mirror of
				https://codeberg.org/forgejo/forgejo.git
				synced 2025-10-31 14:31:02 +00:00 
			
		
		
		
	- In Go 1.21 the crypto/sha256 [got a massive improvement](https://go.dev/doc/go1.21#crypto/sha256) by utilizing the SHA instructions for AMD64 CPUs, which sha256-simd already was doing. The performance is now on par and I think it's preferable to use the standard library rather than a package when possible. ``` cpu: AMD Ryzen 5 3600X 6-Core Processor │ simd.txt │ go.txt │ │ sec/op │ sec/op vs base │ Hash/8Bytes-12 63.25n ± 1% 73.38n ± 1% +16.02% (p=0.002 n=6) Hash/64Bytes-12 98.73n ± 1% 105.30n ± 1% +6.65% (p=0.002 n=6) Hash/1K-12 567.2n ± 1% 572.8n ± 1% +0.99% (p=0.002 n=6) Hash/8K-12 4.062µ ± 1% 4.062µ ± 1% ~ (p=0.396 n=6) Hash/1M-12 512.1µ ± 0% 510.6µ ± 1% ~ (p=0.485 n=6) Hash/5M-12 2.556m ± 1% 2.564m ± 0% ~ (p=0.093 n=6) Hash/10M-12 5.112m ± 0% 5.127m ± 0% ~ (p=0.093 n=6) geomean 13.82µ 14.27µ +3.28% │ simd.txt │ go.txt │ │ B/s │ B/s vs base │ Hash/8Bytes-12 120.6Mi ± 1% 104.0Mi ± 1% -13.81% (p=0.002 n=6) Hash/64Bytes-12 618.2Mi ± 1% 579.8Mi ± 1% -6.22% (p=0.002 n=6) Hash/1K-12 1.682Gi ± 1% 1.665Gi ± 1% -0.98% (p=0.002 n=6) Hash/8K-12 1.878Gi ± 1% 1.878Gi ± 1% ~ (p=0.310 n=6) Hash/1M-12 1.907Gi ± 0% 1.913Gi ± 1% ~ (p=0.485 n=6) Hash/5M-12 1.911Gi ± 1% 1.904Gi ± 0% ~ (p=0.093 n=6) Hash/10M-12 1.910Gi ± 0% 1.905Gi ± 0% ~ (p=0.093 n=6) geomean 1.066Gi 1.032Gi -3.18% ``` (cherry picked from commitabd94ff5b5) (cherry picked from commit15e81637ab) Conflicts: go.mod https://codeberg.org/forgejo/forgejo/pulls/1581 (cherry picked from commit325d92917f) Conflicts: modules/context/context_cookie.go https://codeberg.org/forgejo/forgejo/pulls/1617 (cherry picked from commit358819e895) (cherry picked from commit362fd7aae1) (cherry picked from commit4f64ee294e) (cherry picked from commit4bde77f7b1) (cherry picked from commit1311e30a81) (cherry picked from commit57b69e334c) (cherry picked from commit52dc892fad) (cherry picked from commit77f54f4187) (cherry picked from commit0d0392f3a5) Conflicts: go.mod https://codeberg.org/forgejo/forgejo/pulls/2034 (cherry picked from commit92798364e8) (cherry picked from commit43d2181277) (cherry picked from commit45c88b86a3) (cherry picked from commita1cd6f4e3a) (cherry picked from commit01191dc2ad) (cherry picked from commit151e07f37e)
		
			
				
	
	
		
			561 lines
		
	
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			561 lines
		
	
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2023 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"archive/tar"
 | |
| 	"bytes"
 | |
| 	"compress/gzip"
 | |
| 	"crypto"
 | |
| 	"crypto/rand"
 | |
| 	"crypto/rsa"
 | |
| 	"crypto/sha1"
 | |
| 	"crypto/sha256"
 | |
| 	"crypto/x509"
 | |
| 	"encoding/base64"
 | |
| 	"encoding/pem"
 | |
| 	"fmt"
 | |
| 	"hash"
 | |
| 	"math/big"
 | |
| 	"mime/multipart"
 | |
| 	"net/http"
 | |
| 	"path"
 | |
| 	"strings"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models/db"
 | |
| 	"code.gitea.io/gitea/models/packages"
 | |
| 	"code.gitea.io/gitea/models/unittest"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	chef_module "code.gitea.io/gitea/modules/packages/chef"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	chef_router "code.gitea.io/gitea/routers/api/packages/chef"
 | |
| 	"code.gitea.io/gitea/tests"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| func TestPackageChef(t *testing.T) {
 | |
| 	defer tests.PrepareTestEnv(t)()
 | |
| 
 | |
| 	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
 | |
| 
 | |
| 	privPem := `-----BEGIN RSA PRIVATE KEY-----
 | |
| MIIEpQIBAAKCAQEAtWp2PZz4TSU5A6ixw41HdbfBuGJwPuTtrsdoUf0DQ0/DJBNP
 | |
| qOCBAgEu6ZdUqIbWJ5Da+nevjtncy5hENdi6XrXjyzlUxghMuXjE5SeLGpgfQvkq
 | |
| bTkYaFpMe8PTzNeze3fei8+Eu6mzeb6g1GrqXznuPIc7bNss0w5iX9RiBM9dWPuX
 | |
| onx9xSEy0LYqJm7yXmshNe1aRwkjG/y5C26BzBFnMKp9YRTua0DO1WqLNhcaRnda
 | |
| lIFYouDNVTbwxSlYL16bZVoebqzZvLGrPvZJkPuCu6vH9brvOuYo0q8hLVNkBeXc
 | |
| imRpsDjLhQYzEJjoMTbaiVGnjBky+PWNiofJnwIDAQABAoIBAQCotF1KxLt/ejr/
 | |
| 9ROCh9JJXV3v6tL5GgkSPOv9Oq2bHgSZer/cixJNW+5VWd5nbiSe3K1WuJBw5pbW
 | |
| Wj4sWORPiRRR+3mjQzqeS/nGJDTOwWJo9K8IrUzOVhLEEYLX/ksxaXJyT8PehFyb
 | |
| vbNwdhCIB6ZNcXDItTWE+95twWJ5lxAIj2dNwZZni3UkwwjYnCnqFtvHCKOg0NH2
 | |
| RjQcFYmu3fncNeqLezUSdVyRyXxSCHsUdlYeX/e44StCnXdrmLUHlb2P27ZVdPGh
 | |
| SW7qTUPpmJKekYiRPOpTLj+ZKXIsANkyWO+7dVtZLBm5bIyAsmp0W/DmK+wRsejj
 | |
| alFbIsh5AoGBANJr7HSG695wkfn+kvu/V8qHbt+KDv4WjWHjGRsUqvxoHOUNkQmW
 | |
| vZWdk4gjHYn1l+QHWmoOE3AgyqtCZ4bFILkZPLN/F8Mh3+r4B0Ac4biJJt7XGMNQ
 | |
| Nv4wsk7TR7CCARsjO7GP1PT60hpjMvYmc1E36gNM7QIZE9jBE+L8eWYtAoGBANy2
 | |
| JOAWf+QeBlur6o9feH76cEmpQzUUq4Lj9mmnXgIirSsFoBnDb8VA6Ws+ltL9U9H2
 | |
| vaCoaTyi9twW9zWj+Ywg2mVR5nlSAPfdlTWS1GLUbDotlj5apc/lvnGuNlWzN+I4
 | |
| Tu64hhgBXqGvRZ0o7HzFodqRAkpVXp6CQCqBM7p7AoGAIgO0K3oL8t87ma/fTra1
 | |
| mFWgRJ5qogQ/Qo2VZ11F7ptd4GD7CxPE/cSFLsKOadi7fu75XJ994OhMGrcXSR/g
 | |
| lEtSFqn6y15UdgU2FtUUX+I72FXo+Nmkqh5xFHDu68d4Kkzdv2xCvn81K3LRsByz
 | |
| E3P4biQnQ+mN3cIIVu79KNkCgYEAm6uctrEn4y2KLn5DInyj8GuTZ2ELFhVOIzPG
 | |
| SR7TH451tTJyiblezDHMcOfkWUx0IlN1zCr8jtgiZXmNQzg0erFxWKU7ebZtGGYh
 | |
| J3g4dLx+2Unt/mzRJqFUgbnueOO/Nr+gbJ+ZdLUCmeeVohOLOTXrws0kYGl2Izab
 | |
| K1+VrKECgYEAxQohoOegA0f4mofisXItbwwqTIX3bLpxBc4woa1sB4kjNrLo4slc
 | |
| qtWZGVlRxwBvQUg0cYj+xtr5nyBdHLy0qwX/kMq4GqQnvW6NqsbrP3MjCZ8NX/Sj
 | |
| A2W0jx50Hs/XNw6IZFLYgWVoOzCaD+jYFpHhzUZyQD6/rYhwhHrNQmU=
 | |
| -----END RSA PRIVATE KEY-----`
 | |
| 
 | |
| 	tmp, _ := pem.Decode([]byte(privPem))
 | |
| 	privKey, _ := x509.ParsePKCS1PrivateKey(tmp.Bytes)
 | |
| 
 | |
| 	pubPem := `-----BEGIN PUBLIC KEY-----
 | |
| MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtWp2PZz4TSU5A6ixw41H
 | |
| dbfBuGJwPuTtrsdoUf0DQ0/DJBNPqOCBAgEu6ZdUqIbWJ5Da+nevjtncy5hENdi6
 | |
| XrXjyzlUxghMuXjE5SeLGpgfQvkqbTkYaFpMe8PTzNeze3fei8+Eu6mzeb6g1Grq
 | |
| XznuPIc7bNss0w5iX9RiBM9dWPuXonx9xSEy0LYqJm7yXmshNe1aRwkjG/y5C26B
 | |
| zBFnMKp9YRTua0DO1WqLNhcaRndalIFYouDNVTbwxSlYL16bZVoebqzZvLGrPvZJ
 | |
| kPuCu6vH9brvOuYo0q8hLVNkBeXcimRpsDjLhQYzEJjoMTbaiVGnjBky+PWNiofJ
 | |
| nwIDAQAB
 | |
| -----END PUBLIC KEY-----`
 | |
| 
 | |
| 	err := user_model.SetUserSetting(db.DefaultContext, user.ID, chef_module.SettingPublicPem, pubPem)
 | |
| 	assert.NoError(t, err)
 | |
| 
 | |
| 	t.Run("Authenticate", func(t *testing.T) {
 | |
| 		auth := &chef_router.Auth{}
 | |
| 
 | |
| 		t.Run("MissingUser", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "POST", "/dummy")
 | |
| 			u, err := auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.NoError(t, err)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("NotExistingUser", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "POST", "/dummy").
 | |
| 				SetHeader("X-Ops-Userid", "not-existing-user")
 | |
| 			u, err := auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("Timestamp", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "POST", "/dummy").
 | |
| 				SetHeader("X-Ops-Userid", user.Name)
 | |
| 			u, err := auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			req.SetHeader("X-Ops-Timestamp", "2023-01-01T00:00:00Z")
 | |
| 			u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("SigningVersion", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "POST", "/dummy").
 | |
| 				SetHeader("X-Ops-Userid", user.Name).
 | |
| 				SetHeader("X-Ops-Timestamp", time.Now().UTC().Format(time.RFC3339))
 | |
| 			u, err := auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			req.SetHeader("X-Ops-Sign", "version=none")
 | |
| 			u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			req.SetHeader("X-Ops-Sign", "version=1.4")
 | |
| 			u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			req.SetHeader("X-Ops-Sign", "version=1.0;algorithm=sha2")
 | |
| 			u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			req.SetHeader("X-Ops-Sign", "version=1.0;algorithm=sha256")
 | |
| 			u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("SignedHeaders", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			ts := time.Now().UTC().Format(time.RFC3339)
 | |
| 
 | |
| 			req := NewRequest(t, "POST", "/dummy").
 | |
| 				SetHeader("X-Ops-Userid", user.Name).
 | |
| 				SetHeader("X-Ops-Timestamp", ts).
 | |
| 				SetHeader("X-Ops-Sign", "version=1.0;algorithm=sha1").
 | |
| 				SetHeader("X-Ops-Content-Hash", "unused").
 | |
| 				SetHeader("X-Ops-Authorization-4", "dummy")
 | |
| 			u, err := auth.Verify(req.Request, nil, nil, nil)
 | |
| 			assert.Nil(t, u)
 | |
| 			assert.Error(t, err)
 | |
| 
 | |
| 			signRequest := func(t *testing.T, rw *RequestWrapper, version string) {
 | |
| 				req := rw.Request
 | |
| 				username := req.Header.Get("X-Ops-Userid")
 | |
| 				if version != "1.0" && version != "1.3" {
 | |
| 					sum := sha1.Sum([]byte(username))
 | |
| 					username = base64.StdEncoding.EncodeToString(sum[:])
 | |
| 				}
 | |
| 
 | |
| 				req.Header.Set("X-Ops-Sign", "version="+version)
 | |
| 
 | |
| 				var data []byte
 | |
| 				if version == "1.3" {
 | |
| 					data = []byte(fmt.Sprintf(
 | |
| 						"Method:%s\nPath:%s\nX-Ops-Content-Hash:%s\nX-Ops-Sign:version=%s\nX-Ops-Timestamp:%s\nX-Ops-UserId:%s\nX-Ops-Server-API-Version:%s",
 | |
| 						req.Method,
 | |
| 						path.Clean(req.URL.Path),
 | |
| 						req.Header.Get("X-Ops-Content-Hash"),
 | |
| 						version,
 | |
| 						req.Header.Get("X-Ops-Timestamp"),
 | |
| 						username,
 | |
| 						req.Header.Get("X-Ops-Server-Api-Version"),
 | |
| 					))
 | |
| 				} else {
 | |
| 					sum := sha1.Sum([]byte(path.Clean(req.URL.Path)))
 | |
| 					data = []byte(fmt.Sprintf(
 | |
| 						"Method:%s\nHashed Path:%s\nX-Ops-Content-Hash:%s\nX-Ops-Timestamp:%s\nX-Ops-UserId:%s",
 | |
| 						req.Method,
 | |
| 						base64.StdEncoding.EncodeToString(sum[:]),
 | |
| 						req.Header.Get("X-Ops-Content-Hash"),
 | |
| 						req.Header.Get("X-Ops-Timestamp"),
 | |
| 						username,
 | |
| 					))
 | |
| 				}
 | |
| 
 | |
| 				for k := range req.Header {
 | |
| 					if strings.HasPrefix(k, "X-Ops-Authorization-") {
 | |
| 						req.Header.Del(k)
 | |
| 					}
 | |
| 				}
 | |
| 
 | |
| 				var signature []byte
 | |
| 				if version == "1.3" || version == "1.2" {
 | |
| 					var h hash.Hash
 | |
| 					var ch crypto.Hash
 | |
| 					if version == "1.3" {
 | |
| 						h = sha256.New()
 | |
| 						ch = crypto.SHA256
 | |
| 					} else {
 | |
| 						h = sha1.New()
 | |
| 						ch = crypto.SHA1
 | |
| 					}
 | |
| 					h.Write(data)
 | |
| 
 | |
| 					signature, _ = rsa.SignPKCS1v15(rand.Reader, privKey, ch, h.Sum(nil))
 | |
| 				} else {
 | |
| 					c := new(big.Int).SetBytes(data)
 | |
| 					m := new(big.Int).Exp(c, privKey.D, privKey.N)
 | |
| 
 | |
| 					signature = m.Bytes()
 | |
| 				}
 | |
| 
 | |
| 				enc := base64.StdEncoding.EncodeToString(signature)
 | |
| 
 | |
| 				const chunkSize = 60
 | |
| 				chunks := make([]string, 0, (len(enc)-1)/chunkSize+1)
 | |
| 				currentLen := 0
 | |
| 				currentStart := 0
 | |
| 				for i := range enc {
 | |
| 					if currentLen == chunkSize {
 | |
| 						chunks = append(chunks, enc[currentStart:i])
 | |
| 						currentLen = 0
 | |
| 						currentStart = i
 | |
| 					}
 | |
| 					currentLen++
 | |
| 				}
 | |
| 				chunks = append(chunks, enc[currentStart:])
 | |
| 
 | |
| 				for i, chunk := range chunks {
 | |
| 					req.Header.Set(fmt.Sprintf("X-Ops-Authorization-%d", i+1), chunk)
 | |
| 				}
 | |
| 			}
 | |
| 
 | |
| 			for _, v := range []string{"1.0", "1.1", "1.2", "1.3"} {
 | |
| 				t.Run(v, func(t *testing.T) {
 | |
| 					defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 					signRequest(t, req, v)
 | |
| 					u, err = auth.Verify(req.Request, nil, nil, nil)
 | |
| 					assert.NotNil(t, u)
 | |
| 					assert.NoError(t, err)
 | |
| 				})
 | |
| 			}
 | |
| 		})
 | |
| 	})
 | |
| 
 | |
| 	packageName := "test"
 | |
| 	packageVersion := "1.0.1"
 | |
| 	packageDescription := "Test Description"
 | |
| 	packageAuthor := "KN4CK3R"
 | |
| 
 | |
| 	root := fmt.Sprintf("/api/packages/%s/chef/api/v1", user.Name)
 | |
| 
 | |
| 	uploadPackage := func(t *testing.T, version string, expectedStatus int) {
 | |
| 		var body bytes.Buffer
 | |
| 		mpw := multipart.NewWriter(&body)
 | |
| 		part, _ := mpw.CreateFormFile("tarball", fmt.Sprintf("%s.tar.gz", version))
 | |
| 		zw := gzip.NewWriter(part)
 | |
| 		tw := tar.NewWriter(zw)
 | |
| 
 | |
| 		content := `{"name":"` + packageName + `","version":"` + version + `","description":"` + packageDescription + `","maintainer":"` + packageAuthor + `"}`
 | |
| 
 | |
| 		hdr := &tar.Header{
 | |
| 			Name: packageName + "/metadata.json",
 | |
| 			Mode: 0o600,
 | |
| 			Size: int64(len(content)),
 | |
| 		}
 | |
| 		tw.WriteHeader(hdr)
 | |
| 		tw.Write([]byte(content))
 | |
| 
 | |
| 		tw.Close()
 | |
| 		zw.Close()
 | |
| 		mpw.Close()
 | |
| 
 | |
| 		req := NewRequestWithBody(t, "POST", root+"/cookbooks", &body).
 | |
| 			SetHeader("Content-Type", mpw.FormDataContentType()).
 | |
| 			AddBasicAuth(user.Name)
 | |
| 		MakeRequest(t, req, expectedStatus)
 | |
| 	}
 | |
| 
 | |
| 	t.Run("Upload", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequestWithBody(t, "POST", root+"/cookbooks", bytes.NewReader([]byte{}))
 | |
| 		MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 		uploadPackage(t, packageVersion, http.StatusCreated)
 | |
| 
 | |
| 		pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeChef)
 | |
| 		assert.NoError(t, err)
 | |
| 		assert.Len(t, pvs, 1)
 | |
| 
 | |
| 		pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0])
 | |
| 		assert.NoError(t, err)
 | |
| 		assert.NotNil(t, pd.SemVer)
 | |
| 		assert.IsType(t, &chef_module.Metadata{}, pd.Metadata)
 | |
| 		assert.Equal(t, packageName, pd.Package.Name)
 | |
| 		assert.Equal(t, packageVersion, pd.Version.Version)
 | |
| 
 | |
| 		pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID)
 | |
| 		assert.NoError(t, err)
 | |
| 		assert.Len(t, pfs, 1)
 | |
| 		assert.Equal(t, fmt.Sprintf("%s.tar.gz", packageVersion), pfs[0].Name)
 | |
| 		assert.True(t, pfs[0].IsLead)
 | |
| 
 | |
| 		uploadPackage(t, packageVersion, http.StatusConflict)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Download", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s/versions/%s/download", root, packageName, packageVersion))
 | |
| 		MakeRequest(t, req, http.StatusOK)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Universe", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequest(t, "GET", root+"/universe")
 | |
| 		resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 		type VersionInfo struct {
 | |
| 			LocationType string            `json:"location_type"`
 | |
| 			LocationPath string            `json:"location_path"`
 | |
| 			DownloadURL  string            `json:"download_url"`
 | |
| 			Dependencies map[string]string `json:"dependencies"`
 | |
| 		}
 | |
| 
 | |
| 		var result map[string]map[string]*VersionInfo
 | |
| 		DecodeJSON(t, resp, &result)
 | |
| 
 | |
| 		assert.Len(t, result, 1)
 | |
| 		assert.Contains(t, result, packageName)
 | |
| 
 | |
| 		versions := result[packageName]
 | |
| 
 | |
| 		assert.Len(t, versions, 1)
 | |
| 		assert.Contains(t, versions, packageVersion)
 | |
| 
 | |
| 		info := versions[packageVersion]
 | |
| 
 | |
| 		assert.Equal(t, "opscode", info.LocationType)
 | |
| 		assert.Equal(t, setting.AppURL+root[1:], info.LocationPath)
 | |
| 		assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s/versions/%s/download", setting.AppURL, root[1:], packageName, packageVersion), info.DownloadURL)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Search", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		cases := []struct {
 | |
| 			Query           string
 | |
| 			Start           int
 | |
| 			Items           int
 | |
| 			ExpectedTotal   int
 | |
| 			ExpectedResults int
 | |
| 		}{
 | |
| 			{"", 0, 0, 1, 1},
 | |
| 			{"", 0, 10, 1, 1},
 | |
| 			{"gitea", 0, 10, 0, 0},
 | |
| 			{"test", 0, 10, 1, 1},
 | |
| 			{"test", 1, 10, 1, 0},
 | |
| 		}
 | |
| 
 | |
| 		type Item struct {
 | |
| 			CookbookName        string `json:"cookbook_name"`
 | |
| 			CookbookMaintainer  string `json:"cookbook_maintainer"`
 | |
| 			CookbookDescription string `json:"cookbook_description"`
 | |
| 			Cookbook            string `json:"cookbook"`
 | |
| 		}
 | |
| 
 | |
| 		type Result struct {
 | |
| 			Start int     `json:"start"`
 | |
| 			Total int     `json:"total"`
 | |
| 			Items []*Item `json:"items"`
 | |
| 		}
 | |
| 
 | |
| 		for i, c := range cases {
 | |
| 			req := NewRequest(t, "GET", fmt.Sprintf("%s/search?q=%s&start=%d&items=%d", root, c.Query, c.Start, c.Items)).
 | |
| 				AddBasicAuth(user.Name)
 | |
| 			resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			var result Result
 | |
| 			DecodeJSON(t, resp, &result)
 | |
| 
 | |
| 			assert.Equal(t, c.ExpectedTotal, result.Total, "case %d: unexpected total hits", i)
 | |
| 			assert.Len(t, result.Items, c.ExpectedResults, "case %d: unexpected result count", i)
 | |
| 
 | |
| 			if len(result.Items) == 1 {
 | |
| 				item := result.Items[0]
 | |
| 				assert.Equal(t, packageName, item.CookbookName)
 | |
| 				assert.Equal(t, packageAuthor, item.CookbookMaintainer)
 | |
| 				assert.Equal(t, packageDescription, item.CookbookDescription)
 | |
| 				assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName), item.Cookbook)
 | |
| 			}
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	t.Run("EnumeratePackages", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		cases := []struct {
 | |
| 			Sort            string
 | |
| 			Start           int
 | |
| 			Items           int
 | |
| 			ExpectedTotal   int
 | |
| 			ExpectedResults int
 | |
| 		}{
 | |
| 			{"", 0, 0, 1, 1},
 | |
| 			{"", 0, 10, 1, 1},
 | |
| 			{"RECENTLY_ADDED", 0, 10, 1, 1},
 | |
| 			{"RECENTLY_UPDATED", 0, 10, 1, 1},
 | |
| 			{"", 1, 10, 1, 0},
 | |
| 		}
 | |
| 
 | |
| 		type Item struct {
 | |
| 			CookbookName        string `json:"cookbook_name"`
 | |
| 			CookbookMaintainer  string `json:"cookbook_maintainer"`
 | |
| 			CookbookDescription string `json:"cookbook_description"`
 | |
| 			Cookbook            string `json:"cookbook"`
 | |
| 		}
 | |
| 
 | |
| 		type Result struct {
 | |
| 			Start int     `json:"start"`
 | |
| 			Total int     `json:"total"`
 | |
| 			Items []*Item `json:"items"`
 | |
| 		}
 | |
| 
 | |
| 		for i, c := range cases {
 | |
| 			req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks?start=%d&items=%d&sort=%s", root, c.Start, c.Items, c.Sort)).
 | |
| 				AddBasicAuth(user.Name)
 | |
| 			resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			var result Result
 | |
| 			DecodeJSON(t, resp, &result)
 | |
| 
 | |
| 			assert.Equal(t, c.ExpectedTotal, result.Total, "case %d: unexpected total hits", i)
 | |
| 			assert.Len(t, result.Items, c.ExpectedResults, "case %d: unexpected result count", i)
 | |
| 
 | |
| 			if len(result.Items) == 1 {
 | |
| 				item := result.Items[0]
 | |
| 				assert.Equal(t, packageName, item.CookbookName)
 | |
| 				assert.Equal(t, packageAuthor, item.CookbookMaintainer)
 | |
| 				assert.Equal(t, packageDescription, item.CookbookDescription)
 | |
| 				assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName), item.Cookbook)
 | |
| 			}
 | |
| 		}
 | |
| 	})
 | |
| 
 | |
| 	t.Run("PackageMetadata", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s", root, packageName))
 | |
| 		resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 		type Result struct {
 | |
| 			Name          string    `json:"name"`
 | |
| 			Maintainer    string    `json:"maintainer"`
 | |
| 			Description   string    `json:"description"`
 | |
| 			Category      string    `json:"category"`
 | |
| 			LatestVersion string    `json:"latest_version"`
 | |
| 			SourceURL     string    `json:"source_url"`
 | |
| 			CreatedAt     time.Time `json:"created_at"`
 | |
| 			UpdatedAt     time.Time `json:"updated_at"`
 | |
| 			Deprecated    bool      `json:"deprecated"`
 | |
| 			Versions      []string  `json:"versions"`
 | |
| 		}
 | |
| 
 | |
| 		var result Result
 | |
| 		DecodeJSON(t, resp, &result)
 | |
| 
 | |
| 		versionURL := fmt.Sprintf("%s%s/cookbooks/%s/versions/%s", setting.AppURL, root[1:], packageName, packageVersion)
 | |
| 
 | |
| 		assert.Equal(t, packageName, result.Name)
 | |
| 		assert.Equal(t, packageAuthor, result.Maintainer)
 | |
| 		assert.Equal(t, packageDescription, result.Description)
 | |
| 		assert.Equal(t, versionURL, result.LatestVersion)
 | |
| 		assert.False(t, result.Deprecated)
 | |
| 		assert.ElementsMatch(t, []string{versionURL}, result.Versions)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("PackageVersionMetadata", func(t *testing.T) {
 | |
| 		defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 		req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, packageVersion))
 | |
| 		resp := MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 		type Result struct {
 | |
| 			Version         string            `json:"version"`
 | |
| 			TarballFileSize int64             `json:"tarball_file_size"`
 | |
| 			PublishedAt     time.Time         `json:"published_at"`
 | |
| 			Cookbook        string            `json:"cookbook"`
 | |
| 			File            string            `json:"file"`
 | |
| 			License         string            `json:"license"`
 | |
| 			Dependencies    map[string]string `json:"dependencies"`
 | |
| 		}
 | |
| 
 | |
| 		var result Result
 | |
| 		DecodeJSON(t, resp, &result)
 | |
| 
 | |
| 		packageURL := fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName)
 | |
| 
 | |
| 		assert.Equal(t, packageVersion, result.Version)
 | |
| 		assert.Equal(t, packageURL, result.Cookbook)
 | |
| 		assert.Equal(t, fmt.Sprintf("%s/versions/%s/download", packageURL, packageVersion), result.File)
 | |
| 	})
 | |
| 
 | |
| 	t.Run("Delete", func(t *testing.T) {
 | |
| 		uploadPackage(t, "1.0.2", http.StatusCreated)
 | |
| 		uploadPackage(t, "1.0.3", http.StatusCreated)
 | |
| 
 | |
| 		t.Run("Version", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, "1.0.2"))
 | |
| 			MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 			req = NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, "1.0.2")).
 | |
| 				AddBasicAuth(user.Name)
 | |
| 			MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			pv, err := packages.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages.TypeChef, packageName, "1.0.2")
 | |
| 			assert.Nil(t, pv)
 | |
| 			assert.Error(t, err)
 | |
| 		})
 | |
| 
 | |
| 		t.Run("Package", func(t *testing.T) {
 | |
| 			defer tests.PrintCurrentTest(t)()
 | |
| 
 | |
| 			req := NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s", root, packageName))
 | |
| 			MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 
 | |
| 			req = NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s", root, packageName)).
 | |
| 				AddBasicAuth(user.Name)
 | |
| 			MakeRequest(t, req, http.StatusOK)
 | |
| 
 | |
| 			pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeChef)
 | |
| 			assert.NoError(t, err)
 | |
| 			assert.Empty(t, pvs)
 | |
| 		})
 | |
| 	})
 | |
| }
 |