test_create_repo.py
348 lines
| 12.2 KiB
| text/x-python
|
PythonLexer
r1 | ||||
r5088 | # Copyright (C) 2010-2023 RhodeCode GmbH | |||
r1 | # | |||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
import mock | ||||
import pytest | ||||
from rhodecode.lib.vcs import settings | ||||
r1153 | from rhodecode.model.meta import Session | |||
r1 | from rhodecode.model.repo import RepoModel | |||
r1153 | from rhodecode.model.user import UserModel | |||
r1 | from rhodecode.tests import TEST_USER_ADMIN_LOGIN | |||
from rhodecode.api.tests.utils import ( | ||||
build_data, api_call, assert_ok, assert_error, crash) | ||||
r5607 | from rhodecode.tests.fixtures.rc_fixture import Fixture | |||
r5048 | from rhodecode.lib.ext_json import json | |||
from rhodecode.lib.str_utils import safe_str | ||||
r1 | ||||
fixture = Fixture() | ||||
@pytest.mark.usefixtures("testuser_api", "app") | ||||
class TestCreateRepo(object): | ||||
r1153 | ||||
@pytest.mark.parametrize('given, expected_name, expected_exc', [ | ||||
('api repo-1', 'api-repo-1', False), | ||||
('api-repo 1-ąć', 'api-repo-1-ąć', False), | ||||
r5453 | ('unicode-ąć', u'unicode-ąć', False), | |||
r1153 | ('some repo v1.2', 'some-repo-v1.2', False), | |||
('v2.0', 'v2.0', False), | ||||
]) | ||||
def test_api_create_repo(self, backend, given, expected_name, expected_exc): | ||||
r1 | id_, params = build_data( | |||
self.apikey, | ||||
'create_repo', | ||||
r1153 | repo_name=given, | |||
r1 | owner=TEST_USER_ADMIN_LOGIN, | |||
repo_type=backend.alias, | ||||
) | ||||
response = api_call(self.app, params) | ||||
ret = { | ||||
r1153 | 'msg': 'Created new repository `%s`' % (expected_name,), | |||
r1 | 'success': True, | |||
'task': None, | ||||
} | ||||
expected = ret | ||||
assert_ok(id_, expected, given=response.body) | ||||
r5048 | repo = RepoModel().get_by_repo_name(safe_str(expected_name)) | |||
r1153 | assert repo is not None | |||
id_, params = build_data(self.apikey, 'get_repo', repoid=expected_name) | ||||
r1 | response = api_call(self.app, params) | |||
body = json.loads(response.body) | ||||
assert body['result']['enable_downloads'] is False | ||||
assert body['result']['enable_locking'] is False | ||||
assert body['result']['enable_statistics'] is False | ||||
r5048 | fixture.destroy_repo(safe_str(expected_name)) | |||
r1 | ||||
def test_api_create_restricted_repo_type(self, backend): | ||||
repo_name = 'api-repo-type-{0}'.format(backend.alias) | ||||
id_, params = build_data( | ||||
self.apikey, | ||||
'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias, | ||||
) | ||||
git_backend = settings.BACKENDS['git'] | ||||
with mock.patch( | ||||
'rhodecode.lib.vcs.settings.BACKENDS', {'git': git_backend}): | ||||
response = api_call(self.app, params) | ||||
repo = RepoModel().get_by_repo_name(repo_name) | ||||
if backend.alias == 'git': | ||||
assert repo is not None | ||||
expected = { | ||||
'msg': 'Created new repository `{0}`'.format(repo_name,), | ||||
'success': True, | ||||
'task': None, | ||||
} | ||||
assert_ok(id_, expected, given=response.body) | ||||
else: | ||||
assert repo is None | ||||
fixture.destroy_repo(repo_name) | ||||
def test_api_create_repo_with_booleans(self, backend): | ||||
repo_name = 'api-repo-2' | ||||
id_, params = build_data( | ||||
self.apikey, | ||||
'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias, | ||||
enable_statistics=True, | ||||
enable_locking=True, | ||||
enable_downloads=True | ||||
) | ||||
response = api_call(self.app, params) | ||||
repo = RepoModel().get_by_repo_name(repo_name) | ||||
assert repo is not None | ||||
ret = { | ||||
'msg': 'Created new repository `%s`' % (repo_name,), | ||||
'success': True, | ||||
'task': None, | ||||
} | ||||
expected = ret | ||||
assert_ok(id_, expected, given=response.body) | ||||
id_, params = build_data(self.apikey, 'get_repo', repoid=repo_name) | ||||
response = api_call(self.app, params) | ||||
body = json.loads(response.body) | ||||
assert body['result']['enable_downloads'] is True | ||||
assert body['result']['enable_locking'] is True | ||||
assert body['result']['enable_statistics'] is True | ||||
fixture.destroy_repo(repo_name) | ||||
def test_api_create_repo_in_group(self, backend): | ||||
repo_group_name = 'my_gr' | ||||
# create the parent | ||||
fixture.create_repo_group(repo_group_name) | ||||
repo_name = '%s/api-repo-gr' % (repo_group_name,) | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias,) | ||||
response = api_call(self.app, params) | ||||
repo = RepoModel().get_by_repo_name(repo_name) | ||||
assert repo is not None | ||||
assert repo.group is not None | ||||
ret = { | ||||
'msg': 'Created new repository `%s`' % (repo_name,), | ||||
'success': True, | ||||
'task': None, | ||||
} | ||||
expected = ret | ||||
assert_ok(id_, expected, given=response.body) | ||||
fixture.destroy_repo(repo_name) | ||||
fixture.destroy_repo_group(repo_group_name) | ||||
r1153 | def test_create_repo_in_group_that_doesnt_exist(self, backend, user_util): | |||
repo_group_name = 'fake_group' | ||||
repo_name = '%s/api-repo-gr' % (repo_group_name,) | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias,) | ||||
response = api_call(self.app, params) | ||||
expected = {'repo_group': 'Repository group `{}` does not exist'.format( | ||||
repo_group_name)} | ||||
assert_error(id_, expected, given=response.body) | ||||
r1 | def test_api_create_repo_unknown_owner(self, backend): | |||
repo_name = 'api-repo-2' | ||||
owner = 'i-dont-exist' | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
owner=owner, | ||||
repo_type=backend.alias) | ||||
response = api_call(self.app, params) | ||||
expected = 'user `%s` does not exist' % (owner,) | ||||
assert_error(id_, expected, given=response.body) | ||||
def test_api_create_repo_dont_specify_owner(self, backend): | ||||
repo_name = 'api-repo-3' | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
repo_type=backend.alias) | ||||
response = api_call(self.app, params) | ||||
repo = RepoModel().get_by_repo_name(repo_name) | ||||
assert repo is not None | ||||
ret = { | ||||
'msg': 'Created new repository `%s`' % (repo_name,), | ||||
'success': True, | ||||
'task': None, | ||||
} | ||||
expected = ret | ||||
assert_ok(id_, expected, given=response.body) | ||||
fixture.destroy_repo(repo_name) | ||||
def test_api_create_repo_by_non_admin(self, backend): | ||||
repo_name = 'api-repo-4' | ||||
id_, params = build_data( | ||||
self.apikey_regular, 'create_repo', | ||||
repo_name=repo_name, | ||||
repo_type=backend.alias) | ||||
response = api_call(self.app, params) | ||||
repo = RepoModel().get_by_repo_name(repo_name) | ||||
assert repo is not None | ||||
ret = { | ||||
'msg': 'Created new repository `%s`' % (repo_name,), | ||||
'success': True, | ||||
'task': None, | ||||
} | ||||
expected = ret | ||||
assert_ok(id_, expected, given=response.body) | ||||
fixture.destroy_repo(repo_name) | ||||
def test_api_create_repo_by_non_admin_specify_owner(self, backend): | ||||
repo_name = 'api-repo-5' | ||||
owner = 'i-dont-exist' | ||||
id_, params = build_data( | ||||
self.apikey_regular, 'create_repo', | ||||
repo_name=repo_name, | ||||
repo_type=backend.alias, | ||||
owner=owner) | ||||
response = api_call(self.app, params) | ||||
r1153 | expected = 'Only RhodeCode super-admin can specify `owner` param' | |||
r1 | assert_error(id_, expected, given=response.body) | |||
fixture.destroy_repo(repo_name) | ||||
r1153 | def test_api_create_repo_by_non_admin_no_parent_group_perms(self, backend): | |||
repo_group_name = 'no-access' | ||||
fixture.create_repo_group(repo_group_name) | ||||
repo_name = 'no-access/api-repo' | ||||
id_, params = build_data( | ||||
self.apikey_regular, 'create_repo', | ||||
repo_name=repo_name, | ||||
repo_type=backend.alias) | ||||
response = api_call(self.app, params) | ||||
expected = {'repo_group': 'Repository group `{}` does not exist'.format( | ||||
repo_group_name)} | ||||
assert_error(id_, expected, given=response.body) | ||||
fixture.destroy_repo_group(repo_group_name) | ||||
fixture.destroy_repo(repo_name) | ||||
def test_api_create_repo_non_admin_no_permission_to_create_to_root_level( | ||||
self, backend, user_util): | ||||
regular_user = user_util.create_user() | ||||
regular_user_api_key = regular_user.api_key | ||||
usr = UserModel().get_by_username(regular_user.username) | ||||
usr.inherit_default_permissions = False | ||||
Session().add(usr) | ||||
repo_name = backend.new_repo_name() | ||||
id_, params = build_data( | ||||
regular_user_api_key, 'create_repo', | ||||
repo_name=repo_name, | ||||
repo_type=backend.alias) | ||||
response = api_call(self.app, params) | ||||
expected = { | ||||
"repo_name": "You do not have the permission to " | ||||
"store repositories in the root location."} | ||||
assert_error(id_, expected, given=response.body) | ||||
r1 | def test_api_create_repo_exists(self, backend): | |||
repo_name = backend.repo_name | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias,) | ||||
response = api_call(self.app, params) | ||||
r1153 | expected = { | |||
'unique_repo_name': 'Repository with name `{}` already exists'.format( | ||||
repo_name)} | ||||
r1 | assert_error(id_, expected, given=response.body) | |||
@mock.patch.object(RepoModel, 'create', crash) | ||||
def test_api_create_repo_exception_occurred(self, backend): | ||||
repo_name = 'api-repo-6' | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
repo_name=repo_name, | ||||
owner=TEST_USER_ADMIN_LOGIN, | ||||
repo_type=backend.alias,) | ||||
response = api_call(self.app, params) | ||||
expected = 'failed to create repository `%s`' % (repo_name,) | ||||
assert_error(id_, expected, given=response.body) | ||||
r1153 | @pytest.mark.parametrize('parent_group, dirty_name, expected_name', [ | |||
(None, 'foo bar x', 'foo-bar-x'), | ||||
('foo', '/foo//bar x', 'foo/bar-x'), | ||||
('foo-bar', 'foo-bar //bar x', 'foo-bar/bar-x'), | ||||
]) | ||||
def test_create_repo_with_extra_slashes_in_name( | ||||
self, backend, parent_group, dirty_name, expected_name): | ||||
if parent_group: | ||||
gr = fixture.create_repo_group(parent_group) | ||||
assert gr.group_name == parent_group | ||||
r1 | ||||
id_, params = build_data( | ||||
self.apikey, 'create_repo', | ||||
r1153 | repo_name=dirty_name, | |||
r1 | repo_type=backend.alias, | |||
owner=TEST_USER_ADMIN_LOGIN,) | ||||
response = api_call(self.app, params) | ||||
r1153 | expected ={ | |||
"msg": "Created new repository `{}`".format(expected_name), | ||||
"task": None, | ||||
"success": True | ||||
} | ||||
assert_ok(id_, expected, response.body) | ||||
repo = RepoModel().get_by_repo_name(expected_name) | ||||
r1 | assert repo is not None | |||
expected = { | ||||
r1153 | 'msg': 'Created new repository `%s`' % (expected_name,), | |||
r1 | 'success': True, | |||
'task': None, | ||||
} | ||||
assert_ok(id_, expected, given=response.body) | ||||
r1153 | fixture.destroy_repo(expected_name) | |||
if parent_group: | ||||
fixture.destroy_repo_group(parent_group) | ||||