1
0
Fork 0
forgejo-api/tests/ci_test.rs
2024-01-18 16:48:18 -05:00

431 lines
14 KiB
Rust

use eyre::{ensure, eyre, WrapErr};
use forgejo_api::{Forgejo, structs::*};
#[tokio::test]
async fn ci() -> eyre::Result<()> {
let url = url::Url::parse(&std::env::var("FORGEJO_API_CI_INSTANCE_URL")?)?;
let token = std::env::var("FORGEJO_API_CI_TOKEN")?;
let api = Forgejo::new(forgejo_api::Auth::Token(&token), url)?;
let mut results = Vec::new();
results.push(user(&api).await.wrap_err("user error"));
results.push(repo(&api).await.wrap_err("repo error"));
results.push(admin(&api).await.wrap_err("admin error"));
let mut errors = 0;
for report in results.into_iter().filter_map(Result::err) {
errors += 1;
for (i, err) in report.chain().enumerate() {
println!("{i}. {err}");
if let Some(err) = err.downcast_ref::<forgejo_api::ForgejoError>() {
if let forgejo_api::ForgejoError::BadStructure(_, body) = err {
println!("BODY: {body}");
}
}
}
}
if errors > 0 {
eyre::bail!("test failed");
}
Ok(())
}
async fn user(api: &Forgejo) -> eyre::Result<()> {
let myself = api.user_get_current().await?;
ensure!(myself.is_admin.unwrap(), "user should be admin");
ensure!(
myself.login.as_ref().unwrap() == "TestingAdmin",
"user should be named \"TestingAdmin\""
);
let myself_indirect = api
.user_get("TestingAdmin")
.await?;
ensure!(
myself == myself_indirect,
"result of `myself` does not match result of `get_user`"
);
let query = UserListFollowingQuery { page: None, limit: None };
let following = api.user_list_following("TestingAdmin", query).await?;
ensure!(following == Vec::new(), "following list not empty");
let query = UserListFollowersQuery { page: None, limit: None };
let followers = api.user_list_followers("TestingAdmin", query).await?;
ensure!(followers == Vec::new(), "follower list not empty");
let url = url::Url::parse(&std::env::var("FORGEJO_API_CI_INSTANCE_URL")?)?;
let password_api = Forgejo::new(
forgejo_api::Auth::Password {
username: "TestingAdmin",
password: "password",
mfa: None,
},
url,
)
.wrap_err("failed to log in using username and password")?;
ensure!(
api.user_get_current().await? == password_api.user_get_current().await?,
"users not equal comparing token-auth and pass-auth"
);
Ok(())
}
async fn repo(api: &forgejo_api::Forgejo) -> eyre::Result<()> {
tokio::fs::create_dir("/test_repo").await?;
let git = || {
let mut cmd = std::process::Command::new("git");
cmd.current_dir("/test_repo");
cmd
};
let _ = git()
.args(["config", "--global", "init.defaultBranch", "main"])
.status()?;
let _ = git().args(["init"]).status()?;
let _ = git()
.args(["config", "user.name", "TestingAdmin"])
.status()?;
let _ = git()
.args(["config", "user.email", "admin@noreply.example.org"])
.status()?;
tokio::fs::write("/test_repo/README.md", "# Test\nThis is a test repo").await?;
let _ = git().args(["add", "."]).status()?;
let _ = git().args(["commit", "-m", "initial commit"]).status()?;
let repo_opt = CreateRepoOption {
auto_init: Some(false),
default_branch: Some("main".into()),
description: Some("Test Repo".into()),
gitignores: Some("".into()),
issue_labels: Some("".into()),
license: Some("".into()),
name: "test".into(),
private: Some(false),
readme: None,
template: Some(false),
trust_model: Some("default".into()),
};
let remote_repo = api.create_current_user_repo(repo_opt).await?;
ensure!(
remote_repo.has_pull_requests.unwrap(),
"repo does not accept pull requests"
);
ensure!(
remote_repo.owner.as_ref().unwrap().login.as_ref().unwrap() == "TestingAdmin",
"repo owner is not \"TestingAdmin\""
);
ensure!(remote_repo.name.as_ref().unwrap() == "test", "repo owner is not \"test\"");
tokio::time::sleep(std::time::Duration::from_secs(3)).await;
let mut remote_url = remote_repo.clone_url.clone().unwrap();
remote_url.set_username("TestingAdmin").unwrap();
remote_url.set_password(Some("password")).unwrap();
let _ = git()
.args(["remote", "add", "origin", remote_url.as_str()])
.status()?;
let _ = git().args(["push", "-u", "origin", "main"]).status()?;
let _ = git().args(["switch", "-c", "test"]).status()?;
tokio::fs::write(
"/test_repo/example.rs",
"fn add_one(x: u32) -> u32 { x + 1 }",
)
.await?;
let _ = git().args(["add", "."]).status()?;
let _ = git().args(["commit", "-m", "egg"]).status()?;
let _ = git().args(["push", "-u", "origin", "test"]).status()?;
let pr_opt = CreatePullRequestOption {
assignee: None,
assignees: Some(vec!["TestingAdmin".into()]),
base: Some("main".into()),
body: Some("This is a test PR".into()),
due_date: None,
head: Some("test".into()),
labels: None,
milestone: None,
title: Some("test pr".into()),
};
let pr = api
.repo_create_pull_request("TestingAdmin", "test", pr_opt)
.await
.wrap_err("couldn't create pr")?;
tokio::time::sleep(std::time::Duration::from_secs(3)).await;
let is_merged = api
.repo_pull_request_is_merged("TestingAdmin", "test", pr.number.unwrap())
.await
.is_ok();
ensure!(!is_merged, "pr should not yet be merged");
let merge_opt = MergePullRequestOption {
r#do: "merge".into(),
merge_commit_id: None,
merge_message_field: None,
merge_title_field: None,
delete_branch_after_merge: Some(true),
force_merge: None,
head_commit_id: None,
merge_when_checks_succeed: None,
};
api.repo_merge_pull_request("TestingAdmin", "test", pr.number.unwrap(), merge_opt)
.await
.wrap_err_with(|| eyre!("couldn't merge pr {}", pr.number.unwrap()))?;
let is_merged = api
.repo_pull_request_is_merged("TestingAdmin", "test", pr.number.unwrap())
.await
.is_ok();
ensure!(is_merged, "pr should be merged");
let _ = git().args(["fetch"]).status()?;
let _ = git().args(["pull"]).status()?;
let query = RepoListReleasesQuery {
draft: None,
pre_release: None,
per_page: None,
page: None,
limit: None,
};
ensure!(
api.repo_list_releases("TestingAdmin", "test", query)
.await
.wrap_err("releases list not found")?
.is_empty(),
"there should be no releases yet"
);
let tag_opt = CreateTagOption {
message: Some("This is a tag!".into()),
tag_name: "v1.0".into(),
target: None,
};
api.repo_create_tag("TestingAdmin", "test", tag_opt)
.await
.wrap_err("failed to create tag")?;
let release_opt = CreateReleaseOption {
body: Some("This is a release!".into()),
draft: Some(true),
name: Some("v1.0".into()),
prerelease: Some(false),
tag_name: "v1.0".into(),
target_commitish: None,
};
let release = api
.repo_create_release("TestingAdmin", "test", release_opt)
.await
.wrap_err("failed to create release")?;
let edit_release = EditReleaseOption {
body: None,
draft: Some(false),
name: None,
prerelease: None,
tag_name: None,
target_commitish: None,
};
api.repo_edit_release("TestingAdmin", "test", release.id.unwrap(), edit_release)
.await
.wrap_err("failed to edit release")?;
let release_by_tag = api
.repo_get_release_by_tag("TestingAdmin", "test", "v1.0")
.await
.wrap_err("failed to find release")?;
let release_latest = api
.repo_get_latest_release("TestingAdmin", "test")
.await
.wrap_err("failed to find latest release")?;
ensure!(release_by_tag == release_latest, "releases not equal");
let attachment = api
.repo_create_release_attachment(
"TestingAdmin",
"test",
release.id.unwrap(),
b"This is a file!".to_vec(),
RepoCreateReleaseAttachmentQuery { name: Some("test.txt".into()) },
)
.await
.wrap_err("failed to create release attachment")?;
ensure!(
&*api.download_release_attachment("TestingAdmin", "test", release.id.unwrap(), attachment.id.unwrap())
.await?
== b"This is a file!",
"couldn't download attachment"
);
let _zip_archive = api.repo_get_archive("TestingAdmin", "test", "v1.0.zip")
.await.unwrap();
let _tar_archive = api.repo_get_archive("TestingAdmin", "test", "v1.0.tar.gz")
.await.unwrap();
// check these contents when their return value is fixed
api.repo_delete_release_attachment("TestingAdmin", "test", release.id.unwrap(), attachment.id.unwrap())
.await
.wrap_err("failed to deleted attachment")?;
api.repo_delete_release("TestingAdmin", "test", release.id.unwrap())
.await
.wrap_err("failed to delete release")?;
api.repo_delete_tag("TestingAdmin", "test", "v1.0")
.await
.wrap_err("failed to delete release")?;
Ok(())
}
async fn admin(api: &forgejo_api::Forgejo) -> eyre::Result<()> {
let user_opt = CreateUserOption {
created_at: None,
email: "user@noreply.example.org".into(),
full_name: None,
login_name: None,
must_change_password: None,
password: Some("userpass".into()),
restricted: Some(false),
send_notify: Some(true),
source_id: None,
username: "Pipis".into(),
visibility: Some("public".into()),
};
let _ = api
.admin_create_user(user_opt)
.await
.wrap_err("failed to create user")?;
let query = AdminSearchUsersQuery {
source_id: None,
login_name: None,
page: None,
limit: None,
};
let users = api
.admin_search_users(query)
.await
.wrap_err("failed to search users")?;
ensure!(
users.iter().find(|u| u.login.as_ref().unwrap() == "Pipis").is_some(),
"could not find new user"
);
let query = AdminGetAllEmailsQuery {
page: None,
limit: None,
};
let users = api
.admin_get_all_emails(query)
.await
.wrap_err("failed to search emails")?;
ensure!(
users
.iter()
.find(|u| u.email.as_ref().unwrap() == "user@noreply.example.org")
.is_some(),
"could not find new user"
);
let org_opt = CreateOrgOption {
description: None,
email: None,
full_name: None,
location: None,
repo_admin_change_team_access: None,
username: "test-org".into(),
visibility: Some("public".into()),
website: None,
};
let _ = api
.admin_create_org("Pipis", org_opt)
.await
.wrap_err("failed to create org")?;
let query = AdminGetAllOrgsQuery {
page: None,
limit: None,
};
ensure!(
!api.admin_get_all_orgs(query)
.await?
.is_empty(),
"org list empty"
);
let key_opt = CreateKeyOption {
key: "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN68ehQAsbGEwlXPa2AxbAh1QxFQrtRel2jeC0hRlPc1 user@noreply.example.org".into(),
read_only: None,
title: "Example Key".into(),
};
let key = api
.admin_create_public_key("Pipis", key_opt)
.await
.wrap_err("failed to create key")?;
api.admin_delete_user_public_key("Pipis", key.id.unwrap())
.await
.wrap_err("failed to delete key")?;
let rename_opt = RenameUserOption {
new_username: "Bepis".into(),
};
api.admin_rename_user("Pipis", rename_opt)
.await
.wrap_err("failed to rename user")?;
let query = AdminDeleteUserQuery {
purge: Some(true),
};
api.admin_delete_user("Bepis", query)
.await
.wrap_err("failed to delete user")?;
let query = AdminDeleteUserQuery {
purge: Some(true),
};
ensure!(
api.admin_delete_user("Ghost", query).await.is_err(),
"deleting fake user should fail"
);
let query = AdminCronListQuery {
page: None,
limit: None,
};
let crons = api
.admin_cron_list(query)
.await
.wrap_err("failed to get crons list")?;
api.admin_cron_run(&crons.get(0).ok_or_else(|| eyre!("no crons"))?.name.as_ref().unwrap())
.await
.wrap_err("failed to run cron")?;
let hook_opt = CreateHookOption {
active: None,
authorization_header: None,
branch_filter: None,
config: CreateHookOptionConfig {
// content_type: "json".into(),
// url: url::Url::parse("http://test.local/").unwrap(),
additional: [("content_type".into(), "json".into()), ("url".into(), "http://test.local/".into())].into(),
},
events: Some(Vec::new()),
r#type: "forgejo".into(),
};
// yarr har har me matey this is me hook
let hook = api
.admin_create_hook(hook_opt)
.await
.wrap_err("failed to create hook")?;
let edit_hook = EditHookOption {
active: Some(true),
authorization_header: None,
branch_filter: None,
config: None,
events: None,
};
api.admin_edit_hook(hook.id.unwrap(), edit_hook)
.await
.wrap_err("failed to edit hook")?;
api.admin_delete_hook(hook.id.unwrap())
.await
.wrap_err("failed to delete hook")?;
Ok(())
}