Add Package Registry (#16510)
* Added package store settings. * Added models. * Added generic package registry. * Added tests. * Added NuGet package registry. * Moved service index to api file. * Added NPM package registry. * Added Maven package registry. * Added PyPI package registry. * Summary is deprecated. * Changed npm name. * Sanitize project url. * Allow only scoped packages. * Added user interface. * Changed method name. * Added missing migration file. * Set page info. * Added documentation. * Added documentation links. * Fixed wrong error message. * Lint template files. * Fixed merge errors. * Fixed unit test storage path. * Switch to json module. * Added suggestions. * Added package webhook. * Add package api. * Fixed swagger file. * Fixed enum and comments. * Fixed NuGet pagination. * Print test names. * Added api tests. * Fixed access level. * Fix User unmarshal. * Added RubyGems package registry. * Fix lint. * Implemented io.Writer. * Added support for sha256/sha512 checksum files. * Improved maven-metadata.xml support. * Added support for symbol package uploads. * Added tests. * Added overview docs. * Added npm dependencies and keywords. * Added no-packages information. * Display file size. * Display asset count. * Fixed filter alignment. * Added package icons. * Formatted instructions. * Allow anonymous package downloads. * Fixed comments. * Fixed postgres test. * Moved file. * Moved models to models/packages. * Use correct error response format per client. * Use simpler search form. * Fixed IsProd. * Restructured data model. * Prevent empty filename. * Fix swagger. * Implemented user/org registry. * Implemented UI. * Use GetUserByIDCtx. * Use table for dependencies. * make svg * Added support for unscoped npm packages. * Add support for npm dist tags. * Added tests for npm tags. * Unlink packages if repository gets deleted. * Prevent user/org delete if a packages exist. * Use package unlink in repository service. * Added support for composer packages. * Restructured package docs. * Added missing tests. * Fixed generic content page. * Fixed docs. * Fixed swagger. * Added missing type. * Fixed ambiguous column. * Organize content store by sha256 hash. * Added admin package management. * Added support for sorting. * Add support for multiple identical versions/files. * Added missing repository unlink. * Added file properties. * make fmt * lint * Added Conan package registry. * Updated docs. * Unify package names. * Added swagger enum. * Use longer TEXT column type. * Removed version composite key. * Merged package and container registry. * Removed index. * Use dedicated package router. * Moved files to new location. * Updated docs. * Fixed JOIN order. * Fixed GROUP BY statement. * Fixed GROUP BY #2. * Added symbol server support. * Added more tests. * Set NOT NULL. * Added setting to disable package registries. * Moved auth into service. * refactor * Use ctx everywhere. * Added package cleanup task. * Changed packages path. * Added container registry. * Refactoring * Updated comparison. * Fix swagger. * Fixed table order. * Use token auth for npm routes. * Enabled ReverseProxy auth. * Added packages link for orgs. * Fixed anonymous org access. * Enable copy button for setup instructions. * Merge error * Added suggestions. * Fixed merge. * Handle "generic". * Added link for TODO. * Added suggestions. * Changed temporary buffer filename. * Added suggestions. * Apply suggestions from code review Co-authored-by: Thomas Boerger <thomas@webhippie.de> * Update docs/content/doc/packages/nuget.en-us.md Co-authored-by: wxiaoguang <wxiaoguang@gmail.com> Co-authored-by: Thomas Boerger <thomas@webhippie.de>tokarchuk/v1.17
parent
2bce1ea986
commit
1d332342db
@ -0,0 +1,12 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Package Registry" |
||||
slug: "packages" |
||||
toc: false |
||||
draft: false |
||||
menu: |
||||
sidebar: |
||||
name: "Package Registry" |
||||
weight: 45 |
||||
identifier: "packages" |
||||
--- |
@ -0,0 +1,120 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Composer Packages Repository" |
||||
slug: "packages/composer" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Composer" |
||||
weight: 10 |
||||
identifier: "composer" |
||||
--- |
||||
|
||||
# Composer Packages Repository |
||||
|
||||
Publish [Composer](https://getcomposer.org/) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the Composer package registry, you can use [Composer](https://getcomposer.org/download/) to consume and a HTTP upload client like `curl` to publish packages. |
||||
|
||||
## Publish a package |
||||
|
||||
To publish a Composer package perform a HTTP PUT operation with the package content in the request body. |
||||
The package content must be the zipped PHP project with the `composer.json` file. |
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
``` |
||||
PUT https://gitea.example.com/api/packages/{owner}/composer |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ---------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
|
||||
If the `composer.json` file does not contain a `version` property, you must provide it as a query parameter: |
||||
|
||||
``` |
||||
PUT https://gitea.example.com/api/packages/{owner}/composer?version={x.y.z} |
||||
``` |
||||
|
||||
Example request using HTTP Basic authentication: |
||||
|
||||
```shell |
||||
curl --user your_username:your_password_or_token \ |
||||
--upload-file path/to/project.zip \ |
||||
https://gitea.example.com/api/packages/testuser/composer |
||||
``` |
||||
|
||||
Or specify the package version as query parameter: |
||||
|
||||
```shell |
||||
curl --user your_username:your_password_or_token \ |
||||
--upload-file path/to/project.zip \ |
||||
https://gitea.example.com/api/packages/testuser/composer?version=1.0.3 |
||||
``` |
||||
|
||||
The server responds with the following HTTP Status codes. |
||||
|
||||
| HTTP Status Code | Meaning | |
||||
| ----------------- | ------- | |
||||
| `201 Created` | The package has been published. | |
||||
| `400 Bad Request` | The package name and/or version are invalid or a package with the same name and version already exist. | |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you need to add it to the Composer `config.json` file (which can usually be found under `<user-home-dir>/.composer/config.json`): |
||||
|
||||
```json |
||||
{ |
||||
"repositories": [{ |
||||
"type": "composer", |
||||
"url": "https://gitea.example.com/api/packages/{owner}/composer" |
||||
} |
||||
] |
||||
} |
||||
``` |
||||
|
||||
To access the package registry using credentials, you must specify them in the `auth.json` file as follows: |
||||
|
||||
```json |
||||
{ |
||||
"http-basic": { |
||||
"gitea.example.com": { |
||||
"username": "{username}", |
||||
"password": "{password}" |
||||
} |
||||
} |
||||
} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ---------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `username` | Your Gitea username. | |
||||
| `password` | Your Gitea password or a personal access token. | |
||||
|
||||
## Install a package |
||||
|
||||
To install a package from the package registry, execute the following command: |
||||
|
||||
```shell |
||||
composer require {package_name} |
||||
``` |
||||
|
||||
Optional you can specify the package version: |
||||
|
||||
```shell |
||||
composer require {package_name}:{package_version} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `package_name` | The package name. | |
||||
| `package_version` | The package version. | |
@ -0,0 +1,101 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Conan Packages Repository" |
||||
slug: "packages/conan" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Conan" |
||||
weight: 20 |
||||
identifier: "conan" |
||||
--- |
||||
|
||||
# Conan Packages Repository |
||||
|
||||
Publish [Conan](https://conan.io/) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the Conan package registry, you need to use the [conan](https://conan.io/downloads.html) command line tool to consume and publish packages. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you need to configure a new Conan remote: |
||||
|
||||
```shell |
||||
conan remote add {remote} https://gitea.example.com/api/packages/{owner}/conan |
||||
conan user --remote {remote} --password {password} {username} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -----------| ----------- | |
||||
| `remote` | The remote name. | |
||||
| `username` | Your Gitea username. | |
||||
| `password` | Your Gitea password or a personal access token. | |
||||
| `owner` | The owner of the package. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
conan remote add gitea https://gitea.example.com/api/packages/testuser/conan |
||||
conan user --remote gitea --password password123 testuser |
||||
``` |
||||
|
||||
## Publish a package |
||||
|
||||
Publish a Conan package by running the following command: |
||||
|
||||
```shell |
||||
conan upload --remote={remote} {recipe} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------| ----------- | |
||||
| `remote` | The remote name. | |
||||
| `recipe` | The recipe to upload. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
conan upload --remote=gitea ConanPackage/1.2@gitea/final |
||||
``` |
||||
|
||||
The Gitea Conan package registry has full [revision](https://docs.conan.io/en/latest/versioning/revisions.html) support. |
||||
|
||||
## Install a package |
||||
|
||||
To install a Conan package from the package registry, execute the following command: |
||||
|
||||
```shell |
||||
conan install --remote={remote} {recipe} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------| ----------- | |
||||
| `remote` | The remote name. | |
||||
| `recipe` | The recipe to download. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
conan install --remote=gitea ConanPackage/1.2@gitea/final |
||||
``` |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
conan install |
||||
conan get |
||||
conan info |
||||
conan search |
||||
conan upload |
||||
conan user |
||||
conan download |
||||
conan remove |
||||
``` |
@ -0,0 +1,91 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Container Registry" |
||||
slug: "packages/container" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Container Registry" |
||||
weight: 30 |
||||
identifier: "container" |
||||
--- |
||||
|
||||
# Container Registry |
||||
|
||||
Publish [Open Container Initiative](https://opencontainers.org/) compliant images for your user or organization. |
||||
The container registry follows the OCI specs and supports all compatible images like [Docker](https://www.docker.com/) and [Helm Charts](https://helm.sh/). |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the Container registry, you can use the tools for your specific image type. |
||||
The following examples use the `docker` client. |
||||
|
||||
## Login to the container registry |
||||
|
||||
To push an image or if the image is in a private registry, you have to authenticate: |
||||
|
||||
```shell |
||||
docker login gitea.example.com |
||||
``` |
||||
|
||||
## Image naming convention |
||||
|
||||
Images must follow this naming convention: |
||||
|
||||
`{registry}/{owner}/{image}` |
||||
|
||||
For example, these are all valid image names for the owner `testuser`: |
||||
|
||||
`gitea.example.com/testuser/myimage` |
||||
|
||||
`gitea.example.com/testuser/my-image` |
||||
|
||||
`gitea.example.com/testuser/my/image` |
||||
|
||||
**NOTE:** The registry only supports case-insensitive tag names. So `image:tag` and `image:Tag` get treated as the same image and tag. |
||||
|
||||
## Push an image |
||||
|
||||
Push an image by executing the following command: |
||||
|
||||
```shell |
||||
docker push gitea.example.com/{owner}/{image}:{tag} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------| ----------- | |
||||
| `owner` | The owner of the image. | |
||||
| `image` | The name of the image. | |
||||
| `tag` | The tag of the image. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
docker push gitea.example.com/testuser/myimage:latest |
||||
``` |
||||
|
||||
## Pull an image |
||||
|
||||
Pull an image by executing the following command: |
||||
|
||||
```shell |
||||
docker pull gitea.example.com/{owner}/{image}:{tag} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------| ----------- | |
||||
| `owner` | The owner of the image. | |
||||
| `image` | The name of the image. | |
||||
| `tag` | The tag of the image. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
docker pull gitea.example.com/testuser/myimage:latest |
||||
``` |
@ -0,0 +1,80 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Generic Packages Repository" |
||||
slug: "packages/generic" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Generic" |
||||
weight: 40 |
||||
identifier: "generic" |
||||
--- |
||||
|
||||
# Generic Packages Repository |
||||
|
||||
Publish generic files, like release binaries or other output, for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Authenticate to the package registry |
||||
|
||||
To authenticate to the Package Registry, you need to provide [custom HTTP headers or use HTTP Basic authentication]({{< relref "doc/developers/api-usage.en-us.md#authentication" >}}). |
||||
|
||||
## Publish a package |
||||
|
||||
To publish a generic package perform a HTTP PUT operation with the package content in the request body. |
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
``` |
||||
PUT https://gitea.example.com/api/packages/{owner}/generic/{package_name}/{package_version}/{file_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `package_name` | The package name. It can contain only lowercase letters (`a-z`), uppercase letter (`A-Z`), numbers (`0-9`), dots (`.`), hyphens (`-`), or underscores (`_`). | |
||||
| `package_version` | The package version as described in the [SemVer](https://semver.org/) spec. | |
||||
| `file_name` | The filename. It can contain only lowercase letters (`a-z`), uppercase letter (`A-Z`), numbers (`0-9`), dots (`.`), hyphens (`-`), or underscores (`_`). | |
||||
|
||||
Example request using HTTP Basic authentication: |
||||
|
||||
```shell |
||||
curl --user your_username:your_password_or_token \ |
||||
--upload-file path/to/file.bin \ |
||||
https://gitea.example.com/api/packages/testuser/generic/test_package/1.0.0/file.bin |
||||
``` |
||||
|
||||
The server reponds with the following HTTP Status codes. |
||||
|
||||
| HTTP Status Code | Meaning | |
||||
| ----------------- | ------- | |
||||
| `201 Created` | The package has been published. | |
||||
| `400 Bad Request` | The package name and/or version are invalid or a package with the same name and version already exist. | |
||||
|
||||
## Download a package |
||||
|
||||
To download a generic package perform a HTTP GET operation. |
||||
|
||||
``` |
||||
GET https://gitea.example.com/api/packages/{owner}/generic/{package_name}/{package_version}/{file_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `package_name` | The package name. | |
||||
| `package_version` | The package version. | |
||||
| `file_name` | The filename. | |
||||
|
||||
The file content is served in the response body. The response content type is `application/octet-stream`. |
||||
|
||||
Example request using HTTP Basic authentication: |
||||
|
||||
```shell |
||||
curl --user your_username:your_token_or_password \ |
||||
https://gitea.example.com/api/packages/testuser/generic/test_package/1.0.0/file.bin |
||||
``` |
@ -0,0 +1,110 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Maven Packages Repository" |
||||
slug: "packages/maven" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Maven" |
||||
weight: 50 |
||||
identifier: "maven" |
||||
--- |
||||
|
||||
# Maven Packages Repository |
||||
|
||||
Publish [Maven](https://maven.apache.org) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the Maven package registry, you can use [Maven](https://maven.apache.org/install.html) or [Gradle](https://gradle.org/install/). |
||||
The following examples use `Maven`. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you first need to add your access token to the [`settings.xml`](https://maven.apache.org/settings.html) file: |
||||
|
||||
```xml |
||||
<settings> |
||||
<servers> |
||||
<server> |
||||
<id>gitea</id> |
||||
<configuration> |
||||
<httpHeaders> |
||||
<property> |
||||
<name>Authorization</name> |
||||
<value>token {access_token}</value> |
||||
</property> |
||||
</httpHeaders> |
||||
</configuration> |
||||
</server> |
||||
</servers> |
||||
</settings> |
||||
``` |
||||
|
||||
Afterwards add the following sections to your project `pom.xml` file: |
||||
|
||||
```xml |
||||
<repositories> |
||||
<repository> |
||||
<id>gitea</id> |
||||
<url>https://gitea.example.com/api/packages/{owner}/maven</url> |
||||
</repository> |
||||
</repositories> |
||||
<distributionManagement> |
||||
<repository> |
||||
<id>gitea</id> |
||||
<url>https://gitea.example.com/api/packages/{owner}/maven</url> |
||||
</repository> |
||||
<snapshotRepository> |
||||
<id>gitea</id> |
||||
<url>https://gitea.example.com/api/packages/{owner}/maven</url> |
||||
</snapshotRepository> |
||||
</distributionManagement> |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -------------- | ----------- | |
||||
| `access_token` | Your [personal access token]({{< relref "doc/developers/api-usage.en-us.md#authentication" >}}). | |
||||
| `owner` | The owner of the package. | |
||||
|
||||
## Publish a package |
||||
|
||||
To publish a package simply run: |
||||
|
||||
```shell |
||||
mvn deploy |
||||
``` |
||||
|
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
## Install a package |
||||
|
||||
To install a Maven package from the package registry, add a new dependency to your project `pom.xml` file: |
||||
|
||||
```xml |
||||
<dependency> |
||||
<groupId>com.test.package</groupId> |
||||
<artifactId>test_project</artifactId> |
||||
<version>1.0.0</version> |
||||
</dependency> |
||||
``` |
||||
|
||||
Afterwards run: |
||||
|
||||
```shell |
||||
mvn install |
||||
``` |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
mvn install |
||||
mvn deploy |
||||
mvn dependency:get: |
||||
``` |
@ -0,0 +1,118 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "npm Packages Repository" |
||||
slug: "packages/npm" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "npm" |
||||
weight: 60 |
||||
identifier: "npm" |
||||
--- |
||||
|
||||
# npm Packages Repository |
||||
|
||||
Publish [npm](https://www.npmjs.com/) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the npm package registry, you need [Node.js](https://nodejs.org/en/download/) coupled with a package manager such as [Yarn](https://classic.yarnpkg.com/en/docs/install) or [npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm/) itself. |
||||
|
||||
The registry supports [scoped](https://docs.npmjs.com/misc/scope/) and unscoped packages. |
||||
|
||||
The following examples use the `npm` tool with the scope `@test`. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you need to configure a new package source. |
||||
|
||||
```shell |
||||
npm config set {scope}:registry https://gitea.example.com/api/packages/{owner}/npm/ |
||||
npm config set -- '//gitea.example.com/api/packages/{owner}/npm/:_authToken' "{token}" |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ------------ | ----------- | |
||||
| `scope` | The scope of the packages. | |
||||
| `owner` | The owner of the package. | |
||||
| `token` | Your [personal access token]({{< relref "doc/developers/api-usage.en-us.md#authentication" >}}). | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
npm config set @test:registry https://gitea.example.com/api/packages/testuser/npm/ |
||||
npm config set -- '//gitea.example.com/api/packages/testuser/npm/:_authToken' "personal_access_token" |
||||
``` |
||||
|
||||
or without scope: |
||||
|
||||
```shell |
||||
npm config set registry https://gitea.example.com/api/packages/testuser/npm/ |
||||
npm config set -- '//gitea.example.com/api/packages/testuser/npm/:_authToken' "personal_access_token" |
||||
``` |
||||
|
||||
## Publish a package |
||||
|
||||
Publish a package by running the following command in your project: |
||||
|
||||
```shell |
||||
npm publish |
||||
``` |
||||
|
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
## Install a package |
||||
|
||||
To install a package from the package registry, execute the following command: |
||||
|
||||
```shell |
||||
npm install {package_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -------------- | ----------- | |
||||
| `package_name` | The package name. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
npm install @test/test_package |
||||
``` |
||||
|
||||
## Tag a package |
||||
|
||||
The registry supports [version tags](https://docs.npmjs.com/adding-dist-tags-to-packages/) which can be managed by `npm dist-tag`: |
||||
|
||||
```shell |
||||
npm dist-tag add {package_name}@{version} {tag} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -------------- | ----------- | |
||||
| `package_name` | The package name. | |
||||
| `version` | The version of the package. | |
||||
| `tag` | The tag name. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
npm dist-tag add test_package@1.0.2 release |
||||
``` |
||||
|
||||
The tag name must not be a valid version. All tag names which are parsable as a version are rejected. |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
npm install |
||||
npm ci |
||||
npm publish |
||||
npm dist-tag |
||||
npm view |
||||
``` |
@ -0,0 +1,116 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "NuGet Packages Repository" |
||||
slug: "packages/nuget" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "NuGet" |
||||
weight: 70 |
||||
identifier: "nuget" |
||||
--- |
||||
|
||||
# NuGet Packages Repository |
||||
|
||||
Publish [NuGet](https://www.nuget.org/) packages for your user or organization. The package registry supports [NuGet Symbol Packages](https://docs.microsoft.com/en-us/nuget/create-packages/symbol-packages-snupkg) too. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the NuGet package registry, you can use command-line interface tools as well as NuGet features in various IDEs like Visual Studio. |
||||
More informations about NuGet clients can be found in [the official documentation](https://docs.microsoft.com/en-us/nuget/install-nuget-client-tools). |
||||
The following examples use the `dotnet nuget` tool. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you need to configure a new NuGet feed source: |
||||
|
||||
```shell |
||||
dotnet nuget add source --name {source_name} --username {username} --password {password} https://gitea.example.com/api/packages/{owner}/nuget/index.json |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ------------- | ----------- | |
||||
| `source_name` | The desired source name. | |
||||
| `username` | Your Gitea username. | |
||||
| `password` | Your Gitea password or a personal access token. | |
||||
| `owner` | The owner of the package. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
dotnet nuget add source --name gitea --username testuser --password password123 https://gitea.example.com/api/packages/testuser/nuget/index.json |
||||
``` |
||||
|
||||
## Publish a package |
||||
|
||||
Publish a package by running the following command: |
||||
|
||||
```shell |
||||
dotnet nuget push --source {source_name} {package_file} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -------------- | ----------- | |
||||
| `source_name` | The desired source name. | |
||||
| `package_file` | Path to the package `.nupkg` file. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
dotnet nuget push --source gitea test_package.1.0.0.nupkg |
||||
``` |
||||
|
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
### Symbol Packages |
||||
|
||||
The NuGet package registry has build support for a symbol server. The PDB files embedded in a symbol package (`.snupkg`) can get requested by clients. |
||||
To do so, register the NuGet package registry as symbol source: |
||||
|
||||
``` |
||||
https://gitea.example.com/api/packages/{owner}/nuget/symbols |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| --------- | ----------- | |
||||
| `owner` | The owner of the package registry. | |
||||
|
||||
For example: |
||||
|
||||
``` |
||||
https://gitea.example.com/api/packages/testuser/nuget/symbols |
||||
``` |
||||
|
||||
## Install a package |
||||
|
||||
To install a NuGet package from the package registry, execute the following command: |
||||
|
||||
```shell |
||||
dotnet add package --source {source_name} --version {package_version} {package_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `source_name` | The desired source name. | |
||||
| `package_name` | The package name. | |
||||
| `package_version` | The package version. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
dotnet add package --source gitea --version 1.0.0 test_package |
||||
``` |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
dotnet add |
||||
dotnet nuget push |
||||
dotnet nuget delete |
||||
``` |
@ -0,0 +1,76 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "Package Registry" |
||||
slug: "packages/overview" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "Overview" |
||||
weight: 1 |
||||
identifier: "overview" |
||||
--- |
||||
|
||||
# Package Registry |
||||
|
||||
The Package Registry can be used as a public or private registry for common package managers. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Supported package managers |
||||
|
||||
The following package managers are currently supported: |
||||
|
||||
| Name | Language | Package client | |
||||
| ---- | -------- | -------------- | |
||||
| [Composer]({{< relref "doc/packages/composer.en-us.md" >}}) | PHP | `composer` | |
||||
| [Conan]({{< relref "doc/packages/conan.en-us.md" >}}) | C++ | `conan` | |
||||
| [Container]({{< relref "doc/packages/container.en-us.md" >}}) | - | any OCI compliant client | |
||||
| [Generic]({{< relref "doc/packages/generic.en-us.md" >}}) | - | any HTTP client | |
||||
| [Maven]({{< relref "doc/packages/maven.en-us.md" >}}) | Java | `mvn`, `gradle` | |
||||
| [npm]({{< relref "doc/packages/npm.en-us.md" >}}) | JavaScript | `npm`, `yarn` | |
||||
| [NuGet]({{< relref "doc/packages/nuget.en-us.md" >}}) | .NET | `nuget` | |
||||
| [PyPI]({{< relref "doc/packages/pypi.en-us.md" >}}) | Python | `pip`, `twine` | |
||||
| [RubyGems]({{< relref "doc/packages/rubygems.en-us.md" >}}) | Ruby | `gem`, `Bundler` | |
||||
|
||||
**The following paragraphs only apply if Packages are not globally disabled!** |
||||
|
||||
## View packages |
||||
|
||||
You can view the packages of a repository on the repository page. |
||||
|
||||
1. Go to the repository. |
||||
1. Go to **Packages** in the navigation bar. |
||||
|
||||
To view more details about a package, select the name of the package. |
||||
|
||||
## Download a package |
||||
|
||||
To download a package from your repository: |
||||
|
||||
1. Go to **Packages** in the navigation bar. |
||||
1. Select the name of the package to view the details. |
||||
1. In the **Assets** section, select the name of the package file you want to download. |
||||
|
||||
## Delete a package |
||||
|
||||
You cannot edit a package after you published it in the Package Registry. Instead, you |
||||
must delete and recreate it. |
||||
|
||||
To delete a package from your repository: |
||||
|
||||
1. Go to **Packages** in the navigation bar. |
||||
1. Select the name of the package to view the details. |
||||
1. Click **Delete package** to permanently delete the package. |
||||
|
||||
## Disable the Package Registry |
||||
|
||||
The Package Registry is automatically enabled. To disable it for a single repository: |
||||
|
||||
1. Go to **Settings** in the navigation bar. |
||||
1. Disable **Enable Repository Packages Registry**. |
||||
|
||||
Previously published packages are not deleted by disabling the Package Registry. |
@ -0,0 +1,85 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "PyPI Packages Repository" |
||||
slug: "packages/pypi" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "PyPI" |
||||
weight: 80 |
||||
identifier: "pypi" |
||||
--- |
||||
|
||||
# PyPI Packages Repository |
||||
|
||||
Publish [PyPI](https://pypi.org/) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the PyPI package registry, you need to use the tools [pip](https://pypi.org/project/pip/) to consume and [twine](https://pypi.org/project/twine/) to publish packages. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry you need to edit your local `~/.pypirc` file. Add |
||||
|
||||
```ini |
||||
[distutils] |
||||
index-servers = gitea |
||||
|
||||
[gitea] |
||||
repository = https://gitea.example.com/api/packages/{owner}/pypi |
||||
username = {username} |
||||
password = {password} |
||||
``` |
||||
|
||||
| Placeholder | Description | |
||||
| ------------ | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `username` | Your Gitea username. | |
||||
| `password` | Your Gitea password or a [personal access token]({{< relref "doc/developers/api-usage.en-us.md#authentication" >}}). | |
||||
|
||||
## Publish a package |
||||
|
||||
Publish a package by running the following command: |
||||
|
||||
```shell |
||||
python3 -m twine upload --repository gitea /path/to/files/* |
||||
``` |
||||
|
||||
The package files have the extensions `.tar.gz` and `.whl`. |
||||
|
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
## Install a package |
||||
|
||||
To install a PyPI package from the package registry, execute the following command: |
||||
|
||||
```shell |
||||
pip install --index-url https://{username}:{password}@gitea.example.com/api/packages/{owner}/pypi/simple --no-deps {package_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `username` | Your Gitea username. | |
||||
| `password` | Your Gitea password or a personal access token. | |
||||
| `owner` | The owner of the package. | |
||||
| `package_name` | The package name. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
pip install --index-url https://testuser:password123@gitea.example.com/api/packages/testuser/pypi/simple --no-deps test_package |
||||
``` |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
pip install |
||||
twine upload |
||||
``` |
@ -0,0 +1,127 @@ |
||||
--- |
||||
date: "2021-07-20T00:00:00+00:00" |
||||
title: "RubyGems Packages Repository" |
||||
slug: "packages/rubygems" |
||||
draft: false |
||||
toc: false |
||||
menu: |
||||
sidebar: |
||||
parent: "packages" |
||||
name: "RubyGems" |
||||
weight: 90 |
||||
identifier: "rubygems" |
||||
--- |
||||
|
||||
# RubyGems Packages Repository |
||||
|
||||
Publish [RubyGems](https://guides.rubygems.org/) packages for your user or organization. |
||||
|
||||
**Table of Contents** |
||||
|
||||
{{< toc >}} |
||||
|
||||
## Requirements |
||||
|
||||
To work with the RubyGems package registry, you need to use the [gem](https://guides.rubygems.org/command-reference/) command line tool to consume and publish packages. |
||||
|
||||
## Configuring the package registry |
||||
|
||||
To register the package registry edit the `~/.gem/credentials` file and add: |
||||
|
||||
```ini |
||||
--- |
||||
https://gitea.example.com/api/packages/{owner}/rubygems: Bearer {token} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ------------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `token` | Your personal access token. | |
||||
|
||||
For example: |
||||
|
||||
``` |
||||
--- |
||||
https://gitea.example.com/api/packages/testuser/rubygems: Bearer 3bd626f84b01cd26b873931eace1e430a5773cc4 |
||||
``` |
||||
|
||||
## Publish a package |
||||
|
||||
Publish a package by running the following command: |
||||
|
||||
```shell |
||||
gem push --host {host} {package_file} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| -------------- | ----------- | |
||||
| `host` | URL to the package registry. | |
||||
| `package_file` | Path to the package `.gem` file. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
gem push --host https://gitea.example.com/api/packages/testuser/rubygems test_package-1.0.0.gem |
||||
``` |
||||
|
||||
You cannot publish a package if a package of the same name and version already exists. You must delete the existing package first. |
||||
|
||||
## Install a package |
||||
|
||||
To install a package from the package registry you can use [Bundler](https://bundler.io) or `gem`. |
||||
|
||||
### Bundler |
||||
|
||||
Add a new `source` block to your `Gemfile`: |
||||
|
||||
``` |
||||
source "https://gitea.example.com/api/packages/{owner}/rubygems" do |
||||
gem "{package_name}" |
||||
end |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `package_name` | The package name. | |
||||
|
||||
For example: |
||||
|
||||
``` |
||||
source "https://gitea.example.com/api/packages/testuser/rubygems" do |
||||
gem "test_package" |
||||
end |
||||
``` |
||||
|
||||
Afterwards run the following command: |
||||
|
||||
```shell |
||||
bundle install |
||||
``` |
||||
|
||||
### gem |
||||
|
||||
Execute the following command: |
||||
|
||||
```shell |
||||
gem install --host https://gitea.example.com/api/packages/{owner}/rubygems {package_name} |
||||
``` |
||||
|
||||
| Parameter | Description | |
||||
| ----------------- | ----------- | |
||||
| `owner` | The owner of the package. | |
||||
| `package_name` | The package name. | |
||||
|
||||
For example: |
||||
|
||||
```shell |
||||
gem install --host https://gitea.example.com/api/packages/testuser/rubygems test_package |
||||
``` |
||||
|
||||
## Supported commands |
||||
|
||||
``` |
||||
gem install |
||||
bundle install |
||||
gem push |
||||
``` |
@ -0,0 +1,214 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"fmt" |
||||
"net/http" |
||||
neturl "net/url" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
composer_module "code.gitea.io/gitea/modules/packages/composer" |
||||
"code.gitea.io/gitea/modules/setting" |
||||
"code.gitea.io/gitea/routers/api/packages/composer" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageComposer(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
vendorName := "gitea" |
||||
projectName := "composer-package" |
||||
packageName := vendorName + "/" + projectName |
||||
packageVersion := "1.0.3" |
||||
packageDescription := "Package Description" |
||||
packageType := "composer-plugin" |
||||
packageAuthor := "Gitea Authors" |
||||
packageLicense := "MIT" |
||||
|
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
w, _ := archive.Create("composer.json") |
||||
w.Write([]byte(`{ |
||||
"name": "` + packageName + `", |
||||
"description": "` + packageDescription + `", |
||||
"type": "` + packageType + `", |
||||
"license": "` + packageLicense + `", |
||||
"authors": [ |
||||
{ |
||||
"name": "` + packageAuthor + `" |
||||
} |
||||
] |
||||
}`)) |
||||
archive.Close() |
||||
content := buf.Bytes() |
||||
|
||||
url := fmt.Sprintf("%sapi/packages/%s/composer", setting.AppURL, user.Name) |
||||
|
||||
t.Run("ServiceIndex", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/packages.json", url)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result composer.ServiceIndexResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, url+"/search.json?q=%query%&type=%type%", result.SearchTemplate) |
||||
assert.Equal(t, url+"/p2/%package%.json", result.MetadataTemplate) |
||||
assert.Equal(t, url+"/list.json", result.PackageList) |
||||
}) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
t.Run("MissingVersion", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadURL := url + "?version=" + packageVersion |
||||
|
||||
req := NewRequestWithBody(t, "PUT", uploadURL, bytes.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeComposer) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &composer_module.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, fmt.Sprintf("%s-%s.%s.zip", vendorName, projectName, packageVersion), pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(len(content)), pb.Size) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", uploadURL, bytes.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeComposer) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(0), pvs[0].DownloadCount) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/files/%s/%s/%s", url, neturl.PathEscape(packageName), neturl.PathEscape(pvs[0].LowerVersion), neturl.PathEscape(pfs[0].LowerName))) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, content, resp.Body.Bytes()) |
||||
|
||||
pvs, err = packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeComposer) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("SearchService", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Query string |
||||
Type string |
||||
Page int |
||||
PerPage int |
||||
ExpectedTotal int64 |
||||
ExpectedResults int |
||||
}{ |
||||
{"", "", 0, 0, 1, 1}, |
||||
{"", "", 1, 1, 1, 1}, |
||||
{"test", "", 1, 0, 0, 0}, |
||||
{"gitea", "", 1, 1, 1, 1}, |
||||
{"gitea", "", 2, 1, 1, 0}, |
||||
{"", packageType, 1, 1, 1, 1}, |
||||
{"gitea", packageType, 1, 1, 1, 1}, |
||||
{"gitea", "dummy", 1, 1, 0, 0}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/search.json?q=%s&type=%s&page=%d&per_page=%d", url, c.Query, c.Type, c.Page, c.PerPage)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result composer.SearchResultResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, c.ExpectedTotal, result.Total, "case %d: unexpected total hits", i) |
||||
assert.Len(t, result.Results, c.ExpectedResults, "case %d: unexpected result count", i) |
||||
} |
||||
}) |
||||
|
||||
t.Run("EnumeratePackages", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", url+"/list.json") |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result map[string][]string |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Contains(t, result, "packageNames") |
||||
names := result["packageNames"] |
||||
assert.Len(t, names, 1) |
||||
assert.Equal(t, packageName, names[0]) |
||||
}) |
||||
|
||||
t.Run("PackageMetadata", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/p2/%s/%s.json", url, vendorName, projectName)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result composer.PackageMetadataResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Contains(t, result.Packages, packageName) |
||||
pkgs := result.Packages[packageName] |
||||
assert.Len(t, pkgs, 1) |
||||
assert.Equal(t, packageName, pkgs[0].Name) |
||||
assert.Equal(t, packageVersion, pkgs[0].Version) |
||||
assert.Equal(t, packageType, pkgs[0].Type) |
||||
assert.Equal(t, packageDescription, pkgs[0].Description) |
||||
assert.Len(t, pkgs[0].Authors, 1) |
||||
assert.Equal(t, packageAuthor, pkgs[0].Authors[0].Name) |
||||
assert.Equal(t, "zip", pkgs[0].Dist.Type) |
||||
assert.Equal(t, "7b40bfd6da811b2b78deec1e944f156dbb2c747b", pkgs[0].Dist.Checksum) |
||||
}) |
||||
} |
@ -0,0 +1,724 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"fmt" |
||||
"net/http" |
||||
stdurl "net/url" |
||||
"strings" |
||||
"testing" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
conan_model "code.gitea.io/gitea/models/packages/conan" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
conan_module "code.gitea.io/gitea/modules/packages/conan" |
||||
"code.gitea.io/gitea/modules/setting" |
||||
conan_router "code.gitea.io/gitea/routers/api/packages/conan" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
conanfileName = "conanfile.py" |
||||
conaninfoName = "conaninfo.txt" |
||||
|
||||
conanLicense = "MIT" |
||||
conanAuthor = "Gitea <info@gitea.io>" |
||||
conanHomepage = "https://gitea.io/" |
||||
conanURL = "https://gitea.com/" |
||||
conanDescription = "Description of ConanPackage" |
||||
conanTopic = "gitea" |
||||
|
||||
conanPackageReference = "dummyreference" |
||||
|
||||
contentConaninfo = `[settings] |
||||
arch=x84_64 |
||||
|
||||
[requires] |
||||
fmt/7.1.3 |
||||
|
||||
[options] |
||||
shared=False |
||||
|
||||
[full_settings] |
||||
arch=x84_64 |
||||
|
||||
[full_requires] |
||||
fmt/7.1.3 |
||||
|
||||
[full_options] |
||||
shared=False |
||||
|
||||
[recipe_hash] |
||||
74714915a51073acb548ca1ce29afbac |
||||
|
||||
[env] |
||||
CC=gcc-10` |
||||
) |
||||
|
||||
func addTokenAuthHeader(request *http.Request, token string) *http.Request { |
||||
request.Header.Set("Authorization", token) |
||||
return request |
||||
} |
||||
|
||||
func buildConanfileContent(name, version string) string { |
||||
return `from conans import ConanFile, CMake, tools |
||||
|
||||
class ConanPackageConan(ConanFile): |
||||
name = "` + name + `" |
||||
version = "` + version + `" |
||||
license = "` + conanLicense + `" |
||||
author = "` + conanAuthor + `" |
||||
homepage = "` + conanHomepage + `" |
||||
url = "` + conanURL + `" |
||||
description = "` + conanDescription + `" |
||||
topics = ("` + conanTopic + `") |
||||
settings = "os", "compiler", "build_type", "arch" |
||||
options = {"shared": [True, False], "fPIC": [True, False]} |
||||
default_options = {"shared": False, "fPIC": True} |
||||
generators = "cmake"` |
||||
} |
||||
|
||||
func uploadConanPackageV1(t *testing.T, baseURL, token, name, version, user, channel string) { |
||||
contentConanfile := buildConanfileContent(name, version) |
||||
|
||||
recipeURL := fmt.Sprintf("%s/v1/conans/%s/%s/%s/%s", baseURL, name, version, user, channel) |
||||
|
||||
req := NewRequest(t, "GET", recipeURL) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/digest", recipeURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/download_urls", recipeURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "POST", fmt.Sprintf("%s/upload_urls", recipeURL)) |
||||
MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
req = NewRequestWithJSON(t, "POST", fmt.Sprintf("%s/upload_urls", recipeURL), map[string]int64{ |
||||
conanfileName: int64(len(contentConanfile)), |
||||
"removed.txt": 0, |
||||
}) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
uploadURLs := make(map[string]string) |
||||
DecodeJSON(t, resp, &uploadURLs) |
||||
|
||||
assert.Contains(t, uploadURLs, conanfileName) |
||||
assert.NotContains(t, uploadURLs, "removed.txt") |
||||
|
||||
uploadURL := uploadURLs[conanfileName] |
||||
assert.NotEmpty(t, uploadURL) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", uploadURL, strings.NewReader(contentConanfile)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
packageURL := fmt.Sprintf("%s/packages/%s", recipeURL, conanPackageReference) |
||||
|
||||
req = NewRequest(t, "GET", packageURL) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/digest", packageURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/download_urls", packageURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "POST", fmt.Sprintf("%s/upload_urls", packageURL)) |
||||
MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
req = NewRequestWithJSON(t, "POST", fmt.Sprintf("%s/upload_urls", packageURL), map[string]int64{ |
||||
conaninfoName: int64(len(contentConaninfo)), |
||||
"removed.txt": 0, |
||||
}) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
uploadURLs = make(map[string]string) |
||||
DecodeJSON(t, resp, &uploadURLs) |
||||
|
||||
assert.Contains(t, uploadURLs, conaninfoName) |
||||
assert.NotContains(t, uploadURLs, "removed.txt") |
||||
|
||||
uploadURL = uploadURLs[conaninfoName] |
||||
assert.NotEmpty(t, uploadURL) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", uploadURL, strings.NewReader(contentConaninfo)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
} |
||||
|
||||
func uploadConanPackageV2(t *testing.T, baseURL, token, name, version, user, channel, recipeRevision, packageRevision string) { |
||||
contentConanfile := buildConanfileContent(name, version) |
||||
|
||||
recipeURL := fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s", baseURL, name, version, user, channel, recipeRevision) |
||||
|
||||
req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/files/%s", recipeURL, conanfileName), strings.NewReader(contentConanfile)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/files", recipeURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var list *struct { |
||||
Files map[string]interface{} `json:"files"` |
||||
} |
||||
DecodeJSON(t, resp, &list) |
||||
assert.Len(t, list.Files, 1) |
||||
assert.Contains(t, list.Files, conanfileName) |
||||
|
||||
packageURL := fmt.Sprintf("%s/packages/%s/revisions/%s", recipeURL, conanPackageReference, packageRevision) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/files", packageURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/files/%s", packageURL, conaninfoName), strings.NewReader(contentConaninfo)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/files", packageURL)) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
list = nil |
||||
DecodeJSON(t, resp, &list) |
||||
assert.Len(t, list.Files, 1) |
||||
assert.Contains(t, list.Files, conaninfoName) |
||||
} |
||||
|
||||
func TestPackageConan(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
name := "ConanPackage" |
||||
version1 := "1.2" |
||||
version2 := "1.3" |
||||
user1 := "dummy" |
||||
user2 := "gitea" |
||||
channel1 := "test" |
||||
channel2 := "final" |
||||
revision1 := "rev1" |
||||
revision2 := "rev2" |
||||
|
||||
url := fmt.Sprintf("%sapi/packages/%s/conan", setting.AppURL, user.Name) |
||||
|
||||
t.Run("v1", func(t *testing.T) { |
||||
t.Run("Ping", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v1/ping", url)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, "revisions", resp.Header().Get("X-Conan-Server-Capabilities")) |
||||
}) |
||||
|
||||
token := "" |
||||
|
||||
t.Run("Authenticate", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v1/users/authenticate", url)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
body := resp.Body.String() |
||||
assert.NotEmpty(t, body) |
||||
|
||||
token = fmt.Sprintf("Bearer %s", body) |
||||
}) |
||||
|
||||
t.Run("CheckCredentials", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v1/users/check_credentials", url)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
}) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadConanPackageV1(t, url, token, name, version1, user1, channel1) |
||||
|
||||
t.Run("Validate", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeConan) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.Equal(t, name, pd.Package.Name) |
||||
assert.Equal(t, version1, pd.Version.Version) |
||||
assert.IsType(t, &conan_module.Metadata{}, pd.Metadata) |
||||
metadata := pd.Metadata.(*conan_module.Metadata) |
||||
assert.Equal(t, conanLicense, metadata.License) |
||||
assert.Equal(t, conanAuthor, metadata.Author) |
||||
assert.Equal(t, conanHomepage, metadata.ProjectURL) |
||||
assert.Equal(t, conanURL, metadata.RepositoryURL) |
||||
assert.Equal(t, conanDescription, metadata.Description) |
||||
assert.Equal(t, []string{conanTopic}, metadata.Keywords) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 2) |
||||
|
||||
for _, pf := range pfs { |
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pf.BlobID) |
||||
assert.NoError(t, err) |
||||
|
||||
if pf.Name == conanfileName { |
||||
assert.True(t, pf.IsLead) |
||||
|
||||
assert.Equal(t, int64(len(buildConanfileContent(name, version1))), pb.Size) |
||||
} else if pf.Name == conaninfoName { |
||||
assert.False(t, pf.IsLead) |
||||
|
||||
assert.Equal(t, int64(len(contentConaninfo)), pb.Size) |
||||
} else { |
||||
assert.Fail(t, "unknown file: %s", pf.Name) |
||||
} |
||||
} |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
recipeURL := fmt.Sprintf("%s/v1/conans/%s/%s/%s/%s", url, name, version1, user1, channel1) |
||||
|
||||
req := NewRequest(t, "GET", recipeURL) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
fileHashes := make(map[string]string) |
||||
DecodeJSON(t, resp, &fileHashes) |
||||
assert.Len(t, fileHashes, 1) |
||||
assert.Contains(t, fileHashes, conanfileName) |
||||
assert.Equal(t, "7abc52241c22090782c54731371847a8", fileHashes[conanfileName]) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/digest", recipeURL)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
downloadURLs := make(map[string]string) |
||||
DecodeJSON(t, resp, &downloadURLs) |
||||
assert.Contains(t, downloadURLs, conanfileName) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/download_urls", recipeURL)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
DecodeJSON(t, resp, &downloadURLs) |
||||
assert.Contains(t, downloadURLs, conanfileName) |
||||
|
||||
req = NewRequest(t, "GET", downloadURLs[conanfileName]) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
assert.Equal(t, buildConanfileContent(name, version1), resp.Body.String()) |
||||
|
||||
packageURL := fmt.Sprintf("%s/packages/%s", recipeURL, conanPackageReference) |
||||
|
||||
req = NewRequest(t, "GET", packageURL) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
fileHashes = make(map[string]string) |
||||
DecodeJSON(t, resp, &fileHashes) |
||||
assert.Len(t, fileHashes, 1) |
||||
assert.Contains(t, fileHashes, conaninfoName) |
||||
assert.Equal(t, "7628bfcc5b17f1470c468621a78df394", fileHashes[conaninfoName]) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/digest", packageURL)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
downloadURLs = make(map[string]string) |
||||
DecodeJSON(t, resp, &downloadURLs) |
||||
assert.Contains(t, downloadURLs, conaninfoName) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/download_urls", packageURL)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
DecodeJSON(t, resp, &downloadURLs) |
||||
assert.Contains(t, downloadURLs, conaninfoName) |
||||
|
||||
req = NewRequest(t, "GET", downloadURLs[conaninfoName]) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
assert.Equal(t, contentConaninfo, resp.Body.String()) |
||||
}) |
||||
|
||||
t.Run("Search", func(t *testing.T) { |
||||
uploadConanPackageV1(t, url, token, name, version2, user1, channel1) |
||||
uploadConanPackageV1(t, url, token, name, version1, user1, channel2) |
||||
uploadConanPackageV1(t, url, token, name, version1, user2, channel1) |
||||
uploadConanPackageV1(t, url, token, name, version1, user2, channel2) |
||||
|
||||
t.Run("Recipe", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Query string |
||||
Expected []string |
||||
}{ |
||||
{"ConanPackage", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.1", []string{}}, |
||||
{"Conan*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/*2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1*2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2@", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2@du*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final"}}, |
||||
{"ConanPackage/1.2@du*/", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@dummy/final"}}, |
||||
{"ConanPackage/1.2@du*/*test", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@du*/*st", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@gitea/*", []string{"ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"*/*@dummy", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@dummy/final"}}, |
||||
{"*/*@*/final", []string{"ConanPackage/1.2@dummy/final", "ConanPackage/1.2@gitea/final"}}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v1/conans/search?q=%s", url, stdurl.QueryEscape(c.Query))) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result *conan_router.SearchResult |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.ElementsMatch(t, c.Expected, result.Results, "case %d: unexpected result", i) |
||||
} |
||||
}) |
||||
|
||||
t.Run("Package", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v1/conans/%s/%s/%s/%s/search", url, name, version1, user1, channel2)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result map[string]*conan_module.Conaninfo |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Contains(t, result, conanPackageReference) |
||||
info := result[conanPackageReference] |
||||
assert.NotEmpty(t, info.Settings) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
t.Run("Package", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Channel string |
||||
References []string |
||||
}{ |
||||
{channel1, []string{conanPackageReference}}, |
||||
{channel2, []string{}}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
rref, _ := conan_module.NewRecipeReference(name, version1, user1, c.Channel, conan_module.DefaultRevision) |
||||
references, err := conan_model.GetPackageReferences(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.NotEmpty(t, references) |
||||
|
||||
req := NewRequestWithJSON(t, "POST", fmt.Sprintf("%s/v1/conans/%s/%s/%s/%s/packages/delete", url, name, version1, user1, c.Channel), map[string][]string{ |
||||
"package_ids": c.References, |
||||
}) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
references, err = conan_model.GetPackageReferences(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.Empty(t, references, "case %d: should be empty", i) |
||||
} |
||||
}) |
||||
|
||||
t.Run("Recipe", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Channel string |
||||
}{ |
||||
{channel1}, |
||||
{channel2}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
rref, _ := conan_module.NewRecipeReference(name, version1, user1, c.Channel, conan_module.DefaultRevision) |
||||
revisions, err := conan_model.GetRecipeRevisions(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.NotEmpty(t, revisions) |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/v1/conans/%s/%s/%s/%s", url, name, version1, user1, c.Channel)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
revisions, err = conan_model.GetRecipeRevisions(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.Empty(t, revisions, "case %d: should be empty", i) |
||||
} |
||||
}) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("v2", func(t *testing.T) { |
||||
t.Run("Ping", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v2/ping", url)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, "revisions", resp.Header().Get("X-Conan-Server-Capabilities")) |
||||
}) |
||||
|
||||
token := "" |
||||
|
||||
t.Run("Authenticate", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v2/users/authenticate", url)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
body := resp.Body.String() |
||||
assert.NotEmpty(t, body) |
||||
|
||||
token = fmt.Sprintf("Bearer %s", body) |
||||
}) |
||||
|
||||
t.Run("CheckCredentials", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v2/users/check_credentials", url)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
}) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadConanPackageV2(t, url, token, name, version1, user1, channel1, revision1, revision1) |
||||
|
||||
t.Run("Validate", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeConan) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 2) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Latest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
recipeURL := fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s", url, name, version1, user1, channel1) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/latest", recipeURL)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
obj := make(map[string]string) |
||||
DecodeJSON(t, resp, &obj) |
||||
assert.Contains(t, obj, "revision") |
||||
assert.Equal(t, revision1, obj["revision"]) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/revisions/%s/packages/%s/latest", recipeURL, revision1, conanPackageReference)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
obj = make(map[string]string) |
||||
DecodeJSON(t, resp, &obj) |
||||
assert.Contains(t, obj, "revision") |
||||
assert.Equal(t, revision1, obj["revision"]) |
||||
}) |
||||
|
||||
t.Run("ListRevisions", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadConanPackageV2(t, url, token, name, version1, user1, channel1, revision1, revision2) |
||||
uploadConanPackageV2(t, url, token, name, version1, user1, channel1, revision2, revision1) |
||||
uploadConanPackageV2(t, url, token, name, version1, user1, channel1, revision2, revision2) |
||||
|
||||
recipeURL := fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions", url, name, version1, user1, channel1) |
||||
|
||||
req := NewRequest(t, "GET", recipeURL) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
type RevisionInfo struct { |
||||
Revision string `json:"revision"` |
||||
Time time.Time `json:"time"` |
||||
} |
||||
|
||||
type RevisionList struct { |
||||
Revisions []*RevisionInfo `json:"revisions"` |
||||
} |
||||
|
||||
var list *RevisionList |
||||
DecodeJSON(t, resp, &list) |
||||
assert.Len(t, list.Revisions, 2) |
||||
revs := make([]string, 0, len(list.Revisions)) |
||||
for _, rev := range list.Revisions { |
||||
revs = append(revs, rev.Revision) |
||||
} |
||||
assert.ElementsMatch(t, []string{revision1, revision2}, revs) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/%s/packages/%s/revisions", recipeURL, revision1, conanPackageReference)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
DecodeJSON(t, resp, &list) |
||||
assert.Len(t, list.Revisions, 2) |
||||
revs = make([]string, 0, len(list.Revisions)) |
||||
for _, rev := range list.Revisions { |
||||
revs = append(revs, rev.Revision) |
||||
} |
||||
assert.ElementsMatch(t, []string{revision1, revision2}, revs) |
||||
}) |
||||
|
||||
t.Run("Search", func(t *testing.T) { |
||||
t.Run("Recipe", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Query string |
||||
Expected []string |
||||
}{ |
||||
{"ConanPackage", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.1", []string{}}, |
||||
{"Conan*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1*", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/*2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1*2", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2@", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"ConanPackage/1.2@du*", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@du*/", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@du*/*test", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@du*/*st", []string{"ConanPackage/1.2@dummy/test"}}, |
||||
{"ConanPackage/1.2@gitea/*", []string{"ConanPackage/1.2@gitea/test", "ConanPackage/1.2@gitea/final"}}, |
||||
{"*/*@dummy", []string{"ConanPackage/1.2@dummy/test", "ConanPackage/1.3@dummy/test"}}, |
||||
{"*/*@*/final", []string{"ConanPackage/1.2@gitea/final"}}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v2/conans/search?q=%s", url, stdurl.QueryEscape(c.Query))) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result *conan_router.SearchResult |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.ElementsMatch(t, c.Expected, result.Results, "case %d: unexpected result", i) |
||||
} |
||||
}) |
||||
|
||||
t.Run("Package", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/search", url, name, version1, user1, channel1)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result map[string]*conan_module.Conaninfo |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Contains(t, result, conanPackageReference) |
||||
info := result[conanPackageReference] |
||||
assert.NotEmpty(t, info.Settings) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s/search", url, name, version1, user1, channel1, revision1)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
result = make(map[string]*conan_module.Conaninfo) |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Contains(t, result, conanPackageReference) |
||||
info = result[conanPackageReference] |
||||
assert.NotEmpty(t, info.Settings) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
t.Run("Package", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
rref, _ := conan_module.NewRecipeReference(name, version1, user1, channel1, revision1) |
||||
pref, _ := conan_module.NewPackageReference(rref, conanPackageReference, conan_module.DefaultRevision) |
||||
|
||||
checkPackageRevisionCount := func(count int) { |
||||
revisions, err := conan_model.GetPackageRevisions(db.DefaultContext, user.ID, pref) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, revisions, count) |
||||
} |
||||
checkPackageReferenceCount := func(count int) { |
||||
references, err := conan_model.GetPackageReferences(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, references, count) |
||||
} |
||||
|
||||
checkPackageRevisionCount(2) |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s/packages/%s/revisions/%s", url, name, version1, user1, channel1, revision1, conanPackageReference, revision1)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkPackageRevisionCount(1) |
||||
|
||||
req = NewRequest(t, "DELETE", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s/packages/%s", url, name, version1, user1, channel1, revision1, conanPackageReference)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkPackageRevisionCount(0) |
||||
|
||||
rref = rref.WithRevision(revision2) |
||||
|
||||
checkPackageReferenceCount(1) |
||||
|
||||
req = NewRequest(t, "DELETE", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s/packages", url, name, version1, user1, channel1, revision2)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkPackageReferenceCount(0) |
||||
}) |
||||
|
||||
t.Run("Recipe", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
rref, _ := conan_module.NewRecipeReference(name, version1, user1, channel1, conan_module.DefaultRevision) |
||||
|
||||
checkRecipeRevisionCount := func(count int) { |
||||
revisions, err := conan_model.GetRecipeRevisions(db.DefaultContext, user.ID, rref) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, revisions, count) |
||||
} |
||||
|
||||
checkRecipeRevisionCount(2) |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s/revisions/%s", url, name, version1, user1, channel1, revision1)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkRecipeRevisionCount(1) |
||||
|
||||
req = NewRequest(t, "DELETE", fmt.Sprintf("%s/v2/conans/%s/%s/%s/%s", url, name, version1, user1, channel1)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkRecipeRevisionCount(0) |
||||
}) |
||||
}) |
||||
}) |
||||
} |
@ -0,0 +1,534 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"bytes" |
||||
"encoding/base64" |
||||
"fmt" |
||||
"net/http" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
packages_model "code.gitea.io/gitea/models/packages" |
||||
container_model "code.gitea.io/gitea/models/packages/container" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
container_module "code.gitea.io/gitea/modules/packages/container" |
||||
"code.gitea.io/gitea/modules/packages/container/oci" |
||||
"code.gitea.io/gitea/modules/setting" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageContainer(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
has := func(l packages_model.PackagePropertyList, name string) bool { |
||||
for _, pp := range l { |
||||
if pp.Name == name { |
||||
return true |
||||
} |
||||
} |
||||
return false |
||||
} |
||||
|
||||
images := []string{"test", "te/st"} |
||||
tags := []string{"latest", "main"} |
||||
multiTag := "multi" |
||||
|
||||
unknownDigest := "sha256:0000000000000000000000000000000000000000000000000000000000000000" |
||||
|
||||
blobDigest := "sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4" |
||||
blobContent, _ := base64.StdEncoding.DecodeString(`H4sIAAAJbogA/2IYBaNgFIxYAAgAAP//Lq+17wAEAAA=`) |
||||
|
||||
configDigest := "sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d" |
||||
configContent := `{"architecture":"amd64","config":{"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/true"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"container":"b89fe92a887d55c0961f02bdfbfd8ac3ddf66167db374770d2d9e9fab3311510","container_config":{"Hostname":"b89fe92a887d","Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"],"Cmd":["/bin/sh","-c","#(nop) ","CMD [\"/true\"]"],"ArgsEscaped":true,"Image":"sha256:9bd8b88dc68b80cffe126cc820e4b52c6e558eb3b37680bfee8e5f3ed7b8c257"},"created":"2022-01-01T00:00:00.000000000Z","docker_version":"20.10.12","history":[{"created":"2022-01-01T00:00:00.000000000Z","created_by":"/bin/sh -c #(nop) COPY file:0e7589b0c800daaf6fa460d2677101e4676dd9491980210cb345480e513f3602 in /true "},{"created":"2022-01-01T00:00:00.000000001Z","created_by":"/bin/sh -c #(nop) CMD [\"/true\"]","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:0ff3b91bdf21ecdf2f2f3d4372c2098a14dbe06cd678e8f0a85fd4902d00e2e2"]}}` |
||||
|
||||
manifestDigest := "sha256:4f10484d1c1bb13e3956b4de1cd42db8e0f14a75be1617b60f2de3cd59c803c6" |
||||
manifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeDockerManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` |
||||
|
||||
untaggedManifestDigest := "sha256:4305f5f5572b9a426b88909b036e52ee3cf3d7b9c1b01fac840e90747f56623d" |
||||
untaggedManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageManifest + `","config":{"mediaType":"application/vnd.docker.container.image.v1+json","digest":"sha256:4607e093bec406eaadb6f3a340f63400c9d3a7038680744c406903766b938f0d","size":1069},"layers":[{"mediaType":"application/vnd.docker.image.rootfs.diff.tar.gzip","digest":"sha256:a3ed95caeb02ffe68cdd9fd84406680ae93d633cb16422d00e8a7c22955b46d4","size":32}]}` |
||||
|
||||
indexManifestDigest := "sha256:bab112d6efb9e7f221995caaaa880352feb5bd8b1faf52fae8d12c113aa123ec" |
||||
indexManifestContent := `{"schemaVersion":2,"mediaType":"` + oci.MediaTypeImageIndex + `","manifests":[{"mediaType":"` + oci.MediaTypeDockerManifest + `","digest":"` + manifestDigest + `","platform":{"os":"linux","architecture":"arm","variant":"v7"}},{"mediaType":"` + oci.MediaTypeImageManifest + `","digest":"` + untaggedManifestDigest + `","platform":{"os":"linux","architecture":"arm64","variant":"v8"}}]}` |
||||
|
||||
anonymousToken := "" |
||||
userToken := "" |
||||
|
||||
t.Run("Authenticate", func(t *testing.T) { |
||||
type TokenResponse struct { |
||||
Token string `json:"token"` |
||||
} |
||||
|
||||
authenticate := []string{ |
||||
`Bearer realm="` + setting.AppURL + `v2/token"`, |
||||
`Basic`, |
||||
} |
||||
|
||||
t.Run("Anonymous", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL)) |
||||
resp := MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate")) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL)) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
tokenResponse := &TokenResponse{} |
||||
DecodeJSON(t, resp, &tokenResponse) |
||||
|
||||
assert.NotEmpty(t, tokenResponse.Token) |
||||
|
||||
anonymousToken = fmt.Sprintf("Bearer %s", tokenResponse.Token) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL)) |
||||
addTokenAuthHeader(req, anonymousToken) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
}) |
||||
|
||||
t.Run("User", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL)) |
||||
resp := MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
assert.ElementsMatch(t, authenticate, resp.Header().Values("WWW-Authenticate")) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%sv2/token", setting.AppURL)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
tokenResponse := &TokenResponse{} |
||||
DecodeJSON(t, resp, &tokenResponse) |
||||
|
||||
assert.NotEmpty(t, tokenResponse.Token) |
||||
|
||||
userToken = fmt.Sprintf("Bearer %s", tokenResponse.Token) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("DetermineSupport", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%sv2", setting.AppURL)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
assert.Equal(t, "registry/2.0", resp.Header().Get("Docker-Distribution-Api-Version")) |
||||
}) |
||||
|
||||
for _, image := range images { |
||||
t.Run(fmt.Sprintf("[Image:%s]", image), func(t *testing.T) { |
||||
url := fmt.Sprintf("%sv2/%s/%s", setting.AppURL, user.Name, image) |
||||
|
||||
t.Run("UploadBlob/Monolithic", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url)) |
||||
addTokenAuthHeader(req, anonymousToken) |
||||
MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, unknownDigest), bytes.NewReader(blobContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
|
||||
req = NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, blobDigest), bytes.NewReader(blobContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location")) |
||||
assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
|
||||
pv, err := packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, container_model.UploadVersion) |
||||
assert.NoError(t, err) |
||||
|
||||
pfs, err := packages_model.GetFilesByVersionID(db.DefaultContext, pv.ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
|
||||
pb, err := packages_model.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.EqualValues(t, len(blobContent), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadBlob/Chunked", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads", url)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
uuid := resp.Header().Get("Docker-Upload-Uuid") |
||||
assert.NotEmpty(t, uuid) |
||||
|
||||
pbu, err := packages_model.GetBlobUploadByID(db.DefaultContext, uuid) |
||||
assert.NoError(t, err) |
||||
assert.EqualValues(t, 0, pbu.BytesReceived) |
||||
|
||||
uploadURL := resp.Header().Get("Location") |
||||
assert.NotEmpty(t, uploadURL) |
||||
|
||||
req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:]+"000", bytes.NewReader(blobContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequestWithBody(t, "PATCH", setting.AppURL+uploadURL[1:], bytes.NewReader(blobContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
|
||||
req.Header.Set("Content-Range", "1-10") |
||||
MakeRequest(t, req, http.StatusRequestedRangeNotSatisfiable) |
||||
|
||||
contentRange := fmt.Sprintf("0-%d", len(blobContent)-1) |
||||
req.Header.Set("Content-Range", contentRange) |
||||
resp = MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
assert.Equal(t, uuid, resp.Header().Get("Docker-Upload-Uuid")) |
||||
assert.Equal(t, contentRange, resp.Header().Get("Range")) |
||||
|
||||
pbu, err = packages_model.GetBlobUploadByID(db.DefaultContext, uuid) |
||||
assert.NoError(t, err) |
||||
assert.EqualValues(t, len(blobContent), pbu.BytesReceived) |
||||
|
||||
uploadURL = resp.Header().Get("Location") |
||||
|
||||
req = NewRequest(t, "PUT", fmt.Sprintf("%s?digest=%s", setting.AppURL+uploadURL[1:], blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp = MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location")) |
||||
assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
}) |
||||
|
||||
for _, tag := range tags { |
||||
t.Run(fmt.Sprintf("[Tag:%s]", tag), func(t *testing.T) { |
||||
t.Run("UploadManifest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/blobs/uploads?digest=%s", url, configDigest), strings.NewReader(configContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) |
||||
addTokenAuthHeader(req, anonymousToken) |
||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) |
||||
MakeRequest(t, req, http.StatusUnauthorized) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) |
||||
resp := MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
|
||||
pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, tag) |
||||
assert.NoError(t, err) |
||||
|
||||
pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv) |
||||
assert.NoError(t, err) |
||||
assert.Nil(t, pd.SemVer) |
||||
assert.Equal(t, image, pd.Package.Name) |
||||
assert.Equal(t, tag, pd.Version.Version) |
||||
assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged)) |
||||
|
||||
assert.IsType(t, &container_module.Metadata{}, pd.Metadata) |
||||
metadata := pd.Metadata.(*container_module.Metadata) |
||||
assert.Equal(t, container_module.TypeOCI, metadata.Type) |
||||
assert.Len(t, metadata.ImageLayers, 2) |
||||
assert.Empty(t, metadata.MultiArch) |
||||
|
||||
assert.Len(t, pd.Files, 3) |
||||
for _, pfd := range pd.Files { |
||||
switch pfd.File.Name { |
||||
case container_model.ManifestFilename: |
||||
assert.True(t, pfd.File.IsLead) |
||||
assert.Equal(t, oci.MediaTypeDockerManifest, pfd.Properties.GetByName(container_module.PropertyMediaType)) |
||||
assert.Equal(t, manifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) |
||||
case strings.Replace(configDigest, ":", "_", 1): |
||||
assert.False(t, pfd.File.IsLead) |
||||
assert.Equal(t, "application/vnd.docker.container.image.v1+json", pfd.Properties.GetByName(container_module.PropertyMediaType)) |
||||
assert.Equal(t, configDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) |
||||
case strings.Replace(blobDigest, ":", "_", 1): |
||||
assert.False(t, pfd.File.IsLead) |
||||
assert.Equal(t, "application/vnd.docker.image.rootfs.diff.tar.gzip", pfd.Properties.GetByName(container_module.PropertyMediaType)) |
||||
assert.Equal(t, blobDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) |
||||
default: |
||||
assert.Fail(t, "unknown file: %s", pfd.File.Name) |
||||
} |
||||
} |
||||
|
||||
// Overwrite existing tag
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, tag), strings.NewReader(manifestContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
req.Header.Set("Content-Type", oci.MediaTypeDockerManifest) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
}) |
||||
|
||||
t.Run("HeadManifest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/unknown-tag", url)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, tag)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length")) |
||||
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
}) |
||||
|
||||
t.Run("GetManifest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/manifests/unknown-tag", url)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/manifests/%s", url, tag)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("%d", len(manifestContent)), resp.Header().Get("Content-Length")) |
||||
assert.Equal(t, oci.MediaTypeDockerManifest, resp.Header().Get("Content-Type")) |
||||
assert.Equal(t, manifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
assert.Equal(t, manifestContent, resp.Body.String()) |
||||
}) |
||||
}) |
||||
} |
||||
|
||||
t.Run("UploadUntaggedManifest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest), strings.NewReader(untaggedManifestContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
req.Header.Set("Content-Type", oci.MediaTypeImageManifest) |
||||
resp := MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp = MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("%d", len(untaggedManifestContent)), resp.Header().Get("Content-Length")) |
||||
assert.Equal(t, untaggedManifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
|
||||
pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, untaggedManifestDigest) |
||||
assert.NoError(t, err) |
||||
|
||||
pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv) |
||||
assert.NoError(t, err) |
||||
assert.Nil(t, pd.SemVer) |
||||
assert.Equal(t, image, pd.Package.Name) |
||||
assert.Equal(t, untaggedManifestDigest, pd.Version.Version) |
||||
assert.False(t, has(pd.Properties, container_module.PropertyManifestTagged)) |
||||
|
||||
assert.IsType(t, &container_module.Metadata{}, pd.Metadata) |
||||
|
||||
assert.Len(t, pd.Files, 3) |
||||
for _, pfd := range pd.Files { |
||||
if pfd.File.Name == container_model.ManifestFilename { |
||||
assert.True(t, pfd.File.IsLead) |
||||
assert.Equal(t, oci.MediaTypeImageManifest, pfd.Properties.GetByName(container_module.PropertyMediaType)) |
||||
assert.Equal(t, untaggedManifestDigest, pfd.Properties.GetByName(container_module.PropertyDigest)) |
||||
} |
||||
} |
||||
}) |
||||
|
||||
t.Run("UploadIndexManifest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/manifests/%s", url, multiTag), strings.NewReader(indexManifestContent)) |
||||
addTokenAuthHeader(req, userToken) |
||||
req.Header.Set("Content-Type", oci.MediaTypeImageIndex) |
||||
resp := MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, indexManifestDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
|
||||
pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, image, multiTag) |
||||
assert.NoError(t, err) |
||||
|
||||
pd, err := packages_model.GetPackageDescriptor(db.DefaultContext, pv) |
||||
assert.NoError(t, err) |
||||
assert.Nil(t, pd.SemVer) |
||||
assert.Equal(t, image, pd.Package.Name) |
||||
assert.Equal(t, multiTag, pd.Version.Version) |
||||
assert.True(t, has(pd.Properties, container_module.PropertyManifestTagged)) |
||||
|
||||
getAllByName := func(l packages_model.PackagePropertyList, name string) []string { |
||||
values := make([]string, 0, len(l)) |
||||
for _, pp := range l { |
||||
if pp.Name == name { |
||||
values = append(values, pp.Value) |
||||
} |
||||
} |
||||
return values |
||||
} |
||||
assert.ElementsMatch(t, []string{manifestDigest, untaggedManifestDigest}, getAllByName(pd.Properties, container_module.PropertyManifestReference)) |
||||
|
||||
assert.IsType(t, &container_module.Metadata{}, pd.Metadata) |
||||
metadata := pd.Metadata.(*container_module.Metadata) |
||||
assert.Equal(t, container_module.TypeOCI, metadata.Type) |
||||
assert.Contains(t, metadata.MultiArch, "linux/arm/v7") |
||||
assert.Equal(t, manifestDigest, metadata.MultiArch["linux/arm/v7"]) |
||||
assert.Contains(t, metadata.MultiArch, "linux/arm64/v8") |
||||
assert.Equal(t, untaggedManifestDigest, metadata.MultiArch["linux/arm64/v8"]) |
||||
|
||||
assert.Len(t, pd.Files, 1) |
||||
assert.True(t, pd.Files[0].File.IsLead) |
||||
assert.Equal(t, oci.MediaTypeImageIndex, pd.Files[0].Properties.GetByName(container_module.PropertyMediaType)) |
||||
assert.Equal(t, indexManifestDigest, pd.Files[0].Properties.GetByName(container_module.PropertyDigest)) |
||||
}) |
||||
|
||||
t.Run("UploadBlob/Mount", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, unknownDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
req = NewRequest(t, "POST", fmt.Sprintf("%s/blobs/uploads?mount=%s", url, blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("/v2/%s/%s/blobs/%s", user.Name, image, blobDigest), resp.Header().Get("Location")) |
||||
assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
}) |
||||
|
||||
t.Run("HeadBlob", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, unknownDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length")) |
||||
assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
}) |
||||
|
||||
t.Run("GetBlob", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, unknownDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/blobs/%s", url, blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, fmt.Sprintf("%d", len(blobContent)), resp.Header().Get("Content-Length")) |
||||
assert.Equal(t, blobDigest, resp.Header().Get("Docker-Content-Digest")) |
||||
assert.Equal(t, blobContent, resp.Body.Bytes()) |
||||
}) |
||||
|
||||
t.Run("GetTagList", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
URL string |
||||
ExpectedTags []string |
||||
ExpectedLink string |
||||
}{ |
||||
{ |
||||
URL: fmt.Sprintf("%s/tags/list", url), |
||||
ExpectedTags: []string{"latest", "main", "multi"}, |
||||
ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image), |
||||
}, |
||||
{ |
||||
URL: fmt.Sprintf("%s/tags/list?n=0", url), |
||||
ExpectedTags: []string{}, |
||||
ExpectedLink: "", |
||||
}, |
||||
{ |
||||
URL: fmt.Sprintf("%s/tags/list?n=2", url), |
||||
ExpectedTags: []string{"latest", "main"}, |
||||
ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=2>; rel="next"`, user.Name, image), |
||||
}, |
||||
{ |
||||
URL: fmt.Sprintf("%s/tags/list?last=main", url), |
||||
ExpectedTags: []string{"multi"}, |
||||
ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=multi>; rel="next"`, user.Name, image), |
||||
}, |
||||
{ |
||||
URL: fmt.Sprintf("%s/tags/list?n=1&last=latest", url), |
||||
ExpectedTags: []string{"main"}, |
||||
ExpectedLink: fmt.Sprintf(`</v2/%s/%s/tags/list?last=main&n=1>; rel="next"`, user.Name, image), |
||||
}, |
||||
} |
||||
|
||||
for _, c := range cases { |
||||
req := NewRequest(t, "GET", c.URL) |
||||
addTokenAuthHeader(req, userToken) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
type TagList struct { |
||||
Name string `json:"name"` |
||||
Tags []string `json:"tags"` |
||||
} |
||||
|
||||
tagList := &TagList{} |
||||
DecodeJSON(t, resp, &tagList) |
||||
|
||||
assert.Equal(t, user.Name+"/"+image, tagList.Name) |
||||
assert.Equal(t, c.ExpectedTags, tagList.Tags) |
||||
assert.Equal(t, c.ExpectedLink, resp.Header().Get("Link")) |
||||
} |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
t.Run("Blob", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/blobs/%s", url, blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/blobs/%s", url, blobDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
|
||||
t.Run("ManifestByDigest", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, untaggedManifestDigest)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
|
||||
t.Run("ManifestByTag", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/manifests/%s", url, multiTag)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusAccepted) |
||||
|
||||
req = NewRequest(t, "HEAD", fmt.Sprintf("%s/manifests/%s", url, multiTag)) |
||||
addTokenAuthHeader(req, userToken) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
}) |
||||
}) |
||||
} |
||||
} |
@ -0,0 +1,109 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"bytes" |
||||
"fmt" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageGeneric(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
packageName := "te-st_pac.kage" |
||||
packageVersion := "1.0.3" |
||||
filename := "fi-le_na.me" |
||||
content := []byte{1, 2, 3} |
||||
|
||||
url := fmt.Sprintf("/api/packages/%s/generic/%s/%s/%s", user.Name, packageName, packageVersion, filename) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(content)) |
||||
AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeGeneric) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.Nil(t, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, filename, pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(len(content)), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(content)) |
||||
AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", url) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, content, resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeGeneric) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", url) |
||||
AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeGeneric) |
||||
assert.NoError(t, err) |
||||
assert.Empty(t, pvs) |
||||
}) |
||||
|
||||
t.Run("DownloadNotExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", url) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
|
||||
t.Run("DeleteNotExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", url) |
||||
AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
} |
@ -0,0 +1,205 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"fmt" |
||||
"net/http" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
"code.gitea.io/gitea/modules/packages/maven" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageMaven(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
groupID := "com.gitea" |
||||
artifactID := "test-project" |
||||
packageName := groupID + "-" + artifactID |
||||
packageVersion := "1.0.1" |
||||
packageDescription := "Test Description" |
||||
|
||||
root := fmt.Sprintf("/api/packages/%s/maven/%s/%s", user.Name, strings.ReplaceAll(groupID, ".", "/"), artifactID) |
||||
filename := fmt.Sprintf("%s-%s.jar", packageName, packageVersion) |
||||
|
||||
putFile := func(t *testing.T, path, content string, expectedStatus int) { |
||||
req := NewRequestWithBody(t, "PUT", root+path, strings.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, expectedStatus) |
||||
} |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
putFile(t, fmt.Sprintf("/%s/%s", packageVersion, filename), "test", http.StatusCreated) |
||||
putFile(t, "/maven-metadata.xml", "test", http.StatusOK) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeMaven) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.Nil(t, pd.SemVer) |
||||
assert.Nil(t, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, filename, pfs[0].Name) |
||||
assert.False(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(4), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
putFile(t, fmt.Sprintf("/%s/%s", packageVersion, filename), "test", http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/%s/%s", root, packageVersion, filename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, []byte("test"), resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeMaven) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(0), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("UploadVerifySHA1", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
t.Run("Missmatch", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
putFile(t, fmt.Sprintf("/%s/%s.sha1", packageVersion, filename), "test", http.StatusBadRequest) |
||||
}) |
||||
t.Run("Valid", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
putFile(t, fmt.Sprintf("/%s/%s.sha1", packageVersion, filename), "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3", http.StatusOK) |
||||
}) |
||||
}) |
||||
|
||||
pomContent := `<?xml version="1.0"?> |
||||
<project xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> |
||||
<groupId>` + groupID + `</groupId> |
||||
<artifactId>` + artifactID + `</artifactId> |
||||
<version>` + packageVersion + `</version> |
||||
<description>` + packageDescription + `</description> |
||||
</project>` |
||||
|
||||
t.Run("UploadPOM", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeMaven) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.Nil(t, pd.Metadata) |
||||
|
||||
putFile(t, fmt.Sprintf("/%s/%s.pom", packageVersion, filename), pomContent, http.StatusCreated) |
||||
|
||||
pvs, err = packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeMaven) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err = packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.IsType(t, &maven.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageDescription, pd.Metadata.(*maven.Metadata).Description) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 2) |
||||
i := 0 |
||||
if strings.HasSuffix(pfs[1].Name, ".pom") { |
||||
i = 1 |
||||
} |
||||
assert.Equal(t, filename+".pom", pfs[i].Name) |
||||
assert.True(t, pfs[i].IsLead) |
||||
}) |
||||
|
||||
t.Run("DownloadPOM", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/%s/%s.pom", root, packageVersion, filename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, []byte(pomContent), resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeMaven) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("DownloadChecksums", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/1.2.3/%s", root, filename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
for key, checksum := range map[string]string{ |
||||
"md5": "098f6bcd4621d373cade4e832627b4f6", |
||||
"sha1": "a94a8fe5ccb19ba61c4c0873d391e987982fbbd3", |
||||
"sha256": "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08", |
||||
"sha512": "ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff", |
||||
} { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/%s/%s.%s", root, packageVersion, filename, key)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, checksum, resp.Body.String()) |
||||
} |
||||
}) |
||||
|
||||
t.Run("DownloadMetadata", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", root+"/maven-metadata.xml") |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
expectedMetadata := `<?xml version="1.0" encoding="UTF-8"?>` + "\n<metadata><groupId>com.gitea</groupId><artifactId>test-project</artifactId><versioning><release>1.0.1</release><latest>1.0.1</latest><versions><version>1.0.1</version></versions></versioning></metadata>" |
||||
assert.Equal(t, expectedMetadata, resp.Body.String()) |
||||
|
||||
for key, checksum := range map[string]string{ |
||||
"md5": "6bee0cebaaa686d658adf3e7e16371a0", |
||||
"sha1": "8696abce499fe84d9ea93e5492abe7147e195b6c", |
||||
"sha256": "3f48322f81c4b2c3bb8649ae1e5c9801476162b520e1c2734ac06b2c06143208", |
||||
"sha512": "cb075aa2e2ef1a83cdc14dd1e08c505b72d633399b39e73a21f00f0deecb39a3e2c79f157c1163f8a3854828750706e0dec3a0f5e4778e91f8ec2cf351a855f2", |
||||
} { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/maven-metadata.xml.%s", root, key)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, checksum, resp.Body.String()) |
||||
} |
||||
}) |
||||
} |
@ -0,0 +1,222 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"encoding/base64" |
||||
"fmt" |
||||
"net/http" |
||||
"net/url" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
"code.gitea.io/gitea/modules/packages/npm" |
||||
"code.gitea.io/gitea/modules/setting" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageNpm(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
token := fmt.Sprintf("Bearer %s", getTokenForLoggedInUser(t, loginUser(t, user.Name))) |
||||
|
||||
packageName := "@scope/test-package" |
||||
packageVersion := "1.0.1-pre" |
||||
packageTag := "latest" |
||||
packageTag2 := "release" |
||||
packageAuthor := "KN4CK3R" |
||||
packageDescription := "Test Description" |
||||
|
||||
data := "H4sIAAAAAAAA/ytITM5OTE/VL4DQelnF+XkMVAYGBgZmJiYK2MRBwNDcSIHB2NTMwNDQzMwAqA7IMDUxA9LUdgg2UFpcklgEdAql5kD8ogCnhwio5lJQUMpLzE1VslJQcihOzi9I1S9JLS7RhSYIJR2QgrLUouLM/DyQGkM9Az1D3YIiqExKanFyUWZBCVQ2BKhVwQVJDKwosbQkI78IJO/tZ+LsbRykxFXLNdA+HwWjYBSMgpENACgAbtAACAAA" |
||||
upload := `{ |
||||
"_id": "` + packageName + `", |
||||
"name": "` + packageName + `", |
||||
"description": "` + packageDescription + `", |
||||
"dist-tags": { |
||||
"` + packageTag + `": "` + packageVersion + `" |
||||
}, |
||||
"versions": { |
||||
"` + packageVersion + `": { |
||||
"name": "` + packageName + `", |
||||
"version": "` + packageVersion + `", |
||||
"description": "` + packageDescription + `", |
||||
"author": { |
||||
"name": "` + packageAuthor + `" |
||||
}, |
||||
"dist": { |
||||
"integrity": "sha512-yA4FJsVhetynGfOC1jFf79BuS+jrHbm0fhh+aHzCQkOaOBXKf9oBnC4a6DnLLnEsHQDRLYd00cwj8sCXpC+wIg==", |
||||
"shasum": "aaa7eaf852a948b0aa05afeda35b1badca155d90" |
||||
} |
||||
} |
||||
}, |
||||
"_attachments": { |
||||
"` + packageName + `-` + packageVersion + `.tgz": { |
||||
"data": "` + data + `" |
||||
} |
||||
} |
||||
}` |
||||
|
||||
root := fmt.Sprintf("/api/packages/%s/npm/%s", user.Name, url.QueryEscape(packageName)) |
||||
tagsRoot := fmt.Sprintf("/api/packages/%s/npm/-/package/%s/dist-tags", user.Name, url.QueryEscape(packageName)) |
||||
filename := fmt.Sprintf("%s-%s.tgz", strings.Split(packageName, "/")[1], packageVersion) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", root, strings.NewReader(upload)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNpm) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &npm.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
assert.Len(t, pd.Properties, 1) |
||||
assert.Equal(t, npm.TagProperty, pd.Properties[0].Name) |
||||
assert.Equal(t, packageTag, pd.Properties[0].Value) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, filename, pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(192), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", root, strings.NewReader(upload)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/-/%s/%s", root, packageVersion, filename)) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
b, _ := base64.StdEncoding.DecodeString(data) |
||||
assert.Equal(t, b, resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNpm) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("PackageMetadata", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/packages/%s/npm/%s", user.Name, "does-not-exist")) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", root) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result npm.PackageMetadata |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, packageName, result.ID) |
||||
assert.Equal(t, packageName, result.Name) |
||||
assert.Equal(t, packageDescription, result.Description) |
||||
assert.Contains(t, result.DistTags, packageTag) |
||||
assert.Equal(t, packageVersion, result.DistTags[packageTag]) |
||||
assert.Equal(t, packageAuthor, result.Author.Name) |
||||
assert.Contains(t, result.Versions, packageVersion) |
||||
pmv := result.Versions[packageVersion] |
||||
assert.Equal(t, fmt.Sprintf("%s@%s", packageName, packageVersion), pmv.ID) |
||||
assert.Equal(t, packageName, pmv.Name) |
||||
assert.Equal(t, packageDescription, pmv.Description) |
||||
assert.Equal(t, packageAuthor, pmv.Author.Name) |
||||
assert.Equal(t, "sha512-yA4FJsVhetynGfOC1jFf79BuS+jrHbm0fhh+aHzCQkOaOBXKf9oBnC4a6DnLLnEsHQDRLYd00cwj8sCXpC+wIg==", pmv.Dist.Integrity) |
||||
assert.Equal(t, "aaa7eaf852a948b0aa05afeda35b1badca155d90", pmv.Dist.Shasum) |
||||
assert.Equal(t, fmt.Sprintf("%s%s/-/%s/%s", setting.AppURL, root[1:], packageVersion, filename), pmv.Dist.Tarball) |
||||
}) |
||||
|
||||
t.Run("AddTag", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
test := func(t *testing.T, status int, tag, version string) { |
||||
req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/%s", tagsRoot, tag), strings.NewReader(`"`+version+`"`)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, status) |
||||
} |
||||
|
||||
test(t, http.StatusBadRequest, "1.0", packageVersion) |
||||
test(t, http.StatusBadRequest, "v1.0", packageVersion) |
||||
test(t, http.StatusNotFound, packageTag2, "1.2") |
||||
test(t, http.StatusOK, packageTag, packageVersion) |
||||
test(t, http.StatusOK, packageTag2, packageVersion) |
||||
}) |
||||
|
||||
t.Run("ListTags", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", tagsRoot) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result map[string]string |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Len(t, result, 2) |
||||
assert.Contains(t, result, packageTag) |
||||
assert.Equal(t, packageVersion, result[packageTag]) |
||||
assert.Contains(t, result, packageTag2) |
||||
assert.Equal(t, packageVersion, result[packageTag2]) |
||||
}) |
||||
|
||||
t.Run("PackageMetadataDistTags", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", root) |
||||
req = addTokenAuthHeader(req, token) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result npm.PackageMetadata |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Len(t, result.DistTags, 2) |
||||
assert.Contains(t, result.DistTags, packageTag) |
||||
assert.Equal(t, packageVersion, result.DistTags[packageTag]) |
||||
assert.Contains(t, result.DistTags, packageTag2) |
||||
assert.Equal(t, packageVersion, result.DistTags[packageTag2]) |
||||
}) |
||||
|
||||
t.Run("DeleteTag", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
test := func(t *testing.T, status int, tag string) { |
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/%s", tagsRoot, tag)) |
||||
req = addTokenAuthHeader(req, token) |
||||
MakeRequest(t, req, status) |
||||
} |
||||
|
||||
test(t, http.StatusBadRequest, "v1.0") |
||||
test(t, http.StatusBadRequest, "1.0") |
||||
test(t, http.StatusOK, "dummy") |
||||
test(t, http.StatusOK, packageTag2) |
||||
}) |
||||
} |
@ -0,0 +1,381 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"encoding/base64" |
||||
"fmt" |
||||
"io" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
nuget_module "code.gitea.io/gitea/modules/packages/nuget" |
||||
"code.gitea.io/gitea/modules/setting" |
||||
"code.gitea.io/gitea/routers/api/packages/nuget" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageNuGet(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
packageName := "test.package" |
||||
packageVersion := "1.0.3" |
||||
packageAuthors := "KN4CK3R" |
||||
packageDescription := "Gitea Test Package" |
||||
symbolFilename := "test.pdb" |
||||
symbolID := "d910bb6948bd4c6cb40155bcf52c3c94" |
||||
|
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
w, _ := archive.Create("package.nuspec") |
||||
w.Write([]byte(`<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata> |
||||
<id>` + packageName + `</id> |
||||
<version>` + packageVersion + `</version> |
||||
<authors>` + packageAuthors + `</authors> |
||||
<description>` + packageDescription + `</description> |
||||
<group targetFramework=".NETStandard2.0"> |
||||
<dependency id="Microsoft.CSharp" version="4.5.0" /> |
||||
</group> |
||||
</metadata> |
||||
</package>`)) |
||||
archive.Close() |
||||
content := buf.Bytes() |
||||
|
||||
url := fmt.Sprintf("/api/packages/%s/nuget", user.Name) |
||||
|
||||
t.Run("ServiceIndex", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/index.json", url)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result nuget.ServiceIndexResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, "3.0.0", result.Version) |
||||
assert.NotEmpty(t, result.Resources) |
||||
|
||||
root := setting.AppURL + url[1:] |
||||
for _, r := range result.Resources { |
||||
switch r.Type { |
||||
case "SearchQueryService": |
||||
fallthrough |
||||
case "SearchQueryService/3.0.0-beta": |
||||
fallthrough |
||||
case "SearchQueryService/3.0.0-rc": |
||||
assert.Equal(t, root+"/query", r.ID) |
||||
case "RegistrationsBaseUrl": |
||||
fallthrough |
||||
case "RegistrationsBaseUrl/3.0.0-beta": |
||||
fallthrough |
||||
case "RegistrationsBaseUrl/3.0.0-rc": |
||||
assert.Equal(t, root+"/registration", r.ID) |
||||
case "PackageBaseAddress/3.0.0": |
||||
assert.Equal(t, root+"/package", r.ID) |
||||
case "PackagePublish/2.0.0": |
||||
assert.Equal(t, root, r.ID) |
||||
} |
||||
} |
||||
}) |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
t.Run("DependencyPackage", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNuGet) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &nuget_module.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, fmt.Sprintf("%s.%s.nupkg", packageName, packageVersion), pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(len(content)), pb.Size) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", url, bytes.NewReader(content)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("SymbolPackage", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
createPackage := func(id, packageType string) io.Reader { |
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
|
||||
w, _ := archive.Create("package.nuspec") |
||||
w.Write([]byte(`<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata> |
||||
<id>` + id + `</id> |
||||
<version>` + packageVersion + `</version> |
||||
<authors>` + packageAuthors + `</authors> |
||||
<description>` + packageDescription + `</description> |
||||
<packageTypes><packageType name="` + packageType + `" /></packageTypes> |
||||
</metadata> |
||||
</package>`)) |
||||
|
||||
w, _ = archive.Create(symbolFilename) |
||||
b, _ := base64.StdEncoding.DecodeString(`QlNKQgEAAQAAAAAADAAAAFBEQiB2MS4wAAAAAAAABgB8AAAAWAAAACNQZGIAAAAA1AAAAAgBAAAj |
||||
fgAA3AEAAAQAAAAjU3RyaW5ncwAAAADgAQAABAAAACNVUwDkAQAAMAAAACNHVUlEAAAAFAIAACgB |
||||
AAAjQmxvYgAAAGm7ENm9SGxMtAFVvPUsPJTF6PbtAAAAAFcVogEJAAAAAQAAAA==`) |
||||
w.Write(b) |
||||
|
||||
archive.Close() |
||||
return &buf |
||||
} |
||||
|
||||
req := NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/symbolpackage", url), createPackage("unknown-package", "SymbolsPackage")) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/symbolpackage", url), createPackage(packageName, "DummyPackage")) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/symbolpackage", url), createPackage(packageName, "SymbolsPackage")) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNuGet) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &nuget_module.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 3) |
||||
for _, pf := range pfs { |
||||
switch pf.Name { |
||||
case fmt.Sprintf("%s.%s.nupkg", packageName, packageVersion): |
||||
case fmt.Sprintf("%s.%s.snupkg", packageName, packageVersion): |
||||
assert.False(t, pf.IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pf.BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(616), pb.Size) |
||||
case symbolFilename: |
||||
assert.False(t, pf.IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pf.BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(160), pb.Size) |
||||
|
||||
pps, err := packages.GetProperties(db.DefaultContext, packages.PropertyTypeFile, pf.ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pps, 1) |
||||
assert.Equal(t, nuget_module.PropertySymbolID, pps[0].Name) |
||||
assert.Equal(t, symbolID, pps[0].Value) |
||||
default: |
||||
assert.Fail(t, "unexpected file: %v", pf.Name) |
||||
} |
||||
} |
||||
|
||||
req = NewRequestWithBody(t, "PUT", fmt.Sprintf("%s/symbolpackage", url), createPackage(packageName, "SymbolsPackage")) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
checkDownloadCount := func(count int64) { |
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNuGet) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, count, pvs[0].DownloadCount) |
||||
} |
||||
|
||||
checkDownloadCount(0) |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/package/%s/%s/%s.%s.nupkg", url, packageName, packageVersion, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, content, resp.Body.Bytes()) |
||||
|
||||
checkDownloadCount(1) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/package/%s/%s/%s.%s.snupkg", url, packageName, packageVersion, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkDownloadCount(1) |
||||
|
||||
t.Run("Symbol", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/symbols/%s/%sFFFFFFFF/gitea.pdb", url, symbolFilename, symbolID)) |
||||
MakeRequest(t, req, http.StatusBadRequest) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/symbols/%s/%sFFFFFFFF/%s", url, symbolFilename, "00000000000000000000000000000000", symbolFilename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/symbols/%s/%sFFFFFFFF/%s", url, symbolFilename, symbolID, symbolFilename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
checkDownloadCount(1) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("SearchService", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
cases := []struct { |
||||
Query string |
||||
Skip int |
||||
Take int |
||||
ExpectedTotal int64 |
||||
ExpectedResults int |
||||
}{ |
||||
{"", 0, 0, 1, 1}, |
||||
{"", 0, 10, 1, 1}, |
||||
{"gitea", 0, 10, 0, 0}, |
||||
{"test", 0, 10, 1, 1}, |
||||
{"test", 1, 10, 1, 0}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/query?q=%s&skip=%d&take=%d", url, c.Query, c.Skip, c.Take)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result nuget.SearchResultResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, c.ExpectedTotal, result.TotalHits, "case %d: unexpected total hits", i) |
||||
assert.Len(t, result.Data, c.ExpectedResults, "case %d: unexpected result count", i) |
||||
} |
||||
}) |
||||
|
||||
t.Run("RegistrationService", func(t *testing.T) { |
||||
indexURL := fmt.Sprintf("%s%s/registration/%s/index.json", setting.AppURL, url[1:], packageName) |
||||
leafURL := fmt.Sprintf("%s%s/registration/%s/%s.json", setting.AppURL, url[1:], packageName, packageVersion) |
||||
contentURL := fmt.Sprintf("%s%s/package/%s/%s/%s.%s.nupkg", setting.AppURL, url[1:], packageName, packageVersion, packageName, packageVersion) |
||||
|
||||
t.Run("RegistrationIndex", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/registration/%s/index.json", url, packageName)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result nuget.RegistrationIndexResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, indexURL, result.RegistrationIndexURL) |
||||
assert.Equal(t, 1, result.Count) |
||||
assert.Len(t, result.Pages, 1) |
||||
assert.Equal(t, indexURL, result.Pages[0].RegistrationPageURL) |
||||
assert.Equal(t, packageVersion, result.Pages[0].Lower) |
||||
assert.Equal(t, packageVersion, result.Pages[0].Upper) |
||||
assert.Equal(t, 1, result.Pages[0].Count) |
||||
assert.Len(t, result.Pages[0].Items, 1) |
||||
assert.Equal(t, packageName, result.Pages[0].Items[0].CatalogEntry.ID) |
||||
assert.Equal(t, packageVersion, result.Pages[0].Items[0].CatalogEntry.Version) |
||||
assert.Equal(t, packageAuthors, result.Pages[0].Items[0].CatalogEntry.Authors) |
||||
assert.Equal(t, packageDescription, result.Pages[0].Items[0].CatalogEntry.Description) |
||||
assert.Equal(t, leafURL, result.Pages[0].Items[0].CatalogEntry.CatalogLeafURL) |
||||
assert.Equal(t, contentURL, result.Pages[0].Items[0].CatalogEntry.PackageContentURL) |
||||
}) |
||||
|
||||
t.Run("RegistrationLeaf", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/registration/%s/%s.json", url, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result nuget.RegistrationLeafResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Equal(t, leafURL, result.RegistrationLeafURL) |
||||
assert.Equal(t, contentURL, result.PackageContentURL) |
||||
assert.Equal(t, indexURL, result.RegistrationIndexURL) |
||||
}) |
||||
}) |
||||
|
||||
t.Run("PackageService", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/package/%s/index.json", url, packageName)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var result nuget.PackageVersionsResponse |
||||
DecodeJSON(t, resp, &result) |
||||
|
||||
assert.Len(t, result.Versions, 1) |
||||
assert.Equal(t, packageVersion, result.Versions[0]) |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/%s/%s", url, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeNuGet) |
||||
assert.NoError(t, err) |
||||
assert.Empty(t, pvs) |
||||
}) |
||||
|
||||
t.Run("DownloadNotExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/package/%s/%s/%s.%s.nupkg", url, packageName, packageVersion, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("%s/package/%s/%s/%s.%s.snupkg", url, packageName, packageVersion, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
|
||||
t.Run("DeleteNotExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("%s/package/%s/%s", url, packageName, packageVersion)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
}) |
||||
} |
@ -0,0 +1,181 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"bytes" |
||||
"fmt" |
||||
"io" |
||||
"mime/multipart" |
||||
"net/http" |
||||
"regexp" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
"code.gitea.io/gitea/modules/packages/pypi" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackagePyPI(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
packageName := "test-package" |
||||
packageVersion := "1.0.1" |
||||
packageAuthor := "KN4CK3R" |
||||
packageDescription := "Test Description" |
||||
|
||||
content := "test" |
||||
hashSHA256 := "9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08" |
||||
|
||||
root := fmt.Sprintf("/api/packages/%s/pypi", user.Name) |
||||
|
||||
uploadFile := func(t *testing.T, filename, content string, expectedStatus int) { |
||||
body := &bytes.Buffer{} |
||||
writer := multipart.NewWriter(body) |
||||
part, _ := writer.CreateFormFile("content", filename) |
||||
_, _ = io.Copy(part, strings.NewReader(content)) |
||||
|
||||
writer.WriteField("name", packageName) |
||||
writer.WriteField("version", packageVersion) |
||||
writer.WriteField("author", packageAuthor) |
||||
writer.WriteField("summary", packageDescription) |
||||
writer.WriteField("description", packageDescription) |
||||
writer.WriteField("sha256_digest", hashSHA256) |
||||
writer.WriteField("requires_python", "3.6") |
||||
|
||||
_ = writer.Close() |
||||
|
||||
req := NewRequestWithBody(t, "POST", root, body) |
||||
req.Header.Add("Content-Type", writer.FormDataContentType()) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, expectedStatus) |
||||
} |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
filename := "test.whl" |
||||
uploadFile(t, filename, content, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypePyPI) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &pypi.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, filename, pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(4), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadAddFile", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
filename := "test.tar.gz" |
||||
uploadFile(t, filename, content, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypePyPI) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &pypi.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 2) |
||||
|
||||
pf, err := packages.GetFileForVersionByName(db.DefaultContext, pvs[0].ID, filename, packages.EmptyFileKey) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, filename, pf.Name) |
||||
assert.True(t, pf.IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pf.BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(4), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadHashMismatch", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
filename := "test2.whl" |
||||
uploadFile(t, filename, "dummy", http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("UploadExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadFile(t, "test.whl", content, http.StatusBadRequest) |
||||
uploadFile(t, "test.tar.gz", content, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
downloadFile := func(filename string) { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/files/%s/%s/%s", root, packageName, packageVersion, filename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, []byte(content), resp.Body.Bytes()) |
||||
} |
||||
|
||||
downloadFile("test.whl") |
||||
downloadFile("test.tar.gz") |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypePyPI) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(2), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("PackageMetadata", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/simple/%s", root, packageName)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
htmlDoc := NewHTMLParser(t, resp.Body) |
||||
nodes := htmlDoc.doc.Find("a").Nodes |
||||
assert.Len(t, nodes, 2) |
||||
|
||||
hrefMatcher := regexp.MustCompile(fmt.Sprintf(`%s/files/%s/%s/test\..+#sha256-%s`, root, packageName, packageVersion, hashSHA256)) |
||||
|
||||
for _, a := range nodes { |
||||
for _, att := range a.Attr { |
||||
switch att.Key { |
||||
case "href": |
||||
assert.Regexp(t, hrefMatcher, att.Val) |
||||
case "data-requires-python": |
||||
assert.Equal(t, "3.6", att.Val) |
||||
default: |
||||
t.Fail() |
||||
} |
||||
} |
||||
} |
||||
}) |
||||
} |
@ -0,0 +1,226 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"bytes" |
||||
"encoding/base64" |
||||
"fmt" |
||||
"mime/multipart" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
"code.gitea.io/gitea/modules/packages/rubygems" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageRubyGems(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}).(*user_model.User) |
||||
|
||||
packageName := "gitea" |
||||
packageVersion := "1.0.5" |
||||
packageFilename := "gitea-1.0.5.gem" |
||||
|
||||
gemContent, _ := base64.StdEncoding.DecodeString(`bWV0YWRhdGEuZ3oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAwMDA0NDQAMDAwMDAw |
||||
MAAwMDAwMDAwADAwMDAwMDAxMDQxADE0MTEwNzcyMzY2ADAxMzQ0MQAgMAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB1c3RhcgAwMHdoZWVsAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAd2hlZWwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMDAwMDAwADAwMDAw |
||||
MDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAf |
||||
iwgA9vQjYQID1VVNb9QwEL37V5he9pRsmlJAFlQckCoOXAriQIUix5nNmsYf2JOqKwS/nYmz2d3Q |
||||
qqCCKpFdadfjmfdm5nmcLMv4k9DXm6Wrv4BCcQ5GiPcelF5pJVE7y6w0IHirESS7hhDJJu4I+jhu |
||||
Mc53Tsd5kZ8y30lcuWAEH2KY7HHtQhQs4+cJkwwuwNdeB6JhtbaNDoLTL1MQsFJrqQnr8jNrJJJH |
||||
WZTHWfEiK094UYj0zYvp4Z9YAx5sA1ZpSCS3M30zeWwo2bG60FvUBjIKJts2GwMW76r0Yr9NzjN3 |
||||
YhwsGX2Ozl4dpcWwvK9d43PQtDIv9igvHwSyIIwFmXHjqTqxLY8MPkCADmQk80p2EfZ6VbM6/ue6 |
||||
/1D0Bq7/qeA/zh6W82leHmhFWUHn/JbsEfT6q7QbiCpoj8l0QcEUFLmX6kq2wBEiMjBSd+Pwt7T5 |
||||
Ot0kuXYMbkD1KOuOBnWYb7hBsAP4bhlkFRqnqpWefMZ/pHCn6+WIFGq2dgY8EQq+RvRRLJcTyZJ1 |
||||
WhHqGPTu7QdmACXdJFLwb9+ZdxErbSPKrqsMxJhAWCJ1qaqRdtu6yktcT/STsamG0qp7rsa5EL/K |
||||
MBua30uw4ynzExqYWRJDfx8/kQWN3PwsDh2jYLr1W+pZcAmCs9splvnz/Flesqhbq21bXcGG/OLh |
||||
+2fv/JTF3hgZyCW9OaZjxoZjdnBGfgKpxZyJ1QYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAZGF0 |
||||
YS50YXIuZ3oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAwMDA0NDQAMDAwMDAwMAAw |
||||
MDAwMDAwADAwMDAwMDAwMjQyADE0MTEwNzcyMzY2ADAxMzM2MQAgMAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB1c3RhcgAwMHdoZWVsAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAd2hlZWwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMDAwMDAwADAwMDAwMDAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfiwgA |
||||
9vQjYQID7M/NCsMgDABgz32KrA/QxersK/Q17ExXIcyhlr7+HLv1sJ02KPhBCPk5JOyn881nsl2c |
||||
xI+gRDRaC3zbZ8RBCamlxGHolTFlX11kLwDFH6wp21hO2RYi/rD3bb5/7iCubFOCMbBtABzNkIjn |
||||
bvGlAnisOUE7EnOALUR2p7b06e6aV4iqqqrquJ4AAAD//wMA+sA/NQAIAAAAAAAAAAAAAAAAAAAA
|
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGNoZWNr |
||||
c3Vtcy55YW1sLmd6AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwMDAwNDQ0ADAwMDAwMDAAMDAw |
||||
MDAwMAAwMDAwMDAwMDQ1MAAxNDExMDc3MjM2NgAwMTQ2MTIAIDAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdXN0YXIAMDB3aGVlbAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAHdoZWVsAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDAwMDAwMAAwMDAwMDAwAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAH4sIAPb0 |
||||
I2ECA2WQOa4UQAxE8znFXGCQ21vbPyMj5wRuL0Qk6EecnmZCyKyy9FSvXq/X4/u3ryj68Xg+f/Zn |
||||
VHzGlx+/P57qvU4XxWalBKftSXOgCjNYkdRycrC5Axem+W4HqS12PNEv7836jF9vnlHxwSyxKY+y |
||||
go0cPblyHzkrZ4HF1GSVhe7mOOoasXNk2fnbUxb+19Pp9tobD/QlJKMX7y204PREh6nQ5hG9Alw6 |
||||
x4TnmtA+aekGfm6wAseog2LSgpR4Q7cYnAH3K4qAQa6A6JCC1gpuY7P+9YxE5SZ+j0eVGbaBTwBQ |
||||
iIqRUyyzLCoFCBdYNWxniapTavD97blXTzFvgoVoAsKBAtlU48cdaOmeZDpwV01OtcGwjscfeUrY |
||||
B9QBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA |
||||
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA`) |
||||
|
||||
root := fmt.Sprintf("/api/packages/%s/rubygems", user.Name) |
||||
|
||||
uploadFile := func(t *testing.T, expectedStatus int) { |
||||
req := NewRequestWithBody(t, "POST", fmt.Sprintf("%s/api/v1/gems", root), bytes.NewReader(gemContent)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, expectedStatus) |
||||
} |
||||
|
||||
t.Run("Upload", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadFile(t, http.StatusCreated) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeRubyGems) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
|
||||
pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0]) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, pd.SemVer) |
||||
assert.IsType(t, &rubygems.Metadata{}, pd.Metadata) |
||||
assert.Equal(t, packageName, pd.Package.Name) |
||||
assert.Equal(t, packageVersion, pd.Version.Version) |
||||
|
||||
pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pfs, 1) |
||||
assert.Equal(t, packageFilename, pfs[0].Name) |
||||
assert.True(t, pfs[0].IsLead) |
||||
|
||||
pb, err := packages.GetBlobByID(db.DefaultContext, pfs[0].BlobID) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, int64(4608), pb.Size) |
||||
}) |
||||
|
||||
t.Run("UploadExists", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
uploadFile(t, http.StatusBadRequest) |
||||
}) |
||||
|
||||
t.Run("Download", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/gems/%s", root, packageFilename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, gemContent, resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeRubyGems) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("DownloadGemspec", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/quick/Marshal.4.8/%sspec.rz", root, packageFilename)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
b, _ := base64.StdEncoding.DecodeString(`eJxi4Si1EndPzbWyCi5ITc5My0xOLMnMz2M8zMIRLeGpxGWsZ6RnzGbF5hqSyempxJWeWZKayGbN |
||||
EBJqJQjWFZZaVJyZnxfN5qnEZahnoGcKkjTwVBJyB6lUKEhMzk5MTwULGngqcRaVJlWCONEMBp5K |
||||
DGAWSKc7zFhPJamg0qRK99TcYphehZLU4hKInFhGSUlBsZW+PtgZepn5+iDxECRzDUDGcfh6hoA4 |
||||
gAAAAP//MS06Gw==`)
|
||||
assert.Equal(t, b, resp.Body.Bytes()) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeRubyGems) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pvs, 1) |
||||
assert.Equal(t, int64(1), pvs[0].DownloadCount) |
||||
}) |
||||
|
||||
t.Run("EnumeratePackages", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
enumeratePackages := func(t *testing.T, endpoint string, expectedContent []byte) { |
||||
req := NewRequest(t, "GET", fmt.Sprintf("%s/%s", root, endpoint)) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
assert.Equal(t, expectedContent, resp.Body.Bytes()) |
||||
} |
||||
|
||||
b, _ := base64.StdEncoding.DecodeString(`H4sICAAAAAAA/3NwZWNzLjQuOABi4Yhmi+bwVOJKzyxJTWSzYnMNCbUSdE/NtbIKSy0qzszPi2bzVOIy1DPQM2WzZgjxVOIsKk2qBDEBAQAA///xOEYKOwAAAA==`) |
||||
enumeratePackages(t, "specs.4.8.gz", b) |
||||
b, _ = base64.StdEncoding.DecodeString(`H4sICAAAAAAA/2xhdGVzdF9zcGVjcy40LjgAYuGIZovm8FTiSs8sSU1ks2JzDQm1EnRPzbWyCkstKs7Mz4tm81TiMtQz0DNls2YI8VTiLCpNqgQxAQEAAP//8ThGCjsAAAA=`) |
||||
enumeratePackages(t, "latest_specs.4.8.gz", b) |
||||
b, _ = base64.StdEncoding.DecodeString(`H4sICAAAAAAA/3ByZXJlbGVhc2Vfc3BlY3MuNC44AGLhiGYABAAA//9snXr5BAAAAA==`) |
||||
enumeratePackages(t, "prerelease_specs.4.8.gz", b) |
||||
}) |
||||
|
||||
t.Run("Delete", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
body := bytes.Buffer{} |
||||
writer := multipart.NewWriter(&body) |
||||
writer.WriteField("gem_name", packageName) |
||||
writer.WriteField("version", packageVersion) |
||||
writer.Close() |
||||
|
||||
req := NewRequestWithBody(t, "DELETE", fmt.Sprintf("%s/api/v1/gems/yank", root), &body) |
||||
req.Header.Add("Content-Type", writer.FormDataContentType()) |
||||
req = AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusOK) |
||||
|
||||
pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeRubyGems) |
||||
assert.NoError(t, err) |
||||
assert.Empty(t, pvs) |
||||
}) |
||||
} |
@ -0,0 +1,102 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package integrations |
||||
|
||||
import ( |
||||
"bytes" |
||||
"fmt" |
||||
"net/http" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/unittest" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
api "code.gitea.io/gitea/modules/structs" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestPackageAPI(t *testing.T) { |
||||
defer prepareTestEnv(t)() |
||||
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}).(*user_model.User) |
||||
session := loginUser(t, user.Name) |
||||
token := getTokenForLoggedInUser(t, session) |
||||
|
||||
packageName := "test-package" |
||||
packageVersion := "1.0.3" |
||||
filename := "file.bin" |
||||
|
||||
url := fmt.Sprintf("/api/packages/%s/generic/%s/%s/%s", user.Name, packageName, packageVersion, filename) |
||||
req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{})) |
||||
AddBasicAuthHeader(req, user.Name) |
||||
MakeRequest(t, req, http.StatusCreated) |
||||
|
||||
t.Run("ListPackages", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s?token=%s", user.Name, token)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var apiPackages []*api.Package |
||||
DecodeJSON(t, resp, &apiPackages) |
||||
|
||||
assert.Len(t, apiPackages, 1) |
||||
assert.Equal(t, string(packages.TypeGeneric), apiPackages[0].Type) |
||||
assert.Equal(t, packageName, apiPackages[0].Name) |
||||
assert.Equal(t, packageVersion, apiPackages[0].Version) |
||||
assert.NotNil(t, apiPackages[0].Creator) |
||||
assert.Equal(t, user.Name, apiPackages[0].Creator.UserName) |
||||
}) |
||||
|
||||
t.Run("GetPackage", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s?token=%s", user.Name, packageName, packageVersion, token)) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s?token=%s", user.Name, packageName, packageVersion, token)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var p *api.Package |
||||
DecodeJSON(t, resp, &p) |
||||
|
||||
assert.Equal(t, string(packages.TypeGeneric), p.Type) |
||||
assert.Equal(t, packageName, p.Name) |
||||
assert.Equal(t, packageVersion, p.Version) |
||||
assert.NotNil(t, p.Creator) |
||||
assert.Equal(t, user.Name, p.Creator.UserName) |
||||
}) |
||||
|
||||
t.Run("ListPackageFiles", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s/files?token=%s", user.Name, packageName, packageVersion, token)) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s/files?token=%s", user.Name, packageName, packageVersion, token)) |
||||
resp := MakeRequest(t, req, http.StatusOK) |
||||
|
||||
var files []*api.PackageFile |
||||
DecodeJSON(t, resp, &files) |
||||
|
||||
assert.Len(t, files, 1) |
||||
assert.Equal(t, int64(0), files[0].Size) |
||||
assert.Equal(t, filename, files[0].Name) |
||||
assert.Equal(t, "d41d8cd98f00b204e9800998ecf8427e", files[0].HashMD5) |
||||
assert.Equal(t, "da39a3ee5e6b4b0d3255bfef95601890afd80709", files[0].HashSHA1) |
||||
assert.Equal(t, "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", files[0].HashSHA256) |
||||
assert.Equal(t, "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e", files[0].HashSHA512) |
||||
}) |
||||
|
||||
t.Run("DeletePackage", func(t *testing.T) { |
||||
defer PrintCurrentTest(t)() |
||||
|
||||
req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s?token=%s", user.Name, packageName, packageVersion, token)) |
||||
MakeRequest(t, req, http.StatusNotFound) |
||||
|
||||
req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s?token=%s", user.Name, packageName, packageVersion, token)) |
||||
MakeRequest(t, req, http.StatusNoContent) |
||||
}) |
||||
} |
@ -0,0 +1,94 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package migrations |
||||
|
||||
import ( |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
|
||||
"xorm.io/xorm" |
||||
) |
||||
|
||||
func addPackageTables(x *xorm.Engine) error { |
||||
type Package struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
OwnerID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
RepoID int64 `xorm:"INDEX"` |
||||
Type string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
Name string `xorm:"NOT NULL"` |
||||
LowerName string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
SemverCompatible bool `xorm:"NOT NULL DEFAULT false"` |
||||
} |
||||
|
||||
if err := x.Sync2(new(Package)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
type PackageVersion struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
PackageID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CreatorID int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
Version string `xorm:"NOT NULL"` |
||||
LowerVersion string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
IsInternal bool `xorm:"INDEX NOT NULL DEFAULT false"` |
||||
MetadataJSON string `xorm:"metadata_json TEXT"` |
||||
DownloadCount int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
} |
||||
|
||||
if err := x.Sync2(new(PackageVersion)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
type PackageProperty struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
RefType int64 `xorm:"INDEX NOT NULL"` |
||||
RefID int64 `xorm:"INDEX NOT NULL"` |
||||
Name string `xorm:"INDEX NOT NULL"` |
||||
Value string `xorm:"TEXT NOT NULL"` |
||||
} |
||||
|
||||
if err := x.Sync2(new(PackageProperty)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
type PackageFile struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
VersionID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
BlobID int64 `xorm:"INDEX NOT NULL"` |
||||
Name string `xorm:"NOT NULL"` |
||||
LowerName string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CompositeKey string `xorm:"UNIQUE(s) INDEX"` |
||||
IsLead bool `xorm:"NOT NULL DEFAULT false"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
} |
||||
|
||||
if err := x.Sync2(new(PackageFile)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
type PackageBlob struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
Size int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
HashMD5 string `xorm:"hash_md5 char(32) UNIQUE(md5) INDEX NOT NULL"` |
||||
HashSHA1 string `xorm:"hash_sha1 char(40) UNIQUE(sha1) INDEX NOT NULL"` |
||||
HashSHA256 string `xorm:"hash_sha256 char(64) UNIQUE(sha256) INDEX NOT NULL"` |
||||
HashSHA512 string `xorm:"hash_sha512 char(128) UNIQUE(sha512) INDEX NOT NULL"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
} |
||||
|
||||
if err := x.Sync2(new(PackageBlob)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
type PackageBlobUpload struct { |
||||
ID string `xorm:"pk"` |
||||
BytesReceived int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
HashStateBytes []byte `xorm:"BLOB"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created NOT NULL"` |
||||
UpdatedUnix timeutil.TimeStamp `xorm:"updated INDEX NOT NULL"` |
||||
} |
||||
|
||||
return x.Sync2(new(PackageBlobUpload)) |
||||
} |
@ -0,0 +1,171 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"strconv" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
conan_module "code.gitea.io/gitea/modules/packages/conan" |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
var ( |
||||
ErrRecipeReferenceNotExist = errors.New("Recipe reference does not exist") |
||||
ErrPackageReferenceNotExist = errors.New("Package reference does not exist") |
||||
) |
||||
|
||||
// RecipeExists checks if a recipe exists
|
||||
func RecipeExists(ctx context.Context, ownerID int64, ref *conan_module.RecipeReference) (bool, error) { |
||||
revisions, err := GetRecipeRevisions(ctx, ownerID, ref) |
||||
if err != nil { |
||||
return false, err |
||||
} |
||||
|
||||
return len(revisions) != 0, nil |
||||
} |
||||
|
||||
type PropertyValue struct { |
||||
Value string |
||||
CreatedUnix timeutil.TimeStamp |
||||
} |
||||
|
||||
func findPropertyValues(ctx context.Context, propertyName string, ownerID int64, name, version string, propertyFilter map[string]string) ([]*PropertyValue, error) { |
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": packages.PropertyTypeFile, |
||||
} |
||||
propsCond = propsCond.And(builder.Expr("package_property.ref_id = package_file.id")) |
||||
|
||||
propsCondBlock := builder.NewCond() |
||||
for name, value := range propertyFilter { |
||||
propsCondBlock = propsCondBlock.Or(builder.Eq{ |
||||
"package_property.name": name, |
||||
"package_property.value": value, |
||||
}) |
||||
} |
||||
propsCond = propsCond.And(propsCondBlock) |
||||
|
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.type": packages.TypeConan, |
||||
"package.owner_id": ownerID, |
||||
"package.lower_name": strings.ToLower(name), |
||||
"package_version.lower_version": strings.ToLower(version), |
||||
"package_version.is_internal": false, |
||||
strconv.Itoa(len(propertyFilter)): builder.Select("COUNT(*)").Where(propsCond).From("package_property"), |
||||
} |
||||
|
||||
in2 := builder. |
||||
Select("package_file.id"). |
||||
From("package_file"). |
||||
Join("INNER", "package_version", "package_version.id = package_file.version_id"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond) |
||||
|
||||
query := builder. |
||||
Select("package_property.value, MAX(package_file.created_unix) AS created_unix"). |
||||
From("package_property"). |
||||
Join("INNER", "package_file", "package_file.id = package_property.ref_id"). |
||||
Where(builder.Eq{"package_property.name": propertyName}.And(builder.In("package_property.ref_id", in2))). |
||||
GroupBy("package_property.value"). |
||||
OrderBy("created_unix DESC") |
||||
|
||||
var values []*PropertyValue |
||||
return values, db.GetEngine(ctx).SQL(query).Find(&values) |
||||
} |
||||
|
||||
// GetRecipeRevisions gets all revisions of a recipe
|
||||
func GetRecipeRevisions(ctx context.Context, ownerID int64, ref *conan_module.RecipeReference) ([]*PropertyValue, error) { |
||||
values, err := findPropertyValues( |
||||
ctx, |
||||
conan_module.PropertyRecipeRevision, |
||||
ownerID, |
||||
ref.Name, |
||||
ref.Version, |
||||
map[string]string{ |
||||
conan_module.PropertyRecipeUser: ref.User, |
||||
conan_module.PropertyRecipeChannel: ref.Channel, |
||||
}, |
||||
) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
return values, nil |
||||
} |
||||
|
||||
// GetLastRecipeRevision gets the latest recipe revision
|
||||
func GetLastRecipeRevision(ctx context.Context, ownerID int64, ref *conan_module.RecipeReference) (*PropertyValue, error) { |
||||
revisions, err := GetRecipeRevisions(ctx, ownerID, ref) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if len(revisions) == 0 { |
||||
return nil, ErrRecipeReferenceNotExist |
||||
} |
||||
return revisions[0], nil |
||||
} |
||||
|
||||
// GetPackageReferences gets all package references of a recipe
|
||||
func GetPackageReferences(ctx context.Context, ownerID int64, ref *conan_module.RecipeReference) ([]*PropertyValue, error) { |
||||
values, err := findPropertyValues( |
||||
ctx, |
||||
conan_module.PropertyPackageReference, |
||||
ownerID, |
||||
ref.Name, |
||||
ref.Version, |
||||
map[string]string{ |
||||
conan_module.PropertyRecipeUser: ref.User, |
||||
conan_module.PropertyRecipeChannel: ref.Channel, |
||||
conan_module.PropertyRecipeRevision: ref.Revision, |
||||
}, |
||||
) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
return values, nil |
||||
} |
||||
|
||||
// GetPackageRevisions gets all revision of a package
|
||||
func GetPackageRevisions(ctx context.Context, ownerID int64, ref *conan_module.PackageReference) ([]*PropertyValue, error) { |
||||
values, err := findPropertyValues( |
||||
ctx, |
||||
conan_module.PropertyPackageRevision, |
||||
ownerID, |
||||
ref.Recipe.Name, |
||||
ref.Recipe.Version, |
||||
map[string]string{ |
||||
conan_module.PropertyRecipeUser: ref.Recipe.User, |
||||
conan_module.PropertyRecipeChannel: ref.Recipe.Channel, |
||||
conan_module.PropertyRecipeRevision: ref.Recipe.Revision, |
||||
conan_module.PropertyPackageReference: ref.Reference, |
||||
}, |
||||
) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
return values, nil |
||||
} |
||||
|
||||
// GetLastPackageRevision gets the latest package revision
|
||||
func GetLastPackageRevision(ctx context.Context, ownerID int64, ref *conan_module.PackageReference) (*PropertyValue, error) { |
||||
revisions, err := GetPackageRevisions(ctx, ownerID, ref) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if len(revisions) == 0 { |
||||
return nil, ErrPackageReferenceNotExist |
||||
} |
||||
return revisions[0], nil |
||||
} |
@ -0,0 +1,149 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"context" |
||||
"fmt" |
||||
"strconv" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
conan_module "code.gitea.io/gitea/modules/packages/conan" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
// buildCondition creates a Like condition if a wildcard is present. Otherwise Eq is used.
|
||||
func buildCondition(name, value string) builder.Cond { |
||||
if strings.Contains(value, "*") { |
||||
return builder.Like{name, strings.ReplaceAll(strings.ReplaceAll(value, "_", "\\_"), "*", "%")} |
||||
} |
||||
return builder.Eq{name: value} |
||||
} |
||||
|
||||
type RecipeSearchOptions struct { |
||||
OwnerID int64 |
||||
Name string |
||||
Version string |
||||
User string |
||||
Channel string |
||||
} |
||||
|
||||
// SearchRecipes gets all recipes matching the search options
|
||||
func SearchRecipes(ctx context.Context, opts *RecipeSearchOptions) ([]string, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package_file.is_lead": true, |
||||
"package.type": packages.TypeConan, |
||||
"package.owner_id": opts.OwnerID, |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
if opts.Name != "" { |
||||
cond = cond.And(buildCondition("package.lower_name", strings.ToLower(opts.Name))) |
||||
} |
||||
if opts.Version != "" { |
||||
cond = cond.And(buildCondition("package_version.lower_version", strings.ToLower(opts.Version))) |
||||
} |
||||
if opts.User != "" || opts.Channel != "" { |
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": packages.PropertyTypeFile, |
||||
} |
||||
propsCond = propsCond.And(builder.Expr("package_property.ref_id = package_file.id")) |
||||
|
||||
count := 0 |
||||
propsCondBlock := builder.NewCond() |
||||
if opts.User != "" { |
||||
count++ |
||||
propsCondBlock = propsCondBlock.Or(builder.Eq{"package_property.name": conan_module.PropertyRecipeUser}.And(buildCondition("package_property.value", opts.User))) |
||||
} |
||||
if opts.Channel != "" { |
||||
count++ |
||||
propsCondBlock = propsCondBlock.Or(builder.Eq{"package_property.name": conan_module.PropertyRecipeChannel}.And(buildCondition("package_property.value", opts.Channel))) |
||||
} |
||||
propsCond = propsCond.And(propsCondBlock) |
||||
|
||||
cond = cond.And(builder.Eq{ |
||||
strconv.Itoa(count): builder.Select("COUNT(*)").Where(propsCond).From("package_property"), |
||||
}) |
||||
} |
||||
|
||||
query := builder. |
||||
Select("package.name, package_version.version, package_file.id"). |
||||
From("package_file"). |
||||
Join("INNER", "package_version", "package_version.id = package_file.version_id"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond) |
||||
|
||||
results := make([]struct { |
||||
Name string |
||||
Version string |
||||
ID int64 |
||||
}, 0, 5) |
||||
err := db.GetEngine(ctx).SQL(query).Find(&results) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
unique := make(map[string]bool) |
||||
for _, info := range results { |
||||
recipe := fmt.Sprintf("%s/%s", info.Name, info.Version) |
||||
|
||||
props, _ := packages.GetProperties(ctx, packages.PropertyTypeFile, info.ID) |
||||
if len(props) > 0 { |
||||
var ( |
||||
user = "" |
||||
channel = "" |
||||
) |
||||
for _, prop := range props { |
||||
if prop.Name == conan_module.PropertyRecipeUser { |
||||
user = prop.Value |
||||
} |
||||
if prop.Name == conan_module.PropertyRecipeChannel { |
||||
channel = prop.Value |
||||
} |
||||
} |
||||
if user != "" && channel != "" { |
||||
recipe = fmt.Sprintf("%s@%s/%s", recipe, user, channel) |
||||
} |
||||
} |
||||
|
||||
unique[recipe] = true |
||||
} |
||||
|
||||
recipes := make([]string, 0, len(unique)) |
||||
for recipe := range unique { |
||||
recipes = append(recipes, recipe) |
||||
} |
||||
return recipes, nil |
||||
} |
||||
|
||||
// GetPackageInfo gets the Conaninfo for a package
|
||||
func GetPackageInfo(ctx context.Context, ownerID int64, ref *conan_module.PackageReference) (string, error) { |
||||
values, err := findPropertyValues( |
||||
ctx, |
||||
conan_module.PropertyPackageInfo, |
||||
ownerID, |
||||
ref.Recipe.Name, |
||||
ref.Recipe.Version, |
||||
map[string]string{ |
||||
conan_module.PropertyRecipeUser: ref.Recipe.User, |
||||
conan_module.PropertyRecipeChannel: ref.Recipe.Channel, |
||||
conan_module.PropertyRecipeRevision: ref.Recipe.Revision, |
||||
conan_module.PropertyPackageReference: ref.Reference, |
||||
conan_module.PropertyPackageRevision: ref.Revision, |
||||
}, |
||||
) |
||||
if err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
if len(values) == 0 { |
||||
return "", ErrPackageReferenceNotExist |
||||
} |
||||
|
||||
return values[0].Value, nil |
||||
} |
@ -0,0 +1,10 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package container |
||||
|
||||
const ( |
||||
ManifestFilename = "manifest.json" |
||||
UploadVersion = "_upload" |
||||
) |
@ -0,0 +1,227 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package container |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"strings" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/models/packages" |
||||
container_module "code.gitea.io/gitea/modules/packages/container" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
var ErrContainerBlobNotExist = errors.New("Container blob does not exist") |
||||
|
||||
type BlobSearchOptions struct { |
||||
OwnerID int64 |
||||
Image string |
||||
Digest string |
||||
Tag string |
||||
IsManifest bool |
||||
} |
||||
|
||||
func (opts *BlobSearchOptions) toConds() builder.Cond { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.type": packages.TypeContainer, |
||||
} |
||||
|
||||
if opts.OwnerID != 0 { |
||||
cond = cond.And(builder.Eq{"package.owner_id": opts.OwnerID}) |
||||
} |
||||
if opts.Image != "" { |
||||
cond = cond.And(builder.Eq{"package.lower_name": strings.ToLower(opts.Image)}) |
||||
} |
||||
if opts.Tag != "" { |
||||
cond = cond.And(builder.Eq{"package_version.lower_version": strings.ToLower(opts.Tag)}) |
||||
} |
||||
if opts.IsManifest { |
||||
cond = cond.And(builder.Eq{"package_file.lower_name": ManifestFilename}) |
||||
} |
||||
if opts.Digest != "" { |
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": packages.PropertyTypeFile, |
||||
"package_property.name": container_module.PropertyDigest, |
||||
"package_property.value": opts.Digest, |
||||
} |
||||
|
||||
cond = cond.And(builder.In("package_file.id", builder.Select("package_property.ref_id").Where(propsCond).From("package_property"))) |
||||
} |
||||
|
||||
return cond |
||||
} |
||||
|
||||
// GetContainerBlob gets the container blob matching the blob search options
|
||||
// If multiple matching blobs are found (manifests with the same digest) the first (according to the database) is selected.
|
||||
func GetContainerBlob(ctx context.Context, opts *BlobSearchOptions) (*packages.PackageFileDescriptor, error) { |
||||
pfds, err := getContainerBlobsLimit(ctx, opts, 1) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if len(pfds) != 1 { |
||||
return nil, ErrContainerBlobNotExist |
||||
} |
||||
|
||||
return pfds[0], nil |
||||
} |
||||
|
||||
// GetContainerBlobs gets the container blobs matching the blob search options
|
||||
func GetContainerBlobs(ctx context.Context, opts *BlobSearchOptions) ([]*packages.PackageFileDescriptor, error) { |
||||
return getContainerBlobsLimit(ctx, opts, 0) |
||||
} |
||||
|
||||
func getContainerBlobsLimit(ctx context.Context, opts *BlobSearchOptions, limit int) ([]*packages.PackageFileDescriptor, error) { |
||||
pfs := make([]*packages.PackageFile, 0, limit) |
||||
sess := db.GetEngine(ctx). |
||||
Join("INNER", "package_version", "package_version.id = package_file.version_id"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(opts.toConds()) |
||||
|
||||
if limit > 0 { |
||||
sess = sess.Limit(limit) |
||||
} |
||||
|
||||
if err := sess.Find(&pfs); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
pfds := make([]*packages.PackageFileDescriptor, 0, len(pfs)) |
||||
for _, pf := range pfs { |
||||
pfd, err := packages.GetPackageFileDescriptor(ctx, pf) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
pfds = append(pfds, pfd) |
||||
} |
||||
|
||||
return pfds, nil |
||||
} |
||||
|
||||
// GetManifestVersions gets all package versions representing the matching manifest
|
||||
func GetManifestVersions(ctx context.Context, opts *BlobSearchOptions) ([]*packages.PackageVersion, error) { |
||||
cond := opts.toConds().And(builder.Eq{"package_version.is_internal": false}) |
||||
|
||||
pvs := make([]*packages.PackageVersion, 0, 10) |
||||
return pvs, db.GetEngine(ctx). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Join("INNER", "package_file", "package_file.version_id = package_version.id"). |
||||
Where(cond). |
||||
Find(&pvs) |
||||
} |
||||
|
||||
// GetImageTags gets a sorted list of the tags of an image
|
||||
// The result is suitable for the api call.
|
||||
func GetImageTags(ctx context.Context, ownerID int64, image string, n int, last string) ([]string, error) { |
||||
// Short circuit: n == 0 should return an empty list
|
||||
if n == 0 { |
||||
return []string{}, nil |
||||
} |
||||
|
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.type": packages.TypeContainer, |
||||
"package.owner_id": ownerID, |
||||
"package.lower_name": strings.ToLower(image), |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": packages.PropertyTypeVersion, |
||||
"package_property.name": container_module.PropertyManifestTagged, |
||||
} |
||||
|
||||
cond = cond.And(builder.In("package_version.id", builder.Select("package_property.ref_id").Where(propsCond).From("package_property"))) |
||||
|
||||
if last != "" { |
||||
cond = cond.And(builder.Gt{"package_version.lower_version": strings.ToLower(last)}) |
||||
} |
||||
|
||||
sess := db.GetEngine(ctx). |
||||
Table("package_version"). |
||||
Select("package_version.lower_version"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond). |
||||
Asc("package_version.lower_version") |
||||
|
||||
var tags []string |
||||
if n > 0 { |
||||
sess = sess.Limit(n) |
||||
|
||||
tags = make([]string, 0, n) |
||||
} else { |
||||
tags = make([]string, 0, 10) |
||||
} |
||||
|
||||
return tags, sess.Find(&tags) |
||||
} |
||||
|
||||
type ImageTagsSearchOptions struct { |
||||
PackageID int64 |
||||
Query string |
||||
IsTagged bool |
||||
db.Paginator |
||||
} |
||||
|
||||
func (opts *ImageTagsSearchOptions) toConds() builder.Cond { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.type": packages.TypeContainer, |
||||
"package.id": opts.PackageID, |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
if opts.Query != "" { |
||||
cond = cond.And(builder.Like{"package_version.lower_version", strings.ToLower(opts.Query)}) |
||||
} |
||||
|
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": packages.PropertyTypeVersion, |
||||
"package_property.name": container_module.PropertyManifestTagged, |
||||
} |
||||
|
||||
in := builder.In("package_version.id", builder.Select("package_property.ref_id").Where(propsCond).From("package_property")) |
||||
|
||||
if opts.IsTagged { |
||||
cond = cond.And(in) |
||||
} else { |
||||
cond = cond.And(builder.Not{in}) |
||||
} |
||||
|
||||
return cond |
||||
} |
||||
|
||||
// SearchImageTags gets a sorted list of the tags of an image
|
||||
func SearchImageTags(ctx context.Context, opts *ImageTagsSearchOptions) ([]*packages.PackageVersion, int64, error) { |
||||
sess := db.GetEngine(ctx). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(opts.toConds()). |
||||
Desc("package_version.created_unix") |
||||
|
||||
if opts.Paginator != nil { |
||||
sess = db.SetSessionPagination(sess, opts) |
||||
} |
||||
|
||||
pvs := make([]*packages.PackageVersion, 0, 10) |
||||
count, err := sess.FindAndCount(&pvs) |
||||
return pvs, count, err |
||||
} |
||||
|
||||
func SearchExpiredUploadedBlobs(ctx context.Context, olderThan time.Duration) ([]*packages.PackageFile, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package_version.is_internal": true, |
||||
"package_version.lower_version": UploadVersion, |
||||
"package.type": packages.TypeContainer, |
||||
} |
||||
cond = cond.And(builder.Lt{"package_file.created_unix": time.Now().Add(-olderThan).Unix()}) |
||||
|
||||
var pfs []*packages.PackageFile |
||||
return pfs, db.GetEngine(ctx). |
||||
Join("INNER", "package_version", "package_version.id = package_file.version_id"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond). |
||||
Find(&pfs) |
||||
} |
@ -0,0 +1,192 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"fmt" |
||||
"net/url" |
||||
|
||||
repo_model "code.gitea.io/gitea/models/repo" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
"code.gitea.io/gitea/modules/json" |
||||
"code.gitea.io/gitea/modules/packages/composer" |
||||
"code.gitea.io/gitea/modules/packages/conan" |
||||
"code.gitea.io/gitea/modules/packages/container" |
||||
"code.gitea.io/gitea/modules/packages/maven" |
||||
"code.gitea.io/gitea/modules/packages/npm" |
||||
"code.gitea.io/gitea/modules/packages/nuget" |
||||
"code.gitea.io/gitea/modules/packages/pypi" |
||||
"code.gitea.io/gitea/modules/packages/rubygems" |
||||
|
||||
"github.com/hashicorp/go-version" |
||||
) |
||||
|
||||
// PackagePropertyList is a list of package properties
|
||||
type PackagePropertyList []*PackageProperty |
||||
|
||||
// GetByName gets the first property value with the specific name
|
||||
func (l PackagePropertyList) GetByName(name string) string { |
||||
for _, pp := range l { |
||||
if pp.Name == name { |
||||
return pp.Value |
||||
} |
||||
} |
||||
return "" |
||||
} |
||||
|
||||
// PackageDescriptor describes a package
|
||||
type PackageDescriptor struct { |
||||
Package *Package |
||||
Owner *user_model.User |
||||
Repository *repo_model.Repository |
||||
Version *PackageVersion |
||||
SemVer *version.Version |
||||
Creator *user_model.User |
||||
Properties PackagePropertyList |
||||
Metadata interface{} |
||||
Files []*PackageFileDescriptor |
||||
} |
||||
|
||||
// PackageFileDescriptor describes a package file
|
||||
type PackageFileDescriptor struct { |
||||
File *PackageFile |
||||
Blob *PackageBlob |
||||
Properties PackagePropertyList |
||||
} |
||||
|
||||
// PackageWebLink returns the package web link
|
||||
func (pd *PackageDescriptor) PackageWebLink() string { |
||||
return fmt.Sprintf("%s/-/packages/%s/%s", pd.Owner.HTMLURL(), string(pd.Package.Type), url.PathEscape(pd.Package.LowerName)) |
||||
} |
||||
|
||||
// FullWebLink returns the package version web link
|
||||
func (pd *PackageDescriptor) FullWebLink() string { |
||||
return fmt.Sprintf("%s/%s", pd.PackageWebLink(), url.PathEscape(pd.Version.LowerVersion)) |
||||
} |
||||
|
||||
// CalculateBlobSize returns the total blobs size in bytes
|
||||
func (pd *PackageDescriptor) CalculateBlobSize() int64 { |
||||
size := int64(0) |
||||
for _, f := range pd.Files { |
||||
size += f.Blob.Size |
||||
} |
||||
return size |
||||
} |
||||
|
||||
// GetPackageDescriptor gets the package description for a version
|
||||
func GetPackageDescriptor(ctx context.Context, pv *PackageVersion) (*PackageDescriptor, error) { |
||||
p, err := GetPackageByID(ctx, pv.PackageID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
o, err := user_model.GetUserByIDCtx(ctx, p.OwnerID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
repository, err := repo_model.GetRepositoryByIDCtx(ctx, p.RepoID) |
||||
if err != nil && !repo_model.IsErrRepoNotExist(err) { |
||||
return nil, err |
||||
} |
||||
creator, err := user_model.GetUserByIDCtx(ctx, pv.CreatorID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
var semVer *version.Version |
||||
if p.SemverCompatible { |
||||
semVer, err = version.NewVersion(pv.Version) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
} |
||||
pvps, err := GetProperties(ctx, PropertyTypeVersion, pv.ID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
pfs, err := GetFilesByVersionID(ctx, pv.ID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
pfds := make([]*PackageFileDescriptor, 0, len(pfs)) |
||||
for _, pf := range pfs { |
||||
pfd, err := GetPackageFileDescriptor(ctx, pf) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
pfds = append(pfds, pfd) |
||||
} |
||||
|
||||
var metadata interface{} |
||||
switch p.Type { |
||||
case TypeComposer: |
||||
metadata = &composer.Metadata{} |
||||
case TypeConan: |
||||
metadata = &conan.Metadata{} |
||||
case TypeContainer: |
||||
metadata = &container.Metadata{} |
||||
case TypeGeneric: |
||||
// generic packages have no metadata
|
||||
case TypeNuGet: |
||||
metadata = &nuget.Metadata{} |
||||
case TypeNpm: |
||||
metadata = &npm.Metadata{} |
||||
case TypeMaven: |
||||
metadata = &maven.Metadata{} |
||||
case TypePyPI: |
||||
metadata = &pypi.Metadata{} |
||||
case TypeRubyGems: |
||||
metadata = &rubygems.Metadata{} |
||||
default: |
||||
panic(fmt.Sprintf("unknown package type: %s", string(p.Type))) |
||||
} |
||||
if metadata != nil { |
||||
if err := json.Unmarshal([]byte(pv.MetadataJSON), &metadata); err != nil { |
||||
return nil, err |
||||
} |
||||
} |
||||
|
||||
return &PackageDescriptor{ |
||||
Package: p, |
||||
Owner: o, |
||||
Repository: repository, |
||||
Version: pv, |
||||
SemVer: semVer, |
||||
Creator: creator, |
||||
Properties: PackagePropertyList(pvps), |
||||
Metadata: metadata, |
||||
Files: pfds, |
||||
}, nil |
||||
} |
||||
|
||||
// GetPackageFileDescriptor gets a package file descriptor for a package file
|
||||
func GetPackageFileDescriptor(ctx context.Context, pf *PackageFile) (*PackageFileDescriptor, error) { |
||||
pb, err := GetBlobByID(ctx, pf.BlobID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
pfps, err := GetProperties(ctx, PropertyTypeFile, pf.ID) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
return &PackageFileDescriptor{ |
||||
pf, |
||||
pb, |
||||
PackagePropertyList(pfps), |
||||
}, nil |
||||
} |
||||
|
||||
// GetPackageDescriptors gets the package descriptions for the versions
|
||||
func GetPackageDescriptors(ctx context.Context, pvs []*PackageVersion) ([]*PackageDescriptor, error) { |
||||
pds := make([]*PackageDescriptor, 0, len(pvs)) |
||||
for _, pv := range pvs { |
||||
pd, err := GetPackageDescriptor(ctx, pv) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
pds = append(pds, pd) |
||||
} |
||||
return pds, nil |
||||
} |
@ -0,0 +1,213 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"fmt" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(Package)) |
||||
} |
||||
|
||||
var ( |
||||
// ErrDuplicatePackage indicates a duplicated package error
|
||||
ErrDuplicatePackage = errors.New("Package does exist already") |
||||
// ErrPackageNotExist indicates a package not exist error
|
||||
ErrPackageNotExist = errors.New("Package does not exist") |
||||
) |
||||
|
||||
// Type of a package
|
||||
type Type string |
||||
|
||||
// List of supported packages
|
||||
const ( |
||||
TypeComposer Type = "composer" |
||||
TypeConan Type = "conan" |
||||
TypeContainer Type = "container" |
||||
TypeGeneric Type = "generic" |
||||
TypeNuGet Type = "nuget" |
||||
TypeNpm Type = "npm" |
||||
TypeMaven Type = "maven" |
||||
TypePyPI Type = "pypi" |
||||
TypeRubyGems Type = "rubygems" |
||||
) |
||||
|
||||
// Name gets the name of the package type
|
||||
func (pt Type) Name() string { |
||||
switch pt { |
||||
case TypeComposer: |
||||
return "Composer" |
||||
case TypeConan: |
||||
return "Conan" |
||||
case TypeContainer: |
||||
return "Container" |
||||
case TypeGeneric: |
||||
return "Generic" |
||||
case TypeNuGet: |
||||
return "NuGet" |
||||
case TypeNpm: |
||||
return "npm" |
||||
case TypeMaven: |
||||
return "Maven" |
||||
case TypePyPI: |
||||
return "PyPI" |
||||
case TypeRubyGems: |
||||
return "RubyGems" |
||||
} |
||||
panic(fmt.Sprintf("unknown package type: %s", string(pt))) |
||||
} |
||||
|
||||
// SVGName gets the name of the package type svg image
|
||||
func (pt Type) SVGName() string { |
||||
switch pt { |
||||
case TypeComposer: |
||||
return "gitea-composer" |
||||
case TypeConan: |
||||
return "gitea-conan" |
||||
case TypeContainer: |
||||
return "octicon-container" |
||||
case TypeGeneric: |
||||
return "octicon-package" |
||||
case TypeNuGet: |
||||
return "gitea-nuget" |
||||
case TypeNpm: |
||||
return "gitea-npm" |
||||
case TypeMaven: |
||||
return "gitea-maven" |
||||
case TypePyPI: |
||||
return "gitea-python" |
||||
case TypeRubyGems: |
||||
return "gitea-rubygems" |
||||
} |
||||
panic(fmt.Sprintf("unknown package type: %s", string(pt))) |
||||
} |
||||
|
||||
// Package represents a package
|
||||
type Package struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
OwnerID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
RepoID int64 `xorm:"INDEX"` |
||||
Type Type `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
Name string `xorm:"NOT NULL"` |
||||
LowerName string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
SemverCompatible bool `xorm:"NOT NULL DEFAULT false"` |
||||
} |
||||
|
||||
// TryInsertPackage inserts a package. If a package exists already, ErrDuplicatePackage is returned
|
||||
func TryInsertPackage(ctx context.Context, p *Package) (*Package, error) { |
||||
e := db.GetEngine(ctx) |
||||
|
||||
key := &Package{ |
||||
OwnerID: p.OwnerID, |
||||
Type: p.Type, |
||||
LowerName: p.LowerName, |
||||
} |
||||
|
||||
has, err := e.Get(key) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if has { |
||||
return key, ErrDuplicatePackage |
||||
} |
||||
if _, err = e.Insert(p); err != nil { |
||||
return nil, err |
||||
} |
||||
return p, nil |
||||
} |
||||
|
||||
// SetRepositoryLink sets the linked repository
|
||||
func SetRepositoryLink(ctx context.Context, packageID, repoID int64) error { |
||||
_, err := db.GetEngine(ctx).ID(packageID).Cols("repo_id").Update(&Package{RepoID: repoID}) |
||||
return err |
||||
} |
||||
|
||||
// UnlinkRepositoryFromAllPackages unlinks every package from the repository
|
||||
func UnlinkRepositoryFromAllPackages(ctx context.Context, repoID int64) error { |
||||
_, err := db.GetEngine(ctx).Where("repo_id = ?", repoID).Cols("repo_id").Update(&Package{}) |
||||
return err |
||||
} |
||||
|
||||
// GetPackageByID gets a package by id
|
||||
func GetPackageByID(ctx context.Context, packageID int64) (*Package, error) { |
||||
p := &Package{} |
||||
|
||||
has, err := db.GetEngine(ctx).ID(packageID).Get(p) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageNotExist |
||||
} |
||||
return p, nil |
||||
} |
||||
|
||||
// GetPackageByName gets a package by name
|
||||
func GetPackageByName(ctx context.Context, ownerID int64, packageType Type, name string) (*Package, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
"package.lower_name": strings.ToLower(name), |
||||
} |
||||
|
||||
p := &Package{} |
||||
|
||||
has, err := db.GetEngine(ctx). |
||||
Where(cond). |
||||
Get(p) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageNotExist |
||||
} |
||||
return p, nil |
||||
} |
||||
|
||||
// GetPackagesByType gets all packages of a specific type
|
||||
func GetPackagesByType(ctx context.Context, ownerID int64, packageType Type) ([]*Package, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
} |
||||
|
||||
ps := make([]*Package, 0, 10) |
||||
return ps, db.GetEngine(ctx). |
||||
Where(cond). |
||||
Find(&ps) |
||||
} |
||||
|
||||
// DeletePackagesIfUnreferenced deletes a package if there are no associated versions
|
||||
func DeletePackagesIfUnreferenced(ctx context.Context) error { |
||||
in := builder. |
||||
Select("package_version.package_id"). |
||||
From("package"). |
||||
Join("LEFT", "package_version", "package_version.package_id = package.id"). |
||||
Where(builder.Expr("package_version.id IS NULL")) |
||||
|
||||
_, err := db.GetEngine(ctx). |
||||
Where(builder.In("package.id", in)). |
||||
Delete(&Package{}) |
||||
|
||||
return err |
||||
} |
||||
|
||||
// HasOwnerPackages tests if a user/org has packages
|
||||
func HasOwnerPackages(ctx context.Context, ownerID int64) (bool, error) { |
||||
return db.GetEngine(ctx).Where("owner_id = ?", ownerID).Exist(&Package{}) |
||||
} |
||||
|
||||
// HasRepositoryPackages tests if a repository has packages
|
||||
func HasRepositoryPackages(ctx context.Context, repositoryID int64) (bool, error) { |
||||
return db.GetEngine(ctx).Where("repo_id = ?", repositoryID).Exist(&Package{}) |
||||
} |
@ -0,0 +1,85 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
) |
||||
|
||||
// ErrPackageBlobNotExist indicates a package blob not exist error
|
||||
var ErrPackageBlobNotExist = errors.New("Package blob does not exist") |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(PackageBlob)) |
||||
} |
||||
|
||||
// PackageBlob represents a package blob
|
||||
type PackageBlob struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
Size int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
HashMD5 string `xorm:"hash_md5 char(32) UNIQUE(md5) INDEX NOT NULL"` |
||||
HashSHA1 string `xorm:"hash_sha1 char(40) UNIQUE(sha1) INDEX NOT NULL"` |
||||
HashSHA256 string `xorm:"hash_sha256 char(64) UNIQUE(sha256) INDEX NOT NULL"` |
||||
HashSHA512 string `xorm:"hash_sha512 char(128) UNIQUE(sha512) INDEX NOT NULL"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
} |
||||
|
||||
// GetOrInsertBlob inserts a blob. If the blob exists already the existing blob is returned
|
||||
func GetOrInsertBlob(ctx context.Context, pb *PackageBlob) (*PackageBlob, bool, error) { |
||||
e := db.GetEngine(ctx) |
||||
|
||||
has, err := e.Get(pb) |
||||
if err != nil { |
||||
return nil, false, err |
||||
} |
||||
if has { |
||||
return pb, true, nil |
||||
} |
||||
if _, err = e.Insert(pb); err != nil { |
||||
return nil, false, err |
||||
} |
||||
return pb, false, nil |
||||
} |
||||
|
||||
// GetBlobByID gets a blob by id
|
||||
func GetBlobByID(ctx context.Context, blobID int64) (*PackageBlob, error) { |
||||
pb := &PackageBlob{} |
||||
|
||||
has, err := db.GetEngine(ctx).ID(blobID).Get(pb) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageBlobNotExist |
||||
} |
||||
return pb, nil |
||||
} |
||||
|
||||
// FindExpiredUnreferencedBlobs gets all blobs without associated files older than the specific duration
|
||||
func FindExpiredUnreferencedBlobs(ctx context.Context, olderThan time.Duration) ([]*PackageBlob, error) { |
||||
pbs := make([]*PackageBlob, 0, 10) |
||||
return pbs, db.GetEngine(ctx). |
||||
Table("package_blob"). |
||||
Join("LEFT OUTER", "package_file", "package_file.blob_id = package_blob.id"). |
||||
Where("package_file.id IS NULL AND package_blob.created_unix < ?", time.Now().Add(-olderThan).Unix()). |
||||
Find(&pbs) |
||||
} |
||||
|
||||
// DeleteBlobByID deletes a blob by id
|
||||
func DeleteBlobByID(ctx context.Context, blobID int64) error { |
||||
_, err := db.GetEngine(ctx).ID(blobID).Delete(&PackageBlob{}) |
||||
return err |
||||
} |
||||
|
||||
// GetTotalBlobSize returns the total blobs size in bytes
|
||||
func GetTotalBlobSize() (int64, error) { |
||||
return db.GetEngine(db.DefaultContext). |
||||
SumInt(&PackageBlob{}, "size") |
||||
} |
@ -0,0 +1,81 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"strings" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
"code.gitea.io/gitea/modules/util" |
||||
) |
||||
|
||||
// ErrPackageBlobUploadNotExist indicates a package blob upload not exist error
|
||||
var ErrPackageBlobUploadNotExist = errors.New("Package blob upload does not exist") |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(PackageBlobUpload)) |
||||
} |
||||
|
||||
// PackageBlobUpload represents a package blob upload
|
||||
type PackageBlobUpload struct { |
||||
ID string `xorm:"pk"` |
||||
BytesReceived int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
HashStateBytes []byte `xorm:"BLOB"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created NOT NULL"` |
||||
UpdatedUnix timeutil.TimeStamp `xorm:"updated INDEX NOT NULL"` |
||||
} |
||||
|
||||
// CreateBlobUpload inserts a blob upload
|
||||
func CreateBlobUpload(ctx context.Context) (*PackageBlobUpload, error) { |
||||
id, err := util.CryptoRandomString(25) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
pbu := &PackageBlobUpload{ |
||||
ID: strings.ToLower(id), |
||||
} |
||||
|
||||
_, err = db.GetEngine(ctx).Insert(pbu) |
||||
return pbu, err |
||||
} |
||||
|
||||
// GetBlobUploadByID gets a blob upload by id
|
||||
func GetBlobUploadByID(ctx context.Context, id string) (*PackageBlobUpload, error) { |
||||
pbu := &PackageBlobUpload{} |
||||
|
||||
has, err := db.GetEngine(ctx).ID(id).Get(pbu) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageBlobUploadNotExist |
||||
} |
||||
return pbu, nil |
||||
} |
||||
|
||||
// UpdateBlobUpload updates the blob upload
|
||||
func UpdateBlobUpload(ctx context.Context, pbu *PackageBlobUpload) error { |
||||
_, err := db.GetEngine(ctx).ID(pbu.ID).Update(pbu) |
||||
return err |
||||
} |
||||
|
||||
// DeleteBlobUploadByID deletes the blob upload
|
||||
func DeleteBlobUploadByID(ctx context.Context, id string) error { |
||||
_, err := db.GetEngine(ctx).ID(id).Delete(&PackageBlobUpload{}) |
||||
return err |
||||
} |
||||
|
||||
// FindExpiredBlobUploads gets all expired blob uploads
|
||||
func FindExpiredBlobUploads(ctx context.Context, olderThan time.Duration) ([]*PackageBlobUpload, error) { |
||||
pbus := make([]*PackageBlobUpload, 0, 10) |
||||
return pbus, db.GetEngine(ctx). |
||||
Where("updated_unix < ?", time.Now().Add(-olderThan).Unix()). |
||||
Find(&pbus) |
||||
} |
@ -0,0 +1,201 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"strconv" |
||||
"strings" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(PackageFile)) |
||||
} |
||||
|
||||
var ( |
||||
// ErrDuplicatePackageFile indicates a duplicated package file error
|
||||
ErrDuplicatePackageFile = errors.New("Package file does exist already") |
||||
// ErrPackageFileNotExist indicates a package file not exist error
|
||||
ErrPackageFileNotExist = errors.New("Package file does not exist") |
||||
) |
||||
|
||||
// EmptyFileKey is a named constant for an empty file key
|
||||
const EmptyFileKey = "" |
||||
|
||||
// PackageFile represents a package file
|
||||
type PackageFile struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
VersionID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
BlobID int64 `xorm:"INDEX NOT NULL"` |
||||
Name string `xorm:"NOT NULL"` |
||||
LowerName string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CompositeKey string `xorm:"UNIQUE(s) INDEX"` |
||||
IsLead bool `xorm:"NOT NULL DEFAULT false"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
} |
||||
|
||||
// TryInsertFile inserts a file. If the file exists already ErrDuplicatePackageFile is returned
|
||||
func TryInsertFile(ctx context.Context, pf *PackageFile) (*PackageFile, error) { |
||||
e := db.GetEngine(ctx) |
||||
|
||||
key := &PackageFile{ |
||||
VersionID: pf.VersionID, |
||||
LowerName: pf.LowerName, |
||||
CompositeKey: pf.CompositeKey, |
||||
} |
||||
|
||||
has, err := e.Get(key) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if has { |
||||
return pf, ErrDuplicatePackageFile |
||||
} |
||||
if _, err = e.Insert(pf); err != nil { |
||||
return nil, err |
||||
} |
||||
return pf, nil |
||||
} |
||||
|
||||
// GetFilesByVersionID gets all files of a version
|
||||
func GetFilesByVersionID(ctx context.Context, versionID int64) ([]*PackageFile, error) { |
||||
pfs := make([]*PackageFile, 0, 10) |
||||
return pfs, db.GetEngine(ctx).Where("version_id = ?", versionID).Find(&pfs) |
||||
} |
||||
|
||||
// GetFileForVersionByID gets a file of a version by id
|
||||
func GetFileForVersionByID(ctx context.Context, versionID, fileID int64) (*PackageFile, error) { |
||||
pf := &PackageFile{ |
||||
VersionID: versionID, |
||||
} |
||||
|
||||
has, err := db.GetEngine(ctx).ID(fileID).Get(pf) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageFileNotExist |
||||
} |
||||
return pf, nil |
||||
} |
||||
|
||||
// GetFileForVersionByName gets a file of a version by name
|
||||
func GetFileForVersionByName(ctx context.Context, versionID int64, name, key string) (*PackageFile, error) { |
||||
if name == "" { |
||||
return nil, ErrPackageFileNotExist |
||||
} |
||||
|
||||
pf := &PackageFile{ |
||||
VersionID: versionID, |
||||
LowerName: strings.ToLower(name), |
||||
CompositeKey: key, |
||||
} |
||||
|
||||
has, err := db.GetEngine(ctx).Get(pf) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageFileNotExist |
||||
} |
||||
return pf, nil |
||||
} |
||||
|
||||
// DeleteFileByID deletes a file
|
||||
func DeleteFileByID(ctx context.Context, fileID int64) error { |
||||
_, err := db.GetEngine(ctx).ID(fileID).Delete(&PackageFile{}) |
||||
return err |
||||
} |
||||
|
||||
// PackageFileSearchOptions are options for SearchXXX methods
|
||||
type PackageFileSearchOptions struct { |
||||
OwnerID int64 |
||||
PackageType string |
||||
VersionID int64 |
||||
Query string |
||||
CompositeKey string |
||||
Properties map[string]string |
||||
OlderThan time.Duration |
||||
db.Paginator |
||||
} |
||||
|
||||
func (opts *PackageFileSearchOptions) toConds() builder.Cond { |
||||
cond := builder.NewCond() |
||||
|
||||
if opts.VersionID != 0 { |
||||
cond = cond.And(builder.Eq{"package_file.version_id": opts.VersionID}) |
||||
} else if opts.OwnerID != 0 || (opts.PackageType != "" && opts.PackageType != "all") { |
||||
var versionCond builder.Cond = builder.Eq{ |
||||
"package_version.is_internal": false, |
||||
} |
||||
if opts.OwnerID != 0 { |
||||
versionCond = versionCond.And(builder.Eq{"package.owner_id": opts.OwnerID}) |
||||
} |
||||
if opts.PackageType != "" && opts.PackageType != "all" { |
||||
versionCond = versionCond.And(builder.Eq{"package.type": opts.PackageType}) |
||||
} |
||||
|
||||
in := builder. |
||||
Select("package_version.id"). |
||||
From("package_version"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(versionCond) |
||||
|
||||
cond = cond.And(builder.In("package_file.version_id", in)) |
||||
} |
||||
if opts.CompositeKey != "" { |
||||
cond = cond.And(builder.Eq{"package_file.composite_key": opts.CompositeKey}) |
||||
} |
||||
if opts.Query != "" { |
||||
cond = cond.And(builder.Like{"package_file.lower_name", strings.ToLower(opts.Query)}) |
||||
} |
||||
|
||||
if len(opts.Properties) != 0 { |
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": PropertyTypeFile, |
||||
} |
||||
propsCond = propsCond.And(builder.Expr("package_property.ref_id = package_file.id")) |
||||
|
||||
propsCondBlock := builder.NewCond() |
||||
for name, value := range opts.Properties { |
||||
propsCondBlock = propsCondBlock.Or(builder.Eq{ |
||||
"package_property.name": name, |
||||
"package_property.value": value, |
||||
}) |
||||
} |
||||
propsCond = propsCond.And(propsCondBlock) |
||||
|
||||
cond = cond.And(builder.Eq{ |
||||
strconv.Itoa(len(opts.Properties)): builder.Select("COUNT(*)").Where(propsCond).From("package_property"), |
||||
}) |
||||
} |
||||
|
||||
if opts.OlderThan != 0 { |
||||
cond = cond.And(builder.Lt{"package_file.created_unix": time.Now().Add(-opts.OlderThan).Unix()}) |
||||
} |
||||
|
||||
return cond |
||||
} |
||||
|
||||
// SearchFiles gets all files of packages matching the search options
|
||||
func SearchFiles(ctx context.Context, opts *PackageFileSearchOptions) ([]*PackageFile, int64, error) { |
||||
sess := db.GetEngine(ctx). |
||||
Where(opts.toConds()) |
||||
|
||||
if opts.Paginator != nil { |
||||
sess = db.SetSessionPagination(sess, opts) |
||||
} |
||||
|
||||
pfs := make([]*PackageFile, 0, 10) |
||||
count, err := sess.FindAndCount(&pfs) |
||||
return pfs, count, err |
||||
} |
@ -0,0 +1,70 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
) |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(PackageProperty)) |
||||
} |
||||
|
||||
type PropertyType int64 |
||||
|
||||
const ( |
||||
// PropertyTypeVersion means the reference is a package version
|
||||
PropertyTypeVersion PropertyType = iota // 0
|
||||
// PropertyTypeFile means the reference is a package file
|
||||
PropertyTypeFile // 1
|
||||
) |
||||
|
||||
// PackageProperty represents a property of a package version or file
|
||||
type PackageProperty struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
RefType PropertyType `xorm:"INDEX NOT NULL"` |
||||
RefID int64 `xorm:"INDEX NOT NULL"` |
||||
Name string `xorm:"INDEX NOT NULL"` |
||||
Value string `xorm:"TEXT NOT NULL"` |
||||
} |
||||
|
||||
// InsertProperty creates a property
|
||||
func InsertProperty(ctx context.Context, refType PropertyType, refID int64, name, value string) (*PackageProperty, error) { |
||||
pp := &PackageProperty{ |
||||
RefType: refType, |
||||
RefID: refID, |
||||
Name: name, |
||||
Value: value, |
||||
} |
||||
|
||||
_, err := db.GetEngine(ctx).Insert(pp) |
||||
return pp, err |
||||
} |
||||
|
||||
// GetProperties gets all properties
|
||||
func GetProperties(ctx context.Context, refType PropertyType, refID int64) ([]*PackageProperty, error) { |
||||
pps := make([]*PackageProperty, 0, 10) |
||||
return pps, db.GetEngine(ctx).Where("ref_type = ? AND ref_id = ?", refType, refID).Find(&pps) |
||||
} |
||||
|
||||
// GetPropertiesByName gets all properties with a specific name
|
||||
func GetPropertiesByName(ctx context.Context, refType PropertyType, refID int64, name string) ([]*PackageProperty, error) { |
||||
pps := make([]*PackageProperty, 0, 10) |
||||
return pps, db.GetEngine(ctx).Where("ref_type = ? AND ref_id = ? AND name = ?", refType, refID, name).Find(&pps) |
||||
} |
||||
|
||||
// DeleteAllProperties deletes all properties of a ref
|
||||
func DeleteAllProperties(ctx context.Context, refType PropertyType, refID int64) error { |
||||
_, err := db.GetEngine(ctx).Where("ref_type = ? AND ref_id = ?", refType, refID).Delete(&PackageProperty{}) |
||||
return err |
||||
} |
||||
|
||||
// DeletePropertyByID deletes a property
|
||||
func DeletePropertyByID(ctx context.Context, propertyID int64) error { |
||||
_, err := db.GetEngine(ctx).ID(propertyID).Delete(&PackageProperty{}) |
||||
return err |
||||
} |
@ -0,0 +1,316 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"context" |
||||
"errors" |
||||
"strconv" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/models/db" |
||||
"code.gitea.io/gitea/modules/timeutil" |
||||
|
||||
"xorm.io/builder" |
||||
) |
||||
|
||||
var ( |
||||
// ErrDuplicatePackageVersion indicates a duplicated package version error
|
||||
ErrDuplicatePackageVersion = errors.New("Package version does exist already") |
||||
// ErrPackageVersionNotExist indicates a package version not exist error
|
||||
ErrPackageVersionNotExist = errors.New("Package version does not exist") |
||||
) |
||||
|
||||
func init() { |
||||
db.RegisterModel(new(PackageVersion)) |
||||
} |
||||
|
||||
// PackageVersion represents a package version
|
||||
type PackageVersion struct { |
||||
ID int64 `xorm:"pk autoincr"` |
||||
PackageID int64 `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CreatorID int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
Version string `xorm:"NOT NULL"` |
||||
LowerVersion string `xorm:"UNIQUE(s) INDEX NOT NULL"` |
||||
CreatedUnix timeutil.TimeStamp `xorm:"created INDEX NOT NULL"` |
||||
IsInternal bool `xorm:"INDEX NOT NULL DEFAULT false"` |
||||
MetadataJSON string `xorm:"metadata_json TEXT"` |
||||
DownloadCount int64 `xorm:"NOT NULL DEFAULT 0"` |
||||
} |
||||
|
||||
// GetOrInsertVersion inserts a version. If the same version exist already ErrDuplicatePackageVersion is returned
|
||||
func GetOrInsertVersion(ctx context.Context, pv *PackageVersion) (*PackageVersion, error) { |
||||
e := db.GetEngine(ctx) |
||||
|
||||
key := &PackageVersion{ |
||||
PackageID: pv.PackageID, |
||||
LowerVersion: pv.LowerVersion, |
||||
} |
||||
|
||||
has, err := e.Get(key) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if has { |
||||
return key, ErrDuplicatePackageVersion |
||||
} |
||||
if _, err = e.Insert(pv); err != nil { |
||||
return nil, err |
||||
} |
||||
return pv, nil |
||||
} |
||||
|
||||
// UpdateVersion updates a version
|
||||
func UpdateVersion(ctx context.Context, pv *PackageVersion) error { |
||||
_, err := db.GetEngine(ctx).ID(pv.ID).Update(pv) |
||||
return err |
||||
} |
||||
|
||||
// IncrementDownloadCounter increments the download counter of a version
|
||||
func IncrementDownloadCounter(ctx context.Context, versionID int64) error { |
||||
_, err := db.GetEngine(ctx).Exec("UPDATE `package_version` SET `download_count` = `download_count` + 1 WHERE `id` = ?", versionID) |
||||
return err |
||||
} |
||||
|
||||
// GetVersionByID gets a version by id
|
||||
func GetVersionByID(ctx context.Context, versionID int64) (*PackageVersion, error) { |
||||
pv := &PackageVersion{} |
||||
|
||||
has, err := db.GetEngine(ctx).ID(versionID).Get(pv) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageNotExist |
||||
} |
||||
return pv, nil |
||||
} |
||||
|
||||
// GetVersionByNameAndVersion gets a version by name and version number
|
||||
func GetVersionByNameAndVersion(ctx context.Context, ownerID int64, packageType Type, name, version string) (*PackageVersion, error) { |
||||
return getVersionByNameAndVersion(ctx, ownerID, packageType, name, version, false) |
||||
} |
||||
|
||||
// GetInternalVersionByNameAndVersion gets a version by name and version number
|
||||
func GetInternalVersionByNameAndVersion(ctx context.Context, ownerID int64, packageType Type, name, version string) (*PackageVersion, error) { |
||||
return getVersionByNameAndVersion(ctx, ownerID, packageType, name, version, true) |
||||
} |
||||
|
||||
func getVersionByNameAndVersion(ctx context.Context, ownerID int64, packageType Type, name, version string, isInternal bool) (*PackageVersion, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
"package.lower_name": strings.ToLower(name), |
||||
"package_version.is_internal": isInternal, |
||||
} |
||||
pv := &PackageVersion{ |
||||
LowerVersion: strings.ToLower(version), |
||||
} |
||||
has, err := db.GetEngine(ctx). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond). |
||||
Get(pv) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
if !has { |
||||
return nil, ErrPackageNotExist |
||||
} |
||||
|
||||
return pv, nil |
||||
} |
||||
|
||||
// GetVersionsByPackageType gets all versions of a specific type
|
||||
func GetVersionsByPackageType(ctx context.Context, ownerID int64, packageType Type) ([]*PackageVersion, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 10) |
||||
return pvs, db.GetEngine(ctx). |
||||
Where(cond). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Find(&pvs) |
||||
} |
||||
|
||||
// GetVersionsByPackageName gets all versions of a specific package
|
||||
func GetVersionsByPackageName(ctx context.Context, ownerID int64, packageType Type, name string) ([]*PackageVersion, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
"package.lower_name": strings.ToLower(name), |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 10) |
||||
return pvs, db.GetEngine(ctx). |
||||
Where(cond). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Find(&pvs) |
||||
} |
||||
|
||||
// GetVersionsByFilename gets all versions which are linked to a filename
|
||||
func GetVersionsByFilename(ctx context.Context, ownerID int64, packageType Type, filename string) ([]*PackageVersion, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package.owner_id": ownerID, |
||||
"package.type": packageType, |
||||
"package_file.lower_name": strings.ToLower(filename), |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 10) |
||||
return pvs, db.GetEngine(ctx). |
||||
Where(cond). |
||||
Join("INNER", "package_file", "package_file.version_id = package_version.id"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Find(&pvs) |
||||
} |
||||
|
||||
// DeleteVersionByID deletes a version by id
|
||||
func DeleteVersionByID(ctx context.Context, versionID int64) error { |
||||
_, err := db.GetEngine(ctx).ID(versionID).Delete(&PackageVersion{}) |
||||
return err |
||||
} |
||||
|
||||
// HasVersionFileReferences checks if there are associated files
|
||||
func HasVersionFileReferences(ctx context.Context, versionID int64) (bool, error) { |
||||
return db.GetEngine(ctx).Get(&PackageFile{ |
||||
VersionID: versionID, |
||||
}) |
||||
} |
||||
|
||||
// PackageSearchOptions are options for SearchXXX methods
|
||||
type PackageSearchOptions struct { |
||||
OwnerID int64 |
||||
RepoID int64 |
||||
Type string |
||||
PackageID int64 |
||||
QueryName string |
||||
QueryVersion string |
||||
Properties map[string]string |
||||
Sort string |
||||
db.Paginator |
||||
} |
||||
|
||||
func (opts *PackageSearchOptions) toConds() builder.Cond { |
||||
var cond builder.Cond = builder.Eq{"package_version.is_internal": false} |
||||
|
||||
if opts.OwnerID != 0 { |
||||
cond = cond.And(builder.Eq{"package.owner_id": opts.OwnerID}) |
||||
} |
||||
if opts.RepoID != 0 { |
||||
cond = cond.And(builder.Eq{"package.repo_id": opts.RepoID}) |
||||
} |
||||
if opts.Type != "" && opts.Type != "all" { |
||||
cond = cond.And(builder.Eq{"package.type": opts.Type}) |
||||
} |
||||
if opts.PackageID != 0 { |
||||
cond = cond.And(builder.Eq{"package.id": opts.PackageID}) |
||||
} |
||||
if opts.QueryName != "" { |
||||
cond = cond.And(builder.Like{"package.lower_name", strings.ToLower(opts.QueryName)}) |
||||
} |
||||
if opts.QueryVersion != "" { |
||||
cond = cond.And(builder.Like{"package_version.lower_version", strings.ToLower(opts.QueryVersion)}) |
||||
} |
||||
|
||||
if len(opts.Properties) != 0 { |
||||
var propsCond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": PropertyTypeVersion, |
||||
} |
||||
propsCond = propsCond.And(builder.Expr("package_property.ref_id = package_version.id")) |
||||
|
||||
propsCondBlock := builder.NewCond() |
||||
for name, value := range opts.Properties { |
||||
propsCondBlock = propsCondBlock.Or(builder.Eq{ |
||||
"package_property.name": name, |
||||
"package_property.value": value, |
||||
}) |
||||
} |
||||
propsCond = propsCond.And(propsCondBlock) |
||||
|
||||
cond = cond.And(builder.Eq{ |
||||
strconv.Itoa(len(opts.Properties)): builder.Select("COUNT(*)").Where(propsCond).From("package_property"), |
||||
}) |
||||
} |
||||
|
||||
return cond |
||||
} |
||||
|
||||
func (opts *PackageSearchOptions) configureOrderBy(e db.Engine) { |
||||
switch opts.Sort { |
||||
case "alphabetically": |
||||
e.Asc("package.name") |
||||
case "reversealphabetically": |
||||
e.Desc("package.name") |
||||
case "highestversion": |
||||
e.Desc("package_version.version") |
||||
case "lowestversion": |
||||
e.Asc("package_version.version") |
||||
case "oldest": |
||||
e.Asc("package_version.created_unix") |
||||
default: |
||||
e.Desc("package_version.created_unix") |
||||
} |
||||
} |
||||
|
||||
// SearchVersions gets all versions of packages matching the search options
|
||||
func SearchVersions(ctx context.Context, opts *PackageSearchOptions) ([]*PackageVersion, int64, error) { |
||||
sess := db.GetEngine(ctx). |
||||
Where(opts.toConds()). |
||||
Table("package_version"). |
||||
Join("INNER", "package", "package.id = package_version.package_id") |
||||
|
||||
opts.configureOrderBy(sess) |
||||
|
||||
if opts.Paginator != nil { |
||||
sess = db.SetSessionPagination(sess, opts) |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 10) |
||||
count, err := sess.FindAndCount(&pvs) |
||||
return pvs, count, err |
||||
} |
||||
|
||||
// SearchLatestVersions gets the latest version of every package matching the search options
|
||||
func SearchLatestVersions(ctx context.Context, opts *PackageSearchOptions) ([]*PackageVersion, int64, error) { |
||||
cond := opts.toConds(). |
||||
And(builder.Expr("pv2.id IS NULL")) |
||||
|
||||
sess := db.GetEngine(ctx). |
||||
Table("package_version"). |
||||
Join("LEFT", "package_version pv2", "package_version.package_id = pv2.package_id AND (package_version.created_unix < pv2.created_unix OR (package_version.created_unix = pv2.created_unix AND package_version.id < pv2.id))"). |
||||
Join("INNER", "package", "package.id = package_version.package_id"). |
||||
Where(cond) |
||||
|
||||
opts.configureOrderBy(sess) |
||||
|
||||
if opts.Paginator != nil { |
||||
sess = db.SetSessionPagination(sess, opts) |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 10) |
||||
count, err := sess.FindAndCount(&pvs) |
||||
return pvs, count, err |
||||
} |
||||
|
||||
// FindVersionsByPropertyNameAndValue gets all package versions which are associated with a specific property + value
|
||||
func FindVersionsByPropertyNameAndValue(ctx context.Context, packageID int64, name, value string) ([]*PackageVersion, error) { |
||||
var cond builder.Cond = builder.Eq{ |
||||
"package_property.ref_type": PropertyTypeVersion, |
||||
"package_property.name": name, |
||||
"package_property.value": value, |
||||
"package_version.package_id": packageID, |
||||
"package_version.is_internal": false, |
||||
} |
||||
|
||||
pvs := make([]*PackageVersion, 0, 5) |
||||
return pvs, db.GetEngine(ctx). |
||||
Where(cond). |
||||
Join("INNER", "package_property", "package_property.ref_id = package_version.id"). |
||||
Find(&pvs) |
||||
} |
@ -0,0 +1,109 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package context |
||||
|
||||
import ( |
||||
"fmt" |
||||
"net/http" |
||||
|
||||
"code.gitea.io/gitea/models/organization" |
||||
packages_model "code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/perm" |
||||
user_model "code.gitea.io/gitea/models/user" |
||||
) |
||||
|
||||
// Package contains owner, access mode and optional the package descriptor
|
||||
type Package struct { |
||||
Owner *user_model.User |
||||
AccessMode perm.AccessMode |
||||
Descriptor *packages_model.PackageDescriptor |
||||
} |
||||
|
||||
// PackageAssignment returns a middleware to handle Context.Package assignment
|
||||
func PackageAssignment() func(ctx *Context) { |
||||
return func(ctx *Context) { |
||||
packageAssignment(ctx, func(status int, title string, obj interface{}) { |
||||
err, ok := obj.(error) |
||||
if !ok { |
||||
err = fmt.Errorf("%s", obj) |
||||
} |
||||
if status == http.StatusNotFound { |
||||
ctx.NotFound(title, err) |
||||
} else { |
||||
ctx.ServerError(title, err) |
||||
} |
||||
}) |
||||
} |
||||
} |
||||
|
||||
// PackageAssignmentAPI returns a middleware to handle Context.Package assignment
|
||||
func PackageAssignmentAPI() func(ctx *APIContext) { |
||||
return func(ctx *APIContext) { |
||||
packageAssignment(ctx.Context, ctx.Error) |
||||
} |
||||
} |
||||
|
||||
func packageAssignment(ctx *Context, errCb func(int, string, interface{})) { |
||||
ctx.Package = &Package{ |
||||
Owner: ctx.ContextUser, |
||||
} |
||||
|
||||
if ctx.Doer != nil && ctx.Doer.ID == ctx.ContextUser.ID { |
||||
ctx.Package.AccessMode = perm.AccessModeOwner |
||||
} else { |
||||
if ctx.Package.Owner.IsOrganization() { |
||||
if organization.HasOrgOrUserVisible(ctx, ctx.Package.Owner, ctx.Doer) { |
||||
ctx.Package.AccessMode = perm.AccessModeRead |
||||
if ctx.Doer != nil { |
||||
var err error |
||||
ctx.Package.AccessMode, err = organization.OrgFromUser(ctx.Package.Owner).GetOrgUserMaxAuthorizeLevel(ctx.Doer.ID) |
||||
if err != nil { |
||||
errCb(http.StatusInternalServerError, "GetOrgUserMaxAuthorizeLevel", err) |
||||
return |
||||
} |
||||
} |
||||
} |
||||
} else { |
||||
ctx.Package.AccessMode = perm.AccessModeRead |
||||
} |
||||
} |
||||
|
||||
packageType := ctx.Params("type") |
||||
name := ctx.Params("name") |
||||
version := ctx.Params("version") |
||||
if packageType != "" && name != "" && version != "" { |
||||
pv, err := packages_model.GetVersionByNameAndVersion(ctx, ctx.Package.Owner.ID, packages_model.Type(packageType), name, version) |
||||
if err != nil { |
||||
if err == packages_model.ErrPackageNotExist { |
||||
errCb(http.StatusNotFound, "GetVersionByNameAndVersion", err) |
||||
} else { |
||||
errCb(http.StatusInternalServerError, "GetVersionByNameAndVersion", err) |
||||
} |
||||
return |
||||
} |
||||
|
||||
ctx.Package.Descriptor, err = packages_model.GetPackageDescriptor(ctx, pv) |
||||
if err != nil { |
||||
errCb(http.StatusInternalServerError, "GetPackageDescriptor", err) |
||||
return |
||||
} |
||||
} |
||||
} |
||||
|
||||
// PackageContexter initializes a package context for a request.
|
||||
func PackageContexter() func(next http.Handler) http.Handler { |
||||
return func(next http.Handler) http.Handler { |
||||
return http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) { |
||||
ctx := Context{ |
||||
Resp: NewResponse(resp), |
||||
Data: map[string]interface{}{}, |
||||
} |
||||
|
||||
ctx.Req = WithContext(req, &ctx) |
||||
|
||||
next.ServeHTTP(ctx.Resp, ctx.Req) |
||||
}) |
||||
} |
||||
} |
@ -0,0 +1,43 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package convert |
||||
|
||||
import ( |
||||
"code.gitea.io/gitea/models/packages" |
||||
"code.gitea.io/gitea/models/perm" |
||||
api "code.gitea.io/gitea/modules/structs" |
||||
) |
||||
|
||||
// ToPackage convert a packages.PackageDescriptor to api.Package
|
||||
func ToPackage(pd *packages.PackageDescriptor) *api.Package { |
||||
var repo *api.Repository |
||||
if pd.Repository != nil { |
||||
repo = ToRepo(pd.Repository, perm.AccessModeNone) |
||||
} |
||||
|
||||
return &api.Package{ |
||||
ID: pd.Version.ID, |
||||
Owner: ToUser(pd.Owner, nil), |
||||
Repository: repo, |
||||
Creator: ToUser(pd.Creator, nil), |
||||
Type: string(pd.Package.Type), |
||||
Name: pd.Package.Name, |
||||
Version: pd.Version.Version, |
||||
CreatedAt: pd.Version.CreatedUnix.AsTime(), |
||||
} |
||||
} |
||||
|
||||
// ToPackageFile converts packages.PackageFileDescriptor to api.PackageFile
|
||||
func ToPackageFile(pfd *packages.PackageFileDescriptor) *api.PackageFile { |
||||
return &api.PackageFile{ |
||||
ID: pfd.File.ID, |
||||
Size: pfd.Blob.Size, |
||||
Name: pfd.File.Name, |
||||
HashMD5: pfd.Blob.HashMD5, |
||||
HashSHA1: pfd.Blob.HashSHA1, |
||||
HashSHA256: pfd.Blob.HashSHA256, |
||||
HashSHA512: pfd.Blob.HashSHA512, |
||||
} |
||||
} |
@ -0,0 +1,147 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package composer |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"errors" |
||||
"io" |
||||
"regexp" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/modules/json" |
||||
"code.gitea.io/gitea/modules/validation" |
||||
|
||||
"github.com/hashicorp/go-version" |
||||
) |
||||
|
||||
// TypeProperty is the name of the property for Composer package types
|
||||
const TypeProperty = "composer.type" |
||||
|
||||
var ( |
||||
// ErrMissingComposerFile indicates a missing composer.json file
|
||||
ErrMissingComposerFile = errors.New("composer.json file is missing") |
||||
// ErrInvalidName indicates an invalid package name
|
||||
ErrInvalidName = errors.New("package name is invalid") |
||||
// ErrInvalidVersion indicates an invalid package version
|
||||
ErrInvalidVersion = errors.New("package version is invalid") |
||||
) |
||||
|
||||
// Package represents a Composer package
|
||||
type Package struct { |
||||
Name string |
||||
Version string |
||||
Type string |
||||
Metadata *Metadata |
||||
} |
||||
|
||||
// Metadata represents the metadata of a Composer package
|
||||
type Metadata struct { |
||||
Description string `json:"description,omitempty"` |
||||
Keywords []string `json:"keywords,omitempty"` |
||||
Homepage string `json:"homepage,omitempty"` |
||||
License Licenses `json:"license,omitempty"` |
||||
Authors []Author `json:"authors,omitempty"` |
||||
Autoload map[string]interface{} `json:"autoload,omitempty"` |
||||
AutoloadDev map[string]interface{} `json:"autoload-dev,omitempty"` |
||||
Extra map[string]interface{} `json:"extra,omitempty"` |
||||
Require map[string]string `json:"require,omitempty"` |
||||
RequireDev map[string]string `json:"require-dev,omitempty"` |
||||
Suggest map[string]string `json:"suggest,omitempty"` |
||||
Provide map[string]string `json:"provide,omitempty"` |
||||
} |
||||
|
||||
// Licenses represents the licenses of a Composer package
|
||||
type Licenses []string |
||||
|
||||
// UnmarshalJSON reads from a string or array
|
||||
func (l *Licenses) UnmarshalJSON(data []byte) error { |
||||
switch data[0] { |
||||
case '"': |
||||
var value string |
||||
if err := json.Unmarshal(data, &value); err != nil { |
||||
return err |
||||
} |
||||
*l = Licenses{value} |
||||
case '[': |
||||
values := make([]string, 0, 5) |
||||
if err := json.Unmarshal(data, &values); err != nil { |
||||
return err |
||||
} |
||||
*l = Licenses(values) |
||||
} |
||||
return nil |
||||
} |
||||
|
||||
// Author represents an author
|
||||
type Author struct { |
||||
Name string `json:"name,omitempty"` |
||||
Email string `json:"email,omitempty"` |
||||
Homepage string `json:"homepage,omitempty"` |
||||
} |
||||
|
||||
var nameMatch = regexp.MustCompile(`\A[a-z0-9]([_\.-]?[a-z0-9]+)*/[a-z0-9](([_\.]?|-{0,2})[a-z0-9]+)*\z`) |
||||
|
||||
// ParsePackage parses the metadata of a Composer package file
|
||||
func ParsePackage(r io.ReaderAt, size int64) (*Package, error) { |
||||
archive, err := zip.NewReader(r, size) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
for _, file := range archive.File { |
||||
if strings.Count(file.Name, "/") > 1 { |
||||
continue |
||||
} |
||||
if strings.HasSuffix(strings.ToLower(file.Name), "composer.json") { |
||||
f, err := archive.Open(file.Name) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
defer f.Close() |
||||
|
||||
return ParseComposerFile(f) |
||||
} |
||||
} |
||||
return nil, ErrMissingComposerFile |
||||
} |
||||
|
||||
// ParseComposerFile parses a composer.json file to retrieve the metadata of a Composer package
|
||||
func ParseComposerFile(r io.Reader) (*Package, error) { |
||||
var cj struct { |
||||
Name string `json:"name"` |
||||
Version string `json:"version"` |
||||
Type string `json:"type"` |
||||
Metadata |
||||
} |
||||
if err := json.NewDecoder(r).Decode(&cj); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if !nameMatch.MatchString(cj.Name) { |
||||
return nil, ErrInvalidName |
||||
} |
||||
|
||||
if cj.Version != "" { |
||||
if _, err := version.NewSemver(cj.Version); err != nil { |
||||
return nil, ErrInvalidVersion |
||||
} |
||||
} |
||||
|
||||
if !validation.IsValidURL(cj.Homepage) { |
||||
cj.Homepage = "" |
||||
} |
||||
|
||||
if cj.Type == "" { |
||||
cj.Type = "library" |
||||
} |
||||
|
||||
return &Package{ |
||||
Name: cj.Name, |
||||
Version: cj.Version, |
||||
Type: cj.Type, |
||||
Metadata: &cj.Metadata, |
||||
}, nil |
||||
} |
@ -0,0 +1,130 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package composer |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/modules/json" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
name = "gitea/composer-package" |
||||
description = "Package Description" |
||||
packageType = "composer-plugin" |
||||
author = "Gitea Authors" |
||||
email = "no.reply@gitea.io" |
||||
homepage = "https://gitea.io" |
||||
license = "MIT" |
||||
) |
||||
|
||||
const composerContent = `{ |
||||
"name": "` + name + `", |
||||
"description": "` + description + `", |
||||
"type": "` + packageType + `", |
||||
"license": "` + license + `", |
||||
"authors": [ |
||||
{ |
||||
"name": "` + author + `", |
||||
"email": "` + email + `" |
||||
} |
||||
], |
||||
"homepage": "` + homepage + `", |
||||
"autoload": { |
||||
"psr-4": {"Gitea\\ComposerPackage\\": "src/"} |
||||
}, |
||||
"require": { |
||||
"php": ">=7.2 || ^8.0" |
||||
} |
||||
}` |
||||
|
||||
func TestLicenseUnmarshal(t *testing.T) { |
||||
var l Licenses |
||||
assert.NoError(t, json.NewDecoder(strings.NewReader(`["MIT"]`)).Decode(&l)) |
||||
assert.Len(t, l, 1) |
||||
assert.Equal(t, "MIT", l[0]) |
||||
assert.NoError(t, json.NewDecoder(strings.NewReader(`"MIT"`)).Decode(&l)) |
||||
assert.Len(t, l, 1) |
||||
assert.Equal(t, "MIT", l[0]) |
||||
} |
||||
|
||||
func TestParsePackage(t *testing.T) { |
||||
createArchive := func(name, content string) []byte { |
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
w, _ := archive.Create(name) |
||||
w.Write([]byte(content)) |
||||
archive.Close() |
||||
return buf.Bytes() |
||||
} |
||||
|
||||
t.Run("MissingComposerFile", func(t *testing.T) { |
||||
data := createArchive("dummy.txt", "") |
||||
|
||||
cp, err := ParsePackage(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, cp) |
||||
assert.ErrorIs(t, err, ErrMissingComposerFile) |
||||
}) |
||||
|
||||
t.Run("MissingComposerFileInRoot", func(t *testing.T) { |
||||
data := createArchive("sub/sub/composer.json", "") |
||||
|
||||
cp, err := ParsePackage(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, cp) |
||||
assert.ErrorIs(t, err, ErrMissingComposerFile) |
||||
}) |
||||
|
||||
t.Run("InvalidComposerFile", func(t *testing.T) { |
||||
data := createArchive("composer.json", "") |
||||
|
||||
cp, err := ParsePackage(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, cp) |
||||
assert.Error(t, err) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
data := createArchive("composer.json", composerContent) |
||||
|
||||
cp, err := ParsePackage(bytes.NewReader(data), int64(len(data))) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, cp) |
||||
}) |
||||
} |
||||
|
||||
func TestParseComposerFile(t *testing.T) { |
||||
t.Run("InvalidPackageName", func(t *testing.T) { |
||||
cp, err := ParseComposerFile(strings.NewReader(`{}`)) |
||||
assert.Nil(t, cp) |
||||
assert.ErrorIs(t, err, ErrInvalidName) |
||||
}) |
||||
|
||||
t.Run("InvalidPackageVersion", func(t *testing.T) { |
||||
cp, err := ParseComposerFile(strings.NewReader(`{"name": "gitea/composer-package", "version": "1.a.3"}`)) |
||||
assert.Nil(t, cp) |
||||
assert.ErrorIs(t, err, ErrInvalidVersion) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
cp, err := ParseComposerFile(strings.NewReader(composerContent)) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, cp) |
||||
|
||||
assert.Equal(t, name, cp.Name) |
||||
assert.Empty(t, cp.Version) |
||||
assert.Equal(t, description, cp.Metadata.Description) |
||||
assert.Len(t, cp.Metadata.Authors, 1) |
||||
assert.Equal(t, author, cp.Metadata.Authors[0].Name) |
||||
assert.Equal(t, email, cp.Metadata.Authors[0].Email) |
||||
assert.Equal(t, homepage, cp.Metadata.Homepage) |
||||
assert.Equal(t, packageType, cp.Type) |
||||
assert.Len(t, cp.Metadata.License, 1) |
||||
assert.Equal(t, license, cp.Metadata.License[0]) |
||||
}) |
||||
} |
@ -0,0 +1,68 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"io" |
||||
"regexp" |
||||
"strings" |
||||
) |
||||
|
||||
var ( |
||||
patternAuthor = compilePattern("author") |
||||
patternHomepage = compilePattern("homepage") |
||||
patternURL = compilePattern("url") |
||||
patternLicense = compilePattern("license") |
||||
patternDescription = compilePattern("description") |
||||
patternTopics = regexp.MustCompile(`(?im)^\s*topics\s*=\s*\((.+)\)`) |
||||
patternTopicList = regexp.MustCompile(`\s*['"](.+?)['"]\s*,?`) |
||||
) |
||||
|
||||
func compilePattern(name string) *regexp.Regexp { |
||||
return regexp.MustCompile(`(?im)^\s*` + name + `\s*=\s*['"\(](.+)['"\)]`) |
||||
} |
||||
|
||||
func ParseConanfile(r io.Reader) (*Metadata, error) { |
||||
buf, err := io.ReadAll(io.LimitReader(r, 1<<20)) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
metadata := &Metadata{} |
||||
|
||||
m := patternAuthor.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
metadata.Author = string(m[1]) |
||||
} |
||||
m = patternHomepage.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
metadata.ProjectURL = string(m[1]) |
||||
} |
||||
m = patternURL.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
metadata.RepositoryURL = string(m[1]) |
||||
} |
||||
m = patternLicense.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
metadata.License = strings.ReplaceAll(strings.ReplaceAll(string(m[1]), "'", ""), "\"", "") |
||||
} |
||||
m = patternDescription.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
metadata.Description = string(m[1]) |
||||
} |
||||
m = patternTopics.FindSubmatch(buf) |
||||
if len(m) > 1 && len(m[1]) > 0 { |
||||
m2 := patternTopicList.FindAllSubmatch(m[1], -1) |
||||
if len(m2) > 0 { |
||||
metadata.Keywords = make([]string, 0, len(m2)) |
||||
for _, g := range m2 { |
||||
if len(g) > 1 { |
||||
metadata.Keywords = append(metadata.Keywords, string(g[1])) |
||||
} |
||||
} |
||||
} |
||||
} |
||||
return metadata, nil |
||||
} |
@ -0,0 +1,51 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"strings" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
name = "ConanPackage" |
||||
version = "1.2" |
||||
license = "MIT" |
||||
author = "Gitea <info@gitea.io>" |
||||
homepage = "https://gitea.io/" |
||||
url = "https://gitea.com/" |
||||
description = "Description of ConanPackage" |
||||
topic1 = "gitea" |
||||
topic2 = "conan" |
||||
contentConanfile = `from conans import ConanFile, CMake, tools |
||||
|
||||
class ConanPackageConan(ConanFile): |
||||
name = "` + name + `" |
||||
version = "` + version + `" |
||||
license = "` + license + `" |
||||
author = "` + author + `" |
||||
homepage = "` + homepage + `" |
||||
url = "` + url + `" |
||||
description = "` + description + `" |
||||
topics = ("` + topic1 + `", "` + topic2 + `") |
||||
settings = "os", "compiler", "build_type", "arch" |
||||
options = {"shared": [True, False], "fPIC": [True, False]} |
||||
default_options = {"shared": False, "fPIC": True} |
||||
generators = "cmake" |
||||
` |
||||
) |
||||
|
||||
func TestParseConanfile(t *testing.T) { |
||||
metadata, err := ParseConanfile(strings.NewReader(contentConanfile)) |
||||
assert.Nil(t, err) |
||||
assert.Equal(t, license, metadata.License) |
||||
assert.Equal(t, author, metadata.Author) |
||||
assert.Equal(t, homepage, metadata.ProjectURL) |
||||
assert.Equal(t, url, metadata.RepositoryURL) |
||||
assert.Equal(t, description, metadata.Description) |
||||
assert.Equal(t, []string{topic1, topic2}, metadata.Keywords) |
||||
} |
@ -0,0 +1,123 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"bufio" |
||||
"errors" |
||||
"io" |
||||
"strings" |
||||
) |
||||
|
||||
// Conaninfo represents infos of a Conan package
|
||||
type Conaninfo struct { |
||||
Settings map[string]string `json:"settings"` |
||||
FullSettings map[string]string `json:"full_settings"` |
||||
Requires []string `json:"requires"` |
||||
FullRequires []string `json:"full_requires"` |
||||
Options map[string]string `json:"options"` |
||||
FullOptions map[string]string `json:"full_options"` |
||||
RecipeHash string `json:"recipe_hash"` |
||||
Environment map[string][]string `json:"environment"` |
||||
} |
||||
|
||||
func ParseConaninfo(r io.Reader) (*Conaninfo, error) { |
||||
sections, err := readSections(io.LimitReader(r, 1<<20)) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
info := &Conaninfo{} |
||||
for section, lines := range sections { |
||||
if len(lines) == 0 { |
||||
continue |
||||
} |
||||
switch section { |
||||
case "settings": |
||||
info.Settings = toMap(lines) |
||||
case "full_settings": |
||||
info.FullSettings = toMap(lines) |
||||
case "options": |
||||
info.Options = toMap(lines) |
||||
case "full_options": |
||||
info.FullOptions = toMap(lines) |
||||
case "requires": |
||||
info.Requires = lines |
||||
case "full_requires": |
||||
info.FullRequires = lines |
||||
case "recipe_hash": |
||||
info.RecipeHash = lines[0] |
||||
case "env": |
||||
info.Environment = toMapArray(lines) |
||||
} |
||||
} |
||||
return info, nil |
||||
} |
||||
|
||||
func readSections(r io.Reader) (map[string][]string, error) { |
||||
sections := make(map[string][]string) |
||||
|
||||
section := "" |
||||
lines := make([]string, 0, 5) |
||||
|
||||
scanner := bufio.NewScanner(r) |
||||
for scanner.Scan() { |
||||
line := strings.TrimSpace(scanner.Text()) |
||||
if strings.HasPrefix(line, "[") && strings.HasSuffix(line, "]") { |
||||
if section != "" { |
||||
sections[section] = lines |
||||
} |
||||
section = line[1 : len(line)-1] |
||||
lines = make([]string, 0, 5) |
||||
continue |
||||
} |
||||
if section != "" { |
||||
if line != "" { |
||||
lines = append(lines, line) |
||||
} |
||||
continue |
||||
} |
||||
if line != "" { |
||||
return nil, errors.New("Invalid conaninfo.txt") |
||||
} |
||||
} |
||||
if err := scanner.Err(); err != nil { |
||||
return nil, err |
||||
} |
||||
if section != "" { |
||||
sections[section] = lines |
||||
} |
||||
return sections, nil |
||||
} |
||||
|
||||
func toMap(lines []string) map[string]string { |
||||
result := make(map[string]string) |
||||
for _, line := range lines { |
||||
parts := strings.SplitN(line, "=", 2) |
||||
if len(parts) != 2 || len(parts[0]) == 0 || len(parts[1]) == 0 { |
||||
continue |
||||
} |
||||
result[parts[0]] = parts[1] |
||||
} |
||||
return result |
||||
} |
||||
|
||||
func toMapArray(lines []string) map[string][]string { |
||||
result := make(map[string][]string) |
||||
for _, line := range lines { |
||||
parts := strings.SplitN(line, "=", 2) |
||||
if len(parts) != 2 || len(parts[0]) == 0 || len(parts[1]) == 0 { |
||||
continue |
||||
} |
||||
var items []string |
||||
if strings.HasPrefix(parts[1], "[") && strings.HasSuffix(parts[1], "]") { |
||||
items = strings.Split(parts[1], ",") |
||||
} else { |
||||
items = []string{parts[1]} |
||||
} |
||||
result[parts[0]] = items |
||||
} |
||||
return result |
||||
} |
@ -0,0 +1,85 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"strings" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
settingsKey = "arch" |
||||
settingsValue = "x84_64" |
||||
optionsKey = "shared" |
||||
optionsValue = "False" |
||||
requires = "fmt/7.1.3" |
||||
hash = "74714915a51073acb548ca1ce29afbac" |
||||
envKey = "CC" |
||||
envValue = "gcc-10" |
||||
|
||||
contentConaninfo = `[settings] |
||||
` + settingsKey + `=` + settingsValue + ` |
||||
|
||||
[requires] |
||||
` + requires + ` |
||||
|
||||
[options] |
||||
` + optionsKey + `=` + optionsValue + ` |
||||
|
||||
[full_settings] |
||||
` + settingsKey + `=` + settingsValue + ` |
||||
|
||||
[full_requires] |
||||
` + requires + ` |
||||
|
||||
[full_options] |
||||
` + optionsKey + `=` + optionsValue + ` |
||||
|
||||
[recipe_hash] |
||||
` + hash + ` |
||||
|
||||
[env] |
||||
` + envKey + `=` + envValue + ` |
||||
|
||||
` |
||||
) |
||||
|
||||
func TestParseConaninfo(t *testing.T) { |
||||
info, err := ParseConaninfo(strings.NewReader(contentConaninfo)) |
||||
assert.NotNil(t, info) |
||||
assert.Nil(t, err) |
||||
assert.Equal( |
||||
t, |
||||
map[string]string{ |
||||
settingsKey: settingsValue, |
||||
}, |
||||
info.Settings, |
||||
) |
||||
assert.Equal(t, info.Settings, info.FullSettings) |
||||
assert.Equal( |
||||
t, |
||||
map[string]string{ |
||||
optionsKey: optionsValue, |
||||
}, |
||||
info.Options, |
||||
) |
||||
assert.Equal(t, info.Options, info.FullOptions) |
||||
assert.Equal( |
||||
t, |
||||
[]string{requires}, |
||||
info.Requires, |
||||
) |
||||
assert.Equal(t, info.Requires, info.FullRequires) |
||||
assert.Equal(t, hash, info.RecipeHash) |
||||
assert.Equal( |
||||
t, |
||||
map[string][]string{ |
||||
envKey: {envValue}, |
||||
}, |
||||
info.Environment, |
||||
) |
||||
} |
@ -0,0 +1,24 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
const ( |
||||
PropertyRecipeUser = "conan.recipe.user" |
||||
PropertyRecipeChannel = "conan.recipe.channel" |
||||
PropertyRecipeRevision = "conan.recipe.revision" |
||||
PropertyPackageReference = "conan.package.reference" |
||||
PropertyPackageRevision = "conan.package.revision" |
||||
PropertyPackageInfo = "conan.package.info" |
||||
) |
||||
|
||||
// Metadata represents the metadata of a Conan package
|
||||
type Metadata struct { |
||||
Author string `json:"author,omitempty"` |
||||
License string `json:"license,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
RepositoryURL string `json:"repository_url,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
Keywords []string `json:"keywords,omitempty"` |
||||
} |
@ -0,0 +1,155 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"errors" |
||||
"fmt" |
||||
"regexp" |
||||
|
||||
"code.gitea.io/gitea/modules/log" |
||||
|
||||
goversion "github.com/hashicorp/go-version" |
||||
) |
||||
|
||||
const ( |
||||
// taken from https://github.com/conan-io/conan/blob/develop/conans/model/ref.py
|
||||
minChars = 2 |
||||
maxChars = 51 |
||||
|
||||
// DefaultRevision if no revision is specified
|
||||
DefaultRevision = "0" |
||||
) |
||||
|
||||
var ( |
||||
namePattern = regexp.MustCompile(fmt.Sprintf(`^[a-zA-Z0-9_][a-zA-Z0-9_\+\.-]{%d,%d}$`, minChars-1, maxChars-1)) |
||||
revisionPattern = regexp.MustCompile(fmt.Sprintf(`^[a-zA-Z0-9]{1,%d}$`, maxChars)) |
||||
|
||||
ErrValidation = errors.New("Could not validate one or more reference fields") |
||||
) |
||||
|
||||
// RecipeReference represents a recipe <Name>/<Version>@<User>/<Channel>#<Revision>
|
||||
type RecipeReference struct { |
||||
Name string |
||||
Version string |
||||
User string |
||||
Channel string |
||||
Revision string |
||||
} |
||||
|
||||
func NewRecipeReference(name, version, user, channel, revision string) (*RecipeReference, error) { |
||||
log.Trace("Conan Recipe: %s/%s(@%s/%s(#%s))", name, version, user, channel, revision) |
||||
|
||||
if user == "_" { |
||||
user = "" |
||||
} |
||||
if channel == "_" { |
||||
channel = "" |
||||
} |
||||
|
||||
if (user != "" && channel == "") || (user == "" && channel != "") { |
||||
return nil, ErrValidation |
||||
} |
||||
|
||||
if !namePattern.MatchString(name) { |
||||
return nil, ErrValidation |
||||
} |
||||
if _, err := goversion.NewSemver(version); err != nil { |
||||
return nil, ErrValidation |
||||
} |
||||
if user != "" && !namePattern.MatchString(user) { |
||||
return nil, ErrValidation |
||||
} |
||||
if channel != "" && !namePattern.MatchString(channel) { |
||||
return nil, ErrValidation |
||||
} |
||||
if revision != "" && !revisionPattern.MatchString(revision) { |
||||
return nil, ErrValidation |
||||
} |
||||
|
||||
return &RecipeReference{name, version, user, channel, revision}, nil |
||||
} |
||||
|
||||
func (r *RecipeReference) RevisionOrDefault() string { |
||||
if r.Revision == "" { |
||||
return DefaultRevision |
||||
} |
||||
return r.Revision |
||||
} |
||||
|
||||
func (r *RecipeReference) String() string { |
||||
rev := "" |
||||
if r.Revision != "" { |
||||
rev = "#" + r.Revision |
||||
} |
||||
if r.User == "" || r.Channel == "" { |
||||
return fmt.Sprintf("%s/%s%s", r.Name, r.Version, rev) |
||||
} |
||||
return fmt.Sprintf("%s/%s@%s/%s%s", r.Name, r.Version, r.User, r.Channel, rev) |
||||
} |
||||
|
||||
func (r *RecipeReference) LinkName() string { |
||||
user := r.User |
||||
if user == "" { |
||||
user = "_" |
||||
} |
||||
channel := r.Channel |
||||
if channel == "" { |
||||
channel = "_" |
||||
} |
||||
return fmt.Sprintf("%s/%s/%s/%s/%s", r.Name, r.Version, user, channel, r.RevisionOrDefault()) |
||||
} |
||||
|
||||
func (r *RecipeReference) WithRevision(revision string) *RecipeReference { |
||||
return &RecipeReference{r.Name, r.Version, r.User, r.Channel, revision} |
||||
} |
||||
|
||||
// AsKey builds the additional key for the package file
|
||||
func (r *RecipeReference) AsKey() string { |
||||
return fmt.Sprintf("%s|%s|%s", r.User, r.Channel, r.RevisionOrDefault()) |
||||
} |
||||
|
||||
// PackageReference represents a package of a recipe <Name>/<Version>@<User>/<Channel>#<Revision> <Reference>#<Revision>
|
||||
type PackageReference struct { |
||||
Recipe *RecipeReference |
||||
Reference string |
||||
Revision string |
||||
} |
||||
|
||||
func NewPackageReference(recipe *RecipeReference, reference, revision string) (*PackageReference, error) { |
||||
log.Trace("Conan Package: %v %s(#%s)", recipe, reference, revision) |
||||
|
||||
if recipe == nil { |
||||
return nil, ErrValidation |
||||
} |
||||
if reference == "" || !revisionPattern.MatchString(reference) { |
||||
return nil, ErrValidation |
||||
} |
||||
if revision != "" && !revisionPattern.MatchString(revision) { |
||||
return nil, ErrValidation |
||||
} |
||||
|
||||
return &PackageReference{recipe, reference, revision}, nil |
||||
} |
||||
|
||||
func (r *PackageReference) RevisionOrDefault() string { |
||||
if r.Revision == "" { |
||||
return DefaultRevision |
||||
} |
||||
return r.Revision |
||||
} |
||||
|
||||
func (r *PackageReference) LinkName() string { |
||||
return fmt.Sprintf("%s/%s", r.Reference, r.RevisionOrDefault()) |
||||
} |
||||
|
||||
func (r *PackageReference) WithRevision(revision string) *PackageReference { |
||||
return &PackageReference{r.Recipe, r.Reference, revision} |
||||
} |
||||
|
||||
// AsKey builds the additional key for the package file
|
||||
func (r *PackageReference) AsKey() string { |
||||
return fmt.Sprintf("%s|%s|%s|%s|%s", r.Recipe.User, r.Recipe.Channel, r.Recipe.RevisionOrDefault(), r.Reference, r.RevisionOrDefault()) |
||||
} |
@ -0,0 +1,147 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package conan |
||||
|
||||
import ( |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestNewRecipeReference(t *testing.T) { |
||||
cases := []struct { |
||||
Name string |
||||
Version string |
||||
User string |
||||
Channel string |
||||
Revision string |
||||
IsValid bool |
||||
}{ |
||||
{"", "", "", "", "", false}, |
||||
{"name", "", "", "", "", false}, |
||||
{"", "1.0", "", "", "", false}, |
||||
{"", "", "user", "", "", false}, |
||||
{"", "", "", "channel", "", false}, |
||||
{"", "", "", "", "0", false}, |
||||
{"name", "1.0", "", "", "", true}, |
||||
{"name", "1.0", "user", "", "", false}, |
||||
{"name", "1.0", "", "channel", "", false}, |
||||
{"name", "1.0", "user", "channel", "", true}, |
||||
{"name", "1.0", "_", "", "", true}, |
||||
{"name", "1.0", "", "_", "", true}, |
||||
{"name", "1.0", "_", "_", "", true}, |
||||
{"name", "1.0", "_", "_", "0", true}, |
||||
{"name", "1.0", "", "", "0", true}, |
||||
{"name", "1.0", "", "", "000000000000000000000000000000000000000000000000000000000000", false}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
rref, err := NewRecipeReference(c.Name, c.Version, c.User, c.Channel, c.Revision) |
||||
if c.IsValid { |
||||
assert.NoError(t, err, "case %d, should be invalid", i) |
||||
assert.NotNil(t, rref, "case %d, should not be nil", i) |
||||
} else { |
||||
assert.Error(t, err, "case %d, should be valid", i) |
||||
} |
||||
} |
||||
} |
||||
|
||||
func TestRecipeReferenceRevisionOrDefault(t *testing.T) { |
||||
rref, err := NewRecipeReference("name", "1.0", "", "", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, DefaultRevision, rref.RevisionOrDefault()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "", "", DefaultRevision) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, DefaultRevision, rref.RevisionOrDefault()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "", "", "Az09") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "Az09", rref.RevisionOrDefault()) |
||||
} |
||||
|
||||
func TestRecipeReferenceString(t *testing.T) { |
||||
rref, err := NewRecipeReference("name", "1.0", "", "", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0", rref.String()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "user", "channel", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0@user/channel", rref.String()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "user", "channel", "Az09") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0@user/channel#Az09", rref.String()) |
||||
} |
||||
|
||||
func TestRecipeReferenceLinkName(t *testing.T) { |
||||
rref, err := NewRecipeReference("name", "1.0", "", "", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0/_/_/0", rref.LinkName()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "user", "channel", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0/user/channel/0", rref.LinkName()) |
||||
|
||||
rref, err = NewRecipeReference("name", "1.0", "user", "channel", "Az09") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "name/1.0/user/channel/Az09", rref.LinkName()) |
||||
} |
||||
|
||||
func TestNewPackageReference(t *testing.T) { |
||||
rref, _ := NewRecipeReference("name", "1.0", "", "", "") |
||||
|
||||
cases := []struct { |
||||
Recipe *RecipeReference |
||||
Reference string |
||||
Revision string |
||||
IsValid bool |
||||
}{ |
||||
{nil, "", "", false}, |
||||
{rref, "", "", false}, |
||||
{nil, "aZ09", "", false}, |
||||
{rref, "aZ09", "", true}, |
||||
{rref, "", "Az09", false}, |
||||
{rref, "aZ09", "Az09", true}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
pref, err := NewPackageReference(c.Recipe, c.Reference, c.Revision) |
||||
if c.IsValid { |
||||
assert.NoError(t, err, "case %d, should be invalid", i) |
||||
assert.NotNil(t, pref, "case %d, should not be nil", i) |
||||
} else { |
||||
assert.Error(t, err, "case %d, should be valid", i) |
||||
} |
||||
} |
||||
} |
||||
|
||||
func TestPackageReferenceRevisionOrDefault(t *testing.T) { |
||||
rref, _ := NewRecipeReference("name", "1.0", "", "", "") |
||||
|
||||
pref, err := NewPackageReference(rref, "ref", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, DefaultRevision, pref.RevisionOrDefault()) |
||||
|
||||
pref, err = NewPackageReference(rref, "ref", DefaultRevision) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, DefaultRevision, pref.RevisionOrDefault()) |
||||
|
||||
pref, err = NewPackageReference(rref, "ref", "Az09") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "Az09", pref.RevisionOrDefault()) |
||||
} |
||||
|
||||
func TestPackageReferenceLinkName(t *testing.T) { |
||||
rref, _ := NewRecipeReference("name", "1.0", "", "", "") |
||||
|
||||
pref, err := NewPackageReference(rref, "ref", "") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "ref/0", pref.LinkName()) |
||||
|
||||
pref, err = NewPackageReference(rref, "ref", "Az09") |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "ref/Az09", pref.LinkName()) |
||||
} |
@ -0,0 +1,56 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package helm |
||||
|
||||
// https://github.com/helm/helm/blob/main/pkg/chart/
|
||||
|
||||
const ConfigMediaType = "application/vnd.cncf.helm.config.v1+json" |
||||
|
||||
// Maintainer describes a Chart maintainer.
|
||||
type Maintainer struct { |
||||
// Name is a user name or organization name
|
||||
Name string `json:"name,omitempty"` |
||||
// Email is an optional email address to contact the named maintainer
|
||||
Email string `json:"email,omitempty"` |
||||
// URL is an optional URL to an address for the named maintainer
|
||||
URL string `json:"url,omitempty"` |
||||
} |
||||
|
||||
// Metadata for a Chart file. This models the structure of a Chart.yaml file.
|
||||
type Metadata struct { |
||||
// The name of the chart. Required.
|
||||
Name string `json:"name,omitempty"` |
||||
// The URL to a relevant project page, git repo, or contact person
|
||||
Home string `json:"home,omitempty"` |
||||
// Source is the URL to the source code of this chart
|
||||
Sources []string `json:"sources,omitempty"` |
||||
// A SemVer 2 conformant version string of the chart. Required.
|
||||
Version string `json:"version,omitempty"` |
||||
// A one-sentence description of the chart
|
||||
Description string `json:"description,omitempty"` |
||||
// A list of string keywords
|
||||
Keywords []string `json:"keywords,omitempty"` |
||||
// A list of name and URL/email address combinations for the maintainer(s)
|
||||
Maintainers []*Maintainer `json:"maintainers,omitempty"` |
||||
// The URL to an icon file.
|
||||
Icon string `json:"icon,omitempty"` |
||||
// The API Version of this chart. Required.
|
||||
APIVersion string `json:"apiVersion,omitempty"` |
||||
// The condition to check to enable chart
|
||||
Condition string `json:"condition,omitempty"` |
||||
// The tags to check to enable chart
|
||||
Tags string `json:"tags,omitempty"` |
||||
// The version of the application enclosed inside of this chart.
|
||||
AppVersion string `json:"appVersion,omitempty"` |
||||
// Whether or not this chart is deprecated
|
||||
Deprecated bool `json:"deprecated,omitempty"` |
||||
// Annotations are additional mappings uninterpreted by Helm,
|
||||
// made available for inspection by other applications.
|
||||
Annotations map[string]string `json:"annotations,omitempty"` |
||||
// KubeVersion is a SemVer constraint specifying the version of Kubernetes required.
|
||||
KubeVersion string `json:"kubeVersion,omitempty"` |
||||
// Specifies the chart type: application or library
|
||||
Type string `json:"type,omitempty"` |
||||
} |
@ -0,0 +1,157 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package container |
||||
|
||||
import ( |
||||
"fmt" |
||||
"io" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/modules/json" |
||||
"code.gitea.io/gitea/modules/packages/container/helm" |
||||
"code.gitea.io/gitea/modules/packages/container/oci" |
||||
"code.gitea.io/gitea/modules/validation" |
||||
) |
||||
|
||||
const ( |
||||
PropertyDigest = "container.digest" |
||||
PropertyMediaType = "container.mediatype" |
||||
PropertyManifestTagged = "container.manifest.tagged" |
||||
PropertyManifestReference = "container.manifest.reference" |
||||
|
||||
DefaultPlatform = "linux/amd64" |
||||
|
||||
labelLicenses = "org.opencontainers.image.licenses" |
||||
labelURL = "org.opencontainers.image.url" |
||||
labelSource = "org.opencontainers.image.source" |
||||
labelDocumentation = "org.opencontainers.image.documentation" |
||||
labelDescription = "org.opencontainers.image.description" |
||||
labelAuthors = "org.opencontainers.image.authors" |
||||
) |
||||
|
||||
type ImageType string |
||||
|
||||
const ( |
||||
TypeOCI ImageType = "oci" |
||||
TypeHelm ImageType = "helm" |
||||
) |
||||
|
||||
// Name gets the name of the image type
|
||||
func (it ImageType) Name() string { |
||||
switch it { |
||||
case TypeHelm: |
||||
return "Helm Chart" |
||||
default: |
||||
return "OCI / Docker" |
||||
} |
||||
} |
||||
|
||||
// Metadata represents the metadata of a Container package
|
||||
type Metadata struct { |
||||
Type ImageType `json:"type"` |
||||
IsTagged bool `json:"is_tagged"` |
||||
Platform string `json:"platform,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
Authors []string `json:"authors,omitempty"` |
||||
Licenses string `json:"license,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
RepositoryURL string `json:"repository_url,omitempty"` |
||||
DocumentationURL string `json:"documentation_url,omitempty"` |
||||
Labels map[string]string `json:"labels,omitempty"` |
||||
ImageLayers []string `json:"layer_creation,omitempty"` |
||||
MultiArch map[string]string `json:"multiarch,omitempty"` |
||||
} |
||||
|
||||
// ParseImageConfig parses the metadata of an image config
|
||||
func ParseImageConfig(mediaType oci.MediaType, r io.Reader) (*Metadata, error) { |
||||
if strings.EqualFold(string(mediaType), helm.ConfigMediaType) { |
||||
return parseHelmConfig(r) |
||||
} |
||||
|
||||
// fallback to OCI Image Config
|
||||
return parseOCIImageConfig(r) |
||||
} |
||||
|
||||
func parseOCIImageConfig(r io.Reader) (*Metadata, error) { |
||||
var image oci.Image |
||||
if err := json.NewDecoder(r).Decode(&image); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
platform := DefaultPlatform |
||||
if image.OS != "" && image.Architecture != "" { |
||||
platform = fmt.Sprintf("%s/%s", image.OS, image.Architecture) |
||||
if image.Variant != "" { |
||||
platform = fmt.Sprintf("%s/%s", platform, image.Variant) |
||||
} |
||||
} |
||||
|
||||
imageLayers := make([]string, 0, len(image.History)) |
||||
for _, history := range image.History { |
||||
cmd := history.CreatedBy |
||||
if i := strings.Index(cmd, "#(nop) "); i != -1 { |
||||
cmd = strings.TrimSpace(cmd[i+7:]) |
||||
} |
||||
imageLayers = append(imageLayers, cmd) |
||||
} |
||||
|
||||
metadata := &Metadata{ |
||||
Type: TypeOCI, |
||||
Platform: platform, |
||||
Licenses: image.Config.Labels[labelLicenses], |
||||
ProjectURL: image.Config.Labels[labelURL], |
||||
RepositoryURL: image.Config.Labels[labelSource], |
||||
DocumentationURL: image.Config.Labels[labelDocumentation], |
||||
Description: image.Config.Labels[labelDescription], |
||||
Labels: image.Config.Labels, |
||||
ImageLayers: imageLayers, |
||||
} |
||||
|
||||
if authors, ok := image.Config.Labels[labelAuthors]; ok { |
||||
metadata.Authors = []string{authors} |
||||
} |
||||
|
||||
if !validation.IsValidURL(metadata.ProjectURL) { |
||||
metadata.ProjectURL = "" |
||||
} |
||||
if !validation.IsValidURL(metadata.RepositoryURL) { |
||||
metadata.RepositoryURL = "" |
||||
} |
||||
if !validation.IsValidURL(metadata.DocumentationURL) { |
||||
metadata.DocumentationURL = "" |
||||
} |
||||
|
||||
return metadata, nil |
||||
} |
||||
|
||||
func parseHelmConfig(r io.Reader) (*Metadata, error) { |
||||
var config helm.Metadata |
||||
if err := json.NewDecoder(r).Decode(&config); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
metadata := &Metadata{ |
||||
Type: TypeHelm, |
||||
Description: config.Description, |
||||
ProjectURL: config.Home, |
||||
} |
||||
|
||||
if len(config.Maintainers) > 0 { |
||||
authors := make([]string, 0, len(config.Maintainers)) |
||||
for _, maintainer := range config.Maintainers { |
||||
authors = append(authors, maintainer.Name) |
||||
} |
||||
metadata.Authors = authors |
||||
} |
||||
|
||||
if len(config.Sources) > 0 && validation.IsValidURL(config.Sources[0]) { |
||||
metadata.RepositoryURL = config.Sources[0] |
||||
} |
||||
if !validation.IsValidURL(metadata.ProjectURL) { |
||||
metadata.ProjectURL = "" |
||||
} |
||||
|
||||
return metadata, nil |
||||
} |
@ -0,0 +1,62 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package container |
||||
|
||||
import ( |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/modules/packages/container/helm" |
||||
"code.gitea.io/gitea/modules/packages/container/oci" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestParseImageConfig(t *testing.T) { |
||||
description := "Image Description" |
||||
author := "Gitea" |
||||
license := "MIT" |
||||
projectURL := "https://gitea.io" |
||||
repositoryURL := "https://gitea.com/gitea" |
||||
documentationURL := "https://docs.gitea.io" |
||||
|
||||
configOCI := `{"config": {"labels": {"` + labelAuthors + `": "` + author + `", "` + labelLicenses + `": "` + license + `", "` + labelURL + `": "` + projectURL + `", "` + labelSource + `": "` + repositoryURL + `", "` + labelDocumentation + `": "` + documentationURL + `", "` + labelDescription + `": "` + description + `"}}, "history": [{"created_by": "do it 1"}, {"created_by": "dummy #(nop) do it 2"}]}` |
||||
|
||||
metadata, err := ParseImageConfig(oci.MediaType(oci.MediaTypeImageManifest), strings.NewReader(configOCI)) |
||||
assert.NoError(t, err) |
||||
|
||||
assert.Equal(t, TypeOCI, metadata.Type) |
||||
assert.Equal(t, description, metadata.Description) |
||||
assert.ElementsMatch(t, []string{author}, metadata.Authors) |
||||
assert.Equal(t, license, metadata.Licenses) |
||||
assert.Equal(t, projectURL, metadata.ProjectURL) |
||||
assert.Equal(t, repositoryURL, metadata.RepositoryURL) |
||||
assert.Equal(t, documentationURL, metadata.DocumentationURL) |
||||
assert.Equal(t, []string{"do it 1", "do it 2"}, metadata.ImageLayers) |
||||
assert.Equal( |
||||
t, |
||||
map[string]string{ |
||||
labelAuthors: author, |
||||
labelLicenses: license, |
||||
labelURL: projectURL, |
||||
labelSource: repositoryURL, |
||||
labelDocumentation: documentationURL, |
||||
labelDescription: description, |
||||
}, |
||||
metadata.Labels, |
||||
) |
||||
assert.Empty(t, metadata.MultiArch) |
||||
|
||||
configHelm := `{"description":"` + description + `", "home": "` + projectURL + `", "sources": ["` + repositoryURL + `"], "maintainers":[{"name":"` + author + `"}]}` |
||||
|
||||
metadata, err = ParseImageConfig(oci.MediaType(helm.ConfigMediaType), strings.NewReader(configHelm)) |
||||
assert.NoError(t, err) |
||||
|
||||
assert.Equal(t, TypeHelm, metadata.Type) |
||||
assert.Equal(t, description, metadata.Description) |
||||
assert.ElementsMatch(t, []string{author}, metadata.Authors) |
||||
assert.Equal(t, projectURL, metadata.ProjectURL) |
||||
assert.Equal(t, repositoryURL, metadata.RepositoryURL) |
||||
} |
@ -0,0 +1,27 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package oci |
||||
|
||||
import ( |
||||
"regexp" |
||||
"strings" |
||||
) |
||||
|
||||
var digestPattern = regexp.MustCompile(`\Asha256:[a-f0-9]{64}\z`) |
||||
|
||||
type Digest string |
||||
|
||||
// Validate checks if the digest has a valid SHA256 signature
|
||||
func (d Digest) Validate() bool { |
||||
return digestPattern.MatchString(string(d)) |
||||
} |
||||
|
||||
func (d Digest) Hash() string { |
||||
p := strings.SplitN(string(d), ":", 2) |
||||
if len(p) != 2 { |
||||
return "" |
||||
} |
||||
return p[1] |
||||
} |
@ -0,0 +1,36 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package oci |
||||
|
||||
import ( |
||||
"strings" |
||||
) |
||||
|
||||
const ( |
||||
MediaTypeImageManifest = "application/vnd.oci.image.manifest.v1+json" |
||||
MediaTypeImageIndex = "application/vnd.oci.image.index.v1+json" |
||||
MediaTypeDockerManifest = "application/vnd.docker.distribution.manifest.v2+json" |
||||
MediaTypeDockerManifestList = "application/vnd.docker.distribution.manifest.list.v2+json" |
||||
) |
||||
|
||||
type MediaType string |
||||
|
||||
// IsValid tests if the media type is in the OCI or Docker namespace
|
||||
func (m MediaType) IsValid() bool { |
||||
s := string(m) |
||||
return strings.HasPrefix(s, "application/vnd.docker.") || strings.HasPrefix(s, "application/vnd.oci.") |
||||
} |
||||
|
||||
// IsImageManifest tests if the media type is an image manifest
|
||||
func (m MediaType) IsImageManifest() bool { |
||||
s := string(m) |
||||
return strings.EqualFold(s, MediaTypeDockerManifest) || strings.EqualFold(s, MediaTypeImageManifest) |
||||
} |
||||
|
||||
// IsImageIndex tests if the media type is an image index
|
||||
func (m MediaType) IsImageIndex() bool { |
||||
s := string(m) |
||||
return strings.EqualFold(s, MediaTypeDockerManifestList) || strings.EqualFold(s, MediaTypeImageIndex) |
||||
} |
@ -0,0 +1,191 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package oci |
||||
|
||||
import ( |
||||
"time" |
||||
) |
||||
|
||||
// https://github.com/opencontainers/image-spec/tree/main/specs-go/v1
|
||||
|
||||
// ImageConfig defines the execution parameters which should be used as a base when running a container using an image.
|
||||
type ImageConfig struct { |
||||
// User defines the username or UID which the process in the container should run as.
|
||||
User string `json:"User,omitempty"` |
||||
|
||||
// ExposedPorts a set of ports to expose from a container running this image.
|
||||
ExposedPorts map[string]struct{} `json:"ExposedPorts,omitempty"` |
||||
|
||||
// Env is a list of environment variables to be used in a container.
|
||||
Env []string `json:"Env,omitempty"` |
||||
|
||||
// Entrypoint defines a list of arguments to use as the command to execute when the container starts.
|
||||
Entrypoint []string `json:"Entrypoint,omitempty"` |
||||
|
||||
// Cmd defines the default arguments to the entrypoint of the container.
|
||||
Cmd []string `json:"Cmd,omitempty"` |
||||
|
||||
// Volumes is a set of directories describing where the process is likely write data specific to a container instance.
|
||||
Volumes map[string]struct{} `json:"Volumes,omitempty"` |
||||
|
||||
// WorkingDir sets the current working directory of the entrypoint process in the container.
|
||||
WorkingDir string `json:"WorkingDir,omitempty"` |
||||
|
||||
// Labels contains arbitrary metadata for the container.
|
||||
Labels map[string]string `json:"Labels,omitempty"` |
||||
|
||||
// StopSignal contains the system call signal that will be sent to the container to exit.
|
||||
StopSignal string `json:"StopSignal,omitempty"` |
||||
} |
||||
|
||||
// RootFS describes a layer content addresses
|
||||
type RootFS struct { |
||||
// Type is the type of the rootfs.
|
||||
Type string `json:"type"` |
||||
|
||||
// DiffIDs is an array of layer content hashes, in order from bottom-most to top-most.
|
||||
DiffIDs []string `json:"diff_ids"` |
||||
} |
||||
|
||||
// History describes the history of a layer.
|
||||
type History struct { |
||||
// Created is the combined date and time at which the layer was created, formatted as defined by RFC 3339, section 5.6.
|
||||
Created *time.Time `json:"created,omitempty"` |
||||
|
||||
// CreatedBy is the command which created the layer.
|
||||
CreatedBy string `json:"created_by,omitempty"` |
||||
|
||||
// Author is the author of the build point.
|
||||
Author string `json:"author,omitempty"` |
||||
|
||||
// Comment is a custom message set when creating the layer.
|
||||
Comment string `json:"comment,omitempty"` |
||||
|
||||
// EmptyLayer is used to mark if the history item created a filesystem diff.
|
||||
EmptyLayer bool `json:"empty_layer,omitempty"` |
||||
} |
||||
|
||||
// Image is the JSON structure which describes some basic information about the image.
|
||||
// This provides the `application/vnd.oci.image.config.v1+json` mediatype when marshalled to JSON.
|
||||
type Image struct { |
||||
// Created is the combined date and time at which the image was created, formatted as defined by RFC 3339, section 5.6.
|
||||
Created *time.Time `json:"created,omitempty"` |
||||
|
||||
// Author defines the name and/or email address of the person or entity which created and is responsible for maintaining the image.
|
||||
Author string `json:"author,omitempty"` |
||||
|
||||
// Architecture is the CPU architecture which the binaries in this image are built to run on.
|
||||
Architecture string `json:"architecture"` |
||||
|
||||
// Variant is the variant of the specified CPU architecture which image binaries are intended to run on.
|
||||
Variant string `json:"variant,omitempty"` |
||||
|
||||
// OS is the name of the operating system which the image is built to run on.
|
||||
OS string `json:"os"` |
||||
|
||||
// OSVersion is an optional field specifying the operating system
|
||||
// version, for example on Windows `10.0.14393.1066`.
|
||||
OSVersion string `json:"os.version,omitempty"` |
||||
|
||||
// OSFeatures is an optional field specifying an array of strings,
|
||||
// each listing a required OS feature (for example on Windows `win32k`).
|
||||
OSFeatures []string `json:"os.features,omitempty"` |
||||
|
||||
// Config defines the execution parameters which should be used as a base when running a container using the image.
|
||||
Config ImageConfig `json:"config,omitempty"` |
||||
|
||||
// RootFS references the layer content addresses used by the image.
|
||||
RootFS RootFS `json:"rootfs"` |
||||
|
||||
// History describes the history of each layer.
|
||||
History []History `json:"history,omitempty"` |
||||
} |
||||
|
||||
// Descriptor describes the disposition of targeted content.
|
||||
// This structure provides `application/vnd.oci.descriptor.v1+json` mediatype
|
||||
// when marshalled to JSON.
|
||||
type Descriptor struct { |
||||
// MediaType is the media type of the object this schema refers to.
|
||||
MediaType MediaType `json:"mediaType,omitempty"` |
||||
|
||||
// Digest is the digest of the targeted content.
|
||||
Digest Digest `json:"digest"` |
||||
|
||||
// Size specifies the size in bytes of the blob.
|
||||
Size int64 `json:"size"` |
||||
|
||||
// URLs specifies a list of URLs from which this object MAY be downloaded
|
||||
URLs []string `json:"urls,omitempty"` |
||||
|
||||
// Annotations contains arbitrary metadata relating to the targeted content.
|
||||
Annotations map[string]string `json:"annotations,omitempty"` |
||||
|
||||
// Data is an embedding of the targeted content. This is encoded as a base64
|
||||
// string when marshalled to JSON (automatically, by encoding/json). If
|
||||
// present, Data can be used directly to avoid fetching the targeted content.
|
||||
Data []byte `json:"data,omitempty"` |
||||
|
||||
// Platform describes the platform which the image in the manifest runs on.
|
||||
//
|
||||
// This should only be used when referring to a manifest.
|
||||
Platform *Platform `json:"platform,omitempty"` |
||||
} |
||||
|
||||
// Platform describes the platform which the image in the manifest runs on.
|
||||
type Platform struct { |
||||
// Architecture field specifies the CPU architecture, for example
|
||||
// `amd64` or `ppc64`.
|
||||
Architecture string `json:"architecture"` |
||||
|
||||
// OS specifies the operating system, for example `linux` or `windows`.
|
||||
OS string `json:"os"` |
||||
|
||||
// OSVersion is an optional field specifying the operating system
|
||||
// version, for example on Windows `10.0.14393.1066`.
|
||||
OSVersion string `json:"os.version,omitempty"` |
||||
|
||||
// OSFeatures is an optional field specifying an array of strings,
|
||||
// each listing a required OS feature (for example on Windows `win32k`).
|
||||
OSFeatures []string `json:"os.features,omitempty"` |
||||
|
||||
// Variant is an optional field specifying a variant of the CPU, for
|
||||
// example `v7` to specify ARMv7 when architecture is `arm`.
|
||||
Variant string `json:"variant,omitempty"` |
||||
} |
||||
|
||||
type SchemaMediaBase struct { |
||||
// SchemaVersion is the image manifest schema that this image follows
|
||||
SchemaVersion int `json:"schemaVersion"` |
||||
|
||||
// MediaType specifies the type of this document data structure e.g. `application/vnd.oci.image.manifest.v1+json`
|
||||
MediaType MediaType `json:"mediaType,omitempty"` |
||||
} |
||||
|
||||
// Manifest provides `application/vnd.oci.image.manifest.v1+json` mediatype structure when marshalled to JSON.
|
||||
type Manifest struct { |
||||
SchemaMediaBase |
||||
|
||||
// Config references a configuration object for a container, by digest.
|
||||
// The referenced configuration object is a JSON blob that the runtime uses to set up the container.
|
||||
Config Descriptor `json:"config"` |
||||
|
||||
// Layers is an indexed list of layers referenced by the manifest.
|
||||
Layers []Descriptor `json:"layers"` |
||||
|
||||
// Annotations contains arbitrary metadata for the image manifest.
|
||||
Annotations map[string]string `json:"annotations,omitempty"` |
||||
} |
||||
|
||||
// Index references manifests for various platforms.
|
||||
// This structure provides `application/vnd.oci.image.index.v1+json` mediatype when marshalled to JSON.
|
||||
type Index struct { |
||||
SchemaMediaBase |
||||
|
||||
// Manifests references platform specific manifests.
|
||||
Manifests []Descriptor `json:"manifests"` |
||||
|
||||
// Annotations contains arbitrary metadata for the image index.
|
||||
Annotations map[string]string `json:"annotations,omitempty"` |
||||
} |
@ -0,0 +1,17 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package oci |
||||
|
||||
import ( |
||||
"regexp" |
||||
) |
||||
|
||||
var referencePattern = regexp.MustCompile(`\A[a-zA-Z0-9_][a-zA-Z0-9._-]{0,127}\z`) |
||||
|
||||
type Reference string |
||||
|
||||
func (r Reference) Validate() bool { |
||||
return referencePattern.MatchString(string(r)) |
||||
} |
@ -0,0 +1,47 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"io" |
||||
"path" |
||||
|
||||
"code.gitea.io/gitea/modules/storage" |
||||
) |
||||
|
||||
// BlobHash256Key is the key to address a blob content
|
||||
type BlobHash256Key string |
||||
|
||||
// ContentStore is a wrapper around ObjectStorage
|
||||
type ContentStore struct { |
||||
store storage.ObjectStorage |
||||
} |
||||
|
||||
// NewContentStore creates the default package store
|
||||
func NewContentStore() *ContentStore { |
||||
contentStore := &ContentStore{storage.Packages} |
||||
return contentStore |
||||
} |
||||
|
||||
// Get gets a package blob
|
||||
func (s *ContentStore) Get(key BlobHash256Key) (storage.Object, error) { |
||||
return s.store.Open(keyToRelativePath(key)) |
||||
} |
||||
|
||||
// Save stores a package blob
|
||||
func (s *ContentStore) Save(key BlobHash256Key, r io.Reader, size int64) error { |
||||
_, err := s.store.Save(keyToRelativePath(key), r, size) |
||||
return err |
||||
} |
||||
|
||||
// Delete deletes a package blob
|
||||
func (s *ContentStore) Delete(key BlobHash256Key) error { |
||||
return s.store.Delete(keyToRelativePath(key)) |
||||
} |
||||
|
||||
// keyToRelativePath converts the sha256 key aabb000000... to aa/bb/aabb000000...
|
||||
func keyToRelativePath(key BlobHash256Key) string { |
||||
return path.Join(string(key)[0:2], string(key)[2:4], string(key)) |
||||
} |
@ -0,0 +1,70 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"io" |
||||
|
||||
"code.gitea.io/gitea/modules/util/filebuffer" |
||||
) |
||||
|
||||
// HashedSizeReader provide methods to read, sum hashes and a Size method
|
||||
type HashedSizeReader interface { |
||||
io.Reader |
||||
HashSummer |
||||
Size() int64 |
||||
} |
||||
|
||||
// HashedBuffer is buffer which calculates multiple checksums
|
||||
type HashedBuffer struct { |
||||
*filebuffer.FileBackedBuffer |
||||
|
||||
hash *MultiHasher |
||||
|
||||
combinedWriter io.Writer |
||||
} |
||||
|
||||
// NewHashedBuffer creates a hashed buffer with a specific maximum memory size
|
||||
func NewHashedBuffer(maxMemorySize int) (*HashedBuffer, error) { |
||||
b, err := filebuffer.New(maxMemorySize) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
hash := NewMultiHasher() |
||||
|
||||
combinedWriter := io.MultiWriter(b, hash) |
||||
|
||||
return &HashedBuffer{ |
||||
b, |
||||
hash, |
||||
combinedWriter, |
||||
}, nil |
||||
} |
||||
|
||||
// CreateHashedBufferFromReader creates a hashed buffer and copies the provided reader data into it.
|
||||
func CreateHashedBufferFromReader(r io.Reader, maxMemorySize int) (*HashedBuffer, error) { |
||||
b, err := NewHashedBuffer(maxMemorySize) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
_, err = io.Copy(b, r) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
return b, nil |
||||
} |
||||
|
||||
// Write implements io.Writer
|
||||
func (b *HashedBuffer) Write(p []byte) (int, error) { |
||||
return b.combinedWriter.Write(p) |
||||
} |
||||
|
||||
// Sums gets the MD5, SHA1, SHA256 and SHA512 checksums of the data
|
||||
func (b *HashedBuffer) Sums() (hashMD5, hashSHA1, hashSHA256, hashSHA512 []byte) { |
||||
return b.hash.Sums() |
||||
} |
@ -0,0 +1,89 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package maven |
||||
|
||||
import ( |
||||
"encoding/xml" |
||||
"io" |
||||
|
||||
"code.gitea.io/gitea/modules/validation" |
||||
) |
||||
|
||||
// Metadata represents the metadata of a Maven package
|
||||
type Metadata struct { |
||||
GroupID string `json:"group_id,omitempty"` |
||||
ArtifactID string `json:"artifact_id,omitempty"` |
||||
Name string `json:"name,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
Licenses []string `json:"licenses,omitempty"` |
||||
Dependencies []*Dependency `json:"dependencies,omitempty"` |
||||
} |
||||
|
||||
// Dependency represents a dependency of a Maven package
|
||||
type Dependency struct { |
||||
GroupID string `json:"group_id,omitempty"` |
||||
ArtifactID string `json:"artifact_id,omitempty"` |
||||
Version string `json:"version,omitempty"` |
||||
} |
||||
|
||||
type pomStruct struct { |
||||
XMLName xml.Name `xml:"project"` |
||||
GroupID string `xml:"groupId"` |
||||
ArtifactID string `xml:"artifactId"` |
||||
Version string `xml:"version"` |
||||
Name string `xml:"name"` |
||||
Description string `xml:"description"` |
||||
URL string `xml:"url"` |
||||
Licenses []struct { |
||||
Name string `xml:"name"` |
||||
URL string `xml:"url"` |
||||
Distribution string `xml:"distribution"` |
||||
} `xml:"licenses>license"` |
||||
Dependencies []struct { |
||||
GroupID string `xml:"groupId"` |
||||
ArtifactID string `xml:"artifactId"` |
||||
Version string `xml:"version"` |
||||
Scope string `xml:"scope"` |
||||
} `xml:"dependencies>dependency"` |
||||
} |
||||
|
||||
// ParsePackageMetaData parses the metadata of a pom file
|
||||
func ParsePackageMetaData(r io.Reader) (*Metadata, error) { |
||||
var pom pomStruct |
||||
if err := xml.NewDecoder(r).Decode(&pom); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if !validation.IsValidURL(pom.URL) { |
||||
pom.URL = "" |
||||
} |
||||
|
||||
licenses := make([]string, 0, len(pom.Licenses)) |
||||
for _, l := range pom.Licenses { |
||||
if l.Name != "" { |
||||
licenses = append(licenses, l.Name) |
||||
} |
||||
} |
||||
|
||||
dependencies := make([]*Dependency, 0, len(pom.Dependencies)) |
||||
for _, d := range pom.Dependencies { |
||||
dependencies = append(dependencies, &Dependency{ |
||||
GroupID: d.GroupID, |
||||
ArtifactID: d.ArtifactID, |
||||
Version: d.Version, |
||||
}) |
||||
} |
||||
|
||||
return &Metadata{ |
||||
GroupID: pom.GroupID, |
||||
ArtifactID: pom.ArtifactID, |
||||
Name: pom.Name, |
||||
Description: pom.Description, |
||||
ProjectURL: pom.URL, |
||||
Licenses: licenses, |
||||
Dependencies: dependencies, |
||||
}, nil |
||||
} |
@ -0,0 +1,73 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package maven |
||||
|
||||
import ( |
||||
"strings" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
groupID = "org.gitea" |
||||
artifactID = "my-project" |
||||
version = "1.0.1" |
||||
name = "My Gitea Project" |
||||
description = "Package Description" |
||||
projectURL = "https://gitea.io" |
||||
license = "MIT" |
||||
dependencyGroupID = "org.gitea.core" |
||||
dependencyArtifactID = "git" |
||||
dependencyVersion = "5.0.0" |
||||
) |
||||
|
||||
const pomContent = `<?xml version="1.0"?> |
||||
<project xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/xsd/maven-4.0.0.xsd"> |
||||
<groupId>` + groupID + `</groupId> |
||||
<artifactId>` + artifactID + `</artifactId> |
||||
<version>` + version + `</version> |
||||
<name>` + name + `</name> |
||||
<description>` + description + `</description> |
||||
<url>` + projectURL + `</url> |
||||
<licenses> |
||||
<license> |
||||
<name>` + license + `</name> |
||||
</license> |
||||
</licenses> |
||||
<dependencies> |
||||
<dependency> |
||||
<groupId>` + dependencyGroupID + `</groupId> |
||||
<artifactId>` + dependencyArtifactID + `</artifactId> |
||||
<version>` + dependencyVersion + `</version> |
||||
</dependency> |
||||
</dependencies> |
||||
</project>` |
||||
|
||||
func TestParsePackageMetaData(t *testing.T) { |
||||
t.Run("InvalidFile", func(t *testing.T) { |
||||
m, err := ParsePackageMetaData(strings.NewReader("")) |
||||
assert.Nil(t, m) |
||||
assert.Error(t, err) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
m, err := ParsePackageMetaData(strings.NewReader(pomContent)) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, m) |
||||
|
||||
assert.Equal(t, groupID, m.GroupID) |
||||
assert.Equal(t, artifactID, m.ArtifactID) |
||||
assert.Equal(t, name, m.Name) |
||||
assert.Equal(t, description, m.Description) |
||||
assert.Equal(t, projectURL, m.ProjectURL) |
||||
assert.Len(t, m.Licenses, 1) |
||||
assert.Equal(t, license, m.Licenses[0]) |
||||
assert.Len(t, m.Dependencies, 1) |
||||
assert.Equal(t, dependencyGroupID, m.Dependencies[0].GroupID) |
||||
assert.Equal(t, dependencyArtifactID, m.Dependencies[0].ArtifactID) |
||||
assert.Equal(t, dependencyVersion, m.Dependencies[0].Version) |
||||
}) |
||||
} |
@ -0,0 +1,123 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"crypto/md5" |
||||
"crypto/sha1" |
||||
"crypto/sha256" |
||||
"crypto/sha512" |
||||
"encoding" |
||||
"errors" |
||||
"hash" |
||||
"io" |
||||
) |
||||
|
||||
const ( |
||||
marshaledSizeMD5 = 92 |
||||
marshaledSizeSHA1 = 96 |
||||
marshaledSizeSHA256 = 108 |
||||
marshaledSizeSHA512 = 204 |
||||
|
||||
marshaledSize = marshaledSizeMD5 + marshaledSizeSHA1 + marshaledSizeSHA256 + marshaledSizeSHA512 |
||||
) |
||||
|
||||
// HashSummer provide a Sums method
|
||||
type HashSummer interface { |
||||
Sums() (hashMD5, hashSHA1, hashSHA256, hashSHA512 []byte) |
||||
} |
||||
|
||||
// MultiHasher calculates multiple checksums
|
||||
type MultiHasher struct { |
||||
md5 hash.Hash |
||||
sha1 hash.Hash |
||||
sha256 hash.Hash |
||||
sha512 hash.Hash |
||||
|
||||
combinedWriter io.Writer |
||||
} |
||||
|
||||
// NewMultiHasher creates a multi hasher
|
||||
func NewMultiHasher() *MultiHasher { |
||||
md5 := md5.New() |
||||
sha1 := sha1.New() |
||||
sha256 := sha256.New() |
||||
sha512 := sha512.New() |
||||
|
||||
combinedWriter := io.MultiWriter(md5, sha1, sha256, sha512) |
||||
|
||||
return &MultiHasher{ |
||||
md5, |
||||
sha1, |
||||
sha256, |
||||
sha512, |
||||
combinedWriter, |
||||
} |
||||
} |
||||
|
||||
// MarshalBinary implements encoding.BinaryMarshaler
|
||||
func (h *MultiHasher) MarshalBinary() ([]byte, error) { |
||||
md5Bytes, err := h.md5.(encoding.BinaryMarshaler).MarshalBinary() |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
sha1Bytes, err := h.sha1.(encoding.BinaryMarshaler).MarshalBinary() |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
sha256Bytes, err := h.sha256.(encoding.BinaryMarshaler).MarshalBinary() |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
sha512Bytes, err := h.sha512.(encoding.BinaryMarshaler).MarshalBinary() |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
b := make([]byte, 0, marshaledSize) |
||||
b = append(b, md5Bytes...) |
||||
b = append(b, sha1Bytes...) |
||||
b = append(b, sha256Bytes...) |
||||
b = append(b, sha512Bytes...) |
||||
return b, nil |
||||
} |
||||
|
||||
// UnmarshalBinary implements encoding.BinaryUnmarshaler
|
||||
func (h *MultiHasher) UnmarshalBinary(b []byte) error { |
||||
if len(b) != marshaledSize { |
||||
return errors.New("invalid hash state size") |
||||
} |
||||
|
||||
if err := h.md5.(encoding.BinaryUnmarshaler).UnmarshalBinary(b[:marshaledSizeMD5]); err != nil { |
||||
return err |
||||
} |
||||
|
||||
b = b[marshaledSizeMD5:] |
||||
if err := h.sha1.(encoding.BinaryUnmarshaler).UnmarshalBinary(b[:marshaledSizeSHA1]); err != nil { |
||||
return err |
||||
} |
||||
|
||||
b = b[marshaledSizeSHA1:] |
||||
if err := h.sha256.(encoding.BinaryUnmarshaler).UnmarshalBinary(b[:marshaledSizeSHA256]); err != nil { |
||||
return err |
||||
} |
||||
|
||||
b = b[marshaledSizeSHA256:] |
||||
return h.sha512.(encoding.BinaryUnmarshaler).UnmarshalBinary(b[:marshaledSizeSHA512]) |
||||
} |
||||
|
||||
// Write implements io.Writer
|
||||
func (h *MultiHasher) Write(p []byte) (int, error) { |
||||
return h.combinedWriter.Write(p) |
||||
} |
||||
|
||||
// Sums gets the MD5, SHA1, SHA256 and SHA512 checksums of the data
|
||||
func (h *MultiHasher) Sums() (hashMD5, hashSHA1, hashSHA256, hashSHA512 []byte) { |
||||
hashMD5 = h.md5.Sum(nil) |
||||
hashSHA1 = h.sha1.Sum(nil) |
||||
hashSHA256 = h.sha256.Sum(nil) |
||||
hashSHA512 = h.sha512.Sum(nil) |
||||
return |
||||
} |
@ -0,0 +1,54 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package packages |
||||
|
||||
import ( |
||||
"fmt" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
expectedMD5 = "e3bef03c5f3b7f6b3ab3e3053ed71e9c" |
||||
expectedSHA1 = "060b3b99f88e96085b4a68e095bc9e3d1d91e1bc" |
||||
expectedSHA256 = "6ccce4863b70f258d691f59609d31b4502e1ba5199942d3bc5d35d17a4ce771d" |
||||
expectedSHA512 = "7f70e439ba8c52025c1f06cdf6ae443c4b8ed2e90059cdb9bbbf8adf80846f185a24acca9245b128b226d61753b0d7ed46580a69c8999eeff3bc13a4d0bd816c" |
||||
) |
||||
|
||||
func TestMultiHasherSums(t *testing.T) { |
||||
t.Run("Sums", func(t *testing.T) { |
||||
h := NewMultiHasher() |
||||
h.Write([]byte("gitea")) |
||||
|
||||
hashMD5, hashSHA1, hashSHA256, hashSHA512 := h.Sums() |
||||
|
||||
assert.Equal(t, expectedMD5, fmt.Sprintf("%x", hashMD5)) |
||||
assert.Equal(t, expectedSHA1, fmt.Sprintf("%x", hashSHA1)) |
||||
assert.Equal(t, expectedSHA256, fmt.Sprintf("%x", hashSHA256)) |
||||
assert.Equal(t, expectedSHA512, fmt.Sprintf("%x", hashSHA512)) |
||||
}) |
||||
|
||||
t.Run("State", func(t *testing.T) { |
||||
h := NewMultiHasher() |
||||
h.Write([]byte("git")) |
||||
|
||||
state, err := h.MarshalBinary() |
||||
assert.NoError(t, err) |
||||
|
||||
h2 := NewMultiHasher() |
||||
err = h2.UnmarshalBinary(state) |
||||
assert.NoError(t, err) |
||||
|
||||
h2.Write([]byte("ea")) |
||||
|
||||
hashMD5, hashSHA1, hashSHA256, hashSHA512 := h2.Sums() |
||||
|
||||
assert.Equal(t, expectedMD5, fmt.Sprintf("%x", hashMD5)) |
||||
assert.Equal(t, expectedSHA1, fmt.Sprintf("%x", hashSHA1)) |
||||
assert.Equal(t, expectedSHA256, fmt.Sprintf("%x", hashSHA256)) |
||||
assert.Equal(t, expectedSHA512, fmt.Sprintf("%x", hashSHA512)) |
||||
}) |
||||
} |
@ -0,0 +1,256 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package npm |
||||
|
||||
import ( |
||||
"bytes" |
||||
"crypto/sha1" |
||||
"crypto/sha512" |
||||
"encoding/base64" |
||||
"errors" |
||||
"fmt" |
||||
"io" |
||||
"regexp" |
||||
"strings" |
||||
"time" |
||||
|
||||
"code.gitea.io/gitea/modules/json" |
||||
"code.gitea.io/gitea/modules/validation" |
||||
|
||||
"github.com/hashicorp/go-version" |
||||
) |
||||
|
||||
var ( |
||||
// ErrInvalidPackage indicates an invalid package
|
||||
ErrInvalidPackage = errors.New("The package is invalid") |
||||
// ErrInvalidPackageName indicates an invalid name
|
||||
ErrInvalidPackageName = errors.New("The package name is invalid") |
||||
// ErrInvalidPackageVersion indicates an invalid version
|
||||
ErrInvalidPackageVersion = errors.New("The package version is invalid") |
||||
// ErrInvalidAttachment indicates a invalid attachment
|
||||
ErrInvalidAttachment = errors.New("The package attachment is invalid") |
||||
// ErrInvalidIntegrity indicates an integrity validation error
|
||||
ErrInvalidIntegrity = errors.New("Failed to validate integrity") |
||||
) |
||||
|
||||
var nameMatch = regexp.MustCompile(`\A((@[^\s\/~'!\(\)\*]+?)[\/])?([^_.][^\s\/~'!\(\)\*]+)\z`) |
||||
|
||||
// Package represents a npm package
|
||||
type Package struct { |
||||
Name string |
||||
Version string |
||||
DistTags []string |
||||
Metadata Metadata |
||||
Filename string |
||||
Data []byte |
||||
} |
||||
|
||||
// PackageMetadata https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#package
|
||||
type PackageMetadata struct { |
||||
ID string `json:"_id"` |
||||
Name string `json:"name"` |
||||
Description string `json:"description"` |
||||
DistTags map[string]string `json:"dist-tags,omitempty"` |
||||
Versions map[string]*PackageMetadataVersion `json:"versions"` |
||||
Readme string `json:"readme,omitempty"` |
||||
Maintainers []User `json:"maintainers,omitempty"` |
||||
Time map[string]time.Time `json:"time,omitempty"` |
||||
Homepage string `json:"homepage,omitempty"` |
||||
Keywords []string `json:"keywords,omitempty"` |
||||
Repository Repository `json:"repository,omitempty"` |
||||
Author User `json:"author"` |
||||
ReadmeFilename string `json:"readmeFilename,omitempty"` |
||||
Users map[string]bool `json:"users,omitempty"` |
||||
License string `json:"license,omitempty"` |
||||
} |
||||
|
||||
// PackageMetadataVersion https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#version
|
||||
type PackageMetadataVersion struct { |
||||
ID string `json:"_id"` |
||||
Name string `json:"name"` |
||||
Version string `json:"version"` |
||||
Description string `json:"description"` |
||||
Author User `json:"author"` |
||||
Homepage string `json:"homepage,omitempty"` |
||||
License string `json:"license,omitempty"` |
||||
Repository Repository `json:"repository,omitempty"` |
||||
Keywords []string `json:"keywords,omitempty"` |
||||
Dependencies map[string]string `json:"dependencies,omitempty"` |
||||
DevDependencies map[string]string `json:"devDependencies,omitempty"` |
||||
PeerDependencies map[string]string `json:"peerDependencies,omitempty"` |
||||
OptionalDependencies map[string]string `json:"optionalDependencies,omitempty"` |
||||
Readme string `json:"readme,omitempty"` |
||||
Dist PackageDistribution `json:"dist"` |
||||
Maintainers []User `json:"maintainers,omitempty"` |
||||
} |
||||
|
||||
// PackageDistribution https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#version
|
||||
type PackageDistribution struct { |
||||
Integrity string `json:"integrity"` |
||||
Shasum string `json:"shasum"` |
||||
Tarball string `json:"tarball"` |
||||
FileCount int `json:"fileCount,omitempty"` |
||||
UnpackedSize int `json:"unpackedSize,omitempty"` |
||||
NpmSignature string `json:"npm-signature,omitempty"` |
||||
} |
||||
|
||||
// User https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#package
|
||||
type User struct { |
||||
Username string `json:"username,omitempty"` |
||||
Name string `json:"name"` |
||||
Email string `json:"email,omitempty"` |
||||
URL string `json:"url,omitempty"` |
||||
} |
||||
|
||||
// UnmarshalJSON is needed because User objects can be strings or objects
|
||||
func (u *User) UnmarshalJSON(data []byte) error { |
||||
switch data[0] { |
||||
case '"': |
||||
if err := json.Unmarshal(data, &u.Name); err != nil { |
||||
return err |
||||
} |
||||
case '{': |
||||
var tmp struct { |
||||
Username string `json:"username"` |
||||
Name string `json:"name"` |
||||
Email string `json:"email"` |
||||
URL string `json:"url"` |
||||
} |
||||
if err := json.Unmarshal(data, &tmp); err != nil { |
||||
return err |
||||
} |
||||
u.Username = tmp.Username |
||||
u.Name = tmp.Name |
||||
u.Email = tmp.Email |
||||
u.URL = tmp.URL |
||||
} |
||||
return nil |
||||
} |
||||
|
||||
// Repository https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#version
|
||||
type Repository struct { |
||||
Type string `json:"type"` |
||||
URL string `json:"url"` |
||||
} |
||||
|
||||
// PackageAttachment https://github.com/npm/registry/blob/master/docs/REGISTRY-API.md#package
|
||||
type PackageAttachment struct { |
||||
ContentType string `json:"content_type"` |
||||
Data string `json:"data"` |
||||
Length int `json:"length"` |
||||
} |
||||
|
||||
type packageUpload struct { |
||||
PackageMetadata |
||||
Attachments map[string]*PackageAttachment `json:"_attachments"` |
||||
} |
||||
|
||||
// ParsePackage parses the content into a npm package
|
||||
func ParsePackage(r io.Reader) (*Package, error) { |
||||
var upload packageUpload |
||||
if err := json.NewDecoder(r).Decode(&upload); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
for _, meta := range upload.Versions { |
||||
if !validateName(meta.Name) { |
||||
return nil, ErrInvalidPackageName |
||||
} |
||||
|
||||
v, err := version.NewSemver(meta.Version) |
||||
if err != nil { |
||||
return nil, ErrInvalidPackageVersion |
||||
} |
||||
|
||||
scope := "" |
||||
name := meta.Name |
||||
nameParts := strings.SplitN(meta.Name, "/", 2) |
||||
if len(nameParts) == 2 { |
||||
scope = nameParts[0] |
||||
name = nameParts[1] |
||||
} |
||||
|
||||
if !validation.IsValidURL(meta.Homepage) { |
||||
meta.Homepage = "" |
||||
} |
||||
|
||||
p := &Package{ |
||||
Name: meta.Name, |
||||
Version: v.String(), |
||||
DistTags: make([]string, 0, 1), |
||||
Metadata: Metadata{ |
||||
Scope: scope, |
||||
Name: name, |
||||
Description: meta.Description, |
||||
Author: meta.Author.Name, |
||||
License: meta.License, |
||||
ProjectURL: meta.Homepage, |
||||
Keywords: meta.Keywords, |
||||
Dependencies: meta.Dependencies, |
||||
DevelopmentDependencies: meta.DevDependencies, |
||||
PeerDependencies: meta.PeerDependencies, |
||||
OptionalDependencies: meta.OptionalDependencies, |
||||
Readme: meta.Readme, |
||||
}, |
||||
} |
||||
|
||||
for tag := range upload.DistTags { |
||||
p.DistTags = append(p.DistTags, tag) |
||||
} |
||||
|
||||
p.Filename = strings.ToLower(fmt.Sprintf("%s-%s.tgz", name, p.Version)) |
||||
|
||||
attachment := func() *PackageAttachment { |
||||
for _, a := range upload.Attachments { |
||||
return a |
||||
} |
||||
return nil |
||||
}() |
||||
if attachment == nil || len(attachment.Data) == 0 { |
||||
return nil, ErrInvalidAttachment |
||||
} |
||||
|
||||
data, err := base64.StdEncoding.DecodeString(attachment.Data) |
||||
if err != nil { |
||||
return nil, ErrInvalidAttachment |
||||
} |
||||
p.Data = data |
||||
|
||||
integrity := strings.SplitN(meta.Dist.Integrity, "-", 2) |
||||
if len(integrity) != 2 { |
||||
return nil, ErrInvalidIntegrity |
||||
} |
||||
integrityHash, err := base64.StdEncoding.DecodeString(integrity[1]) |
||||
if err != nil { |
||||
return nil, ErrInvalidIntegrity |
||||
} |
||||
var hash []byte |
||||
switch integrity[0] { |
||||
case "sha1": |
||||
tmp := sha1.Sum(data) |
||||
hash = tmp[:] |
||||
case "sha512": |
||||
tmp := sha512.Sum512(data) |
||||
hash = tmp[:] |
||||
} |
||||
if !bytes.Equal(integrityHash, hash) { |
||||
return nil, ErrInvalidIntegrity |
||||
} |
||||
|
||||
return p, nil |
||||
} |
||||
|
||||
return nil, ErrInvalidPackage |
||||
} |
||||
|
||||
func validateName(name string) bool { |
||||
if strings.TrimSpace(name) != name { |
||||
return false |
||||
} |
||||
if len(name) == 0 || len(name) > 214 { |
||||
return false |
||||
} |
||||
return nameMatch.MatchString(name) |
||||
} |
@ -0,0 +1,272 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package npm |
||||
|
||||
import ( |
||||
"bytes" |
||||
"encoding/base64" |
||||
"fmt" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"code.gitea.io/gitea/modules/json" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestParsePackage(t *testing.T) { |
||||
packageScope := "@scope" |
||||
packageName := "test-package" |
||||
packageFullName := packageScope + "/" + packageName |
||||
packageVersion := "1.0.1-pre" |
||||
packageTag := "latest" |
||||
packageAuthor := "KN4CK3R" |
||||
packageDescription := "Test Description" |
||||
data := "H4sIAAAAAAAA/ytITM5OTE/VL4DQelnF+XkMVAYGBgZmJiYK2MRBwNDcSIHB2NTMwNDQzMwAqA7IMDUxA9LUdgg2UFpcklgEdAql5kD8ogCnhwio5lJQUMpLzE1VslJQcihOzi9I1S9JLS7RhSYIJR2QgrLUouLM/DyQGkM9Az1D3YIiqExKanFyUWZBCVQ2BKhVwQVJDKwosbQkI78IJO/tZ+LsbRykxFXLNdA+HwWjYBSMgpENACgAbtAACAAA" |
||||
integrity := "sha512-yA4FJsVhetynGfOC1jFf79BuS+jrHbm0fhh+aHzCQkOaOBXKf9oBnC4a6DnLLnEsHQDRLYd00cwj8sCXpC+wIg==" |
||||
|
||||
t.Run("InvalidUpload", func(t *testing.T) { |
||||
p, err := ParsePackage(bytes.NewReader([]byte{0})) |
||||
assert.Nil(t, p) |
||||
assert.Error(t, err) |
||||
}) |
||||
|
||||
t.Run("InvalidUploadNoData", func(t *testing.T) { |
||||
b, _ := json.Marshal(packageUpload{}) |
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidPackage) |
||||
}) |
||||
|
||||
t.Run("InvalidPackageName", func(t *testing.T) { |
||||
test := func(t *testing.T, name string) { |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: name, |
||||
Name: name, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: name, |
||||
}, |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidPackageName) |
||||
} |
||||
|
||||
test(t, " test ") |
||||
test(t, " test") |
||||
test(t, "test ") |
||||
test(t, "te st") |
||||
test(t, "invalid/scope") |
||||
test(t, "@invalid/_name") |
||||
test(t, "@invalid/.name") |
||||
}) |
||||
|
||||
t.Run("ValidPackageName", func(t *testing.T) { |
||||
test := func(t *testing.T, name string) { |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: name, |
||||
Name: name, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: name, |
||||
}, |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidPackageVersion) |
||||
} |
||||
|
||||
test(t, "test") |
||||
test(t, "@scope/name") |
||||
test(t, packageFullName) |
||||
}) |
||||
|
||||
t.Run("InvalidPackageVersion", func(t *testing.T) { |
||||
version := "first-version" |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
version: { |
||||
Name: packageFullName, |
||||
Version: version, |
||||
}, |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidPackageVersion) |
||||
}) |
||||
|
||||
t.Run("InvalidAttachment", func(t *testing.T) { |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: packageFullName, |
||||
Version: packageVersion, |
||||
}, |
||||
}, |
||||
}, |
||||
Attachments: map[string]*PackageAttachment{ |
||||
"dummy.tgz": {}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidAttachment) |
||||
}) |
||||
|
||||
t.Run("InvalidData", func(t *testing.T) { |
||||
filename := fmt.Sprintf("%s-%s.tgz", packageFullName, packageVersion) |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: packageFullName, |
||||
Version: packageVersion, |
||||
}, |
||||
}, |
||||
}, |
||||
Attachments: map[string]*PackageAttachment{ |
||||
filename: { |
||||
Data: "/", |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidAttachment) |
||||
}) |
||||
|
||||
t.Run("InvalidIntegrity", func(t *testing.T) { |
||||
filename := fmt.Sprintf("%s-%s.tgz", packageFullName, packageVersion) |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: packageFullName, |
||||
Version: packageVersion, |
||||
Dist: PackageDistribution{ |
||||
Integrity: "sha512-test==", |
||||
}, |
||||
}, |
||||
}, |
||||
}, |
||||
Attachments: map[string]*PackageAttachment{ |
||||
filename: { |
||||
Data: data, |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidIntegrity) |
||||
}) |
||||
|
||||
t.Run("InvalidIntegrity2", func(t *testing.T) { |
||||
filename := fmt.Sprintf("%s-%s.tgz", packageFullName, packageVersion) |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: packageFullName, |
||||
Version: packageVersion, |
||||
Dist: PackageDistribution{ |
||||
Integrity: integrity, |
||||
}, |
||||
}, |
||||
}, |
||||
}, |
||||
Attachments: map[string]*PackageAttachment{ |
||||
filename: { |
||||
Data: base64.StdEncoding.EncodeToString([]byte("data")), |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.Nil(t, p) |
||||
assert.ErrorIs(t, err, ErrInvalidIntegrity) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
filename := fmt.Sprintf("%s-%s.tgz", packageFullName, packageVersion) |
||||
b, _ := json.Marshal(packageUpload{ |
||||
PackageMetadata: PackageMetadata{ |
||||
ID: packageFullName, |
||||
Name: packageFullName, |
||||
DistTags: map[string]string{ |
||||
packageTag: packageVersion, |
||||
}, |
||||
Versions: map[string]*PackageMetadataVersion{ |
||||
packageVersion: { |
||||
Name: packageFullName, |
||||
Version: packageVersion, |
||||
Description: packageDescription, |
||||
Author: User{Name: packageAuthor}, |
||||
License: "MIT", |
||||
Homepage: "https://gitea.io/", |
||||
Readme: packageDescription, |
||||
Dependencies: map[string]string{ |
||||
"package": "1.2.0", |
||||
}, |
||||
Dist: PackageDistribution{ |
||||
Integrity: integrity, |
||||
}, |
||||
}, |
||||
}, |
||||
}, |
||||
Attachments: map[string]*PackageAttachment{ |
||||
filename: { |
||||
Data: data, |
||||
}, |
||||
}, |
||||
}) |
||||
|
||||
p, err := ParsePackage(bytes.NewReader(b)) |
||||
assert.NotNil(t, p) |
||||
assert.NoError(t, err) |
||||
|
||||
assert.Equal(t, packageFullName, p.Name) |
||||
assert.Equal(t, packageVersion, p.Version) |
||||
assert.Equal(t, []string{packageTag}, p.DistTags) |
||||
assert.Equal(t, fmt.Sprintf("%s-%s.tgz", strings.Split(packageFullName, "/")[1], packageVersion), p.Filename) |
||||
b, _ = base64.StdEncoding.DecodeString(data) |
||||
assert.Equal(t, b, p.Data) |
||||
assert.Equal(t, packageName, p.Metadata.Name) |
||||
assert.Equal(t, packageScope, p.Metadata.Scope) |
||||
assert.Equal(t, packageDescription, p.Metadata.Description) |
||||
assert.Equal(t, packageDescription, p.Metadata.Readme) |
||||
assert.Equal(t, packageAuthor, p.Metadata.Author) |
||||
assert.Equal(t, "MIT", p.Metadata.License) |
||||
assert.Equal(t, "https://gitea.io/", p.Metadata.ProjectURL) |
||||
assert.Contains(t, p.Metadata.Dependencies, "package") |
||||
assert.Equal(t, "1.2.0", p.Metadata.Dependencies["package"]) |
||||
}) |
||||
} |
@ -0,0 +1,24 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package npm |
||||
|
||||
// TagProperty is the name of the property for tag management
|
||||
const TagProperty = "npm.tag" |
||||
|
||||
// Metadata represents the metadata of a npm package
|
||||
type Metadata struct { |
||||
Scope string `json:"scope,omitempty"` |
||||
Name string `json:"name,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
Author string `json:"author,omitempty"` |
||||
License string `json:"license,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
Keywords []string `json:"keywords,omitempty"` |
||||
Dependencies map[string]string `json:"dependencies,omitempty"` |
||||
DevelopmentDependencies map[string]string `json:"development_dependencies,omitempty"` |
||||
PeerDependencies map[string]string `json:"peer_dependencies,omitempty"` |
||||
OptionalDependencies map[string]string `json:"optional_dependencies,omitempty"` |
||||
Readme string `json:"readme,omitempty"` |
||||
} |
@ -0,0 +1,187 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package nuget |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"encoding/xml" |
||||
"errors" |
||||
"io" |
||||
"path/filepath" |
||||
"regexp" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/modules/validation" |
||||
|
||||
"github.com/hashicorp/go-version" |
||||
) |
||||
|
||||
var ( |
||||
// ErrMissingNuspecFile indicates a missing Nuspec file
|
||||
ErrMissingNuspecFile = errors.New("Nuspec file is missing") |
||||
// ErrNuspecFileTooLarge indicates a Nuspec file which is too large
|
||||
ErrNuspecFileTooLarge = errors.New("Nuspec file is too large") |
||||
// ErrNuspecInvalidID indicates an invalid id in the Nuspec file
|
||||
ErrNuspecInvalidID = errors.New("Nuspec file contains an invalid id") |
||||
// ErrNuspecInvalidVersion indicates an invalid version in the Nuspec file
|
||||
ErrNuspecInvalidVersion = errors.New("Nuspec file contains an invalid version") |
||||
) |
||||
|
||||
// PackageType specifies the package type the metadata describes
|
||||
type PackageType int |
||||
|
||||
const ( |
||||
// DependencyPackage represents a package (*.nupkg)
|
||||
DependencyPackage PackageType = iota + 1 |
||||
// SymbolsPackage represents a symbol package (*.snupkg)
|
||||
SymbolsPackage |
||||
|
||||
PropertySymbolID = "nuget.symbol.id" |
||||
) |
||||
|
||||
var idmatch = regexp.MustCompile(`\A\w+(?:[.-]\w+)*\z`) |
||||
|
||||
const maxNuspecFileSize = 3 * 1024 * 1024 |
||||
|
||||
// Package represents a Nuget package
|
||||
type Package struct { |
||||
PackageType PackageType |
||||
ID string |
||||
Version string |
||||
Metadata *Metadata |
||||
} |
||||
|
||||
// Metadata represents the metadata of a Nuget package
|
||||
type Metadata struct { |
||||
Description string `json:"description,omitempty"` |
||||
ReleaseNotes string `json:"release_notes,omitempty"` |
||||
Authors string `json:"authors,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
RepositoryURL string `json:"repository_url,omitempty"` |
||||
Dependencies map[string][]Dependency `json:"dependencies,omitempty"` |
||||
} |
||||
|
||||
// Dependency represents a dependency of a Nuget package
|
||||
type Dependency struct { |
||||
ID string `json:"id"` |
||||
Version string `json:"version"` |
||||
} |
||||
|
||||
type nuspecPackage struct { |
||||
Metadata struct { |
||||
ID string `xml:"id"` |
||||
Version string `xml:"version"` |
||||
Authors string `xml:"authors"` |
||||
RequireLicenseAcceptance bool `xml:"requireLicenseAcceptance"` |
||||
ProjectURL string `xml:"projectUrl"` |
||||
Description string `xml:"description"` |
||||
ReleaseNotes string `xml:"releaseNotes"` |
||||
PackageTypes struct { |
||||
PackageType []struct { |
||||
Name string `xml:"name,attr"` |
||||
} `xml:"packageType"` |
||||
} `xml:"packageTypes"` |
||||
Repository struct { |
||||
URL string `xml:"url,attr"` |
||||
} `xml:"repository"` |
||||
Dependencies struct { |
||||
Group []struct { |
||||
TargetFramework string `xml:"targetFramework,attr"` |
||||
Dependency []struct { |
||||
ID string `xml:"id,attr"` |
||||
Version string `xml:"version,attr"` |
||||
Exclude string `xml:"exclude,attr"` |
||||
} `xml:"dependency"` |
||||
} `xml:"group"` |
||||
} `xml:"dependencies"` |
||||
} `xml:"metadata"` |
||||
} |
||||
|
||||
// ParsePackageMetaData parses the metadata of a Nuget package file
|
||||
func ParsePackageMetaData(r io.ReaderAt, size int64) (*Package, error) { |
||||
archive, err := zip.NewReader(r, size) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
for _, file := range archive.File { |
||||
if filepath.Dir(file.Name) != "." { |
||||
continue |
||||
} |
||||
if strings.HasSuffix(strings.ToLower(file.Name), ".nuspec") { |
||||
if file.UncompressedSize64 > maxNuspecFileSize { |
||||
return nil, ErrNuspecFileTooLarge |
||||
} |
||||
f, err := archive.Open(file.Name) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
defer f.Close() |
||||
|
||||
return ParseNuspecMetaData(f) |
||||
} |
||||
} |
||||
return nil, ErrMissingNuspecFile |
||||
} |
||||
|
||||
// ParseNuspecMetaData parses a Nuspec file to retrieve the metadata of a Nuget package
|
||||
func ParseNuspecMetaData(r io.Reader) (*Package, error) { |
||||
var p nuspecPackage |
||||
if err := xml.NewDecoder(r).Decode(&p); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if !idmatch.MatchString(p.Metadata.ID) { |
||||
return nil, ErrNuspecInvalidID |
||||
} |
||||
|
||||
v, err := version.NewSemver(p.Metadata.Version) |
||||
if err != nil { |
||||
return nil, ErrNuspecInvalidVersion |
||||
} |
||||
|
||||
if !validation.IsValidURL(p.Metadata.ProjectURL) { |
||||
p.Metadata.ProjectURL = "" |
||||
} |
||||
|
||||
packageType := DependencyPackage |
||||
for _, pt := range p.Metadata.PackageTypes.PackageType { |
||||
if pt.Name == "SymbolsPackage" { |
||||
packageType = SymbolsPackage |
||||
break |
||||
} |
||||
} |
||||
|
||||
m := &Metadata{ |
||||
Description: p.Metadata.Description, |
||||
ReleaseNotes: p.Metadata.ReleaseNotes, |
||||
Authors: p.Metadata.Authors, |
||||
ProjectURL: p.Metadata.ProjectURL, |
||||
RepositoryURL: p.Metadata.Repository.URL, |
||||
Dependencies: make(map[string][]Dependency), |
||||
} |
||||
|
||||
for _, group := range p.Metadata.Dependencies.Group { |
||||
deps := make([]Dependency, 0, len(group.Dependency)) |
||||
for _, dep := range group.Dependency { |
||||
if dep.ID == "" || dep.Version == "" { |
||||
continue |
||||
} |
||||
deps = append(deps, Dependency{ |
||||
ID: dep.ID, |
||||
Version: dep.Version, |
||||
}) |
||||
} |
||||
if len(deps) > 0 { |
||||
m.Dependencies[group.TargetFramework] = deps |
||||
} |
||||
} |
||||
return &Package{ |
||||
PackageType: packageType, |
||||
ID: p.Metadata.ID, |
||||
Version: v.String(), |
||||
Metadata: m, |
||||
}, nil |
||||
} |
@ -0,0 +1,163 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package nuget |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"strings" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const ( |
||||
id = "System.Gitea" |
||||
semver = "1.0.1" |
||||
authors = "Gitea Authors" |
||||
projectURL = "https://gitea.io" |
||||
description = "Package Description" |
||||
releaseNotes = "Package Release Notes" |
||||
repositoryURL = "https://gitea.io/gitea/gitea" |
||||
targetFramework = ".NETStandard2.1" |
||||
dependencyID = "System.Text.Json" |
||||
dependencyVersion = "5.0.0" |
||||
) |
||||
|
||||
const nuspecContent = `<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata> |
||||
<id>` + id + `</id> |
||||
<version>` + semver + `</version> |
||||
<authors>` + authors + `</authors> |
||||
<requireLicenseAcceptance>true</requireLicenseAcceptance> |
||||
<projectUrl>` + projectURL + `</projectUrl> |
||||
<description>` + description + `</description> |
||||
<releaseNotes>` + releaseNotes + `</releaseNotes> |
||||
<repository url="` + repositoryURL + `" /> |
||||
<dependencies> |
||||
<group targetFramework="` + targetFramework + `"> |
||||
<dependency id="` + dependencyID + `" version="` + dependencyVersion + `" exclude="Build,Analyzers" /> |
||||
</group> |
||||
</dependencies> |
||||
</metadata> |
||||
</package>` |
||||
|
||||
const symbolsNuspecContent = `<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata> |
||||
<id>` + id + `</id> |
||||
<version>` + semver + `</version> |
||||
<description>` + description + `</description> |
||||
<packageTypes> |
||||
<packageType name="SymbolsPackage" /> |
||||
</packageTypes> |
||||
<dependencies> |
||||
<group targetFramework="` + targetFramework + `" /> |
||||
</dependencies> |
||||
</metadata> |
||||
</package>` |
||||
|
||||
func TestParsePackageMetaData(t *testing.T) { |
||||
createArchive := func(name, content string) []byte { |
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
w, _ := archive.Create(name) |
||||
w.Write([]byte(content)) |
||||
archive.Close() |
||||
return buf.Bytes() |
||||
} |
||||
|
||||
t.Run("MissingNuspecFile", func(t *testing.T) { |
||||
data := createArchive("dummy.txt", "") |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, np) |
||||
assert.ErrorIs(t, err, ErrMissingNuspecFile) |
||||
}) |
||||
|
||||
t.Run("MissingNuspecFileInRoot", func(t *testing.T) { |
||||
data := createArchive("sub/package.nuspec", "") |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, np) |
||||
assert.ErrorIs(t, err, ErrMissingNuspecFile) |
||||
}) |
||||
|
||||
t.Run("InvalidNuspecFile", func(t *testing.T) { |
||||
data := createArchive("package.nuspec", "") |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, np) |
||||
assert.Error(t, err) |
||||
}) |
||||
|
||||
t.Run("InvalidPackageId", func(t *testing.T) { |
||||
data := createArchive("package.nuspec", `<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata></metadata> |
||||
</package>`) |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, np) |
||||
assert.ErrorIs(t, err, ErrNuspecInvalidID) |
||||
}) |
||||
|
||||
t.Run("InvalidPackageVersion", func(t *testing.T) { |
||||
data := createArchive("package.nuspec", `<?xml version="1.0" encoding="utf-8"?> |
||||
<package xmlns="http://schemas.microsoft.com/packaging/2013/05/nuspec.xsd"> |
||||
<metadata> |
||||
<id>`+id+`</id> |
||||
</metadata> |
||||
</package>`) |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.Nil(t, np) |
||||
assert.ErrorIs(t, err, ErrNuspecInvalidVersion) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
data := createArchive("package.nuspec", nuspecContent) |
||||
|
||||
np, err := ParsePackageMetaData(bytes.NewReader(data), int64(len(data))) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, np) |
||||
}) |
||||
} |
||||
|
||||
func TestParseNuspecMetaData(t *testing.T) { |
||||
t.Run("Dependency Package", func(t *testing.T) { |
||||
np, err := ParseNuspecMetaData(strings.NewReader(nuspecContent)) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, np) |
||||
assert.Equal(t, DependencyPackage, np.PackageType) |
||||
|
||||
assert.Equal(t, id, np.ID) |
||||
assert.Equal(t, semver, np.Version) |
||||
assert.Equal(t, authors, np.Metadata.Authors) |
||||
assert.Equal(t, projectURL, np.Metadata.ProjectURL) |
||||
assert.Equal(t, description, np.Metadata.Description) |
||||
assert.Equal(t, releaseNotes, np.Metadata.ReleaseNotes) |
||||
assert.Equal(t, repositoryURL, np.Metadata.RepositoryURL) |
||||
assert.Len(t, np.Metadata.Dependencies, 1) |
||||
assert.Contains(t, np.Metadata.Dependencies, targetFramework) |
||||
deps := np.Metadata.Dependencies[targetFramework] |
||||
assert.Len(t, deps, 1) |
||||
assert.Equal(t, dependencyID, deps[0].ID) |
||||
assert.Equal(t, dependencyVersion, deps[0].Version) |
||||
}) |
||||
|
||||
t.Run("Symbols Package", func(t *testing.T) { |
||||
np, err := ParseNuspecMetaData(strings.NewReader(symbolsNuspecContent)) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, np) |
||||
assert.Equal(t, SymbolsPackage, np.PackageType) |
||||
|
||||
assert.Equal(t, id, np.ID) |
||||
assert.Equal(t, semver, np.Version) |
||||
assert.Equal(t, description, np.Metadata.Description) |
||||
assert.Empty(t, np.Metadata.Dependencies) |
||||
}) |
||||
} |
@ -0,0 +1,187 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package nuget |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"encoding/binary" |
||||
"errors" |
||||
"fmt" |
||||
"io" |
||||
"path" |
||||
"path/filepath" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/modules/packages" |
||||
) |
||||
|
||||
var ( |
||||
ErrMissingPdbFiles = errors.New("Package does not contain PDB files") |
||||
ErrInvalidFiles = errors.New("Package contains invalid files") |
||||
ErrInvalidPdbMagicNumber = errors.New("Invalid Portable PDB magic number") |
||||
ErrMissingPdbStream = errors.New("Missing PDB stream") |
||||
) |
||||
|
||||
type PortablePdb struct { |
||||
Name string |
||||
ID string |
||||
Content *packages.HashedBuffer |
||||
} |
||||
|
||||
type PortablePdbList []*PortablePdb |
||||
|
||||
func (l PortablePdbList) Close() { |
||||
for _, pdb := range l { |
||||
pdb.Content.Close() |
||||
} |
||||
} |
||||
|
||||
// ExtractPortablePdb extracts PDB files from a .snupkg file
|
||||
func ExtractPortablePdb(r io.ReaderAt, size int64) (PortablePdbList, error) { |
||||
archive, err := zip.NewReader(r, size) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
var pdbs PortablePdbList |
||||
|
||||
err = func() error { |
||||
for _, file := range archive.File { |
||||
if strings.HasSuffix(file.Name, "/") { |
||||
continue |
||||
} |
||||
ext := strings.ToLower(filepath.Ext(file.Name)) |
||||
|
||||
switch ext { |
||||
case ".nuspec", ".xml", ".psmdcp", ".rels", ".p7s": |
||||
continue |
||||
case ".pdb": |
||||
f, err := archive.Open(file.Name) |
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
buf, err := packages.CreateHashedBufferFromReader(f, 32*1024*1024) |
||||
|
||||
f.Close() |
||||
|
||||
if err != nil { |
||||
return err |
||||
} |
||||
|
||||
id, err := ParseDebugHeaderID(buf) |
||||
if err != nil { |
||||
buf.Close() |
||||
return fmt.Errorf("Invalid PDB file: %v", err) |
||||
} |
||||
|
||||
if _, err := buf.Seek(0, io.SeekStart); err != nil { |
||||
buf.Close() |
||||
return err |
||||
} |
||||
|
||||
pdbs = append(pdbs, &PortablePdb{ |
||||
Name: path.Base(file.Name), |
||||
ID: id, |
||||
Content: buf, |
||||
}) |
||||
default: |
||||
return ErrInvalidFiles |
||||
} |
||||
} |
||||
return nil |
||||
}() |
||||
if err != nil { |
||||
pdbs.Close() |
||||
return nil, err |
||||
} |
||||
|
||||
if len(pdbs) == 0 { |
||||
return nil, ErrMissingPdbFiles |
||||
} |
||||
|
||||
return pdbs, nil |
||||
} |
||||
|
||||
// ParseDebugHeaderID TODO
|
||||
func ParseDebugHeaderID(r io.ReadSeeker) (string, error) { |
||||
var magic uint32 |
||||
if err := binary.Read(r, binary.LittleEndian, &magic); err != nil { |
||||
return "", err |
||||
} |
||||
if magic != 0x424A5342 { |
||||
return "", ErrInvalidPdbMagicNumber |
||||
} |
||||
|
||||
if _, err := r.Seek(8, io.SeekCurrent); err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
var versionStringSize int32 |
||||
if err := binary.Read(r, binary.LittleEndian, &versionStringSize); err != nil { |
||||
return "", err |
||||
} |
||||
if _, err := r.Seek(int64(versionStringSize), io.SeekCurrent); err != nil { |
||||
return "", err |
||||
} |
||||
if _, err := r.Seek(2, io.SeekCurrent); err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
var streamCount int16 |
||||
if err := binary.Read(r, binary.LittleEndian, &streamCount); err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
read4ByteAlignedString := func(r io.Reader) (string, error) { |
||||
b := make([]byte, 4) |
||||
var buf bytes.Buffer |
||||
for { |
||||
if _, err := r.Read(b); err != nil { |
||||
return "", err |
||||
} |
||||
if i := bytes.IndexByte(b, 0); i != -1 { |
||||
buf.Write(b[:i]) |
||||
return buf.String(), nil |
||||
} |
||||
buf.Write(b) |
||||
} |
||||
} |
||||
|
||||
for i := 0; i < int(streamCount); i++ { |
||||
var offset uint32 |
||||
if err := binary.Read(r, binary.LittleEndian, &offset); err != nil { |
||||
return "", err |
||||
} |
||||
if _, err := r.Seek(4, io.SeekCurrent); err != nil { |
||||
return "", err |
||||
} |
||||
name, err := read4ByteAlignedString(r) |
||||
if err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
if name == "#Pdb" { |
||||
if _, err := r.Seek(int64(offset), io.SeekStart); err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
b := make([]byte, 16) |
||||
if _, err := r.Read(b); err != nil { |
||||
return "", err |
||||
} |
||||
|
||||
data1 := binary.LittleEndian.Uint32(b[0:4]) |
||||
data2 := binary.LittleEndian.Uint16(b[4:6]) |
||||
data3 := binary.LittleEndian.Uint16(b[6:8]) |
||||
data4 := b[8:16] |
||||
|
||||
return fmt.Sprintf("%08x%04x%04x%04x%012x", data1, data2, data3, data4[:2], data4[2:]), nil |
||||
} |
||||
} |
||||
|
||||
return "", ErrMissingPdbStream |
||||
} |
@ -0,0 +1,82 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package nuget |
||||
|
||||
import ( |
||||
"archive/zip" |
||||
"bytes" |
||||
"encoding/base64" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
const pdbContent = `QlNKQgEAAQAAAAAADAAAAFBEQiB2MS4wAAAAAAAABgB8AAAAWAAAACNQZGIAAAAA1AAAAAgBAAAj |
||||
fgAA3AEAAAQAAAAjU3RyaW5ncwAAAADgAQAABAAAACNVUwDkAQAAMAAAACNHVUlEAAAAFAIAACgB |
||||
AAAjQmxvYgAAAGm7ENm9SGxMtAFVvPUsPJTF6PbtAAAAAFcVogEJAAAAAQAAAA==` |
||||
|
||||
func TestExtractPortablePdb(t *testing.T) { |
||||
createArchive := func(name string, content []byte) []byte { |
||||
var buf bytes.Buffer |
||||
archive := zip.NewWriter(&buf) |
||||
w, _ := archive.Create(name) |
||||
w.Write(content) |
||||
archive.Close() |
||||
return buf.Bytes() |
||||
} |
||||
|
||||
t.Run("MissingPdbFiles", func(t *testing.T) { |
||||
var buf bytes.Buffer |
||||
zip.NewWriter(&buf).Close() |
||||
|
||||
pdbs, err := ExtractPortablePdb(bytes.NewReader(buf.Bytes()), int64(buf.Len())) |
||||
assert.ErrorIs(t, err, ErrMissingPdbFiles) |
||||
assert.Empty(t, pdbs) |
||||
}) |
||||
|
||||
t.Run("InvalidFiles", func(t *testing.T) { |
||||
data := createArchive("sub/test.bin", []byte{}) |
||||
|
||||
pdbs, err := ExtractPortablePdb(bytes.NewReader(data), int64(len(data))) |
||||
assert.ErrorIs(t, err, ErrInvalidFiles) |
||||
assert.Empty(t, pdbs) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
b, _ := base64.StdEncoding.DecodeString(pdbContent) |
||||
data := createArchive("test.pdb", b) |
||||
|
||||
pdbs, err := ExtractPortablePdb(bytes.NewReader(data), int64(len(data))) |
||||
assert.NoError(t, err) |
||||
assert.Len(t, pdbs, 1) |
||||
assert.Equal(t, "test.pdb", pdbs[0].Name) |
||||
assert.Equal(t, "d910bb6948bd4c6cb40155bcf52c3c94", pdbs[0].ID) |
||||
pdbs.Close() |
||||
}) |
||||
} |
||||
|
||||
func TestParseDebugHeaderID(t *testing.T) { |
||||
t.Run("InvalidPdbMagicNumber", func(t *testing.T) { |
||||
id, err := ParseDebugHeaderID(bytes.NewReader([]byte{0, 0, 0, 0})) |
||||
assert.ErrorIs(t, err, ErrInvalidPdbMagicNumber) |
||||
assert.Empty(t, id) |
||||
}) |
||||
|
||||
t.Run("MissingPdbStream", func(t *testing.T) { |
||||
b, _ := base64.StdEncoding.DecodeString(`QlNKQgEAAQAAAAAADAAAAFBEQiB2MS4wAAAAAAAAAQB8AAAAWAAAACNVUwA=`) |
||||
|
||||
id, err := ParseDebugHeaderID(bytes.NewReader(b)) |
||||
assert.ErrorIs(t, err, ErrMissingPdbStream) |
||||
assert.Empty(t, id) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
b, _ := base64.StdEncoding.DecodeString(pdbContent) |
||||
|
||||
id, err := ParseDebugHeaderID(bytes.NewReader(b)) |
||||
assert.NoError(t, err) |
||||
assert.Equal(t, "d910bb6948bd4c6cb40155bcf52c3c94", id) |
||||
}) |
||||
} |
@ -0,0 +1,16 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package pypi |
||||
|
||||
// Metadata represents the metadata of a PyPI package
|
||||
type Metadata struct { |
||||
Author string `json:"author,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
LongDescription string `json:"long_description,omitempty"` |
||||
Summary string `json:"summary,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
License string `json:"license,omitempty"` |
||||
RequiresPython string `json:"requires_python,omitempty"` |
||||
} |
@ -0,0 +1,311 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package rubygems |
||||
|
||||
import ( |
||||
"bufio" |
||||
"bytes" |
||||
"errors" |
||||
"io" |
||||
"reflect" |
||||
) |
||||
|
||||
const ( |
||||
majorVersion = 4 |
||||
minorVersion = 8 |
||||
|
||||
typeNil = '0' |
||||
typeTrue = 'T' |
||||
typeFalse = 'F' |
||||
typeFixnum = 'i' |
||||
typeString = '"' |
||||
typeSymbol = ':' |
||||
typeSymbolLink = ';' |
||||
typeArray = '[' |
||||
typeIVar = 'I' |
||||
typeUserMarshal = 'U' |
||||
typeUserDef = 'u' |
||||
typeObject = 'o' |
||||
) |
||||
|
||||
var ( |
||||
// ErrUnsupportedType indicates an unsupported type
|
||||
ErrUnsupportedType = errors.New("Type is unsupported") |
||||
// ErrInvalidIntRange indicates an invalid number range
|
||||
ErrInvalidIntRange = errors.New("Number is not in valid range") |
||||
) |
||||
|
||||
// RubyUserMarshal is a Ruby object that has a marshal_load function.
|
||||
type RubyUserMarshal struct { |
||||
Name string |
||||
Value interface{} |
||||
} |
||||
|
||||
// RubyUserDef is a Ruby object that has a _load function.
|
||||
type RubyUserDef struct { |
||||
Name string |
||||
Value interface{} |
||||
} |
||||
|
||||
// RubyObject is a default Ruby object.
|
||||
type RubyObject struct { |
||||
Name string |
||||
Member map[string]interface{} |
||||
} |
||||
|
||||
// MarshalEncoder mimics Rubys Marshal class.
|
||||
// Note: Only supports types used by the RubyGems package registry.
|
||||
type MarshalEncoder struct { |
||||
w *bufio.Writer |
||||
symbols map[string]int |
||||
} |
||||
|
||||
// NewMarshalEncoder creates a new MarshalEncoder
|
||||
func NewMarshalEncoder(w io.Writer) *MarshalEncoder { |
||||
return &MarshalEncoder{ |
||||
w: bufio.NewWriter(w), |
||||
symbols: map[string]int{}, |
||||
} |
||||
} |
||||
|
||||
// Encode encodes the given type
|
||||
func (e *MarshalEncoder) Encode(v interface{}) error { |
||||
if _, err := e.w.Write([]byte{majorVersion, minorVersion}); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshal(v); err != nil { |
||||
return err |
||||
} |
||||
|
||||
return e.w.Flush() |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshal(v interface{}) error { |
||||
if v == nil { |
||||
return e.marshalNil() |
||||
} |
||||
|
||||
val := reflect.ValueOf(v) |
||||
typ := reflect.TypeOf(v) |
||||
|
||||
if typ.Kind() == reflect.Ptr { |
||||
val = val.Elem() |
||||
typ = typ.Elem() |
||||
} |
||||
|
||||
switch typ.Kind() { |
||||
case reflect.Bool: |
||||
return e.marshalBool(val.Bool()) |
||||
case reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32: |
||||
return e.marshalInt(val.Int()) |
||||
case reflect.String: |
||||
return e.marshalString(val.String()) |
||||
case reflect.Slice, reflect.Array: |
||||
return e.marshalArray(val) |
||||
} |
||||
|
||||
switch typ.Name() { |
||||
case "RubyUserMarshal": |
||||
return e.marshalUserMarshal(val.Interface().(RubyUserMarshal)) |
||||
case "RubyUserDef": |
||||
return e.marshalUserDef(val.Interface().(RubyUserDef)) |
||||
case "RubyObject": |
||||
return e.marshalObject(val.Interface().(RubyObject)) |
||||
} |
||||
|
||||
return ErrUnsupportedType |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalNil() error { |
||||
return e.w.WriteByte(typeNil) |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalBool(b bool) error { |
||||
if b { |
||||
return e.w.WriteByte(typeTrue) |
||||
} |
||||
return e.w.WriteByte(typeFalse) |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalInt(i int64) error { |
||||
if err := e.w.WriteByte(typeFixnum); err != nil { |
||||
return err |
||||
} |
||||
|
||||
return e.marshalIntInternal(i) |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalIntInternal(i int64) error { |
||||
if i == 0 { |
||||
return e.w.WriteByte(0) |
||||
} else if 0 < i && i < 123 { |
||||
return e.w.WriteByte(byte(i + 5)) |
||||
} else if -124 < i && i <= -1 { |
||||
return e.w.WriteByte(byte(i - 5)) |
||||
} |
||||
|
||||
var len int |
||||
if 122 < i && i <= 0xff { |
||||
len = 1 |
||||
} else if 0xff < i && i <= 0xffff { |
||||
len = 2 |
||||
} else if 0xffff < i && i <= 0xffffff { |
||||
len = 3 |
||||
} else if 0xffffff < i && i <= 0x3fffffff { |
||||
len = 4 |
||||
} else if -0x100 <= i && i < -123 { |
||||
len = -1 |
||||
} else if -0x10000 <= i && i < -0x100 { |
||||
len = -2 |
||||
} else if -0x1000000 <= i && i < -0x100000 { |
||||
len = -3 |
||||
} else if -0x40000000 <= i && i < -0x1000000 { |
||||
len = -4 |
||||
} else { |
||||
return ErrInvalidIntRange |
||||
} |
||||
|
||||
if err := e.w.WriteByte(byte(len)); err != nil { |
||||
return err |
||||
} |
||||
if len < 0 { |
||||
len = -len |
||||
} |
||||
|
||||
for c := 0; c < len; c++ { |
||||
if err := e.w.WriteByte(byte(i >> uint(8*c) & 0xff)); err != nil { |
||||
return err |
||||
} |
||||
} |
||||
|
||||
return nil |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalString(str string) error { |
||||
if err := e.w.WriteByte(typeIVar); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalRawString(str); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalIntInternal(1); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalSymbol("E"); err != nil { |
||||
return err |
||||
} |
||||
|
||||
return e.marshalBool(true) |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalRawString(str string) error { |
||||
if err := e.w.WriteByte(typeString); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalIntInternal(int64(len(str))); err != nil { |
||||
return err |
||||
} |
||||
|
||||
_, err := e.w.WriteString(str) |
||||
return err |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalSymbol(str string) error { |
||||
if index, ok := e.symbols[str]; ok { |
||||
if err := e.w.WriteByte(typeSymbolLink); err != nil { |
||||
return err |
||||
} |
||||
return e.marshalIntInternal(int64(index)) |
||||
} |
||||
|
||||
e.symbols[str] = len(e.symbols) |
||||
|
||||
if err := e.w.WriteByte(typeSymbol); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalIntInternal(int64(len(str))); err != nil { |
||||
return err |
||||
} |
||||
|
||||
_, err := e.w.WriteString(str) |
||||
return err |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalArray(arr reflect.Value) error { |
||||
if err := e.w.WriteByte(typeArray); err != nil { |
||||
return err |
||||
} |
||||
|
||||
len := arr.Len() |
||||
|
||||
if err := e.marshalIntInternal(int64(len)); err != nil { |
||||
return err |
||||
} |
||||
|
||||
for i := 0; i < len; i++ { |
||||
if err := e.marshal(arr.Index(i).Interface()); err != nil { |
||||
return err |
||||
} |
||||
} |
||||
return nil |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalUserMarshal(userMarshal RubyUserMarshal) error { |
||||
if err := e.w.WriteByte(typeUserMarshal); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.marshalSymbol(userMarshal.Name); err != nil { |
||||
return err |
||||
} |
||||
|
||||
return e.marshal(userMarshal.Value) |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalUserDef(userDef RubyUserDef) error { |
||||
var buf bytes.Buffer |
||||
if err := NewMarshalEncoder(&buf).Encode(userDef.Value); err != nil { |
||||
return err |
||||
} |
||||
|
||||
if err := e.w.WriteByte(typeUserDef); err != nil { |
||||
return err |
||||
} |
||||
if err := e.marshalSymbol(userDef.Name); err != nil { |
||||
return err |
||||
} |
||||
if err := e.marshalIntInternal(int64(buf.Len())); err != nil { |
||||
return err |
||||
} |
||||
_, err := e.w.Write(buf.Bytes()) |
||||
return err |
||||
} |
||||
|
||||
func (e *MarshalEncoder) marshalObject(obj RubyObject) error { |
||||
if err := e.w.WriteByte(typeObject); err != nil { |
||||
return err |
||||
} |
||||
if err := e.marshalSymbol(obj.Name); err != nil { |
||||
return err |
||||
} |
||||
if err := e.marshalIntInternal(int64(len(obj.Member))); err != nil { |
||||
return err |
||||
} |
||||
for k, v := range obj.Member { |
||||
if err := e.marshalSymbol(k); err != nil { |
||||
return err |
||||
} |
||||
if err := e.marshal(v); err != nil { |
||||
return err |
||||
} |
||||
} |
||||
return nil |
||||
} |
@ -0,0 +1,99 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package rubygems |
||||
|
||||
import ( |
||||
"bytes" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestMinimalEncoder(t *testing.T) { |
||||
cases := []struct { |
||||
Value interface{} |
||||
Expected []byte |
||||
Error error |
||||
}{ |
||||
{ |
||||
Value: nil, |
||||
Expected: []byte{4, 8, 0x30}, |
||||
}, |
||||
{ |
||||
Value: true, |
||||
Expected: []byte{4, 8, 'T'}, |
||||
}, |
||||
{ |
||||
Value: false, |
||||
Expected: []byte{4, 8, 'F'}, |
||||
}, |
||||
{ |
||||
Value: 0, |
||||
Expected: []byte{4, 8, 'i', 0}, |
||||
}, |
||||
{ |
||||
Value: 1, |
||||
Expected: []byte{4, 8, 'i', 6}, |
||||
}, |
||||
{ |
||||
Value: -1, |
||||
Expected: []byte{4, 8, 'i', 0xfa}, |
||||
}, |
||||
{ |
||||
Value: 0x1fffffff, |
||||
Expected: []byte{4, 8, 'i', 4, 0xff, 0xff, 0xff, 0x1f}, |
||||
}, |
||||
{ |
||||
Value: 0x41000000, |
||||
Error: ErrInvalidIntRange, |
||||
}, |
||||
{ |
||||
Value: "test", |
||||
Expected: []byte{4, 8, 'I', '"', 9, 't', 'e', 's', 't', 6, ':', 6, 'E', 'T'}, |
||||
}, |
||||
{ |
||||
Value: []int{1, 2}, |
||||
Expected: []byte{4, 8, '[', 7, 'i', 6, 'i', 7}, |
||||
}, |
||||
{ |
||||
Value: &RubyUserMarshal{ |
||||
Name: "Test", |
||||
Value: 4, |
||||
}, |
||||
Expected: []byte{4, 8, 'U', ':', 9, 'T', 'e', 's', 't', 'i', 9}, |
||||
}, |
||||
{ |
||||
Value: &RubyUserDef{ |
||||
Name: "Test", |
||||
Value: 4, |
||||
}, |
||||
Expected: []byte{4, 8, 'u', ':', 9, 'T', 'e', 's', 't', 9, 4, 8, 'i', 9}, |
||||
}, |
||||
{ |
||||
Value: &RubyObject{ |
||||
Name: "Test", |
||||
Member: map[string]interface{}{ |
||||
"test": 4, |
||||
}, |
||||
}, |
||||
Expected: []byte{4, 8, 'o', ':', 9, 'T', 'e', 's', 't', 6, ':', 9, 't', 'e', 's', 't', 'i', 9}, |
||||
}, |
||||
{ |
||||
Value: &struct { |
||||
Name string |
||||
}{ |
||||
"test", |
||||
}, |
||||
Error: ErrUnsupportedType, |
||||
}, |
||||
} |
||||
|
||||
for i, c := range cases { |
||||
var b bytes.Buffer |
||||
err := NewMarshalEncoder(&b).Encode(c.Value) |
||||
assert.ErrorIs(t, err, c.Error) |
||||
assert.Equal(t, c.Expected, b.Bytes(), "case %d", i) |
||||
} |
||||
} |
@ -0,0 +1,222 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package rubygems |
||||
|
||||
import ( |
||||
"archive/tar" |
||||
"compress/gzip" |
||||
"errors" |
||||
"io" |
||||
"regexp" |
||||
"strings" |
||||
|
||||
"code.gitea.io/gitea/modules/validation" |
||||
|
||||
"gopkg.in/yaml.v2" |
||||
) |
||||
|
||||
var ( |
||||
// ErrMissingMetadataFile indicates a missing metadata.gz file
|
||||
ErrMissingMetadataFile = errors.New("Metadata file is missing") |
||||
// ErrInvalidName indicates an invalid id in the metadata.gz file
|
||||
ErrInvalidName = errors.New("Metadata file contains an invalid name") |
||||
// ErrInvalidVersion indicates an invalid version in the metadata.gz file
|
||||
ErrInvalidVersion = errors.New("Metadata file contains an invalid version") |
||||
) |
||||
|
||||
var versionMatcher = regexp.MustCompile(`\A[0-9]+(?:\.[0-9a-zA-Z]+)*(?:-[0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*)?\z`) |
||||
|
||||
// Package represents a RubyGems package
|
||||
type Package struct { |
||||
Name string |
||||
Version string |
||||
Metadata *Metadata |
||||
} |
||||
|
||||
// Metadata represents the metadata of a RubyGems package
|
||||
type Metadata struct { |
||||
Platform string `json:"platform,omitempty"` |
||||
Description string `json:"description,omitempty"` |
||||
Summary string `json:"summary,omitempty"` |
||||
Authors []string `json:"authors,omitempty"` |
||||
Licenses []string `json:"licenses,omitempty"` |
||||
RequiredRubyVersion []VersionRequirement `json:"required_ruby_version,omitempty"` |
||||
RequiredRubygemsVersion []VersionRequirement `json:"required_rubygems_version,omitempty"` |
||||
ProjectURL string `json:"project_url,omitempty"` |
||||
RuntimeDependencies []Dependency `json:"runtime_dependencies,omitempty"` |
||||
DevelopmentDependencies []Dependency `json:"development_dependencies,omitempty"` |
||||
} |
||||
|
||||
// VersionRequirement represents a version restriction
|
||||
type VersionRequirement struct { |
||||
Restriction string `json:"restriction"` |
||||
Version string `json:"version"` |
||||
} |
||||
|
||||
// Dependency represents a dependency of a RubyGems package
|
||||
type Dependency struct { |
||||
Name string `json:"name"` |
||||
Version []VersionRequirement `json:"version"` |
||||
} |
||||
|
||||
type gemspec struct { |
||||
Name string `yaml:"name"` |
||||
Version struct { |
||||
Version string `yaml:"version"` |
||||
} `yaml:"version"` |
||||
Platform string `yaml:"platform"` |
||||
Authors []string `yaml:"authors"` |
||||
Autorequire interface{} `yaml:"autorequire"` |
||||
Bindir string `yaml:"bindir"` |
||||
CertChain []interface{} `yaml:"cert_chain"` |
||||
Date string `yaml:"date"` |
||||
Dependencies []struct { |
||||
Name string `yaml:"name"` |
||||
Requirement requirement `yaml:"requirement"` |
||||
Type string `yaml:"type"` |
||||
Prerelease bool `yaml:"prerelease"` |
||||
VersionRequirements requirement `yaml:"version_requirements"` |
||||
} `yaml:"dependencies"` |
||||
Description string `yaml:"description"` |
||||
Email string `yaml:"email"` |
||||
Executables []string `yaml:"executables"` |
||||
Extensions []interface{} `yaml:"extensions"` |
||||
ExtraRdocFiles []string `yaml:"extra_rdoc_files"` |
||||
Files []string `yaml:"files"` |
||||
Homepage string `yaml:"homepage"` |
||||
Licenses []string `yaml:"licenses"` |
||||
Metadata struct { |
||||
BugTrackerURI string `yaml:"bug_tracker_uri"` |
||||
ChangelogURI string `yaml:"changelog_uri"` |
||||
DocumentationURI string `yaml:"documentation_uri"` |
||||
SourceCodeURI string `yaml:"source_code_uri"` |
||||
} `yaml:"metadata"` |
||||
PostInstallMessage interface{} `yaml:"post_install_message"` |
||||
RdocOptions []interface{} `yaml:"rdoc_options"` |
||||
RequirePaths []string `yaml:"require_paths"` |
||||
RequiredRubyVersion requirement `yaml:"required_ruby_version"` |
||||
RequiredRubygemsVersion requirement `yaml:"required_rubygems_version"` |
||||
Requirements []interface{} `yaml:"requirements"` |
||||
RubygemsVersion string `yaml:"rubygems_version"` |
||||
SigningKey interface{} `yaml:"signing_key"` |
||||
SpecificationVersion int `yaml:"specification_version"` |
||||
Summary string `yaml:"summary"` |
||||
TestFiles []interface{} `yaml:"test_files"` |
||||
} |
||||
|
||||
type requirement struct { |
||||
Requirements [][]interface{} `yaml:"requirements"` |
||||
} |
||||
|
||||
// AsVersionRequirement converts into []VersionRequirement
|
||||
func (r requirement) AsVersionRequirement() []VersionRequirement { |
||||
requirements := make([]VersionRequirement, 0, len(r.Requirements)) |
||||
for _, req := range r.Requirements { |
||||
if len(req) != 2 { |
||||
continue |
||||
} |
||||
restriction, ok := req[0].(string) |
||||
if !ok { |
||||
continue |
||||
} |
||||
vm, ok := req[1].(map[interface{}]interface{}) |
||||
if !ok { |
||||
continue |
||||
} |
||||
versionInt, ok := vm["version"] |
||||
if !ok { |
||||
continue |
||||
} |
||||
version, ok := versionInt.(string) |
||||
if !ok || version == "0" { |
||||
continue |
||||
} |
||||
|
||||
requirements = append(requirements, VersionRequirement{ |
||||
Restriction: restriction, |
||||
Version: version, |
||||
}) |
||||
} |
||||
return requirements |
||||
} |
||||
|
||||
// ParsePackageMetaData parses the metadata of a Gem package file
|
||||
func ParsePackageMetaData(r io.Reader) (*Package, error) { |
||||
archive := tar.NewReader(r) |
||||
for { |
||||
hdr, err := archive.Next() |
||||
if err == io.EOF { |
||||
break |
||||
} |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if hdr.Name == "metadata.gz" { |
||||
return parseMetadataFile(archive) |
||||
} |
||||
} |
||||
|
||||
return nil, ErrMissingMetadataFile |
||||
} |
||||
|
||||
func parseMetadataFile(r io.Reader) (*Package, error) { |
||||
zr, err := gzip.NewReader(r) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
defer zr.Close() |
||||
|
||||
var spec gemspec |
||||
if err := yaml.NewDecoder(zr).Decode(&spec); err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
if len(spec.Name) == 0 || strings.Contains(spec.Name, "/") { |
||||
return nil, ErrInvalidName |
||||
} |
||||
|
||||
if !versionMatcher.MatchString(spec.Version.Version) { |
||||
return nil, ErrInvalidVersion |
||||
} |
||||
|
||||
if !validation.IsValidURL(spec.Homepage) { |
||||
spec.Homepage = "" |
||||
} |
||||
if !validation.IsValidURL(spec.Metadata.SourceCodeURI) { |
||||
spec.Metadata.SourceCodeURI = "" |
||||
} |
||||
|
||||
m := &Metadata{ |
||||
Platform: spec.Platform, |
||||
Description: spec.Description, |
||||
Summary: spec.Summary, |
||||
Authors: spec.Authors, |
||||
Licenses: spec.Licenses, |
||||
ProjectURL: spec.Homepage, |
||||
RequiredRubyVersion: spec.RequiredRubyVersion.AsVersionRequirement(), |
||||
RequiredRubygemsVersion: spec.RequiredRubygemsVersion.AsVersionRequirement(), |
||||
DevelopmentDependencies: make([]Dependency, 0, 5), |
||||
RuntimeDependencies: make([]Dependency, 0, 5), |
||||
} |
||||
|
||||
for _, gemdep := range spec.Dependencies { |
||||
dep := Dependency{ |
||||
Name: gemdep.Name, |
||||
Version: gemdep.Requirement.AsVersionRequirement(), |
||||
} |
||||
if gemdep.Type == ":runtime" { |
||||
m.RuntimeDependencies = append(m.RuntimeDependencies, dep) |
||||
} else { |
||||
m.DevelopmentDependencies = append(m.DevelopmentDependencies, dep) |
||||
} |
||||
} |
||||
|
||||
return &Package{ |
||||
Name: spec.Name, |
||||
Version: spec.Version.Version, |
||||
Metadata: m, |
||||
}, nil |
||||
} |
@ -0,0 +1,89 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package rubygems |
||||
|
||||
import ( |
||||
"archive/tar" |
||||
"bytes" |
||||
"encoding/base64" |
||||
"io" |
||||
"testing" |
||||
|
||||
"github.com/stretchr/testify/assert" |
||||
) |
||||
|
||||
func TestParsePackageMetaData(t *testing.T) { |
||||
createArchive := func(filename string, content []byte) io.Reader { |
||||
var buf bytes.Buffer |
||||
tw := tar.NewWriter(&buf) |
||||
hdr := &tar.Header{ |
||||
Name: filename, |
||||
Mode: 0o600, |
||||
Size: int64(len(content)), |
||||
} |
||||
tw.WriteHeader(hdr) |
||||
tw.Write(content) |
||||
tw.Close() |
||||
return &buf |
||||
} |
||||
|
||||
t.Run("MissingMetadataFile", func(t *testing.T) { |
||||
data := createArchive("dummy.txt", []byte{0}) |
||||
|
||||
rp, err := ParsePackageMetaData(data) |
||||
assert.ErrorIs(t, err, ErrMissingMetadataFile) |
||||
assert.Nil(t, rp) |
||||
}) |
||||
|
||||
t.Run("Valid", func(t *testing.T) { |
||||
content, _ := base64.StdEncoding.DecodeString("H4sICHC/I2EEAG1ldGFkYXRhAAEeAOH/bmFtZTogZwp2ZXJzaW9uOgogIHZlcnNpb246IDEKWw35Tx4AAAA=") |
||||
data := createArchive("metadata.gz", content) |
||||
|
||||
rp, err := ParsePackageMetaData(data) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, rp) |
||||
}) |
||||
} |
||||
|
||||
func TestParseMetadataFile(t *testing.T) { |
||||
content, _ := base64.StdEncoding.DecodeString(`H4sIAMe7I2ECA9VVTW/UMBC9+1eYXvaUbJpSQBZUHJAqDlwK4kCFIseZzZrGH9iTqisEv52Js9nd |
||||
0KqggiqRXWnX45n3ZuZ5nCzL+JPQ15ulq7+AQnEORoj3HpReaSVRO8usNCB4qxEku4YQySbuCPo4 |
||||
bjHOd07HeZGfMt9JXLlgBB9imOxx7UIULOPnCZMMLsDXXgeiYbW2jQ6C0y9TELBSa6kJ6/IzaySS |
||||
R1mUx1nxIitPeFGI9M2L6eGfWAMebANWaUgktzN9M3lsKNmxutBb1AYyCibbNhsDFu+q9GK/Tc4z |
||||
d2IcLBl9js5eHaXFsLyvXeNz0LQyL/YoLx8EsiCMBZlx46k6sS2PDD5AgA5kJPNKdhH2elWzOv7n |
||||
uv9Q9Aau/6ngP84elvNpXh5oRVlB5/yW7BH0+qu0G4gqaI/JdEHBFBS5l+pKtsARIjIwUnfj8Le0 |
||||
+TrdJLl2DG5A9SjrjgZ1mG+4QbAD+G4ZZBUap6qVnnzGf6Rwp+vliBRqtnYGPBEKvkb0USyXE8mS |
||||
dVoR6hj07u0HZgAl3SRS8G/fmXcRK20jyq6rDMSYQFgidamqkXbbuspLXE/0k7GphtKqe67GuRC/ |
||||
yjAbmt9LsOMp8xMamFkSQ38fP5EFjdz8LA4do2C69VvqWXAJgrPbKZb58/xZXrKoW6ttW13Bhvzi |
||||
4ftn7/yUxd4YGcglvTmmY8aGY3ZwRn4CqcWcidUGAAA=`) |
||||
rp, err := parseMetadataFile(bytes.NewReader(content)) |
||||
assert.NoError(t, err) |
||||
assert.NotNil(t, rp) |
||||
|
||||
assert.Equal(t, "gitea", rp.Name) |
||||
assert.Equal(t, "1.0.5", rp.Version) |
||||
assert.Equal(t, "ruby", rp.Metadata.Platform) |
||||
assert.Equal(t, "Gitea package", rp.Metadata.Summary) |
||||
assert.Equal(t, "RubyGems package test", rp.Metadata.Description) |
||||
assert.Equal(t, []string{"Gitea"}, rp.Metadata.Authors) |
||||
assert.Equal(t, "https://gitea.io/", rp.Metadata.ProjectURL) |
||||
assert.Equal(t, []string{"MIT"}, rp.Metadata.Licenses) |
||||
assert.Empty(t, rp.Metadata.RequiredRubygemsVersion) |
||||
assert.Len(t, rp.Metadata.RequiredRubyVersion, 1) |
||||
assert.Equal(t, ">=", rp.Metadata.RequiredRubyVersion[0].Restriction) |
||||
assert.Equal(t, "2.3.0", rp.Metadata.RequiredRubyVersion[0].Version) |
||||
assert.Len(t, rp.Metadata.RuntimeDependencies, 1) |
||||
assert.Equal(t, "runtime-dep", rp.Metadata.RuntimeDependencies[0].Name) |
||||
assert.Len(t, rp.Metadata.RuntimeDependencies[0].Version, 2) |
||||
assert.Equal(t, ">=", rp.Metadata.RuntimeDependencies[0].Version[0].Restriction) |
||||
assert.Equal(t, "1.2.0", rp.Metadata.RuntimeDependencies[0].Version[0].Version) |
||||
assert.Equal(t, "<", rp.Metadata.RuntimeDependencies[0].Version[1].Restriction) |
||||
assert.Equal(t, "2.0", rp.Metadata.RuntimeDependencies[0].Version[1].Version) |
||||
assert.Len(t, rp.Metadata.DevelopmentDependencies, 1) |
||||
assert.Equal(t, "dev-dep", rp.Metadata.DevelopmentDependencies[0].Name) |
||||
assert.Len(t, rp.Metadata.DevelopmentDependencies[0].Version, 1) |
||||
assert.Equal(t, "~>", rp.Metadata.DevelopmentDependencies[0].Version[0].Restriction) |
||||
assert.Equal(t, "5.2", rp.Metadata.DevelopmentDependencies[0].Version[0].Version) |
||||
} |
@ -0,0 +1,47 @@ |
||||
// Copyright 2022 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package setting |
||||
|
||||
import ( |
||||
"os" |
||||
"path/filepath" |
||||
|
||||
"code.gitea.io/gitea/modules/log" |
||||
) |
||||
|
||||
// Package registry settings
|
||||
var ( |
||||
Packages = struct { |
||||
Storage |
||||
Enabled bool |
||||
ChunkedUploadPath string |
||||
RegistryHost string |
||||
}{ |
||||
Enabled: true, |
||||
} |
||||
) |
||||
|
||||
func newPackages() { |
||||
sec := Cfg.Section("packages") |
||||
if err := sec.MapTo(&Packages); err != nil { |
||||
log.Fatal("Failed to map Packages settings: %v", err) |
||||
} |
||||
|
||||
Packages.Storage = getStorage("packages", "", nil) |
||||
|
||||
Packages.RegistryHost = Domain |
||||
if (Protocol == HTTP && HTTPPort != "80") || (Protocol == HTTPS && HTTPPort != "443") { |
||||
Packages.RegistryHost += ":" + HTTPPort |
||||
} |
||||
|
||||
Packages.ChunkedUploadPath = filepath.ToSlash(sec.Key("CHUNKED_UPLOAD_PATH").MustString("tmp/package-upload")) |
||||
if !filepath.IsAbs(Packages.ChunkedUploadPath) { |
||||
Packages.ChunkedUploadPath = filepath.ToSlash(filepath.Join(AppDataPath, Packages.ChunkedUploadPath)) |
||||
} |
||||
|
||||
if err := os.MkdirAll(Packages.ChunkedUploadPath, os.ModePerm); err != nil { |
||||
log.Error("Unable to create chunked upload directory: %s (%v)", Packages.ChunkedUploadPath, err) |
||||
} |
||||
} |
@ -0,0 +1,33 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package structs |
||||
|
||||
import ( |
||||
"time" |
||||
) |
||||
|
||||
// Package represents a package
|
||||
type Package struct { |
||||
ID int64 `json:"id"` |
||||
Owner *User `json:"owner"` |
||||
Repository *Repository `json:"repository"` |
||||
Creator *User `json:"creator"` |
||||
Type string `json:"type"` |
||||
Name string `json:"name"` |
||||
Version string `json:"version"` |
||||
// swagger:strfmt date-time
|
||||
CreatedAt time.Time `json:"created_at"` |
||||
} |
||||
|
||||
// PackageFile represents a package file
|
||||
type PackageFile struct { |
||||
ID int64 `json:"id"` |
||||
Size int64 |
||||
Name string `json:"name"` |
||||
HashMD5 string `json:"md5"` |
||||
HashSHA1 string `json:"sha1"` |
||||
HashSHA256 string `json:"sha256"` |
||||
HashSHA512 string `json:"sha512"` |
||||
} |
@ -0,0 +1,147 @@ |
||||
// Copyright 2021 The Gitea Authors. All rights reserved.
|
||||
// Use of this source code is governed by a MIT-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package filebuffer |
||||
|
||||
import ( |
||||
"bytes" |
||||
"errors" |
||||
"io" |
||||
"os" |
||||
) |
||||
|
||||
const maxInt = int(^uint(0) >> 1) // taken from bytes.Buffer
|
||||
|
||||
var ( |
||||
// ErrInvalidMemorySize occurs if the memory size is not in a valid range
|
||||
ErrInvalidMemorySize = errors.New("Memory size must be greater 0 and lower math.MaxInt32") |
||||
// ErrWriteAfterRead occurs if Write is called after a read operation
|
||||
ErrWriteAfterRead = errors.New("Write is unsupported after a read operation") |
||||
) |
||||
|
||||
type readAtSeeker interface { |
||||
io.ReadSeeker |
||||
io.ReaderAt |
||||
} |
||||
|
||||
// FileBackedBuffer uses a memory buffer with a fixed size.
|
||||
// If more data is written a temporary file is used instead.
|
||||
// It implements io.ReadWriteCloser, io.ReadSeekCloser and io.ReaderAt
|
||||
type FileBackedBuffer struct { |
||||
maxMemorySize int64 |
||||
size int64 |
||||
buffer bytes.Buffer |
||||
file *os.File |
||||
reader readAtSeeker |
||||
} |
||||
|
||||
// New creates a file backed buffer with a specific maximum memory size
|
||||
func New(maxMemorySize int) (*FileBackedBuffer, error) { |
||||
if maxMemorySize < 0 || maxMemorySize > maxInt { |
||||
return nil, ErrInvalidMemorySize |
||||
} |
||||
|
||||
return &FileBackedBuffer{ |
||||
maxMemorySize: int64(maxMemorySize), |
||||
}, nil |
||||
} |
||||
|
||||
// CreateFromReader creates a file backed buffer and copies the provided reader data into it.
|
||||
func CreateFromReader(r io.Reader, maxMemorySize int) (*FileBackedBuffer, error) { |
||||
b, err := New(maxMemorySize) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
_, err = io.Copy(b, r) |
||||
if err != nil { |
||||
return nil, err |
||||
} |
||||
|
||||
return b, nil |
||||
} |
||||
|
||||
// Write implements io.Writer
|
||||
func (b *FileBackedBuffer) Write(p []byte) (int, error) { |
||||
if b.reader != nil { |
||||
return 0, ErrWriteAfterRead |
||||
} |
||||
|
||||
var n int |
||||
var err error |
||||
|
||||
if b.file != nil { |
||||
n, err = b.file.Write(p) |
||||
} else { |
||||
if b.size+int64(len(p)) > b.maxMemorySize { |
||||
b.file, err = os.CreateTemp("", "gitea-buffer-") |
||||
if err != nil { |
||||
return 0, err |
||||
} |
||||
|
||||
_, err = io.Copy(b.file, &b.buffer) |
||||
if err != nil { |
||||
return 0, err |
||||
} |
||||
|
||||
return b.Write(p) |
||||
} |
||||
|
||||
n, err = b.buffer.Write(p) |
||||
} |
||||
|
||||
if err != nil { |
||||
return n, err |
||||
} |
||||
b.size += int64(n) |
||||
return n, nil |
||||
} |
||||
|
||||
// Size returns the byte size of the buffered data
|
||||
func (b *FileBackedBuffer) Size() int64 { |
||||
return b.size |
||||
} |
||||
|
||||
func (b *FileBackedBuffer) switchToReader() { |
||||
if b.reader != nil { |
||||
return |
||||
} |
||||
|
||||
if b.file != nil { |
||||
b.reader = b.file |
||||
} else { |
||||
b.reader = bytes.NewReader(b.buffer.Bytes()) |
||||
} |
||||
} |
||||
|
||||
// Read implements io.Reader
|
||||
func (b *FileBackedBuffer) Read(p []byte) (int, error) { |
||||
b.switchToReader() |
||||
|
||||
return b.reader.Read(p) |
||||
} |
||||
|
||||
// ReadAt implements io.ReaderAt
|
||||
func (b *FileBackedBuffer) ReadAt(p []byte, off int64) (int, error) { |
||||
b.switchToReader() |
||||
|
||||
return b.reader.ReadAt(p, off) |
||||
} |
||||
|
||||
// Seek implements io.Seeker
|
||||
func (b *FileBackedBuffer) Seek(offset int64, whence int) (int64, error) { |
||||
b.switchToReader() |
||||
|
||||
return b.reader.Seek(offset, whence) |
||||
} |
||||
|
||||
// Close implements io.Closer
|
||||
func (b *FileBackedBuffer) Close() error { |
||||
if b.file != nil { |
||||
err := b.file.Close() |
||||
os.Remove(b.file.Name()) |
||||
return err |
||||
} |
||||
return nil |
||||
} |
After Width: | Height: | Size: 5.6 KiB |
After Width: | Height: | Size: 1.8 KiB |
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue