owner", "shared").await;
- assert_eq!(collaborators.len(), 2);
- assert_eq!(collaborators[0].user.name, "adminer");
- assert_eq!(collaborators[1].user.name, "reader");
- let reader = get_collaborator(&app, Some(&owner_token), "owner", "shared", "reader").await;
- assert_eq!(reader.user.name, "reader");
- assert_eq!(format!("{:?}", reader.mode), "Read");
- }
- #[actix_web::test]
- async fn private_collaborator_endpoints_are_not_visible_without_access() {
- let env = TestEnv::new("private-collaborator-opaque");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
- create_user_as_admin(&app, &owner_token, "outsider").await;
- let outsider_token = login(&app, "outsider").await.token;
- let list = test::TestRequest::get()
- .uri("/api/repos/owner/secret/collaborators")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let list_response = test::call_service(&app, list).await;
- assert_eq!(list_response.status(), StatusCode::NOT_FOUND);
- let get = test::TestRequest::get()
- .uri("/api/repos/owner/secret/collaborators/outsider")
- .insert_header(("authorization", format!("Bearer {outsider_token}")))
- .to_request();
- let get_response = test::call_service(&app, get).await;
- assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
- }
- #[actix_web::test]
- async fn public_git_info_refs_allows_anonymous_pull() {
- let env = TestEnv::new("public-git-http");
- let app = env.app().await;
- create_user(&app, "ivan").await;
- let token = login(&app, "ivan").await.token;
- create_repo_with_visibility(&app, &token, "public", true, false).await;
- let request = test::TestRequest::get()
- .uri("/ivan/public.git/info/refs?service=git-upload-pack")
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- assert_eq!(
- response
- .headers()
- .get("content-type")
- .and_then(|v| v.to_str().ok()),
- Some("application/x-git-upload-pack-advertisement")
- );
- }
- #[actix_web::test]
- async fn private_git_info_refs_requires_basic_auth() {
- let env = TestEnv::new("private-git-http");
- let app = env.app().await;
- create_user(&app, "judy").await;
- let token = login(&app, "judy").await.token;
- create_repo_with_visibility(&app, &token, "private", true, true).await;
- let unauthenticated = test::TestRequest::get()
- .uri("/judy/private.git/info/refs?service=git-upload-pack")
- .to_request();
- let unauthenticated_response = test::call_service(&app, unauthenticated).await;
- assert_eq!(unauthenticated_response.status(), StatusCode::UNAUTHORIZED);
- let basic = basic_auth_header("judy", "password123");
- let authenticated = test::TestRequest::get()
- .uri("/judy/private.git/info/refs?service=git-upload-pack")
- .insert_header(("authorization", basic))
- .to_request();
- let authenticated_response = test::call_service(&app, authenticated).await;
- assert_eq!(authenticated_response.status(), StatusCode::OK);
- }
- #[actix_web::test]
- async fn private_git_info_refs_allows_read_collaborator() {
- let env = TestEnv::new("private-collab-read");
- let app = env.app().await;
- create_user(&app, "kate").await;
- let owner_token = login(&app, "kate").await.token;
- create_user_as_admin(&app, &owner_token, "louis").await;
- create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
- add_collaborator(&app, &owner_token, "kate", "shared", "louis", "read").await;
- let collaborator = test::TestRequest::get()
- .uri("/kate/shared.git/info/refs?service=git-upload-pack")
- .insert_header(("authorization", basic_auth_header("louis", "password123")))
- .to_request();
- let collaborator_response = test::call_service(&app, collaborator).await;
- assert_eq!(collaborator_response.status(), StatusCode::OK);
- }
- #[actix_web::test]
- async fn read_collaborator_cannot_advertise_receive_pack() {
- let env = TestEnv::new("private-collab-read-no-push");
- let app = env.app().await;
- create_user(&app, "mike").await;
- let owner_token = login(&app, "mike").await.token;
- create_user_as_admin(&app, &owner_token, "nina").await;
- create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
- add_collaborator(&app, &owner_token, "mike", "shared", "nina", "read").await;
- let collaborator = test::TestRequest::get()
- .uri("/mike/shared.git/info/refs?service=git-receive-pack")
- .insert_header(("authorization", basic_auth_header("nina", "password123")))
- .to_request();
- let collaborator_response = test::call_service(&app, collaborator).await;
- assert_eq!(collaborator_response.status(), StatusCode::FORBIDDEN);
- }
- #[actix_web::test]
- async fn fork_repository_clones_base_repo() {
- let env = TestEnv::new("fork-repository");
- let app = env.app().await;
- create_user(&app, "olivia").await;
- let owner_token = login(&app, "olivia").await.token;
- create_user_as_admin(&app, &owner_token, "peter").await;
- let forker_token = login(&app, "peter").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- let request = test::TestRequest::post()
- .uri("/api/repos/olivia/origin/forks")
- .insert_header(("authorization", format!("Bearer {forker_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"name":"origin-fork","description":"forked"}"#)
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- let fork_path = env.repo_path("peter", "origin-fork");
- assert!(fork_path.exists());
- let head = git(&fork_path, &["rev-parse", "refs/heads/main"]);
- assert_eq!(head.len(), 40);
- }
- #[actix_web::test]
- async fn list_branches_returns_main_branch() {
- let env = TestEnv::new("list-branches");
- let app = env.app().await;
- create_user(&app, "quinn").await;
- let token = login(&app, "quinn").await.token;
- create_repo_with_visibility(&app, &token, "branches", true, false).await;
- let request = test::TestRequest::get()
- .uri("/api/repos/quinn/branches/branches")
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- let branches: Vec<Branch> = test::read_body_json(response).await;
- assert!(branches.iter().any(|branch| branch.name == "main"));
- }
- #[actix_web::test]
- async fn create_pull_request_from_fork_succeeds() {
- let env = TestEnv::new("create-pr");
- let app = env.app().await;
- create_user(&app, "rachel").await;
- let owner_token = login(&app, "rachel").await.token;
- create_user_as_admin(&app, &owner_token, "sam").await;
- let forker_token = login(&app, "sam").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "rachel", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("sam", "origin-fork"),
- "main",
- "feature-one",
- "sam",
- "sam@example.com",
- "feature.txt",
- "hello from fork\n",
- );
- let pull = create_pull_request(
- &app,
- &forker_token,
- "rachel",
- "origin",
- "sam",
- "origin-fork",
- "feature-one",
- "main",
- "Add feature one",
- )
- .await;
- assert_eq!(pull.base_repo.owner.name, "rachel");
- assert_eq!(pull.base_repo.repo.name, "origin");
- assert_eq!(pull.head_repo.owner.name, "sam");
- assert_eq!(pull.head_repo.repo.name, "origin-fork");
- assert_eq!(pull.pull_request.index, 1);
- assert_eq!(pull.pull_request.head_branch, "feature-one");
- assert_eq!(pull.pull_request.base_branch, "main");
- assert_eq!(pull.pull_request.status, PullRequestStatus::Mergeable);
- assert!(!pull.pull_request.merge_base.is_empty());
- }
- #[actix_web::test]
- async fn compare_endpoint_returns_commit_and_file_stats() {
- let env = TestEnv::new("compare-pr");
- let app = env.app().await;
- create_user(&app, "rhea").await;
- let owner_token = login(&app, "rhea").await.token;
- create_user_as_admin(&app, &owner_token, "sora").await;
- let forker_token = login(&app, "sora").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "rhea", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("sora", "origin-fork"),
- "main",
- "feature-compare",
- "sora",
- "sora@example.com",
- "compare.txt",
- "compare body\n",
- );
- let compare = compare_repositories(
- &app,
- &forker_token,
- "rhea",
- "origin",
- "main",
- "sora",
- "origin-fork",
- "feature-compare",
- )
- .await;
- assert_eq!(compare.base_branch, "main");
- assert_eq!(compare.head_branch, "feature-compare");
- assert_eq!(compare.status, PullRequestStatus::Mergeable);
- assert_eq!(compare.commits.len(), 1);
- assert_eq!(compare.files.len(), 1);
- assert_eq!(compare.files[0].path, "compare.txt");
- assert!(!compare.head_commit_id.is_empty());
- assert!(!compare.merge_base.is_empty());
- }
- #[actix_web::test]
- async fn duplicate_unmerged_pull_request_is_rejected() {
- let env = TestEnv::new("duplicate-pr");
- let app = env.app().await;
- create_user(&app, "tina").await;
- let owner_token = login(&app, "tina").await.token;
- create_user_as_admin(&app, &owner_token, "uma").await;
- let forker_token = login(&app, "uma").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "tina", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("uma", "origin-fork"),
- "main",
- "feature-one",
- "uma",
- "uma@example.com",
- "feature.txt",
- "duplicate pr check\n",
- );
- let _ = create_pull_request(
- &app,
- &forker_token,
- "tina",
- "origin",
- "uma",
- "origin-fork",
- "feature-one",
- "main",
- "First PR",
- )
- .await;
- let request = test::TestRequest::post()
- .uri("/api/repos/tina/origin/pulls")
- .insert_header(("authorization", format!("Bearer {forker_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(
- r#"{"head_owner":"uma","head_repo":"origin-fork","head_branch":"feature-one","base_branch":"main","title":"First PR","body":""}"#,
- )
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::CONFLICT);
- }
- #[actix_web::test]
- async fn list_pull_requests_returns_created_pull_request() {
- let env = TestEnv::new("list-prs");
- let app = env.app().await;
- create_user(&app, "victor").await;
- let owner_token = login(&app, "victor").await.token;
- create_user_as_admin(&app, &owner_token, "wendy").await;
- let forker_token = login(&app, "wendy").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "victor", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("wendy", "origin-fork"),
- "main",
- "feature-list",
- "wendy",
- "wendy@example.com",
- "list.txt",
- "list pull requests\n",
- );
- let created = create_pull_request(
- &app,
- &forker_token,
- "victor",
- "origin",
- "wendy",
- "origin-fork",
- "feature-list",
- "main",
- "List PR",
- )
- .await;
- let request = test::TestRequest::get()
- .uri("/api/repos/victor/origin/pulls")
- .insert_header(("authorization", format!("Bearer {owner_token}")))
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- let pulls: Vec<ApiPullRequestResponse> = test::read_body_json(response).await;
- assert_eq!(pulls.len(), 1);
- assert_eq!(pulls[0].pull_request.id, created.pull_request.id);
- assert_eq!(pulls[0].pull_request.title, "List PR");
- assert_eq!(pulls[0].head_repo.repo.name, "origin-fork");
- }
- #[actix_web::test]
- async fn get_pull_request_detail_returns_compare_payload() {
- let env = TestEnv::new("pr-detail");
- let app = env.app().await;
- create_user(&app, "trent").await;
- let owner_token = login(&app, "trent").await.token;
- create_user_as_admin(&app, &owner_token, "ursula").await;
- let forker_token = login(&app, "ursula").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "trent", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("ursula", "origin-fork"),
- "main",
- "feature-detail",
- "ursula",
- "ursula@example.com",
- "detail.txt",
- "detail body\n",
- );
- let created = create_pull_request(
- &app,
- &forker_token,
- "trent",
- "origin",
- "ursula",
- "origin-fork",
- "feature-detail",
- "main",
- "Detail PR",
- )
- .await;
- let detail = get_pull_request(&app, &owner_token, "trent", "origin", 1).await;
- assert_eq!(detail.pull_request.id, created.pull_request.id);
- assert_eq!(detail.pull_request.title, "Detail PR");
- assert_eq!(detail.compare.status, PullRequestStatus::Mergeable);
- assert_eq!(detail.compare.commits.len(), 1);
- assert_eq!(detail.compare.files.len(), 1);
- assert_eq!(detail.compare.files[0].path, "detail.txt");
- }
- #[actix_web::test]
- async fn merge_pull_request_updates_base_branch() {
- let env = TestEnv::new("merge-pr");
- let app = env.app().await;
- create_user(&app, "xavier").await;
- let owner_token = login(&app, "xavier").await.token;
- create_user_as_admin(&app, &owner_token, "yara").await;
- let forker_token = login(&app, "yara").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "xavier", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("yara", "origin-fork"),
- "main",
- "feature-merge",
- "yara",
- "yara@example.com",
- "merged.txt",
- "merged by pr\n",
- );
- let created = create_pull_request(
- &app,
- &forker_token,
- "xavier",
- "origin",
- "yara",
- "origin-fork",
- "feature-merge",
- "main",
- "Merge PR",
- )
- .await;
- let merged = merge_pull_request(&app, &owner_token, "xavier", "origin", 1).await;
- assert_eq!(merged.pull_request.id, created.pull_request.id);
- assert!(merged.pull_request.has_merged);
- assert!(merged.pull_request.is_closed);
- let merged_file = git(
- &env.repo_path("xavier", "origin"),
- &["show", "refs/heads/main:merged.txt"],
- );
- assert_eq!(merged_file, "merged by pr");
- }
- #[actix_web::test]
- async fn merged_pull_request_detail_excludes_base_only_commits() {
- let env = TestEnv::new("merged-pr-compare");
- let app = env.app().await;
- create_user(&app, "owner").await;
- let owner_token = login(&app, "owner").await.token;
- create_user_as_admin(&app, &owner_token, "forker").await;
- let forker_token = login(&app, "forker").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "owner", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("forker", "origin-fork"),
- "main",
- "feature-merged",
- "forker",
- "forker@example.com",
- "feature.txt",
- "feature body\n",
- );
- let _ = create_pull_request(
- &app,
- &forker_token,
- "owner",
- "origin",
- "forker",
- "origin-fork",
- "feature-merged",
- "main",
- "Merged PR",
- )
- .await;
- push_commit_to_existing_branch(
- &env.repo_path("owner", "origin"),
- "main",
- "owner",
- "owner@example.com",
- "base.txt",
- "base only\n",
- );
- let merged = merge_pull_request(&app, &owner_token, "owner", "origin", 1).await;
- assert!(merged.pull_request.has_merged);
- let detail = get_pull_request(&app, &owner_token, "owner", "origin", 1).await;
- assert_eq!(detail.compare.commits.len(), 1);
- assert_eq!(detail.compare.files.len(), 1);
- assert_eq!(detail.compare.files[0].path, "feature.txt");
- }
- #[actix_web::test]
- async fn pull_request_poster_can_close_and_reopen() {
- let env = TestEnv::new("close-reopen-pr");
- let app = env.app().await;
- create_user(&app, "zoe").await;
- let owner_token = login(&app, "zoe").await.token;
- create_user_as_admin(&app, &owner_token, "abby").await;
- let forker_token = login(&app, "abby").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "zoe", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("abby", "origin-fork"),
- "main",
- "feature-close",
- "abby",
- "abby@example.com",
- "close.txt",
- "close reopen\n",
- );
- let created = create_pull_request(
- &app,
- &forker_token,
- "zoe",
- "origin",
- "abby",
- "origin-fork",
- "feature-close",
- "main",
- "Close PR",
- )
- .await;
- assert!(!created.pull_request.is_closed);
- let closed = close_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
- assert!(closed.pull_request.is_closed);
- assert!(!closed.pull_request.has_merged);
- let reopened = reopen_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
- assert!(!reopened.pull_request.is_closed);
- assert_eq!(reopened.pull_request.status, PullRequestStatus::Mergeable);
- }
- #[actix_web::test]
- async fn reopen_pull_request_rejects_duplicate_open_pair() {
- let env = TestEnv::new("reopen-duplicate-pr");
- let app = env.app().await;
- create_user(&app, "brad").await;
- let owner_token = login(&app, "brad").await.token;
- create_user_as_admin(&app, &owner_token, "cora").await;
- let forker_token = login(&app, "cora").await.token;
- create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
- fork_repo(&app, &forker_token, "brad", "origin", "origin-fork").await;
- push_commit_to_branch(
- &env.repo_path("cora", "origin-fork"),
- "main",
- "feature-dup",
- "cora",
- "cora@example.com",
- "dup.txt",
- "duplicate reopen\n",
- );
- let _ = create_pull_request(
- &app,
- &forker_token,
- "brad",
- "origin",
- "cora",
- "origin-fork",
- "feature-dup",
- "main",
- "Closed PR",
- )
- .await;
- let _ = close_pull_request(&app, &forker_token, "brad", "origin", 1).await;
- let _ = create_pull_request(
- &app,
- &forker_token,
- "brad",
- "origin",
- "cora",
- "origin-fork",
- "feature-dup",
- "main",
- "Open PR",
- )
- .await;
- let request = test::TestRequest::post()
- .uri("/api/repos/brad/origin/pulls/1/reopen")
- .insert_header(("authorization", format!("Bearer {forker_token}")))
- .to_request();
- let response = test::call_service(&app, request).await;
- assert_eq!(response.status(), StatusCode::CONFLICT);
- }
- async fn create_user<S>(app: &S, username: &str) -> ApiUser
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let email = format!("{username}@example.com");
- let body = format!(
- r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
- );
- let request = test::TestRequest::post()
- .uri("/api/admin/users")
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn create_user_as_admin<S>(app: &S, admin_token: &str, username: &str) -> ApiUser
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let email = format!("{username}@example.com");
- let body = format!(
- r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
- );
- let request = test::TestRequest::post()
- .uri("/api/admin/users")
- .insert_header(("authorization", format!("Bearer {admin_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn login<S>(app: &S, login: &str) -> ApiLoginResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let body = format!(r#"{{"login":"{login}","password":"password123"}}"#);
- let request = test::TestRequest::post()
- .uri("/api/user/login")
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn create_repo<S>(
- app: &S,
- token: &str,
- name: &str,
- auto_init: bool,
- ) -> ApiRepositoryResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- create_repo_with_visibility(app, token, name, auto_init, false).await
- }
- async fn create_repo_with_visibility<S>(
- app: &S,
- token: &str,
- name: &str,
- auto_init: bool,
- is_private: bool,
- ) -> ApiRepositoryResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let body = format!(
- r#"{{"name":"{name}","description":"repo {name}","auto_init":{auto_init},"is_private":{is_private}}}"#
- );
- let request = test::TestRequest::post()
- .uri("/api/repos")
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn fork_repo<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- fork_name: &str,
- ) -> ApiRepositoryResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let body = format!(r#"{{"name":"{fork_name}","description":"fork {fork_name}"}}"#);
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/forks"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn create_pull_request<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- head_owner: &str,
- head_repo: &str,
- head_branch: &str,
- base_branch: &str,
- title: &str,
- ) -> ApiPullRequestResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let body = format!(
- r#"{{"head_owner":"{head_owner}","head_repo":"{head_repo}","head_branch":"{head_branch}","base_branch":"{base_branch}","title":"{title}","body":"{title} body"}}"#
- );
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/pulls"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn compare_repositories<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- base: &str,
- head_owner: &str,
- head_repo: &str,
- head_branch: &str,
- ) -> CompareResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::get()
- .uri(&format!(
- "/api/repos/{owner}/{repo}/compare?base={base}&head_owner={head_owner}&head_repo={head_repo}&head_branch={head_branch}"
- ))
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn get_pull_request<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- index: i64,
- ) -> ApiPullRequestDetailResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::get()
- .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn merge_pull_request<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- index: i64,
- ) -> ApiPullRequestResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/merge"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(r#"{"message":""}"#)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn close_pull_request<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- index: i64,
- ) -> ApiPullRequestResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/close"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn reopen_pull_request<S>(
- app: &S,
- token: &str,
- owner: &str,
- repo: &str,
- index: i64,
- ) -> ApiPullRequestResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/reopen"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- fn basic_auth_header(username: &str, password: &str) -> String {
- format!("Basic {}", encode_base64(&format!("{username}:{password}")))
- }
- async fn add_collaborator<S>(
- app: &S,
- owner_token: &str,
- owner: &str,
- repo: &str,
- username: &str,
- permission: &str,
- ) where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let body = format!(r#"{{"username":"{username}","permission":"{permission}"}}"#);
- let request = test::TestRequest::post()
- .uri(&format!("/api/repos/{owner}/{repo}/collaborators"))
- .insert_header(("authorization", format!("Bearer {owner_token}")))
- .insert_header(("content-type", "application/json"))
- .set_payload(body)
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- }
- async fn assert_error_response(
- response: ServiceResponse<BoxBody>,
- expected_status: StatusCode,
- expected_code: &str,
- expected_message: &str,
- ) {
- assert_eq!(response.status(), expected_status);
- let body: Value = test::read_body_json(response).await;
- assert_eq!(body.get("code").and_then(Value::as_str), Some(expected_code));
- assert_eq!(
- body.get("message").and_then(Value::as_str),
- Some(expected_message)
- );
- assert_eq!(
- body.get("status").and_then(Value::as_u64),
- Some(expected_status.as_u16() as u64)
- );
- }
- async fn list_current_user_repositories<S>(
- app: &S,
- token: &str,
- query: &str,
- ) -> Vec<ApiRepositoryResponse>
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let request = test::TestRequest::get()
- .uri(&format!("/api/user/repos?q={query}"))
- .insert_header(("authorization", format!("Bearer {token}")))
- .to_request();
- let response = test::call_service(app, request).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn list_user_repositories<S>(
- app: &S,
- token: Option<&str>,
- username: &str,
- query: &str,
- ) -> Vec<ApiRepositoryResponse>
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let mut request = test::TestRequest::get().uri(&format!("/api/users/{username}/repos?q={query}"));
- if let Some(token) = token {
- request = request.insert_header(("authorization", format!("Bearer {token}")));
- }
- let response = test::call_service(app, request.to_request()).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn search_repositories<S>(
- app: &S,
- token: Option<&str>,
- query: &str,
- ) -> Vec<ApiRepositoryResponse>
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let mut request = test::TestRequest::get().uri(&format!("/api/repos/search?q={query}"));
- if let Some(token) = token {
- request = request.insert_header(("authorization", format!("Bearer {token}")));
- }
- let response = test::call_service(app, request.to_request()).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn list_collaborators<S>(
- app: &S,
- token: Option<&str>,
- owner: &str,
- repo: &str,
- ) -> Vec<ApiCollaboratorResponse>
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let mut request =
- test::TestRequest::get().uri(&format!("/api/repos/{owner}/{repo}/collaborators"));
- if let Some(token) = token {
- request = request.insert_header(("authorization", format!("Bearer {token}")));
- }
- let response = test::call_service(app, request.to_request()).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- async fn get_collaborator<S>(
- app: &S,
- token: Option<&str>,
- owner: &str,
- repo: &str,
- username: &str,
- ) -> ApiCollaboratorResponse
- where
- S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
- {
- let mut request = test::TestRequest::get()
- .uri(&format!("/api/repos/{owner}/{repo}/collaborators/{username}"));
- if let Some(token) = token {
- request = request.insert_header(("authorization", format!("Bearer {token}")));
- }
- let response = test::call_service(app, request.to_request()).await;
- assert_eq!(response.status(), StatusCode::OK);
- test::read_body_json(response).await
- }
- fn encode_base64(input: &str) -> String {
- const TABLE: &[u8; 64] = b"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
- let bytes = input.as_bytes();
- let mut out = String::new();
- let mut index = 0;
- while index < bytes.len() {
- let b0 = bytes[index];
- let b1 = *bytes.get(index + 1).unwrap_or(&0);
- let b2 = *bytes.get(index + 2).unwrap_or(&0);
- out.push(TABLE[(b0 >> 2) as usize] as char);
- out.push(TABLE[((b0 & 0b0000_0011) << 4 | (b1 >> 4)) as usize] as char);
- if index + 1 < bytes.len() {
- out.push(TABLE[((b1 & 0b0000_1111) << 2 | (b2 >> 6)) as usize] as char);
- } else {
- out.push('=');
- }
- if index + 2 < bytes.len() {
- out.push(TABLE[(b2 & 0b0011_1111) as usize] as char);
- } else {
- out.push('=');
- }
- index += 3;
- }
- out
- }
- fn git(repo_path: &Path, args: &[&str]) -> String {
- let output = Command::new("git")
- .arg("--git-dir")
- .arg(repo_path)
- .args(args)
- .output()
- .expect("run git");
- assert!(
- output.status.success(),
- "git command failed: {}",
- String::from_utf8_lossy(&output.stderr)
- );
- String::from_utf8_lossy(&output.stdout).trim().to_string()
- }
- fn push_commit_to_branch(
- repo_path: &Path,
- base_branch: &str,
- branch: &str,
- author_name: &str,
- author_email: &str,
- file_name: &str,
- content: &str,
- ) {
- let unique = SystemTime::now()
- .duration_since(UNIX_EPOCH)
- .expect("clock")
- .as_nanos();
- let worktree = std::env::temp_dir().join(format!("gitr-pr-work-{branch}-{unique}"));
- let _ = fs::remove_dir_all(&worktree);
- let clone = Command::new("git")
- .arg("clone")
- .arg(repo_path)
- .arg(&worktree)
- .output()
- .expect("clone repo");
- assert!(
- clone.status.success(),
- "git clone failed: {}",
- String::from_utf8_lossy(&clone.stderr)
- );
- let checkout = Command::new("git")
- .current_dir(&worktree)
- .arg("checkout")
- .arg("-b")
- .arg(branch)
- .arg(format!("origin/{base_branch}"))
- .output()
- .expect("checkout branch");
- assert!(
- checkout.status.success(),
- "git checkout failed: {}",
- String::from_utf8_lossy(&checkout.stderr)
- );
- fs::write(worktree.join(file_name), content).expect("write test file");
- let add = Command::new("git")
- .current_dir(&worktree)
- .arg("add")
- .arg(file_name)
- .output()
- .expect("git add");
- assert!(
- add.status.success(),
- "git add failed: {}",
- String::from_utf8_lossy(&add.stderr)
- );
- let commit = Command::new("git")
- .current_dir(&worktree)
- .env("GIT_AUTHOR_NAME", author_name)
- .env("GIT_AUTHOR_EMAIL", author_email)
- .env("GIT_COMMITTER_NAME", author_name)
- .env("GIT_COMMITTER_EMAIL", author_email)
- .arg("commit")
- .arg("-m")
- .arg(format!("Add {file_name}"))
- .output()
- .expect("git commit");
- assert!(
- commit.status.success(),
- "git commit failed: {}",
- String::from_utf8_lossy(&commit.stderr)
- );
- let push = Command::new("git")
- .current_dir(&worktree)
- .arg("push")
- .arg("origin")
- .arg(format!("HEAD:refs/heads/{branch}"))
- .output()
- .expect("git push");
- assert!(
- push.status.success(),
- "git push failed: {}",
- String::from_utf8_lossy(&push.stderr)
- );
- let _ = fs::remove_dir_all(&worktree);
- }
- fn push_commit_to_existing_branch(
- repo_path: &Path,
- branch: &str,
- author_name: &str,
- author_email: &str,
- file_name: &str,
- content: &str,
- ) {
- let unique = SystemTime::now()
- .duration_since(UNIX_EPOCH)
- .expect("clock")
- .as_nanos();
- let worktree = std::env::temp_dir().join(format!("gitr-base-work-{branch}-{unique}"));
- let _ = fs::remove_dir_all(&worktree);
- let clone = Command::new("git")
- .arg("clone")
- .arg(repo_path)
- .arg(&worktree)
- .output()
- .expect("clone repo");
- assert!(
- clone.status.success(),
- "git clone failed: {}",
- String::from_utf8_lossy(&clone.stderr)
- );
- let checkout = Command::new("git")
- .current_dir(&worktree)
- .arg("checkout")
- .arg(branch)
- .output()
- .expect("checkout branch");
- assert!(
- checkout.status.success(),
- "git checkout failed: {}",
- String::from_utf8_lossy(&checkout.stderr)
- );
- fs::write(worktree.join(file_name), content).expect("write test file");
- let add = Command::new("git")
- .current_dir(&worktree)
- .arg("add")
- .arg(file_name)
- .output()
- .expect("git add");
- assert!(
- add.status.success(),
- "git add failed: {}",
- String::from_utf8_lossy(&add.stderr)
- );
- let commit = Command::new("git")
- .current_dir(&worktree)
- .env("GIT_AUTHOR_NAME", author_name)
- .env("GIT_AUTHOR_EMAIL", author_email)
- .env("GIT_COMMITTER_NAME", author_name)
- .env("GIT_COMMITTER_EMAIL", author_email)
- .arg("commit")
- .arg("-m")
- .arg(format!("Add {file_name}"))
- .output()
- .expect("git commit");
- assert!(
- commit.status.success(),
- "git commit failed: {}",
- String::from_utf8_lossy(&commit.stderr)
- );
- let push = Command::new("git")
- .current_dir(&worktree)
- .arg("push")
- .arg("origin")
- .arg(format!("HEAD:refs/heads/{branch}"))
- .output()
- .expect("git push");
- assert!(
- push.status.success(),
- "git push failed: {}",
- String::from_utf8_lossy(&push.stderr)
- );
- let _ = fs::remove_dir_all(&worktree);
- }
- struct TestEnv {
- root: PathBuf,
- }
- impl TestEnv {
- fn new(label: &str) -> Self {
- let unique = SystemTime::now()
- .duration_since(UNIX_EPOCH)
- .expect("clock")
- .as_nanos();
- let root = std::env::temp_dir().join(format!("gitr-test-{label}-{unique}"));
- fs::create_dir_all(&root).expect("create temp root");
- Self { root }
- }
- async fn app(
- &self,
- ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
- self.app_with_git_binary("git").await
- }
- async fn app_with_git_binary(
- &self,
- git_binary: &str,
- ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
- let database_path = self.root.join("data").join("gitr.db");
- let repository_root = self.root.join("data").join("repositories");
- fs::create_dir_all(&repository_root).expect("repo root");
- let config = AppConfig {
- server: ServerConfig {
- bind: "127.0.0.1:0".to_string(),
- external_url: "http://127.0.0.1:3000/".to_string(),
- },
- database: DatabaseConfig {
- path: database_path,
- },
- repository: RepositoryConfig {
- root: repository_root,
- default_branch: "main".to_string(),
- git_binary: git_binary.to_string(),
- },
- app: CoreAppConfig {
- run_user: "git".to_string(),
- },
- };
- config.prepare().expect("prepare config");
- let db = Database::open(&config.database.path).expect("open db");
- db.init_schema().expect("init schema");
- test::init_service(App::new().service(build_scope(Arc::new(AppState::new(config, db)))))
- .await
- }
- fn repo_path(&self, owner: &str, repo: &str) -> PathBuf {
- self.root
- .join("data")
- .join("repositories")
- .join(owner)
- .join(format!("{repo}.git"))
- }
- }
- impl Drop for TestEnv {
- fn drop(&mut self) {
- let _ = fs::remove_dir_all(&self.root);
- }
- }
|