mirror of
				https://gitcode.com/gitea/gitea.git
				synced 2025-10-25 12:26:40 +08:00 
			
		
		
		
	 e81ccc406b
			
		
	
	e81ccc406b
	
	
	
		
			
			Change all license headers to comply with REUSE specification. Fix #16132 Co-authored-by: flynnnnnnnnnn <flynnnnnnnnnn@github> Co-authored-by: John Olheiser <john.olheiser@gmail.com>
		
			
				
	
	
		
			182 lines
		
	
	
		
			8.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			182 lines
		
	
	
		
			8.0 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2017 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package integration
 | |
| 
 | |
| import (
 | |
| 	"fmt"
 | |
| 	"net/http"
 | |
| 	"testing"
 | |
| 	"time"
 | |
| 
 | |
| 	repo_model "code.gitea.io/gitea/models/repo"
 | |
| 	"code.gitea.io/gitea/models/unittest"
 | |
| 	user_model "code.gitea.io/gitea/models/user"
 | |
| 	"code.gitea.io/gitea/modules/lfs"
 | |
| 	"code.gitea.io/gitea/modules/setting"
 | |
| 	api "code.gitea.io/gitea/modules/structs"
 | |
| 	"code.gitea.io/gitea/tests"
 | |
| 
 | |
| 	"github.com/stretchr/testify/assert"
 | |
| )
 | |
| 
 | |
| func TestAPILFSLocksNotStarted(t *testing.T) {
 | |
| 	defer tests.PrepareTestEnv(t)()
 | |
| 	setting.LFS.StartServer = false
 | |
| 	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
 | |
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
 | |
| 
 | |
| 	req := NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks", user.Name, repo.Name)
 | |
| 	MakeRequest(t, req, http.StatusNotFound)
 | |
| 	req = NewRequestf(t, "POST", "/%s/%s.git/info/lfs/locks", user.Name, repo.Name)
 | |
| 	MakeRequest(t, req, http.StatusNotFound)
 | |
| 	req = NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks/verify", user.Name, repo.Name)
 | |
| 	MakeRequest(t, req, http.StatusNotFound)
 | |
| 	req = NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks/10/unlock", user.Name, repo.Name)
 | |
| 	MakeRequest(t, req, http.StatusNotFound)
 | |
| }
 | |
| 
 | |
| func TestAPILFSLocksNotLogin(t *testing.T) {
 | |
| 	defer tests.PrepareTestEnv(t)()
 | |
| 	setting.LFS.StartServer = true
 | |
| 	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
 | |
| 	repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
 | |
| 
 | |
| 	req := NewRequestf(t, "GET", "/%s/%s.git/info/lfs/locks", user.Name, repo.Name)
 | |
| 	req.Header.Set("Accept", lfs.MediaType)
 | |
| 	resp := MakeRequest(t, req, http.StatusUnauthorized)
 | |
| 	var lfsLockError api.LFSLockError
 | |
| 	DecodeJSON(t, resp, &lfsLockError)
 | |
| 	assert.Equal(t, "You must have pull access to list locks", lfsLockError.Message)
 | |
| }
 | |
| 
 | |
| func TestAPILFSLocksLogged(t *testing.T) {
 | |
| 	defer tests.PrepareTestEnv(t)()
 | |
| 	setting.LFS.StartServer = true
 | |
| 	user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) // in org 3
 | |
| 	user4 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}) // in org 3
 | |
| 
 | |
| 	repo1 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
 | |
| 	repo3 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 3}) // own by org 3
 | |
| 
 | |
| 	tests := []struct {
 | |
| 		user       *user_model.User
 | |
| 		repo       *repo_model.Repository
 | |
| 		path       string
 | |
| 		httpResult int
 | |
| 		addTime    []int
 | |
| 	}{
 | |
| 		{user: user2, repo: repo1, path: "foo/bar.zip", httpResult: http.StatusCreated, addTime: []int{0}},
 | |
| 		{user: user2, repo: repo1, path: "path/test", httpResult: http.StatusCreated, addTime: []int{0}},
 | |
| 		{user: user2, repo: repo1, path: "path/test", httpResult: http.StatusConflict},
 | |
| 		{user: user2, repo: repo1, path: "Foo/BaR.zip", httpResult: http.StatusConflict},
 | |
| 		{user: user2, repo: repo1, path: "Foo/Test/../subFOlder/../Relative/../BaR.zip", httpResult: http.StatusConflict},
 | |
| 		{user: user4, repo: repo1, path: "FoO/BaR.zip", httpResult: http.StatusUnauthorized},
 | |
| 		{user: user4, repo: repo1, path: "path/test-user4", httpResult: http.StatusUnauthorized},
 | |
| 		{user: user2, repo: repo1, path: "patH/Test-user4", httpResult: http.StatusCreated, addTime: []int{0}},
 | |
| 		{user: user2, repo: repo1, path: "some/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/long/path", httpResult: http.StatusCreated, addTime: []int{0}},
 | |
| 
 | |
| 		{user: user2, repo: repo3, path: "test/foo/bar.zip", httpResult: http.StatusCreated, addTime: []int{1, 2}},
 | |
| 		{user: user4, repo: repo3, path: "test/foo/bar.zip", httpResult: http.StatusConflict},
 | |
| 		{user: user4, repo: repo3, path: "test/foo/bar.bin", httpResult: http.StatusCreated, addTime: []int{1, 2}},
 | |
| 	}
 | |
| 
 | |
| 	resultsTests := []struct {
 | |
| 		user        *user_model.User
 | |
| 		repo        *repo_model.Repository
 | |
| 		totalCount  int
 | |
| 		oursCount   int
 | |
| 		theirsCount int
 | |
| 		locksOwners []*user_model.User
 | |
| 		locksTimes  []time.Time
 | |
| 	}{
 | |
| 		{user: user2, repo: repo1, totalCount: 4, oursCount: 4, theirsCount: 0, locksOwners: []*user_model.User{user2, user2, user2, user2}, locksTimes: []time.Time{}},
 | |
| 		{user: user2, repo: repo3, totalCount: 2, oursCount: 1, theirsCount: 1, locksOwners: []*user_model.User{user2, user4}, locksTimes: []time.Time{}},
 | |
| 		{user: user4, repo: repo3, totalCount: 2, oursCount: 1, theirsCount: 1, locksOwners: []*user_model.User{user2, user4}, locksTimes: []time.Time{}},
 | |
| 	}
 | |
| 
 | |
| 	deleteTests := []struct {
 | |
| 		user   *user_model.User
 | |
| 		repo   *repo_model.Repository
 | |
| 		lockID string
 | |
| 	}{}
 | |
| 
 | |
| 	// create locks
 | |
| 	for _, test := range tests {
 | |
| 		session := loginUser(t, test.user.Name)
 | |
| 		req := NewRequestWithJSON(t, "POST", fmt.Sprintf("/%s.git/info/lfs/locks", test.repo.FullName()), map[string]string{"path": test.path})
 | |
| 		req.Header.Set("Accept", lfs.MediaType)
 | |
| 		req.Header.Set("Content-Type", lfs.MediaType)
 | |
| 		resp := session.MakeRequest(t, req, test.httpResult)
 | |
| 		if len(test.addTime) > 0 {
 | |
| 			var lfsLock api.LFSLockResponse
 | |
| 			DecodeJSON(t, resp, &lfsLock)
 | |
| 			assert.Equal(t, test.user.Name, lfsLock.Lock.Owner.Name)
 | |
| 			assert.EqualValues(t, lfsLock.Lock.LockedAt.Format(time.RFC3339), lfsLock.Lock.LockedAt.Format(time.RFC3339Nano)) // locked at should be rounded to second
 | |
| 			for _, id := range test.addTime {
 | |
| 				resultsTests[id].locksTimes = append(resultsTests[id].locksTimes, time.Now())
 | |
| 			}
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// check creation
 | |
| 	for _, test := range resultsTests {
 | |
| 		session := loginUser(t, test.user.Name)
 | |
| 		req := NewRequestf(t, "GET", "/%s.git/info/lfs/locks", test.repo.FullName())
 | |
| 		req.Header.Set("Accept", lfs.MediaType)
 | |
| 		resp := session.MakeRequest(t, req, http.StatusOK)
 | |
| 		var lfsLocks api.LFSLockList
 | |
| 		DecodeJSON(t, resp, &lfsLocks)
 | |
| 		assert.Len(t, lfsLocks.Locks, test.totalCount)
 | |
| 		for i, lock := range lfsLocks.Locks {
 | |
| 			assert.EqualValues(t, test.locksOwners[i].Name, lock.Owner.Name)
 | |
| 			assert.WithinDuration(t, test.locksTimes[i], lock.LockedAt, 10*time.Second)
 | |
| 			assert.EqualValues(t, lock.LockedAt.Format(time.RFC3339), lock.LockedAt.Format(time.RFC3339Nano)) // locked at should be rounded to second
 | |
| 		}
 | |
| 
 | |
| 		req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/%s.git/info/lfs/locks/verify", test.repo.FullName()), map[string]string{})
 | |
| 		req.Header.Set("Accept", lfs.MediaType)
 | |
| 		req.Header.Set("Content-Type", lfs.MediaType)
 | |
| 		resp = session.MakeRequest(t, req, http.StatusOK)
 | |
| 		var lfsLocksVerify api.LFSLockListVerify
 | |
| 		DecodeJSON(t, resp, &lfsLocksVerify)
 | |
| 		assert.Len(t, lfsLocksVerify.Ours, test.oursCount)
 | |
| 		assert.Len(t, lfsLocksVerify.Theirs, test.theirsCount)
 | |
| 		for _, lock := range lfsLocksVerify.Ours {
 | |
| 			assert.EqualValues(t, test.user.Name, lock.Owner.Name)
 | |
| 			deleteTests = append(deleteTests, struct {
 | |
| 				user   *user_model.User
 | |
| 				repo   *repo_model.Repository
 | |
| 				lockID string
 | |
| 			}{test.user, test.repo, lock.ID})
 | |
| 		}
 | |
| 		for _, lock := range lfsLocksVerify.Theirs {
 | |
| 			assert.NotEqual(t, test.user.DisplayName(), lock.Owner.Name)
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	// remove all locks
 | |
| 	for _, test := range deleteTests {
 | |
| 		session := loginUser(t, test.user.Name)
 | |
| 		req := NewRequestWithJSON(t, "POST", fmt.Sprintf("/%s.git/info/lfs/locks/%s/unlock", test.repo.FullName(), test.lockID), map[string]string{})
 | |
| 		req.Header.Set("Accept", lfs.MediaType)
 | |
| 		req.Header.Set("Content-Type", lfs.MediaType)
 | |
| 		resp := session.MakeRequest(t, req, http.StatusOK)
 | |
| 		var lfsLockRep api.LFSLockResponse
 | |
| 		DecodeJSON(t, resp, &lfsLockRep)
 | |
| 		assert.Equal(t, test.lockID, lfsLockRep.Lock.ID)
 | |
| 		assert.Equal(t, test.user.Name, lfsLockRep.Lock.Owner.Name)
 | |
| 	}
 | |
| 
 | |
| 	// check that we don't have any lock
 | |
| 	for _, test := range resultsTests {
 | |
| 		session := loginUser(t, test.user.Name)
 | |
| 		req := NewRequestf(t, "GET", "/%s.git/info/lfs/locks", test.repo.FullName())
 | |
| 		req.Header.Set("Accept", lfs.MediaType)
 | |
| 		resp := session.MakeRequest(t, req, http.StatusOK)
 | |
| 		var lfsLocks api.LFSLockList
 | |
| 		DecodeJSON(t, resp, &lfsLocks)
 | |
| 		assert.Len(t, lfsLocks.Locks, 0)
 | |
| 	}
 | |
| }
 |