loading up the forgejo repo on tangled to test page performance
1// Copyright 2017 The Gitea Authors. All rights reserved.
2// SPDX-License-Identifier: MIT
3
4package integration
5
6import (
7 "fmt"
8 "io"
9 "net/http"
10 "net/url"
11 "strings"
12 "testing"
13
14 auth_model "forgejo.org/models/auth"
15 "forgejo.org/models/db"
16 issues_model "forgejo.org/models/issues"
17 repo_model "forgejo.org/models/repo"
18 "forgejo.org/models/unittest"
19 user_model "forgejo.org/models/user"
20 "forgejo.org/modules/setting"
21 api "forgejo.org/modules/structs"
22 "forgejo.org/modules/test"
23 "forgejo.org/services/forms"
24 issue_service "forgejo.org/services/issue"
25 "forgejo.org/tests"
26
27 "github.com/stretchr/testify/assert"
28 "github.com/stretchr/testify/require"
29)
30
31func TestAPIViewPulls(t *testing.T) {
32 defer tests.PrepareTestEnv(t)()
33 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
34 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
35
36 ctx := NewAPITestContext(t, "user2", repo.Name, auth_model.AccessTokenScopeReadRepository)
37
38 req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls?state=all", owner.Name, repo.Name).
39 AddTokenAuth(ctx.Token)
40 resp := ctx.Session.MakeRequest(t, req, http.StatusOK)
41
42 var pulls []*api.PullRequest
43 DecodeJSON(t, resp, &pulls)
44 expectedLen := unittest.GetCount(t, &issues_model.Issue{RepoID: repo.ID}, unittest.Cond("is_pull = ?", true))
45 assert.Len(t, pulls, expectedLen)
46
47 pull := pulls[0]
48 if assert.EqualValues(t, 5, pull.ID) {
49 resp = ctx.Session.MakeRequest(t, NewRequest(t, "GET", pull.DiffURL), http.StatusOK)
50 _, err := io.ReadAll(resp.Body)
51 require.NoError(t, err)
52 // TODO: use diff to generate stats to test against
53
54 t.Run(fmt.Sprintf("APIGetPullFiles_%d", pull.ID),
55 doAPIGetPullFiles(ctx, pull, func(t *testing.T, files []*api.ChangedFile) {
56 if assert.Len(t, files, 1) {
57 assert.Equal(t, "File-WoW", files[0].Filename)
58 assert.Empty(t, files[0].PreviousFilename)
59 assert.Equal(t, 1, files[0].Additions)
60 assert.Equal(t, 1, files[0].Changes)
61 assert.Equal(t, 0, files[0].Deletions)
62 assert.Equal(t, "added", files[0].Status)
63 }
64 }))
65 }
66}
67
68func TestAPIViewPullsByBaseHead(t *testing.T) {
69 defer tests.PrepareTestEnv(t)()
70 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
71 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
72
73 ctx := NewAPITestContext(t, "user2", repo.Name, auth_model.AccessTokenScopeReadRepository)
74
75 req := NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls/master/branch2", owner.Name, repo.Name).
76 AddTokenAuth(ctx.Token)
77 resp := ctx.Session.MakeRequest(t, req, http.StatusOK)
78
79 pull := &api.PullRequest{}
80 DecodeJSON(t, resp, pull)
81 assert.EqualValues(t, 3, pull.Index)
82 assert.EqualValues(t, 2, pull.ID)
83
84 req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls/master/branch-not-exist", owner.Name, repo.Name).
85 AddTokenAuth(ctx.Token)
86 ctx.Session.MakeRequest(t, req, http.StatusNotFound)
87}
88
89// TestAPIMergePullWIP ensures that we can't merge a WIP pull request
90func TestAPIMergePullWIP(t *testing.T) {
91 defer tests.PrepareTestEnv(t)()
92 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
93 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
94 pr := unittest.AssertExistsAndLoadBean(t, &issues_model.PullRequest{Status: issues_model.PullRequestStatusMergeable}, unittest.Cond("has_merged = ?", false))
95 pr.LoadIssue(db.DefaultContext)
96 issue_service.ChangeTitle(db.DefaultContext, pr.Issue, owner, setting.Repository.PullRequest.WorkInProgressPrefixes[0]+" "+pr.Issue.Title)
97
98 // force reload
99 pr.LoadAttributes(db.DefaultContext)
100
101 assert.Contains(t, pr.Issue.Title, setting.Repository.PullRequest.WorkInProgressPrefixes[0])
102
103 session := loginUser(t, owner.Name)
104 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
105 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/merge", owner.Name, repo.Name, pr.Index), &forms.MergePullRequestForm{
106 MergeMessageField: pr.Issue.Title,
107 Do: string(repo_model.MergeStyleMerge),
108 }).AddTokenAuth(token)
109
110 MakeRequest(t, req, http.StatusMethodNotAllowed)
111}
112
113func TestAPICreatePullSuccess(t *testing.T) {
114 defer tests.PrepareTestEnv(t)()
115 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10})
116 // repo10 have code, pulls units.
117 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11})
118 // repo11 only have code unit but should still create pulls
119 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID})
120 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID})
121
122 session := loginUser(t, owner11.Name)
123 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
124 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), &api.CreatePullRequestOption{
125 Head: fmt.Sprintf("%s:master", owner11.Name),
126 Base: "master",
127 Title: "create a failure pr",
128 }).AddTokenAuth(token)
129 MakeRequest(t, req, http.StatusCreated)
130 MakeRequest(t, req, http.StatusUnprocessableEntity) // second request should fail
131}
132
133func TestAPICreatePullSameRepoSuccess(t *testing.T) {
134 defer tests.PrepareTestEnv(t)()
135 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
136 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
137
138 session := loginUser(t, owner.Name)
139 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
140
141 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner.Name, repo.Name), &api.CreatePullRequestOption{
142 Head: fmt.Sprintf("%s:pr-to-update", owner.Name),
143 Base: "master",
144 Title: "successfully create a PR between branches of the same repository",
145 }).AddTokenAuth(token)
146 MakeRequest(t, req, http.StatusCreated)
147 MakeRequest(t, req, http.StatusUnprocessableEntity) // second request should fail
148}
149
150func TestAPICreatePullWithFieldsSuccess(t *testing.T) {
151 defer tests.PrepareTestEnv(t)()
152 // repo10 have code, pulls units.
153 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10})
154 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID})
155 // repo11 only have code unit but should still create pulls
156 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11})
157 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID})
158
159 session := loginUser(t, owner11.Name)
160 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
161
162 opts := &api.CreatePullRequestOption{
163 Head: fmt.Sprintf("%s:master", owner11.Name),
164 Base: "master",
165 Title: "create a failure pr",
166 Body: "foobaaar",
167 Milestone: 5,
168 Assignees: []string{owner10.Name},
169 Labels: []int64{5},
170 }
171
172 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), opts).
173 AddTokenAuth(token)
174
175 res := MakeRequest(t, req, http.StatusCreated)
176 pull := new(api.PullRequest)
177 DecodeJSON(t, res, pull)
178
179 assert.NotNil(t, pull.Milestone)
180 assert.Equal(t, opts.Milestone, pull.Milestone.ID)
181 if assert.Len(t, pull.Assignees, 1) {
182 assert.Equal(t, opts.Assignees[0], owner10.Name)
183 }
184 assert.NotNil(t, pull.Labels)
185 assert.Equal(t, opts.Labels[0], pull.Labels[0].ID)
186}
187
188func TestAPICreatePullWithFieldsFailure(t *testing.T) {
189 defer tests.PrepareTestEnv(t)()
190 // repo10 have code, pulls units.
191 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10})
192 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID})
193 // repo11 only have code unit but should still create pulls
194 repo11 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 11})
195 owner11 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo11.OwnerID})
196
197 session := loginUser(t, owner11.Name)
198 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
199
200 opts := &api.CreatePullRequestOption{
201 Head: fmt.Sprintf("%s:master", owner11.Name),
202 Base: "master",
203 }
204
205 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), opts).
206 AddTokenAuth(token)
207 MakeRequest(t, req, http.StatusUnprocessableEntity)
208 opts.Title = "is required"
209
210 opts.Milestone = 666
211 MakeRequest(t, req, http.StatusUnprocessableEntity)
212 opts.Milestone = 5
213
214 opts.Assignees = []string{"qweruqweroiuyqweoiruywqer"}
215 MakeRequest(t, req, http.StatusUnprocessableEntity)
216 opts.Assignees = []string{owner10.LoginName}
217
218 opts.Labels = []int64{55555}
219 MakeRequest(t, req, http.StatusUnprocessableEntity)
220 opts.Labels = []int64{5}
221}
222
223func TestAPIEditPull(t *testing.T) {
224 defer tests.PrepareTestEnv(t)()
225 repo10 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 10})
226 owner10 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo10.OwnerID})
227
228 session := loginUser(t, owner10.Name)
229 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
230 title := "create a success pr"
231 req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls", owner10.Name, repo10.Name), &api.CreatePullRequestOption{
232 Head: "develop",
233 Base: "master",
234 Title: title,
235 }).AddTokenAuth(token)
236 apiPull := new(api.PullRequest)
237 resp := MakeRequest(t, req, http.StatusCreated)
238 DecodeJSON(t, resp, apiPull)
239 assert.Equal(t, "master", apiPull.Base.Name)
240
241 newTitle := "edit a this pr"
242 newBody := "edited body"
243 urlStr := fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d", owner10.Name, repo10.Name, apiPull.Index)
244 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{
245 Base: "feature/1",
246 Title: newTitle,
247 Body: &newBody,
248 }).AddTokenAuth(token)
249 resp = MakeRequest(t, req, http.StatusCreated)
250 DecodeJSON(t, resp, apiPull)
251 assert.Equal(t, "feature/1", apiPull.Base.Name)
252 // check comment history
253 pull := unittest.AssertExistsAndLoadBean(t, &issues_model.PullRequest{ID: apiPull.ID})
254 err := pull.LoadIssue(db.DefaultContext)
255 require.NoError(t, err)
256 unittest.AssertExistsAndLoadBean(t, &issues_model.Comment{IssueID: pull.Issue.ID, OldTitle: title, NewTitle: newTitle})
257 unittest.AssertExistsAndLoadBean(t, &issues_model.ContentHistory{IssueID: pull.Issue.ID, ContentText: newBody, IsFirstCreated: false})
258
259 // verify the idempotency of a state change
260 pullState := string(apiPull.State)
261 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{
262 State: &pullState,
263 }).AddTokenAuth(token)
264 apiPullIdempotent := new(api.PullRequest)
265 resp = MakeRequest(t, req, http.StatusCreated)
266 DecodeJSON(t, resp, apiPullIdempotent)
267 assert.Equal(t, apiPull.State, apiPullIdempotent.State)
268
269 req = NewRequestWithJSON(t, http.MethodPatch, urlStr, &api.EditPullRequestOption{
270 Base: "not-exist",
271 }).AddTokenAuth(token)
272 MakeRequest(t, req, http.StatusNotFound)
273}
274
275func TestAPIForkDifferentName(t *testing.T) {
276 defer tests.PrepareTestEnv(t)()
277
278 // Step 1: get a repo and a user that can fork this repo
279 repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
280 owner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID})
281 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5})
282
283 session := loginUser(t, user.Name)
284 token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository, auth_model.AccessTokenScopeWriteUser)
285
286 // Step 2: fork this repo with another name
287 forkName := "myfork"
288 req := NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/forks", owner.Name, repo.Name),
289 &api.CreateForkOption{Name: &forkName}).AddTokenAuth(token)
290 MakeRequest(t, req, http.StatusAccepted)
291
292 // Step 3: make a PR onto the original repo, it should succeed
293 req = NewRequestWithJSON(t, "POST", fmt.Sprintf("/api/v1/repos/%s/%s/pulls?state=all", owner.Name, repo.Name),
294 &api.CreatePullRequestOption{Head: user.Name + ":master", Base: "master", Title: "hi"}).AddTokenAuth(token)
295 MakeRequest(t, req, http.StatusCreated)
296}
297
298func doAPIGetPullFiles(ctx APITestContext, pr *api.PullRequest, callback func(*testing.T, []*api.ChangedFile)) func(*testing.T) {
299 return func(t *testing.T) {
300 req := NewRequest(t, http.MethodGet, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/files", ctx.Username, ctx.Reponame, pr.Index)).
301 AddTokenAuth(ctx.Token)
302 if ctx.ExpectedCode == 0 {
303 ctx.ExpectedCode = http.StatusOK
304 }
305 resp := ctx.Session.MakeRequest(t, req, ctx.ExpectedCode)
306
307 files := make([]*api.ChangedFile, 0, 1)
308 DecodeJSON(t, resp, &files)
309
310 if callback != nil {
311 callback(t, files)
312 }
313 }
314}
315
316func TestAPIPullDeleteBranchPerms(t *testing.T) {
317 onGiteaRun(t, func(t *testing.T, giteaURL *url.URL) {
318 user2Session := loginUser(t, "user2")
319 user4Session := loginUser(t, "user4")
320 testRepoFork(t, user4Session, "user2", "repo1", "user4", "repo1")
321 testEditFileToNewBranch(t, user2Session, "user2", "repo1", "master", "base-pr", "README.md", "Hello, World\n(Edited - base PR)\n")
322
323 req := NewRequestWithValues(t, "POST", "/user4/repo1/compare/master...user2/repo1:base-pr", map[string]string{
324 "_csrf": GetCSRF(t, user4Session, "/user4/repo1/compare/master...user2/repo1:base-pr"),
325 "title": "Testing PR",
326 })
327 resp := user4Session.MakeRequest(t, req, http.StatusOK)
328 elem := strings.Split(test.RedirectURL(resp), "/")
329
330 token := getTokenForLoggedInUser(t, user4Session, auth_model.AccessTokenScopeWriteRepository)
331 req = NewRequestWithValues(t, "POST", "/api/v1/repos/user4/repo1/pulls/"+elem[4]+"/merge", map[string]string{
332 "do": "merge",
333 "delete_branch_after_merge": "on",
334 }).AddTokenAuth(token)
335 resp = user4Session.MakeRequest(t, req, http.StatusForbidden)
336
337 type userResponse struct {
338 Message string `json:"message"`
339 }
340 var bodyResp userResponse
341 DecodeJSON(t, resp, &bodyResp)
342
343 assert.Equal(t, "insufficient permission to delete head branch", bodyResp.Message)
344
345 // Check that the branch still exist.
346 req = NewRequest(t, "GET", "/api/v1/repos/user2/repo1/branches/base-pr").AddTokenAuth(token)
347 user4Session.MakeRequest(t, req, http.StatusOK)
348 })
349}