loading up the forgejo repo on tangled to test page performance
at forgejo 349 lines 14 kB view raw
1// Copyright 2017 The Gitea Authors. All rights reserved. 2// SPDX-License-Identifier: MIT 3 4package integration 5 6import ( 7 "fmt" 8 "io" 9 "net/http" 10 "net/url" 11 "strings" 12 "testing" 13 14 auth_model "forgejo.org/models/auth" 15 "forgejo.org/models/db" 16 issues_model "forgejo.org/models/issues" 17 repo_model "forgejo.org/models/repo" 18 "forgejo.org/models/unittest" 19 user_model "forgejo.org/models/user" 20 "forgejo.org/modules/setting" 21 api "forgejo.org/modules/structs" 22 "forgejo.org/modules/test" 23 "forgejo.org/services/forms" 24 issue_service "forgejo.org/services/issue" 25 "forgejo.org/tests" 26 27 "github.com/stretchr/testify/assert" 28 "github.com/stretchr/testify/require" 29) 30 31func TestAPIViewPulls(t *testing.T) { 32 defer tests.PrepareTestEnv(t)() 33 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) 34 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) 35 36 ctx := NewAPITestContext(t, "user2", repo.Name, auth_model.AccessTokenScopeReadRepository) 37 38 req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls?state=all", owner.Name, repo.Name). 39 AddTokenAuth(ctx.Token) 40 resp := ctx.Session.MakeRequest(t, req, http.StatusOK) 41 42 var pulls []*api.PullRequest 43 DecodeJSON(t, resp, &pulls) 44 expectedLen := unittest.GetCount(t, &issues_model.Issue{RepoID: repo.ID}, unittest.Cond("is_pull = ?", true)) 45 assert.Len(t, pulls, expectedLen) 46 47 pull := pulls[0] 48 if assert.EqualValues(t, 5, pull.ID) { 49 resp = ctx.Session.MakeRequest(t, NewRequest(t, "GET", pull.DiffURL), http.StatusOK) 50 _, err := io.ReadAll(resp.Body) 51 require.NoError(t, err) 52 // TODO: use diff to generate stats to test against 53 54 t.Run(fmt.Sprintf("APIGetPullFiles_%d", pull.ID), 55 doAPIGetPullFiles(ctx, pull, func(t *testing.T, files []*api.ChangedFile) { 56 if assert.Len(t, files, 1) { 57 assert.Equal(t, "File-WoW", files[0].Filename) 58 assert.Empty(t, files[0].PreviousFilename) 59 assert.Equal(t, 1, files[0].Additions) 60 assert.Equal(t, 1, files[0].Changes) 61 assert.Equal(t, 0, files[0].Deletions) 62 assert.Equal(t, "added", files[0].Status) 63 } 64 })) 65 } 66} 67 68func TestAPIViewPullsByBaseHead(t *testing.T) { 69 defer tests.PrepareTestEnv(t)() 70 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) 71 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) 72 73 ctx := NewAPITestContext(t, "user2", repo.Name, auth_model.AccessTokenScopeReadRepository) 74 75 req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls/master/branch2", owner.Name, repo.Name). 76 AddTokenAuth(ctx.Token) 77 resp := ctx.Session.MakeRequest(t, req, http.StatusOK) 78 79 pull := &api.PullRequest{} 80 DecodeJSON(t, resp, pull) 81 assert.EqualValues(t, 3, pull.Index) 82 assert.EqualValues(t, 2, pull.ID) 83 84 req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls/master/branch-not-exist", owner.Name, repo.Name). 85 AddTokenAuth(ctx.Token) 86 ctx.Session.MakeRequest(t, req, http.StatusNotFound) 87} 88 89// TestAPIMergePullWIP ensures that we can't merge a WIP pull request 90func TestAPIMergePullWIP(t *testing.T) { 91 defer tests.PrepareTestEnv(t)() 92 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) 93 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) 94 pr := unittest.AssertExistsAndLoadBean(t, &issues_model.PullRequest{Status: issues_model.PullRequestStatusMergeable}, unittest.Cond("has_merged = ?", false)) 95 pr.LoadIssue(db.DefaultContext) 96 issue_service.ChangeTitle(db.DefaultContext, pr.Issue, owner, setting.Repository.PullRequest.WorkInProgressPrefixes[0]+" "+pr.Issue.Title) 97 98 // force reload 99 pr.LoadAttributes(db.DefaultContext) 100 101 assert.Contains(t, pr.Issue.Title, setting.Repository.PullRequest.WorkInProgressPrefixes[0]) 102 103 session := loginUser(t, owner.Name) 104 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 105 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/merge", owner.Name, repo.Name, pr.Index), &forms.MergePullRequestForm{ 106 MergeMessageField: pr.Issue.Title, 107 Do: string(repo_model.MergeStyleMerge), 108 }).AddTokenAuth(token) 109 110 MakeRequest(t, req, http.StatusMethodNotAllowed) 111} 112 113func TestAPICreatePullSuccess(t *testing.T) { 114 defer tests.PrepareTestEnv(t)() 115 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10}) 116 // repo10 have code, pulls units. 117 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11}) 118 // repo11 only have code unit but should still create pulls 119 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID}) 120 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID}) 121 122 session := loginUser(t, owner11.Name) 123 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 124 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), &api.CreatePullRequestOption{ 125 Head: fmt.Sprintf("%s:master", owner11.Name), 126 Base: "master", 127 Title: "create a failure pr", 128 }).AddTokenAuth(token) 129 MakeRequest(t, req, http.StatusCreated) 130 MakeRequest(t, req, http.StatusUnprocessableEntity) // second request should fail 131} 132 133func TestAPICreatePullSameRepoSuccess(t *testing.T) { 134 defer tests.PrepareTestEnv(t)() 135 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) 136 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) 137 138 session := loginUser(t, owner.Name) 139 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 140 141 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner.Name, repo.Name), &api.CreatePullRequestOption{ 142 Head: fmt.Sprintf("%s:pr-to-update", owner.Name), 143 Base: "master", 144 Title: "successfully create a PR between branches of the same repository", 145 }).AddTokenAuth(token) 146 MakeRequest(t, req, http.StatusCreated) 147 MakeRequest(t, req, http.StatusUnprocessableEntity) // second request should fail 148} 149 150func TestAPICreatePullWithFieldsSuccess(t *testing.T) { 151 defer tests.PrepareTestEnv(t)() 152 // repo10 have code, pulls units. 153 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10}) 154 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID}) 155 // repo11 only have code unit but should still create pulls 156 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11}) 157 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID}) 158 159 session := loginUser(t, owner11.Name) 160 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 161 162 opts := &api.CreatePullRequestOption{ 163 Head: fmt.Sprintf("%s:master", owner11.Name), 164 Base: "master", 165 Title: "create a failure pr", 166 Body: "foobaaar", 167 Milestone: 5, 168 Assignees: []string{owner10.Name}, 169 Labels: []int64{5}, 170 } 171 172 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), opts). 173 AddTokenAuth(token) 174 175 res := MakeRequest(t, req, http.StatusCreated) 176 pull := new(api.PullRequest) 177 DecodeJSON(t, res, pull) 178 179 assert.NotNil(t, pull.Milestone) 180 assert.Equal(t, opts.Milestone, pull.Milestone.ID) 181 if assert.Len(t, pull.Assignees, 1) { 182 assert.Equal(t, opts.Assignees[0], owner10.Name) 183 } 184 assert.NotNil(t, pull.Labels) 185 assert.Equal(t, opts.Labels[0], pull.Labels[0].ID) 186} 187 188func TestAPICreatePullWithFieldsFailure(t *testing.T) { 189 defer tests.PrepareTestEnv(t)() 190 // repo10 have code, pulls units. 191 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10}) 192 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID}) 193 // repo11 only have code unit but should still create pulls 194 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11}) 195 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID}) 196 197 session := loginUser(t, owner11.Name) 198 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 199 200 opts := &api.CreatePullRequestOption{ 201 Head: fmt.Sprintf("%s:master", owner11.Name), 202 Base: "master", 203 } 204 205 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), opts). 206 AddTokenAuth(token) 207 MakeRequest(t, req, http.StatusUnprocessableEntity) 208 opts.Title = "is required" 209 210 opts.Milestone = 666 211 MakeRequest(t, req, http.StatusUnprocessableEntity) 212 opts.Milestone = 5 213 214 opts.Assignees = []string{"qweruqweroiuyqweoiruywqer"} 215 MakeRequest(t, req, http.StatusUnprocessableEntity) 216 opts.Assignees = []string{owner10.LoginName} 217 218 opts.Labels = []int64{55555} 219 MakeRequest(t, req, http.StatusUnprocessableEntity) 220 opts.Labels = []int64{5} 221} 222 223func TestAPIEditPull(t *testing.T) { 224 defer tests.PrepareTestEnv(t)() 225 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10}) 226 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID}) 227 228 session := loginUser(t, owner10.Name) 229 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) 230 title := "create a success pr" 231 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), &api.CreatePullRequestOption{ 232 Head: "develop", 233 Base: "master", 234 Title: title, 235 }).AddTokenAuth(token) 236 apiPull := new(api.PullRequest) 237 resp := MakeRequest(t, req, http.StatusCreated) 238 DecodeJSON(t, resp, apiPull) 239 assert.Equal(t, "master", apiPull.Base.Name) 240 241 newTitle := "edit a this pr" 242 newBody := "edited body" 243 urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d", owner10.Name, repo10.Name, apiPull.Index) 244 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{ 245 Base: "feature/1", 246 Title: newTitle, 247 Body: &newBody, 248 }).AddTokenAuth(token) 249 resp = MakeRequest(t, req, http.StatusCreated) 250 DecodeJSON(t, resp, apiPull) 251 assert.Equal(t, "feature/1", apiPull.Base.Name) 252 // check comment history 253 pull := unittest.AssertExistsAndLoadBean(t, &issues_model.PullRequest{ID: apiPull.ID}) 254 err := pull.LoadIssue(db.DefaultContext) 255 require.NoError(t, err) 256 unittest.AssertExistsAndLoadBean(t, &issues_model.Comment{IssueID: pull.Issue.ID, OldTitle: title, NewTitle: newTitle}) 257 unittest.AssertExistsAndLoadBean(t, &issues_model.ContentHistory{IssueID: pull.Issue.ID, ContentText: newBody, IsFirstCreated: false}) 258 259 // verify the idempotency of a state change 260 pullState := string(apiPull.State) 261 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{ 262 State: &pullState, 263 }).AddTokenAuth(token) 264 apiPullIdempotent := new(api.PullRequest) 265 resp = MakeRequest(t, req, http.StatusCreated) 266 DecodeJSON(t, resp, apiPullIdempotent) 267 assert.Equal(t, apiPull.State, apiPullIdempotent.State) 268 269 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{ 270 Base: "not-exist", 271 }).AddTokenAuth(token) 272 MakeRequest(t, req, http.StatusNotFound) 273} 274 275func TestAPIForkDifferentName(t *testing.T) { 276 defer tests.PrepareTestEnv(t)() 277 278 // Step 1: get a repo and a user that can fork this repo 279 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1}) 280 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) 281 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}) 282 283 session := loginUser(t, user.Name) 284 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository, auth_model.AccessTokenScopeWriteUser) 285 286 // Step 2: fork this repo with another name 287 forkName := "myfork" 288 req := NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/forks", owner.Name, repo.Name), 289 &api.CreateForkOption{Name: &forkName}).AddTokenAuth(token) 290 MakeRequest(t, req, http.StatusAccepted) 291 292 // Step 3: make a PR onto the original repo, it should succeed 293 req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/pulls?state=all", owner.Name, repo.Name), 294 &api.CreatePullRequestOption{Head: user.Name + ":master", Base: "master", Title: "hi"}).AddTokenAuth(token) 295 MakeRequest(t, req, http.StatusCreated) 296} 297 298func doAPIGetPullFiles(ctx APITestContext, pr *api.PullRequest, callback func(*testing.T, []*api.ChangedFile)) func(*testing.T) { 299 return func(t *testing.T) { 300 req := NewRequest(t, http.MethodGet, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/files", ctx.Username, ctx.Reponame, pr.Index)). 301 AddTokenAuth(ctx.Token) 302 if ctx.ExpectedCode == 0 { 303 ctx.ExpectedCode = http.StatusOK 304 } 305 resp := ctx.Session.MakeRequest(t, req, ctx.ExpectedCode) 306 307 files := make([]*api.ChangedFile, 0, 1) 308 DecodeJSON(t, resp, &files) 309 310 if callback != nil { 311 callback(t, files) 312 } 313 } 314} 315 316func TestAPIPullDeleteBranchPerms(t *testing.T) { 317 onGiteaRun(t, func(t *testing.T, giteaURL *url.URL) { 318 user2Session := loginUser(t, "user2") 319 user4Session := loginUser(t, "user4") 320 testRepoFork(t, user4Session, "user2", "repo1", "user4", "repo1") 321 testEditFileToNewBranch(t, user2Session, "user2", "repo1", "master", "base-pr", "README.md", "Hello, World\n(Edited - base PR)\n") 322 323 req := NewRequestWithValues(t, "POST", "/user4/repo1/compare/master...user2/repo1:base-pr", map[string]string{ 324 "_csrf": GetCSRF(t, user4Session, "/user4/repo1/compare/master...user2/repo1:base-pr"), 325 "title": "Testing PR", 326 }) 327 resp := user4Session.MakeRequest(t, req, http.StatusOK) 328 elem := strings.Split(test.RedirectURL(resp), "/") 329 330 token := getTokenForLoggedInUser(t, user4Session, auth_model.AccessTokenScopeWriteRepository) 331 req = NewRequestWithValues(t, "POST", "/api/v1/repos/user4/repo1/pulls/"+elem[4]+"/merge", map[string]string{ 332 "do": "merge", 333 "delete_branch_after_merge": "on", 334 }).AddTokenAuth(token) 335 resp = user4Session.MakeRequest(t, req, http.StatusForbidden) 336 337 type userResponse struct { 338 Message string `json:"message"` 339 } 340 var bodyResp userResponse 341 DecodeJSON(t, resp, &bodyResp) 342 343 assert.Equal(t, "insufficient permission to delete head branch", bodyResp.Message) 344 345 // Check that the branch still exist. 346 req = NewRequest(t, "GET", "/api/v1/repos/user2/repo1/branches/base-pr").AddTokenAuth(token) 347 user4Session.MakeRequest(t, req, http.StatusOK) 348 }) 349}