core_flow.rs 65 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953
  1. use std::{
  2. fs,
  3. path::{Path, PathBuf},
  4. process::Command,
  5. sync::Arc,
  6. time::{SystemTime, UNIX_EPOCH},
  7. };
  8. use actix_http::Request;
  9. use actix_web::{
  10. App,
  11. body::BoxBody,
  12. dev::{Service, ServiceResponse},
  13. http::StatusCode,
  14. test,
  15. };
  16. use gitr::{
  17. app::AppState,
  18. conf::{AppConfig, CoreAppConfig, DatabaseConfig, RepositoryConfig, ServerConfig},
  19. db::Database,
  20. http::build_scope,
  21. models::{
  22. AccessMode, ApiCollaboratorResponse, ApiLoginResponse, ApiPullRequestDetailResponse,
  23. ApiPullRequestResponse, ApiRepositoryResponse, ApiUser, Branch, CompareResponse,
  24. CreateAccessTokenResponse, AccessTokenResponse, PullRequestStatus,
  25. },
  26. };
  27. use serde_json::Value;
  28. #[actix_web::test]
  29. async fn create_user_and_bare_repo_via_http() {
  30. let env = TestEnv::new("bare");
  31. let app = env.app().await;
  32. let user = create_user(&app, "alice").await;
  33. assert_eq!(user.name, "alice");
  34. let token = login(&app, "alice").await.token;
  35. let repo = create_repo(&app, &token, "demo", false).await;
  36. assert_eq!(repo.owner.name, "alice");
  37. assert_eq!(repo.repo.name, "demo");
  38. assert!(repo.repo.is_bare);
  39. let repo_path = env.repo_path("alice", "demo");
  40. assert!(repo_path.exists());
  41. assert!(repo_path.join("HEAD").exists());
  42. assert_eq!(
  43. git(&repo_path, &["symbolic-ref", "HEAD"]),
  44. "refs/heads/main"
  45. );
  46. }
  47. #[actix_web::test]
  48. async fn create_repo_with_auto_init_creates_first_commit() {
  49. let env = TestEnv::new("autoinit");
  50. let app = env.app().await;
  51. create_user(&app, "bob").await;
  52. let token = login(&app, "bob").await.token;
  53. let repo = create_repo(&app, &token, "seeded", true).await;
  54. assert!(!repo.repo.is_bare);
  55. let repo_path = env.repo_path("bob", "seeded");
  56. let head = git(&repo_path, &["rev-parse", "refs/heads/main"]);
  57. assert_eq!(head.len(), 40);
  58. let readme = git(&repo_path, &["show", "refs/heads/main:README.md"]);
  59. assert_eq!(readme, "# seeded");
  60. }
  61. #[actix_web::test]
  62. async fn duplicate_user_is_rejected() {
  63. let env = TestEnv::new("duplicate-user");
  64. let app = env.app().await;
  65. create_user(&app, "carol").await;
  66. let admin_token = login(&app, "carol").await.token;
  67. let request = test::TestRequest::post()
  68. .uri("/api/admin/users")
  69. .insert_header(("authorization", format!("Bearer {admin_token}")))
  70. .insert_header(("content-type", "application/json"))
  71. .set_payload(r#"{"username":"carol","email":"carol@example.com","password":"password123"}"#)
  72. .to_request();
  73. let response = test::call_service(&app, request).await;
  74. assert_eq!(response.status(), StatusCode::CONFLICT);
  75. assert_error_response(
  76. response,
  77. StatusCode::CONFLICT,
  78. "conflict",
  79. "user already exists: carol",
  80. )
  81. .await;
  82. }
  83. #[actix_web::test]
  84. async fn duplicate_repo_is_rejected() {
  85. let env = TestEnv::new("duplicate-repo");
  86. let app = env.app().await;
  87. create_user(&app, "dave").await;
  88. let token = login(&app, "dave").await.token;
  89. create_repo(&app, &token, "demo", false).await;
  90. let request = test::TestRequest::post()
  91. .uri("/api/repos")
  92. .insert_header(("authorization", format!("Bearer {token}")))
  93. .insert_header(("content-type", "application/json"))
  94. .set_payload(r#"{"name":"demo","description":"again","auto_init":false}"#)
  95. .to_request();
  96. let response = test::call_service(&app, request).await;
  97. assert_eq!(response.status(), StatusCode::CONFLICT);
  98. }
  99. #[actix_web::test]
  100. async fn missing_authorization_is_rejected() {
  101. let env = TestEnv::new("missing-auth");
  102. let app = env.app().await;
  103. let request = test::TestRequest::post()
  104. .uri("/api/repos")
  105. .insert_header(("content-type", "application/json"))
  106. .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
  107. .to_request();
  108. let response = test::call_service(&app, request).await;
  109. assert_error_response(
  110. response,
  111. StatusCode::UNAUTHORIZED,
  112. "unauthorized",
  113. "missing authorization header",
  114. )
  115. .await;
  116. }
  117. #[actix_web::test]
  118. async fn invalid_repo_name_is_rejected() {
  119. let env = TestEnv::new("invalid-repo");
  120. let app = env.app().await;
  121. create_user(&app, "erin").await;
  122. let token = login(&app, "erin").await.token;
  123. let request = test::TestRequest::post()
  124. .uri("/api/repos")
  125. .insert_header(("authorization", format!("Bearer {token}")))
  126. .insert_header(("content-type", "application/json"))
  127. .set_payload(r#"{"name":"bad/name","description":"demo","auto_init":false}"#)
  128. .to_request();
  129. let response = test::call_service(&app, request).await;
  130. assert_error_response(
  131. response,
  132. StatusCode::BAD_REQUEST,
  133. "validation_error",
  134. "repository name must contain only ASCII letters, digits, '-', '_' or '.'",
  135. )
  136. .await;
  137. }
  138. #[actix_web::test]
  139. async fn invalid_user_name_is_rejected() {
  140. let env = TestEnv::new("invalid-user");
  141. let app = env.app().await;
  142. let request = test::TestRequest::post()
  143. .uri("/api/admin/users")
  144. .insert_header(("content-type", "application/json"))
  145. .set_payload(
  146. r#"{"username":"bad/name","email":"bad@example.com","password":"password123"}"#,
  147. )
  148. .to_request();
  149. let response = test::call_service(&app, request).await;
  150. assert_eq!(response.status(), StatusCode::BAD_REQUEST);
  151. }
  152. #[actix_web::test]
  153. async fn git_init_failure_does_not_leave_repo_record() {
  154. let env = TestEnv::new("git-init-failure");
  155. let app = env
  156. .app_with_git_binary("definitely-not-a-real-git-binary")
  157. .await;
  158. create_user(&app, "frank").await;
  159. let token = login(&app, "frank").await.token;
  160. let request = test::TestRequest::post()
  161. .uri("/api/repos")
  162. .insert_header(("authorization", format!("Bearer {token}")))
  163. .insert_header(("content-type", "application/json"))
  164. .set_payload(r#"{"name":"blocked","description":"demo","auto_init":false}"#)
  165. .to_request();
  166. let response = test::call_service(&app, request).await;
  167. assert_error_response(
  168. response,
  169. StatusCode::INTERNAL_SERVER_ERROR,
  170. "internal_error",
  171. "internal server error",
  172. )
  173. .await;
  174. let get_request = test::TestRequest::get()
  175. .uri("/api/repos/frank/blocked")
  176. .to_request();
  177. let get_response = test::call_service(&app, get_request).await;
  178. assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
  179. }
  180. #[actix_web::test]
  181. async fn login_rejects_bad_password() {
  182. let env = TestEnv::new("bad-login");
  183. let app = env.app().await;
  184. create_user(&app, "grace").await;
  185. let request = test::TestRequest::post()
  186. .uri("/api/user/login")
  187. .insert_header(("content-type", "application/json"))
  188. .set_payload(r#"{"login":"grace","password":"wrong-password"}"#)
  189. .to_request();
  190. let response = test::call_service(&app, request).await;
  191. assert_eq!(response.status(), StatusCode::UNAUTHORIZED);
  192. }
  193. #[actix_web::test]
  194. async fn login_replaces_existing_login_token() {
  195. let env = TestEnv::new("repeat-login");
  196. let app = env.app().await;
  197. create_user(&app, "grace").await;
  198. let first = login(&app, "grace").await;
  199. let second = login(&app, "grace").await;
  200. assert_ne!(first.token, second.token);
  201. let first_request = test::TestRequest::get()
  202. .uri("/api/user/tokens")
  203. .insert_header(("authorization", format!("Bearer {}", first.token)))
  204. .to_request();
  205. let first_response = test::call_service(&app, first_request).await;
  206. assert_eq!(first_response.status(), StatusCode::UNAUTHORIZED);
  207. let second_request = test::TestRequest::get()
  208. .uri("/api/user/tokens")
  209. .insert_header(("authorization", format!("Bearer {}", second.token)))
  210. .to_request();
  211. let second_response = test::call_service(&app, second_request).await;
  212. assert_eq!(second_response.status(), StatusCode::OK);
  213. let tokens: Vec<AccessTokenResponse> = test::read_body_json(second_response).await;
  214. assert_eq!(tokens.len(), 1);
  215. assert_eq!(tokens[0].name, "login");
  216. }
  217. #[actix_web::test]
  218. async fn token_endpoint_creates_second_token() {
  219. let env = TestEnv::new("token-endpoint");
  220. let app = env.app().await;
  221. create_user(&app, "heidi").await;
  222. let login = login(&app, "heidi").await;
  223. let request = test::TestRequest::post()
  224. .uri("/api/user/tokens")
  225. .insert_header(("authorization", format!("Bearer {}", login.token)))
  226. .insert_header(("content-type", "application/json"))
  227. .set_payload(r#"{"name":"cli"}"#)
  228. .to_request();
  229. let response = test::call_service(&app, request).await;
  230. assert_eq!(response.status(), StatusCode::OK);
  231. let token: CreateAccessTokenResponse = test::read_body_json(response).await;
  232. assert_eq!(token.name, "cli");
  233. assert!(!token.token.is_empty());
  234. assert_eq!(token.updated_unix, 0);
  235. }
  236. #[actix_web::test]
  237. async fn access_token_names_must_be_unique_per_user() {
  238. let env = TestEnv::new("token-unique");
  239. let app = env.app().await;
  240. create_user(&app, "alice").await;
  241. let login = login(&app, "alice").await;
  242. let first = test::TestRequest::post()
  243. .uri("/api/user/tokens")
  244. .insert_header(("authorization", format!("Bearer {}", login.token)))
  245. .insert_header(("content-type", "application/json"))
  246. .set_payload(r#"{"name":"cli"}"#)
  247. .to_request();
  248. let first_response = test::call_service(&app, first).await;
  249. assert_eq!(first_response.status(), StatusCode::OK);
  250. let second = test::TestRequest::post()
  251. .uri("/api/user/tokens")
  252. .insert_header(("authorization", format!("Bearer {}", login.token)))
  253. .insert_header(("content-type", "application/json"))
  254. .set_payload(r#"{"name":"cli"}"#)
  255. .to_request();
  256. let second_response = test::call_service(&app, second).await;
  257. assert_eq!(second_response.status(), StatusCode::CONFLICT);
  258. }
  259. #[actix_web::test]
  260. async fn access_token_can_be_listed_and_deleted() {
  261. let env = TestEnv::new("token-list-delete");
  262. let app = env.app().await;
  263. create_user(&app, "alice").await;
  264. let login = login(&app, "alice").await;
  265. let create = test::TestRequest::post()
  266. .uri("/api/user/tokens")
  267. .insert_header(("authorization", format!("Bearer {}", login.token)))
  268. .insert_header(("content-type", "application/json"))
  269. .set_payload(r#"{"name":"cli"}"#)
  270. .to_request();
  271. let create_response = test::call_service(&app, create).await;
  272. assert_eq!(create_response.status(), StatusCode::OK);
  273. let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
  274. assert_eq!(token.updated_unix, 0);
  275. let list = test::TestRequest::get()
  276. .uri("/api/user/tokens")
  277. .insert_header(("authorization", format!("Bearer {}", login.token)))
  278. .to_request();
  279. let list_response = test::call_service(&app, list).await;
  280. assert_eq!(list_response.status(), StatusCode::OK);
  281. let list_body: Value = test::read_body_json(list_response).await;
  282. let list_entries = list_body
  283. .as_array()
  284. .expect("token list response should be an array");
  285. assert_eq!(list_entries.len(), 2);
  286. assert!(list_entries
  287. .iter()
  288. .any(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id)));
  289. assert!(list_entries.iter().all(|entry| entry.get("token").is_none()));
  290. let delete = test::TestRequest::delete()
  291. .uri(&format!("/api/user/tokens/{}", token.id))
  292. .insert_header(("authorization", format!("Bearer {}", login.token)))
  293. .to_request();
  294. let delete_response = test::call_service(&app, delete).await;
  295. assert_eq!(delete_response.status(), StatusCode::NO_CONTENT);
  296. let list_again = test::TestRequest::get()
  297. .uri("/api/user/tokens")
  298. .insert_header(("authorization", format!("Bearer {}", login.token)))
  299. .to_request();
  300. let list_again_response = test::call_service(&app, list_again).await;
  301. assert_eq!(list_again_response.status(), StatusCode::OK);
  302. let list_again_body: Value = test::read_body_json(list_again_response).await;
  303. let list_again_entries = list_again_body
  304. .as_array()
  305. .expect("token list response should be an array");
  306. assert_eq!(list_again_entries.len(), 1);
  307. assert!(list_again_entries
  308. .iter()
  309. .all(|entry| entry.get("id").and_then(Value::as_i64) != Some(token.id)));
  310. }
  311. #[actix_web::test]
  312. async fn access_token_updated_unix_changes_after_use() {
  313. let env = TestEnv::new("token-touch");
  314. let app = env.app().await;
  315. create_user(&app, "alice").await;
  316. let login = login(&app, "alice").await;
  317. let create = test::TestRequest::post()
  318. .uri("/api/user/tokens")
  319. .insert_header(("authorization", format!("Bearer {}", login.token)))
  320. .insert_header(("content-type", "application/json"))
  321. .set_payload(r#"{"name":"cli"}"#)
  322. .to_request();
  323. let create_response = test::call_service(&app, create).await;
  324. assert_eq!(create_response.status(), StatusCode::OK);
  325. let token: CreateAccessTokenResponse = test::read_body_json(create_response).await;
  326. assert_eq!(token.updated_unix, 0);
  327. let use_cli = test::TestRequest::get()
  328. .uri("/api/user/tokens")
  329. .insert_header(("authorization", format!("Bearer {}", token.token)))
  330. .to_request();
  331. let use_cli_response = test::call_service(&app, use_cli).await;
  332. assert_eq!(use_cli_response.status(), StatusCode::OK);
  333. let list = test::TestRequest::get()
  334. .uri("/api/user/tokens")
  335. .insert_header(("authorization", format!("Bearer {}", login.token)))
  336. .to_request();
  337. let list_response = test::call_service(&app, list).await;
  338. assert_eq!(list_response.status(), StatusCode::OK);
  339. let list_body: Value = test::read_body_json(list_response).await;
  340. let list_entries = list_body
  341. .as_array()
  342. .expect("token list response should be an array");
  343. let cli_entry = list_entries
  344. .iter()
  345. .find(|entry| entry.get("id").and_then(Value::as_i64) == Some(token.id))
  346. .expect("cli token should exist");
  347. assert!(
  348. cli_entry
  349. .get("updated_unix")
  350. .and_then(Value::as_i64)
  351. .unwrap_or_default()
  352. > 0
  353. );
  354. }
  355. #[actix_web::test]
  356. async fn admin_user_creation_requires_bootstrap_or_admin_token() {
  357. let env = TestEnv::new("admin-auth");
  358. let app = env.app().await;
  359. create_user(&app, "admin").await;
  360. let admin_token = login(&app, "admin").await.token;
  361. let anonymous = test::TestRequest::post()
  362. .uri("/api/admin/users")
  363. .insert_header(("content-type", "application/json"))
  364. .set_payload(r#"{"username":"member","email":"member@example.com","password":"password123"}"#)
  365. .to_request();
  366. let anonymous_response = test::call_service(&app, anonymous).await;
  367. assert_eq!(anonymous_response.status(), StatusCode::UNAUTHORIZED);
  368. let member = create_user_as_admin(&app, &admin_token, "member").await;
  369. assert_eq!(member.name, "member");
  370. }
  371. #[actix_web::test]
  372. async fn api_responses_do_not_expose_password_hash() {
  373. let env = TestEnv::new("redaction");
  374. let app = env.app().await;
  375. create_user(&app, "alice").await;
  376. let token = login(&app, "alice").await.token;
  377. let user_request = test::TestRequest::get().uri("/api/users/alice").to_request();
  378. let user_response = test::call_service(&app, user_request).await;
  379. assert_eq!(user_response.status(), StatusCode::OK);
  380. let user_body: Value = test::read_body_json(user_response).await;
  381. assert!(user_body.get("password_hash").is_none());
  382. assert_eq!(user_body.get("email").and_then(Value::as_str), Some(""));
  383. let repo_request = test::TestRequest::post()
  384. .uri("/api/repos")
  385. .insert_header(("authorization", format!("Bearer {token}")))
  386. .insert_header(("content-type", "application/json"))
  387. .set_payload(r#"{"name":"demo","description":"demo","auto_init":false}"#)
  388. .to_request();
  389. let repo_response = test::call_service(&app, repo_request).await;
  390. assert_eq!(repo_response.status(), StatusCode::OK);
  391. let repo_body: Value = test::read_body_json(repo_response).await;
  392. assert!(
  393. repo_body
  394. .get("owner")
  395. .and_then(|owner| owner.get("password_hash"))
  396. .is_none()
  397. );
  398. }
  399. #[actix_web::test]
  400. async fn private_repo_metadata_is_not_visible_without_read_access() {
  401. let env = TestEnv::new("private-repo-opaque");
  402. let app = env.app().await;
  403. create_user(&app, "owner").await;
  404. let owner_token = login(&app, "owner").await.token;
  405. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  406. create_user_as_admin(&app, &owner_token, "outsider").await;
  407. let outsider_token = login(&app, "outsider").await.token;
  408. let anonymous = test::TestRequest::get()
  409. .uri("/api/repos/owner/secret")
  410. .to_request();
  411. let anonymous_response = test::call_service(&app, anonymous).await;
  412. assert_error_response(
  413. anonymous_response,
  414. StatusCode::NOT_FOUND,
  415. "not_found",
  416. "repository not found: owner/secret",
  417. )
  418. .await;
  419. let outsider = test::TestRequest::get()
  420. .uri("/api/repos/owner/secret")
  421. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  422. .to_request();
  423. let outsider_response = test::call_service(&app, outsider).await;
  424. assert_error_response(
  425. outsider_response,
  426. StatusCode::NOT_FOUND,
  427. "not_found",
  428. "repository not found: owner/secret",
  429. )
  430. .await;
  431. }
  432. #[actix_web::test]
  433. async fn private_repo_read_endpoints_are_not_visible_without_access() {
  434. let env = TestEnv::new("private-repo-read-opaque");
  435. let app = env.app().await;
  436. create_user(&app, "owner").await;
  437. let owner_token = login(&app, "owner").await.token;
  438. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  439. create_user_as_admin(&app, &owner_token, "outsider").await;
  440. let outsider_token = login(&app, "outsider").await.token;
  441. let branches = test::TestRequest::get()
  442. .uri("/api/repos/owner/secret/branches")
  443. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  444. .to_request();
  445. let branches_response = test::call_service(&app, branches).await;
  446. assert_eq!(branches_response.status(), StatusCode::NOT_FOUND);
  447. let pulls = test::TestRequest::get()
  448. .uri("/api/repos/owner/secret/pulls")
  449. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  450. .to_request();
  451. let pulls_response = test::call_service(&app, pulls).await;
  452. assert_eq!(pulls_response.status(), StatusCode::NOT_FOUND);
  453. let forks = test::TestRequest::post()
  454. .uri("/api/repos/owner/secret/forks")
  455. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  456. .insert_header(("content-type", "application/json"))
  457. .set_payload(r#"{"name":"secret-fork","description":"x"}"#)
  458. .to_request();
  459. let forks_response = test::call_service(&app, forks).await;
  460. assert_eq!(forks_response.status(), StatusCode::NOT_FOUND);
  461. let compare = test::TestRequest::get()
  462. .uri("/api/repos/owner/secret/compare?base=main&head_owner=owner&head_repo=secret&head_branch=main")
  463. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  464. .to_request();
  465. let compare_response = test::call_service(&app, compare).await;
  466. assert_eq!(compare_response.status(), StatusCode::NOT_FOUND);
  467. let create_pr = test::TestRequest::post()
  468. .uri("/api/repos/owner/secret/pulls")
  469. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  470. .insert_header(("content-type", "application/json"))
  471. .set_payload(
  472. r#"{"head_owner":"owner","head_repo":"secret","head_branch":"main","base_branch":"main","title":"x","body":""}"#,
  473. )
  474. .to_request();
  475. let create_pr_response = test::call_service(&app, create_pr).await;
  476. assert_eq!(create_pr_response.status(), StatusCode::NOT_FOUND);
  477. }
  478. #[actix_web::test]
  479. async fn list_user_repositories_hides_private_repos_without_access() {
  480. let env = TestEnv::new("list-user-repos");
  481. let app = env.app().await;
  482. create_user(&app, "owner").await;
  483. let owner_token = login(&app, "owner").await.token;
  484. create_repo_with_visibility(&app, &owner_token, "public", true, false).await;
  485. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  486. create_user_as_admin(&app, &owner_token, "outsider").await;
  487. let outsider_token = login(&app, "outsider").await.token;
  488. let anonymous_repos = list_user_repositories(&app, None, "owner", "").await;
  489. assert_eq!(anonymous_repos.len(), 1);
  490. assert_eq!(anonymous_repos[0].repo.name, "public");
  491. assert_eq!(anonymous_repos[0].permission.mode, AccessMode::Read);
  492. let outsider_repos = list_user_repositories(&app, Some(&outsider_token), "owner", "").await;
  493. assert_eq!(outsider_repos.len(), 1);
  494. assert_eq!(outsider_repos[0].repo.name, "public");
  495. assert!(outsider_repos[0].permission.can_read);
  496. assert!(!outsider_repos[0].permission.can_write);
  497. let owner_repos = list_user_repositories(&app, Some(&owner_token), "owner", "").await;
  498. assert_eq!(owner_repos.len(), 2);
  499. assert!(owner_repos.iter().any(|repo| repo.repo.name == "secret"));
  500. assert!(owner_repos.iter().all(|repo| repo.permission.is_owner));
  501. }
  502. #[actix_web::test]
  503. async fn current_user_repo_list_includes_visible_repositories() {
  504. let env = TestEnv::new("current-user-repos");
  505. let app = env.app().await;
  506. create_user(&app, "alice").await;
  507. let alice_token = login(&app, "alice").await.token;
  508. create_repo_with_visibility(&app, &alice_token, "own-public", true, false).await;
  509. create_repo_with_visibility(&app, &alice_token, "own-private", true, true).await;
  510. create_user_as_admin(&app, &alice_token, "bob").await;
  511. let bob_token = login(&app, "bob").await.token;
  512. create_repo_with_visibility(&app, &bob_token, "bob-public", true, false).await;
  513. create_repo_with_visibility(&app, &bob_token, "bob-shared", true, true).await;
  514. add_collaborator(&app, &bob_token, "bob", "bob-shared", "alice", "read").await;
  515. let repos = list_current_user_repositories(&app, &alice_token, "").await;
  516. assert_eq!(repos.len(), 4);
  517. assert!(repos.iter().any(|repo| {
  518. repo.owner.name == "alice" && repo.repo.name == "own-private" && repo.permission.is_owner
  519. }));
  520. assert!(repos.iter().any(|repo| {
  521. repo.owner.name == "bob"
  522. && repo.repo.name == "bob-public"
  523. && repo.permission.can_read
  524. && !repo.permission.can_write
  525. }));
  526. assert!(repos.iter().any(|repo| {
  527. repo.owner.name == "bob"
  528. && repo.repo.name == "bob-shared"
  529. && repo.permission.can_read
  530. && !repo.permission.can_write
  531. }));
  532. }
  533. #[actix_web::test]
  534. async fn repository_search_filters_to_visible_results() {
  535. let env = TestEnv::new("search-repos");
  536. let app = env.app().await;
  537. create_user(&app, "searcher").await;
  538. let searcher_token = login(&app, "searcher").await.token;
  539. create_user_as_admin(&app, &searcher_token, "owner").await;
  540. let owner_token = login(&app, "owner").await.token;
  541. create_repo_with_visibility(&app, &owner_token, "rust-public", true, false).await;
  542. create_repo_with_visibility(&app, &owner_token, "python-public", true, false).await;
  543. create_repo_with_visibility(&app, &owner_token, "rust-secret", true, true).await;
  544. add_collaborator(&app, &owner_token, "owner", "rust-secret", "searcher", "read").await;
  545. let anonymous = search_repositories(&app, None, "rust").await;
  546. assert_eq!(anonymous.len(), 1);
  547. assert_eq!(anonymous[0].repo.name, "rust-public");
  548. let authed = search_repositories(&app, Some(&searcher_token), "rust").await;
  549. assert_eq!(authed.len(), 2);
  550. assert!(authed.iter().any(|repo| repo.repo.name == "rust-public"));
  551. assert!(authed.iter().any(|repo| repo.repo.name == "rust-secret"));
  552. }
  553. #[actix_web::test]
  554. async fn invalid_collaborator_permission_is_rejected() {
  555. let env = TestEnv::new("invalid-collab-permission");
  556. let app = env.app().await;
  557. create_user(&app, "owner").await;
  558. let owner_token = login(&app, "owner").await.token;
  559. create_user_as_admin(&app, &owner_token, "guest").await;
  560. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  561. let request = test::TestRequest::post()
  562. .uri("/api/repos/owner/shared/collaborators")
  563. .insert_header(("authorization", format!("Bearer {owner_token}")))
  564. .insert_header(("content-type", "application/json"))
  565. .set_payload(r#"{"username":"guest","permission":"super"}"#)
  566. .to_request();
  567. let response = test::call_service(&app, request).await;
  568. assert_eq!(response.status(), StatusCode::BAD_REQUEST);
  569. }
  570. #[actix_web::test]
  571. async fn collaborator_list_and_check_return_expected_permissions() {
  572. let env = TestEnv::new("list-collaborators");
  573. let app = env.app().await;
  574. create_user(&app, "owner").await;
  575. let owner_token = login(&app, "owner").await.token;
  576. create_user_as_admin(&app, &owner_token, "reader").await;
  577. create_user_as_admin(&app, &owner_token, "adminer").await;
  578. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  579. add_collaborator(&app, &owner_token, "owner", "shared", "reader", "read").await;
  580. add_collaborator(&app, &owner_token, "owner", "shared", "adminer", "admin").await;
  581. let collaborators = list_collaborators(&app, Some(&owner_token), "owner", "shared").await;
  582. assert_eq!(collaborators.len(), 2);
  583. assert_eq!(collaborators[0].user.name, "adminer");
  584. assert_eq!(collaborators[1].user.name, "reader");
  585. let reader = get_collaborator(&app, Some(&owner_token), "owner", "shared", "reader").await;
  586. assert_eq!(reader.user.name, "reader");
  587. assert_eq!(format!("{:?}", reader.mode), "Read");
  588. }
  589. #[actix_web::test]
  590. async fn private_collaborator_endpoints_are_not_visible_without_access() {
  591. let env = TestEnv::new("private-collaborator-opaque");
  592. let app = env.app().await;
  593. create_user(&app, "owner").await;
  594. let owner_token = login(&app, "owner").await.token;
  595. create_repo_with_visibility(&app, &owner_token, "secret", true, true).await;
  596. create_user_as_admin(&app, &owner_token, "outsider").await;
  597. let outsider_token = login(&app, "outsider").await.token;
  598. let list = test::TestRequest::get()
  599. .uri("/api/repos/owner/secret/collaborators")
  600. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  601. .to_request();
  602. let list_response = test::call_service(&app, list).await;
  603. assert_eq!(list_response.status(), StatusCode::NOT_FOUND);
  604. let get = test::TestRequest::get()
  605. .uri("/api/repos/owner/secret/collaborators/outsider")
  606. .insert_header(("authorization", format!("Bearer {outsider_token}")))
  607. .to_request();
  608. let get_response = test::call_service(&app, get).await;
  609. assert_eq!(get_response.status(), StatusCode::NOT_FOUND);
  610. }
  611. #[actix_web::test]
  612. async fn public_git_info_refs_allows_anonymous_pull() {
  613. let env = TestEnv::new("public-git-http");
  614. let app = env.app().await;
  615. create_user(&app, "ivan").await;
  616. let token = login(&app, "ivan").await.token;
  617. create_repo_with_visibility(&app, &token, "public", true, false).await;
  618. let request = test::TestRequest::get()
  619. .uri("/ivan/public.git/info/refs?service=git-upload-pack")
  620. .to_request();
  621. let response = test::call_service(&app, request).await;
  622. assert_eq!(response.status(), StatusCode::OK);
  623. assert_eq!(
  624. response
  625. .headers()
  626. .get("content-type")
  627. .and_then(|v| v.to_str().ok()),
  628. Some("application/x-git-upload-pack-advertisement")
  629. );
  630. }
  631. #[actix_web::test]
  632. async fn private_git_info_refs_requires_basic_auth() {
  633. let env = TestEnv::new("private-git-http");
  634. let app = env.app().await;
  635. create_user(&app, "judy").await;
  636. let token = login(&app, "judy").await.token;
  637. create_repo_with_visibility(&app, &token, "private", true, true).await;
  638. let unauthenticated = test::TestRequest::get()
  639. .uri("/judy/private.git/info/refs?service=git-upload-pack")
  640. .to_request();
  641. let unauthenticated_response = test::call_service(&app, unauthenticated).await;
  642. assert_eq!(unauthenticated_response.status(), StatusCode::UNAUTHORIZED);
  643. let basic = basic_auth_header("judy", "password123");
  644. let authenticated = test::TestRequest::get()
  645. .uri("/judy/private.git/info/refs?service=git-upload-pack")
  646. .insert_header(("authorization", basic))
  647. .to_request();
  648. let authenticated_response = test::call_service(&app, authenticated).await;
  649. assert_eq!(authenticated_response.status(), StatusCode::OK);
  650. }
  651. #[actix_web::test]
  652. async fn private_git_info_refs_allows_read_collaborator() {
  653. let env = TestEnv::new("private-collab-read");
  654. let app = env.app().await;
  655. create_user(&app, "kate").await;
  656. let owner_token = login(&app, "kate").await.token;
  657. create_user_as_admin(&app, &owner_token, "louis").await;
  658. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  659. add_collaborator(&app, &owner_token, "kate", "shared", "louis", "read").await;
  660. let collaborator = test::TestRequest::get()
  661. .uri("/kate/shared.git/info/refs?service=git-upload-pack")
  662. .insert_header(("authorization", basic_auth_header("louis", "password123")))
  663. .to_request();
  664. let collaborator_response = test::call_service(&app, collaborator).await;
  665. assert_eq!(collaborator_response.status(), StatusCode::OK);
  666. }
  667. #[actix_web::test]
  668. async fn read_collaborator_cannot_advertise_receive_pack() {
  669. let env = TestEnv::new("private-collab-read-no-push");
  670. let app = env.app().await;
  671. create_user(&app, "mike").await;
  672. let owner_token = login(&app, "mike").await.token;
  673. create_user_as_admin(&app, &owner_token, "nina").await;
  674. create_repo_with_visibility(&app, &owner_token, "shared", true, true).await;
  675. add_collaborator(&app, &owner_token, "mike", "shared", "nina", "read").await;
  676. let collaborator = test::TestRequest::get()
  677. .uri("/mike/shared.git/info/refs?service=git-receive-pack")
  678. .insert_header(("authorization", basic_auth_header("nina", "password123")))
  679. .to_request();
  680. let collaborator_response = test::call_service(&app, collaborator).await;
  681. assert_eq!(collaborator_response.status(), StatusCode::FORBIDDEN);
  682. }
  683. #[actix_web::test]
  684. async fn fork_repository_clones_base_repo() {
  685. let env = TestEnv::new("fork-repository");
  686. let app = env.app().await;
  687. create_user(&app, "olivia").await;
  688. let owner_token = login(&app, "olivia").await.token;
  689. create_user_as_admin(&app, &owner_token, "peter").await;
  690. let forker_token = login(&app, "peter").await.token;
  691. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  692. let request = test::TestRequest::post()
  693. .uri("/api/repos/olivia/origin/forks")
  694. .insert_header(("authorization", format!("Bearer {forker_token}")))
  695. .insert_header(("content-type", "application/json"))
  696. .set_payload(r#"{"name":"origin-fork","description":"forked"}"#)
  697. .to_request();
  698. let response = test::call_service(&app, request).await;
  699. assert_eq!(response.status(), StatusCode::OK);
  700. let fork_path = env.repo_path("peter", "origin-fork");
  701. assert!(fork_path.exists());
  702. let head = git(&fork_path, &["rev-parse", "refs/heads/main"]);
  703. assert_eq!(head.len(), 40);
  704. }
  705. #[actix_web::test]
  706. async fn list_branches_returns_main_branch() {
  707. let env = TestEnv::new("list-branches");
  708. let app = env.app().await;
  709. create_user(&app, "quinn").await;
  710. let token = login(&app, "quinn").await.token;
  711. create_repo_with_visibility(&app, &token, "branches", true, false).await;
  712. let request = test::TestRequest::get()
  713. .uri("/api/repos/quinn/branches/branches")
  714. .insert_header(("authorization", format!("Bearer {token}")))
  715. .to_request();
  716. let response = test::call_service(&app, request).await;
  717. assert_eq!(response.status(), StatusCode::OK);
  718. let branches: Vec<Branch> = test::read_body_json(response).await;
  719. assert!(branches.iter().any(|branch| branch.name == "main"));
  720. }
  721. #[actix_web::test]
  722. async fn create_pull_request_from_fork_succeeds() {
  723. let env = TestEnv::new("create-pr");
  724. let app = env.app().await;
  725. create_user(&app, "rachel").await;
  726. let owner_token = login(&app, "rachel").await.token;
  727. create_user_as_admin(&app, &owner_token, "sam").await;
  728. let forker_token = login(&app, "sam").await.token;
  729. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  730. fork_repo(&app, &forker_token, "rachel", "origin", "origin-fork").await;
  731. push_commit_to_branch(
  732. &env.repo_path("sam", "origin-fork"),
  733. "main",
  734. "feature-one",
  735. "sam",
  736. "sam@example.com",
  737. "feature.txt",
  738. "hello from fork\n",
  739. );
  740. let pull = create_pull_request(
  741. &app,
  742. &forker_token,
  743. "rachel",
  744. "origin",
  745. "sam",
  746. "origin-fork",
  747. "feature-one",
  748. "main",
  749. "Add feature one",
  750. )
  751. .await;
  752. assert_eq!(pull.base_repo.owner.name, "rachel");
  753. assert_eq!(pull.base_repo.repo.name, "origin");
  754. assert_eq!(pull.head_repo.owner.name, "sam");
  755. assert_eq!(pull.head_repo.repo.name, "origin-fork");
  756. assert_eq!(pull.pull_request.index, 1);
  757. assert_eq!(pull.pull_request.head_branch, "feature-one");
  758. assert_eq!(pull.pull_request.base_branch, "main");
  759. assert_eq!(pull.pull_request.status, PullRequestStatus::Mergeable);
  760. assert!(!pull.pull_request.merge_base.is_empty());
  761. }
  762. #[actix_web::test]
  763. async fn compare_endpoint_returns_commit_and_file_stats() {
  764. let env = TestEnv::new("compare-pr");
  765. let app = env.app().await;
  766. create_user(&app, "rhea").await;
  767. let owner_token = login(&app, "rhea").await.token;
  768. create_user_as_admin(&app, &owner_token, "sora").await;
  769. let forker_token = login(&app, "sora").await.token;
  770. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  771. fork_repo(&app, &forker_token, "rhea", "origin", "origin-fork").await;
  772. push_commit_to_branch(
  773. &env.repo_path("sora", "origin-fork"),
  774. "main",
  775. "feature-compare",
  776. "sora",
  777. "sora@example.com",
  778. "compare.txt",
  779. "compare body\n",
  780. );
  781. let compare = compare_repositories(
  782. &app,
  783. &forker_token,
  784. "rhea",
  785. "origin",
  786. "main",
  787. "sora",
  788. "origin-fork",
  789. "feature-compare",
  790. )
  791. .await;
  792. assert_eq!(compare.base_branch, "main");
  793. assert_eq!(compare.head_branch, "feature-compare");
  794. assert_eq!(compare.status, PullRequestStatus::Mergeable);
  795. assert_eq!(compare.commits.len(), 1);
  796. assert_eq!(compare.files.len(), 1);
  797. assert_eq!(compare.files[0].path, "compare.txt");
  798. assert!(!compare.head_commit_id.is_empty());
  799. assert!(!compare.merge_base.is_empty());
  800. }
  801. #[actix_web::test]
  802. async fn duplicate_unmerged_pull_request_is_rejected() {
  803. let env = TestEnv::new("duplicate-pr");
  804. let app = env.app().await;
  805. create_user(&app, "tina").await;
  806. let owner_token = login(&app, "tina").await.token;
  807. create_user_as_admin(&app, &owner_token, "uma").await;
  808. let forker_token = login(&app, "uma").await.token;
  809. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  810. fork_repo(&app, &forker_token, "tina", "origin", "origin-fork").await;
  811. push_commit_to_branch(
  812. &env.repo_path("uma", "origin-fork"),
  813. "main",
  814. "feature-one",
  815. "uma",
  816. "uma@example.com",
  817. "feature.txt",
  818. "duplicate pr check\n",
  819. );
  820. let _ = create_pull_request(
  821. &app,
  822. &forker_token,
  823. "tina",
  824. "origin",
  825. "uma",
  826. "origin-fork",
  827. "feature-one",
  828. "main",
  829. "First PR",
  830. )
  831. .await;
  832. let request = test::TestRequest::post()
  833. .uri("/api/repos/tina/origin/pulls")
  834. .insert_header(("authorization", format!("Bearer {forker_token}")))
  835. .insert_header(("content-type", "application/json"))
  836. .set_payload(
  837. r#"{"head_owner":"uma","head_repo":"origin-fork","head_branch":"feature-one","base_branch":"main","title":"First PR","body":""}"#,
  838. )
  839. .to_request();
  840. let response = test::call_service(&app, request).await;
  841. assert_eq!(response.status(), StatusCode::CONFLICT);
  842. }
  843. #[actix_web::test]
  844. async fn list_pull_requests_returns_created_pull_request() {
  845. let env = TestEnv::new("list-prs");
  846. let app = env.app().await;
  847. create_user(&app, "victor").await;
  848. let owner_token = login(&app, "victor").await.token;
  849. create_user_as_admin(&app, &owner_token, "wendy").await;
  850. let forker_token = login(&app, "wendy").await.token;
  851. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  852. fork_repo(&app, &forker_token, "victor", "origin", "origin-fork").await;
  853. push_commit_to_branch(
  854. &env.repo_path("wendy", "origin-fork"),
  855. "main",
  856. "feature-list",
  857. "wendy",
  858. "wendy@example.com",
  859. "list.txt",
  860. "list pull requests\n",
  861. );
  862. let created = create_pull_request(
  863. &app,
  864. &forker_token,
  865. "victor",
  866. "origin",
  867. "wendy",
  868. "origin-fork",
  869. "feature-list",
  870. "main",
  871. "List PR",
  872. )
  873. .await;
  874. let request = test::TestRequest::get()
  875. .uri("/api/repos/victor/origin/pulls")
  876. .insert_header(("authorization", format!("Bearer {owner_token}")))
  877. .to_request();
  878. let response = test::call_service(&app, request).await;
  879. assert_eq!(response.status(), StatusCode::OK);
  880. let pulls: Vec<ApiPullRequestResponse> = test::read_body_json(response).await;
  881. assert_eq!(pulls.len(), 1);
  882. assert_eq!(pulls[0].pull_request.id, created.pull_request.id);
  883. assert_eq!(pulls[0].pull_request.title, "List PR");
  884. assert_eq!(pulls[0].head_repo.repo.name, "origin-fork");
  885. }
  886. #[actix_web::test]
  887. async fn get_pull_request_detail_returns_compare_payload() {
  888. let env = TestEnv::new("pr-detail");
  889. let app = env.app().await;
  890. create_user(&app, "trent").await;
  891. let owner_token = login(&app, "trent").await.token;
  892. create_user_as_admin(&app, &owner_token, "ursula").await;
  893. let forker_token = login(&app, "ursula").await.token;
  894. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  895. fork_repo(&app, &forker_token, "trent", "origin", "origin-fork").await;
  896. push_commit_to_branch(
  897. &env.repo_path("ursula", "origin-fork"),
  898. "main",
  899. "feature-detail",
  900. "ursula",
  901. "ursula@example.com",
  902. "detail.txt",
  903. "detail body\n",
  904. );
  905. let created = create_pull_request(
  906. &app,
  907. &forker_token,
  908. "trent",
  909. "origin",
  910. "ursula",
  911. "origin-fork",
  912. "feature-detail",
  913. "main",
  914. "Detail PR",
  915. )
  916. .await;
  917. let detail = get_pull_request(&app, &owner_token, "trent", "origin", 1).await;
  918. assert_eq!(detail.pull_request.id, created.pull_request.id);
  919. assert_eq!(detail.pull_request.title, "Detail PR");
  920. assert_eq!(detail.compare.status, PullRequestStatus::Mergeable);
  921. assert_eq!(detail.compare.commits.len(), 1);
  922. assert_eq!(detail.compare.files.len(), 1);
  923. assert_eq!(detail.compare.files[0].path, "detail.txt");
  924. }
  925. #[actix_web::test]
  926. async fn merge_pull_request_updates_base_branch() {
  927. let env = TestEnv::new("merge-pr");
  928. let app = env.app().await;
  929. create_user(&app, "xavier").await;
  930. let owner_token = login(&app, "xavier").await.token;
  931. create_user_as_admin(&app, &owner_token, "yara").await;
  932. let forker_token = login(&app, "yara").await.token;
  933. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  934. fork_repo(&app, &forker_token, "xavier", "origin", "origin-fork").await;
  935. push_commit_to_branch(
  936. &env.repo_path("yara", "origin-fork"),
  937. "main",
  938. "feature-merge",
  939. "yara",
  940. "yara@example.com",
  941. "merged.txt",
  942. "merged by pr\n",
  943. );
  944. let created = create_pull_request(
  945. &app,
  946. &forker_token,
  947. "xavier",
  948. "origin",
  949. "yara",
  950. "origin-fork",
  951. "feature-merge",
  952. "main",
  953. "Merge PR",
  954. )
  955. .await;
  956. let merged = merge_pull_request(&app, &owner_token, "xavier", "origin", 1).await;
  957. assert_eq!(merged.pull_request.id, created.pull_request.id);
  958. assert!(merged.pull_request.has_merged);
  959. assert!(merged.pull_request.is_closed);
  960. let merged_file = git(
  961. &env.repo_path("xavier", "origin"),
  962. &["show", "refs/heads/main:merged.txt"],
  963. );
  964. assert_eq!(merged_file, "merged by pr");
  965. }
  966. #[actix_web::test]
  967. async fn merged_pull_request_detail_excludes_base_only_commits() {
  968. let env = TestEnv::new("merged-pr-compare");
  969. let app = env.app().await;
  970. create_user(&app, "owner").await;
  971. let owner_token = login(&app, "owner").await.token;
  972. create_user_as_admin(&app, &owner_token, "forker").await;
  973. let forker_token = login(&app, "forker").await.token;
  974. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  975. fork_repo(&app, &forker_token, "owner", "origin", "origin-fork").await;
  976. push_commit_to_branch(
  977. &env.repo_path("forker", "origin-fork"),
  978. "main",
  979. "feature-merged",
  980. "forker",
  981. "forker@example.com",
  982. "feature.txt",
  983. "feature body\n",
  984. );
  985. let _ = create_pull_request(
  986. &app,
  987. &forker_token,
  988. "owner",
  989. "origin",
  990. "forker",
  991. "origin-fork",
  992. "feature-merged",
  993. "main",
  994. "Merged PR",
  995. )
  996. .await;
  997. push_commit_to_existing_branch(
  998. &env.repo_path("owner", "origin"),
  999. "main",
  1000. "owner",
  1001. "owner@example.com",
  1002. "base.txt",
  1003. "base only\n",
  1004. );
  1005. let merged = merge_pull_request(&app, &owner_token, "owner", "origin", 1).await;
  1006. assert!(merged.pull_request.has_merged);
  1007. let detail = get_pull_request(&app, &owner_token, "owner", "origin", 1).await;
  1008. assert_eq!(detail.compare.commits.len(), 1);
  1009. assert_eq!(detail.compare.files.len(), 1);
  1010. assert_eq!(detail.compare.files[0].path, "feature.txt");
  1011. }
  1012. #[actix_web::test]
  1013. async fn pull_request_poster_can_close_and_reopen() {
  1014. let env = TestEnv::new("close-reopen-pr");
  1015. let app = env.app().await;
  1016. create_user(&app, "zoe").await;
  1017. let owner_token = login(&app, "zoe").await.token;
  1018. create_user_as_admin(&app, &owner_token, "abby").await;
  1019. let forker_token = login(&app, "abby").await.token;
  1020. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  1021. fork_repo(&app, &forker_token, "zoe", "origin", "origin-fork").await;
  1022. push_commit_to_branch(
  1023. &env.repo_path("abby", "origin-fork"),
  1024. "main",
  1025. "feature-close",
  1026. "abby",
  1027. "abby@example.com",
  1028. "close.txt",
  1029. "close reopen\n",
  1030. );
  1031. let created = create_pull_request(
  1032. &app,
  1033. &forker_token,
  1034. "zoe",
  1035. "origin",
  1036. "abby",
  1037. "origin-fork",
  1038. "feature-close",
  1039. "main",
  1040. "Close PR",
  1041. )
  1042. .await;
  1043. assert!(!created.pull_request.is_closed);
  1044. let closed = close_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
  1045. assert!(closed.pull_request.is_closed);
  1046. assert!(!closed.pull_request.has_merged);
  1047. let reopened = reopen_pull_request(&app, &forker_token, "zoe", "origin", 1).await;
  1048. assert!(!reopened.pull_request.is_closed);
  1049. assert_eq!(reopened.pull_request.status, PullRequestStatus::Mergeable);
  1050. }
  1051. #[actix_web::test]
  1052. async fn reopen_pull_request_rejects_duplicate_open_pair() {
  1053. let env = TestEnv::new("reopen-duplicate-pr");
  1054. let app = env.app().await;
  1055. create_user(&app, "brad").await;
  1056. let owner_token = login(&app, "brad").await.token;
  1057. create_user_as_admin(&app, &owner_token, "cora").await;
  1058. let forker_token = login(&app, "cora").await.token;
  1059. create_repo_with_visibility(&app, &owner_token, "origin", true, false).await;
  1060. fork_repo(&app, &forker_token, "brad", "origin", "origin-fork").await;
  1061. push_commit_to_branch(
  1062. &env.repo_path("cora", "origin-fork"),
  1063. "main",
  1064. "feature-dup",
  1065. "cora",
  1066. "cora@example.com",
  1067. "dup.txt",
  1068. "duplicate reopen\n",
  1069. );
  1070. let _ = create_pull_request(
  1071. &app,
  1072. &forker_token,
  1073. "brad",
  1074. "origin",
  1075. "cora",
  1076. "origin-fork",
  1077. "feature-dup",
  1078. "main",
  1079. "Closed PR",
  1080. )
  1081. .await;
  1082. let _ = close_pull_request(&app, &forker_token, "brad", "origin", 1).await;
  1083. let _ = create_pull_request(
  1084. &app,
  1085. &forker_token,
  1086. "brad",
  1087. "origin",
  1088. "cora",
  1089. "origin-fork",
  1090. "feature-dup",
  1091. "main",
  1092. "Open PR",
  1093. )
  1094. .await;
  1095. let request = test::TestRequest::post()
  1096. .uri("/api/repos/brad/origin/pulls/1/reopen")
  1097. .insert_header(("authorization", format!("Bearer {forker_token}")))
  1098. .to_request();
  1099. let response = test::call_service(&app, request).await;
  1100. assert_eq!(response.status(), StatusCode::CONFLICT);
  1101. }
  1102. async fn create_user<S>(app: &S, username: &str) -> ApiUser
  1103. where
  1104. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1105. {
  1106. let email = format!("{username}@example.com");
  1107. let body = format!(
  1108. r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
  1109. );
  1110. let request = test::TestRequest::post()
  1111. .uri("/api/admin/users")
  1112. .insert_header(("content-type", "application/json"))
  1113. .set_payload(body)
  1114. .to_request();
  1115. let response = test::call_service(app, request).await;
  1116. assert_eq!(response.status(), StatusCode::OK);
  1117. test::read_body_json(response).await
  1118. }
  1119. async fn create_user_as_admin<S>(app: &S, admin_token: &str, username: &str) -> ApiUser
  1120. where
  1121. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1122. {
  1123. let email = format!("{username}@example.com");
  1124. let body = format!(
  1125. r#"{{"username":"{username}","email":"{email}","password":"password123","full_name":"{username}"}}"#
  1126. );
  1127. let request = test::TestRequest::post()
  1128. .uri("/api/admin/users")
  1129. .insert_header(("authorization", format!("Bearer {admin_token}")))
  1130. .insert_header(("content-type", "application/json"))
  1131. .set_payload(body)
  1132. .to_request();
  1133. let response = test::call_service(app, request).await;
  1134. assert_eq!(response.status(), StatusCode::OK);
  1135. test::read_body_json(response).await
  1136. }
  1137. async fn login<S>(app: &S, login: &str) -> ApiLoginResponse
  1138. where
  1139. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1140. {
  1141. let body = format!(r#"{{"login":"{login}","password":"password123"}}"#);
  1142. let request = test::TestRequest::post()
  1143. .uri("/api/user/login")
  1144. .insert_header(("content-type", "application/json"))
  1145. .set_payload(body)
  1146. .to_request();
  1147. let response = test::call_service(app, request).await;
  1148. assert_eq!(response.status(), StatusCode::OK);
  1149. test::read_body_json(response).await
  1150. }
  1151. async fn create_repo<S>(
  1152. app: &S,
  1153. token: &str,
  1154. name: &str,
  1155. auto_init: bool,
  1156. ) -> ApiRepositoryResponse
  1157. where
  1158. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1159. {
  1160. create_repo_with_visibility(app, token, name, auto_init, false).await
  1161. }
  1162. async fn create_repo_with_visibility<S>(
  1163. app: &S,
  1164. token: &str,
  1165. name: &str,
  1166. auto_init: bool,
  1167. is_private: bool,
  1168. ) -> ApiRepositoryResponse
  1169. where
  1170. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1171. {
  1172. let body = format!(
  1173. r#"{{"name":"{name}","description":"repo {name}","auto_init":{auto_init},"is_private":{is_private}}}"#
  1174. );
  1175. let request = test::TestRequest::post()
  1176. .uri("/api/repos")
  1177. .insert_header(("authorization", format!("Bearer {token}")))
  1178. .insert_header(("content-type", "application/json"))
  1179. .set_payload(body)
  1180. .to_request();
  1181. let response = test::call_service(app, request).await;
  1182. assert_eq!(response.status(), StatusCode::OK);
  1183. test::read_body_json(response).await
  1184. }
  1185. async fn fork_repo<S>(
  1186. app: &S,
  1187. token: &str,
  1188. owner: &str,
  1189. repo: &str,
  1190. fork_name: &str,
  1191. ) -> ApiRepositoryResponse
  1192. where
  1193. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1194. {
  1195. let body = format!(r#"{{"name":"{fork_name}","description":"fork {fork_name}"}}"#);
  1196. let request = test::TestRequest::post()
  1197. .uri(&format!("/api/repos/{owner}/{repo}/forks"))
  1198. .insert_header(("authorization", format!("Bearer {token}")))
  1199. .insert_header(("content-type", "application/json"))
  1200. .set_payload(body)
  1201. .to_request();
  1202. let response = test::call_service(app, request).await;
  1203. assert_eq!(response.status(), StatusCode::OK);
  1204. test::read_body_json(response).await
  1205. }
  1206. async fn create_pull_request<S>(
  1207. app: &S,
  1208. token: &str,
  1209. owner: &str,
  1210. repo: &str,
  1211. head_owner: &str,
  1212. head_repo: &str,
  1213. head_branch: &str,
  1214. base_branch: &str,
  1215. title: &str,
  1216. ) -> ApiPullRequestResponse
  1217. where
  1218. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1219. {
  1220. let body = format!(
  1221. r#"{{"head_owner":"{head_owner}","head_repo":"{head_repo}","head_branch":"{head_branch}","base_branch":"{base_branch}","title":"{title}","body":"{title} body"}}"#
  1222. );
  1223. let request = test::TestRequest::post()
  1224. .uri(&format!("/api/repos/{owner}/{repo}/pulls"))
  1225. .insert_header(("authorization", format!("Bearer {token}")))
  1226. .insert_header(("content-type", "application/json"))
  1227. .set_payload(body)
  1228. .to_request();
  1229. let response = test::call_service(app, request).await;
  1230. assert_eq!(response.status(), StatusCode::OK);
  1231. test::read_body_json(response).await
  1232. }
  1233. async fn compare_repositories<S>(
  1234. app: &S,
  1235. token: &str,
  1236. owner: &str,
  1237. repo: &str,
  1238. base: &str,
  1239. head_owner: &str,
  1240. head_repo: &str,
  1241. head_branch: &str,
  1242. ) -> CompareResponse
  1243. where
  1244. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1245. {
  1246. let request = test::TestRequest::get()
  1247. .uri(&format!(
  1248. "/api/repos/{owner}/{repo}/compare?base={base}&head_owner={head_owner}&head_repo={head_repo}&head_branch={head_branch}"
  1249. ))
  1250. .insert_header(("authorization", format!("Bearer {token}")))
  1251. .to_request();
  1252. let response = test::call_service(app, request).await;
  1253. assert_eq!(response.status(), StatusCode::OK);
  1254. test::read_body_json(response).await
  1255. }
  1256. async fn get_pull_request<S>(
  1257. app: &S,
  1258. token: &str,
  1259. owner: &str,
  1260. repo: &str,
  1261. index: i64,
  1262. ) -> ApiPullRequestDetailResponse
  1263. where
  1264. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1265. {
  1266. let request = test::TestRequest::get()
  1267. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}"))
  1268. .insert_header(("authorization", format!("Bearer {token}")))
  1269. .to_request();
  1270. let response = test::call_service(app, request).await;
  1271. assert_eq!(response.status(), StatusCode::OK);
  1272. test::read_body_json(response).await
  1273. }
  1274. async fn merge_pull_request<S>(
  1275. app: &S,
  1276. token: &str,
  1277. owner: &str,
  1278. repo: &str,
  1279. index: i64,
  1280. ) -> ApiPullRequestResponse
  1281. where
  1282. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1283. {
  1284. let request = test::TestRequest::post()
  1285. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/merge"))
  1286. .insert_header(("authorization", format!("Bearer {token}")))
  1287. .insert_header(("content-type", "application/json"))
  1288. .set_payload(r#"{"message":""}"#)
  1289. .to_request();
  1290. let response = test::call_service(app, request).await;
  1291. assert_eq!(response.status(), StatusCode::OK);
  1292. test::read_body_json(response).await
  1293. }
  1294. async fn close_pull_request<S>(
  1295. app: &S,
  1296. token: &str,
  1297. owner: &str,
  1298. repo: &str,
  1299. index: i64,
  1300. ) -> ApiPullRequestResponse
  1301. where
  1302. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1303. {
  1304. let request = test::TestRequest::post()
  1305. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/close"))
  1306. .insert_header(("authorization", format!("Bearer {token}")))
  1307. .to_request();
  1308. let response = test::call_service(app, request).await;
  1309. assert_eq!(response.status(), StatusCode::OK);
  1310. test::read_body_json(response).await
  1311. }
  1312. async fn reopen_pull_request<S>(
  1313. app: &S,
  1314. token: &str,
  1315. owner: &str,
  1316. repo: &str,
  1317. index: i64,
  1318. ) -> ApiPullRequestResponse
  1319. where
  1320. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1321. {
  1322. let request = test::TestRequest::post()
  1323. .uri(&format!("/api/repos/{owner}/{repo}/pulls/{index}/reopen"))
  1324. .insert_header(("authorization", format!("Bearer {token}")))
  1325. .to_request();
  1326. let response = test::call_service(app, request).await;
  1327. assert_eq!(response.status(), StatusCode::OK);
  1328. test::read_body_json(response).await
  1329. }
  1330. fn basic_auth_header(username: &str, password: &str) -> String {
  1331. format!("Basic {}", encode_base64(&format!("{username}:{password}")))
  1332. }
  1333. async fn add_collaborator<S>(
  1334. app: &S,
  1335. owner_token: &str,
  1336. owner: &str,
  1337. repo: &str,
  1338. username: &str,
  1339. permission: &str,
  1340. ) where
  1341. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1342. {
  1343. let body = format!(r#"{{"username":"{username}","permission":"{permission}"}}"#);
  1344. let request = test::TestRequest::post()
  1345. .uri(&format!("/api/repos/{owner}/{repo}/collaborators"))
  1346. .insert_header(("authorization", format!("Bearer {owner_token}")))
  1347. .insert_header(("content-type", "application/json"))
  1348. .set_payload(body)
  1349. .to_request();
  1350. let response = test::call_service(app, request).await;
  1351. assert_eq!(response.status(), StatusCode::OK);
  1352. }
  1353. async fn assert_error_response(
  1354. response: ServiceResponse<BoxBody>,
  1355. expected_status: StatusCode,
  1356. expected_code: &str,
  1357. expected_message: &str,
  1358. ) {
  1359. assert_eq!(response.status(), expected_status);
  1360. let body: Value = test::read_body_json(response).await;
  1361. assert_eq!(body.get("code").and_then(Value::as_str), Some(expected_code));
  1362. assert_eq!(
  1363. body.get("message").and_then(Value::as_str),
  1364. Some(expected_message)
  1365. );
  1366. assert_eq!(
  1367. body.get("status").and_then(Value::as_u64),
  1368. Some(expected_status.as_u16() as u64)
  1369. );
  1370. }
  1371. async fn list_current_user_repositories<S>(
  1372. app: &S,
  1373. token: &str,
  1374. query: &str,
  1375. ) -> Vec<ApiRepositoryResponse>
  1376. where
  1377. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1378. {
  1379. let request = test::TestRequest::get()
  1380. .uri(&format!("/api/user/repos?q={query}"))
  1381. .insert_header(("authorization", format!("Bearer {token}")))
  1382. .to_request();
  1383. let response = test::call_service(app, request).await;
  1384. assert_eq!(response.status(), StatusCode::OK);
  1385. test::read_body_json(response).await
  1386. }
  1387. async fn list_user_repositories<S>(
  1388. app: &S,
  1389. token: Option<&str>,
  1390. username: &str,
  1391. query: &str,
  1392. ) -> Vec<ApiRepositoryResponse>
  1393. where
  1394. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1395. {
  1396. let mut request = test::TestRequest::get().uri(&format!("/api/users/{username}/repos?q={query}"));
  1397. if let Some(token) = token {
  1398. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1399. }
  1400. let response = test::call_service(app, request.to_request()).await;
  1401. assert_eq!(response.status(), StatusCode::OK);
  1402. test::read_body_json(response).await
  1403. }
  1404. async fn search_repositories<S>(
  1405. app: &S,
  1406. token: Option<&str>,
  1407. query: &str,
  1408. ) -> Vec<ApiRepositoryResponse>
  1409. where
  1410. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1411. {
  1412. let mut request = test::TestRequest::get().uri(&format!("/api/repos/search?q={query}"));
  1413. if let Some(token) = token {
  1414. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1415. }
  1416. let response = test::call_service(app, request.to_request()).await;
  1417. assert_eq!(response.status(), StatusCode::OK);
  1418. test::read_body_json(response).await
  1419. }
  1420. async fn list_collaborators<S>(
  1421. app: &S,
  1422. token: Option<&str>,
  1423. owner: &str,
  1424. repo: &str,
  1425. ) -> Vec<ApiCollaboratorResponse>
  1426. where
  1427. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1428. {
  1429. let mut request =
  1430. test::TestRequest::get().uri(&format!("/api/repos/{owner}/{repo}/collaborators"));
  1431. if let Some(token) = token {
  1432. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1433. }
  1434. let response = test::call_service(app, request.to_request()).await;
  1435. assert_eq!(response.status(), StatusCode::OK);
  1436. test::read_body_json(response).await
  1437. }
  1438. async fn get_collaborator<S>(
  1439. app: &S,
  1440. token: Option<&str>,
  1441. owner: &str,
  1442. repo: &str,
  1443. username: &str,
  1444. ) -> ApiCollaboratorResponse
  1445. where
  1446. S: Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error>,
  1447. {
  1448. let mut request = test::TestRequest::get()
  1449. .uri(&format!("/api/repos/{owner}/{repo}/collaborators/{username}"));
  1450. if let Some(token) = token {
  1451. request = request.insert_header(("authorization", format!("Bearer {token}")));
  1452. }
  1453. let response = test::call_service(app, request.to_request()).await;
  1454. assert_eq!(response.status(), StatusCode::OK);
  1455. test::read_body_json(response).await
  1456. }
  1457. fn encode_base64(input: &str) -> String {
  1458. const TABLE: &[u8; 64] = b"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
  1459. let bytes = input.as_bytes();
  1460. let mut out = String::new();
  1461. let mut index = 0;
  1462. while index < bytes.len() {
  1463. let b0 = bytes[index];
  1464. let b1 = *bytes.get(index + 1).unwrap_or(&0);
  1465. let b2 = *bytes.get(index + 2).unwrap_or(&0);
  1466. out.push(TABLE[(b0 >> 2) as usize] as char);
  1467. out.push(TABLE[((b0 & 0b0000_0011) << 4 | (b1 >> 4)) as usize] as char);
  1468. if index + 1 < bytes.len() {
  1469. out.push(TABLE[((b1 & 0b0000_1111) << 2 | (b2 >> 6)) as usize] as char);
  1470. } else {
  1471. out.push('=');
  1472. }
  1473. if index + 2 < bytes.len() {
  1474. out.push(TABLE[(b2 & 0b0011_1111) as usize] as char);
  1475. } else {
  1476. out.push('=');
  1477. }
  1478. index += 3;
  1479. }
  1480. out
  1481. }
  1482. fn git(repo_path: &Path, args: &[&str]) -> String {
  1483. let output = Command::new("git")
  1484. .arg("--git-dir")
  1485. .arg(repo_path)
  1486. .args(args)
  1487. .output()
  1488. .expect("run git");
  1489. assert!(
  1490. output.status.success(),
  1491. "git command failed: {}",
  1492. String::from_utf8_lossy(&output.stderr)
  1493. );
  1494. String::from_utf8_lossy(&output.stdout).trim().to_string()
  1495. }
  1496. fn push_commit_to_branch(
  1497. repo_path: &Path,
  1498. base_branch: &str,
  1499. branch: &str,
  1500. author_name: &str,
  1501. author_email: &str,
  1502. file_name: &str,
  1503. content: &str,
  1504. ) {
  1505. let unique = SystemTime::now()
  1506. .duration_since(UNIX_EPOCH)
  1507. .expect("clock")
  1508. .as_nanos();
  1509. let worktree = std::env::temp_dir().join(format!("gitr-pr-work-{branch}-{unique}"));
  1510. let _ = fs::remove_dir_all(&worktree);
  1511. let clone = Command::new("git")
  1512. .arg("clone")
  1513. .arg(repo_path)
  1514. .arg(&worktree)
  1515. .output()
  1516. .expect("clone repo");
  1517. assert!(
  1518. clone.status.success(),
  1519. "git clone failed: {}",
  1520. String::from_utf8_lossy(&clone.stderr)
  1521. );
  1522. let checkout = Command::new("git")
  1523. .current_dir(&worktree)
  1524. .arg("checkout")
  1525. .arg("-b")
  1526. .arg(branch)
  1527. .arg(format!("origin/{base_branch}"))
  1528. .output()
  1529. .expect("checkout branch");
  1530. assert!(
  1531. checkout.status.success(),
  1532. "git checkout failed: {}",
  1533. String::from_utf8_lossy(&checkout.stderr)
  1534. );
  1535. fs::write(worktree.join(file_name), content).expect("write test file");
  1536. let add = Command::new("git")
  1537. .current_dir(&worktree)
  1538. .arg("add")
  1539. .arg(file_name)
  1540. .output()
  1541. .expect("git add");
  1542. assert!(
  1543. add.status.success(),
  1544. "git add failed: {}",
  1545. String::from_utf8_lossy(&add.stderr)
  1546. );
  1547. let commit = Command::new("git")
  1548. .current_dir(&worktree)
  1549. .env("GIT_AUTHOR_NAME", author_name)
  1550. .env("GIT_AUTHOR_EMAIL", author_email)
  1551. .env("GIT_COMMITTER_NAME", author_name)
  1552. .env("GIT_COMMITTER_EMAIL", author_email)
  1553. .arg("commit")
  1554. .arg("-m")
  1555. .arg(format!("Add {file_name}"))
  1556. .output()
  1557. .expect("git commit");
  1558. assert!(
  1559. commit.status.success(),
  1560. "git commit failed: {}",
  1561. String::from_utf8_lossy(&commit.stderr)
  1562. );
  1563. let push = Command::new("git")
  1564. .current_dir(&worktree)
  1565. .arg("push")
  1566. .arg("origin")
  1567. .arg(format!("HEAD:refs/heads/{branch}"))
  1568. .output()
  1569. .expect("git push");
  1570. assert!(
  1571. push.status.success(),
  1572. "git push failed: {}",
  1573. String::from_utf8_lossy(&push.stderr)
  1574. );
  1575. let _ = fs::remove_dir_all(&worktree);
  1576. }
  1577. fn push_commit_to_existing_branch(
  1578. repo_path: &Path,
  1579. branch: &str,
  1580. author_name: &str,
  1581. author_email: &str,
  1582. file_name: &str,
  1583. content: &str,
  1584. ) {
  1585. let unique = SystemTime::now()
  1586. .duration_since(UNIX_EPOCH)
  1587. .expect("clock")
  1588. .as_nanos();
  1589. let worktree = std::env::temp_dir().join(format!("gitr-base-work-{branch}-{unique}"));
  1590. let _ = fs::remove_dir_all(&worktree);
  1591. let clone = Command::new("git")
  1592. .arg("clone")
  1593. .arg(repo_path)
  1594. .arg(&worktree)
  1595. .output()
  1596. .expect("clone repo");
  1597. assert!(
  1598. clone.status.success(),
  1599. "git clone failed: {}",
  1600. String::from_utf8_lossy(&clone.stderr)
  1601. );
  1602. let checkout = Command::new("git")
  1603. .current_dir(&worktree)
  1604. .arg("checkout")
  1605. .arg(branch)
  1606. .output()
  1607. .expect("checkout branch");
  1608. assert!(
  1609. checkout.status.success(),
  1610. "git checkout failed: {}",
  1611. String::from_utf8_lossy(&checkout.stderr)
  1612. );
  1613. fs::write(worktree.join(file_name), content).expect("write test file");
  1614. let add = Command::new("git")
  1615. .current_dir(&worktree)
  1616. .arg("add")
  1617. .arg(file_name)
  1618. .output()
  1619. .expect("git add");
  1620. assert!(
  1621. add.status.success(),
  1622. "git add failed: {}",
  1623. String::from_utf8_lossy(&add.stderr)
  1624. );
  1625. let commit = Command::new("git")
  1626. .current_dir(&worktree)
  1627. .env("GIT_AUTHOR_NAME", author_name)
  1628. .env("GIT_AUTHOR_EMAIL", author_email)
  1629. .env("GIT_COMMITTER_NAME", author_name)
  1630. .env("GIT_COMMITTER_EMAIL", author_email)
  1631. .arg("commit")
  1632. .arg("-m")
  1633. .arg(format!("Add {file_name}"))
  1634. .output()
  1635. .expect("git commit");
  1636. assert!(
  1637. commit.status.success(),
  1638. "git commit failed: {}",
  1639. String::from_utf8_lossy(&commit.stderr)
  1640. );
  1641. let push = Command::new("git")
  1642. .current_dir(&worktree)
  1643. .arg("push")
  1644. .arg("origin")
  1645. .arg(format!("HEAD:refs/heads/{branch}"))
  1646. .output()
  1647. .expect("git push");
  1648. assert!(
  1649. push.status.success(),
  1650. "git push failed: {}",
  1651. String::from_utf8_lossy(&push.stderr)
  1652. );
  1653. let _ = fs::remove_dir_all(&worktree);
  1654. }
  1655. struct TestEnv {
  1656. root: PathBuf,
  1657. }
  1658. impl TestEnv {
  1659. fn new(label: &str) -> Self {
  1660. let unique = SystemTime::now()
  1661. .duration_since(UNIX_EPOCH)
  1662. .expect("clock")
  1663. .as_nanos();
  1664. let root = std::env::temp_dir().join(format!("gitr-test-{label}-{unique}"));
  1665. fs::create_dir_all(&root).expect("create temp root");
  1666. Self { root }
  1667. }
  1668. async fn app(
  1669. &self,
  1670. ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
  1671. self.app_with_git_binary("git").await
  1672. }
  1673. async fn app_with_git_binary(
  1674. &self,
  1675. git_binary: &str,
  1676. ) -> impl Service<Request, Response = ServiceResponse<BoxBody>, Error = actix_web::Error> {
  1677. let database_path = self.root.join("data").join("gitr.db");
  1678. let repository_root = self.root.join("data").join("repositories");
  1679. fs::create_dir_all(&repository_root).expect("repo root");
  1680. let config = AppConfig {
  1681. server: ServerConfig {
  1682. bind: "127.0.0.1:0".to_string(),
  1683. external_url: "http://127.0.0.1:3000/".to_string(),
  1684. },
  1685. database: DatabaseConfig {
  1686. path: database_path,
  1687. },
  1688. repository: RepositoryConfig {
  1689. root: repository_root,
  1690. default_branch: "main".to_string(),
  1691. git_binary: git_binary.to_string(),
  1692. },
  1693. app: CoreAppConfig {
  1694. run_user: "git".to_string(),
  1695. },
  1696. };
  1697. config.prepare().expect("prepare config");
  1698. let db = Database::open(&config.database.path).expect("open db");
  1699. db.init_schema().expect("init schema");
  1700. test::init_service(App::new().service(build_scope(Arc::new(AppState::new(config, db)))))
  1701. .await
  1702. }
  1703. fn repo_path(&self, owner: &str, repo: &str) -> PathBuf {
  1704. self.root
  1705. .join("data")
  1706. .join("repositories")
  1707. .join(owner)
  1708. .join(format!("{repo}.git"))
  1709. }
  1710. }
  1711. impl Drop for TestEnv {
  1712. fn drop(&mut self) {
  1713. let _ = fs::remove_dir_all(&self.root);
  1714. }
  1715. }