test_vcs_operations_hg.py
225 lines
| 8.8 KiB
| text/x-python
|
PythonLexer
r5607 | # Copyright (C) 2010-2024 RhodeCode GmbH | |||
r5459 | # | |||
# This program is free software: you can redistribute it and/or modify | ||||
# it under the terms of the GNU Affero General Public License, version 3 | ||||
# (only), as published by the Free Software Foundation. | ||||
# | ||||
# This program is distributed in the hope that it will be useful, | ||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of | ||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||||
# GNU General Public License for more details. | ||||
# | ||||
# You should have received a copy of the GNU Affero General Public License | ||||
# along with this program. If not, see <http://www.gnu.org/licenses/>. | ||||
# | ||||
# This program is dual-licensed. If you wish to learn more about the | ||||
# RhodeCode Enterprise Edition, including its added features, Support services, | ||||
# and proprietary license terms, please see https://rhodecode.com/licenses/ | ||||
""" | ||||
Test suite for making push/pull operations, on specially modified INI files | ||||
""" | ||||
import time | ||||
import pytest | ||||
from rhodecode.lib import rc_cache | ||||
from rhodecode.model.db import Repository, UserIpMap, CacheKey | ||||
from rhodecode.model.meta import Session | ||||
from rhodecode.model.repo import RepoModel | ||||
from rhodecode.model.user import UserModel | ||||
from rhodecode.tests import (GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN) | ||||
from rhodecode.tests.vcs_operations import ( | ||||
Command, _check_proper_clone, _add_files_and_push, HG_REPO_WITH_GROUP) | ||||
r5607 | @pytest.mark.usefixtures( | |||
"init_pyramid_app", | ||||
"repo_group_repos", | ||||
"disable_anonymous_user", | ||||
"disable_locking", | ||||
) | ||||
class TestVCSOperationsHg(object): | ||||
r5459 | ||||
r5607 | def test_clone_hg_repo_by_admin(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
_check_proper_clone(stdout, stderr, 'hg') | ||||
r5607 | def test_clone_hg_repo_by_admin_pull_protocol(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone --pull', clone_url, tmpdir.strpath) | |||
_check_proper_clone(stdout, stderr, 'hg') | ||||
r5607 | def test_clone_hg_repo_by_admin_pull_stream_protocol(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone --pull --stream', clone_url, tmpdir.strpath) | |||
assert 'files to transfer,' in stdout | ||||
assert 'transferred 1.' in stdout | ||||
assert '114 files updated,' in stdout | ||||
r5607 | def test_clone_hg_repo_by_id_by_admin(self, rcstack, tmpdir): | |||
r5459 | repo_id = Repository.get_by_repo_name(HG_REPO).repo_id | |||
r5607 | clone_url = rcstack.repo_clone_url('_%s' % repo_id) | |||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
_check_proper_clone(stdout, stderr, 'hg') | ||||
r5607 | def test_clone_hg_repo_with_group_by_admin(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO_WITH_GROUP) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
_check_proper_clone(stdout, stderr, 'hg') | ||||
r5607 | def test_clone_wrong_credentials_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO, passwd='bad!') | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'abort: authorization failed' in stderr | ||||
r5607 | def test_clone_git_dir_as_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(GIT_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'HTTP Error 404: Not Found' in stderr | ||||
r5607 | def test_clone_non_existing_path_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url('trololo') | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'HTTP Error 404: Not Found' in stderr | ||||
r5607 | def test_clone_hg_with_slashes(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url('//' + HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute('hg clone', clone_url, tmpdir.strpath) | ||||
r5459 | assert 'HTTP Error 404: Not Found' in stderr | |||
def test_clone_existing_path_hg_not_in_database( | ||||
r5607 | self, rcstack, tmpdir, fs_repo_only): | |||
r5459 | ||||
db_name = fs_repo_only('not-in-db-hg', repo_type='hg') | ||||
r5607 | clone_url = rcstack.repo_clone_url(db_name) | |||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'HTTP Error 404: Not Found' in stderr | ||||
def test_clone_existing_path_hg_not_in_database_different_scm( | ||||
r5607 | self, rcstack, tmpdir, fs_repo_only): | |||
r5459 | db_name = fs_repo_only('not-in-db-git', repo_type='git') | |||
r5607 | clone_url = rcstack.repo_clone_url(db_name) | |||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'HTTP Error 404: Not Found' in stderr | ||||
r5607 | def test_clone_non_existing_store_path_hg(self, rcstack, tmpdir, user_util): | |||
r5459 | repo = user_util.create_repo() | |||
r5607 | clone_url = rcstack.repo_clone_url(repo.repo_name) | |||
r5459 | ||||
# Damage repo by removing it's folder | ||||
RepoModel()._delete_filesystem_repo(repo) | ||||
r5607 | stdout, stderr = Command(tmpdir.strpath).execute( | |||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'HTTP Error 404: Not Found' in stderr | ||||
r5607 | def test_push_new_file_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
stdout, stderr = _add_files_and_push( | ||||
'hg', tmpdir.strpath, clone_url=clone_url) | ||||
assert 'pushing to' in stdout | ||||
assert 'size summary' in stdout | ||||
r5607 | def test_push_invalidates_cache(self, rcstack, tmpdir): | |||
r5459 | hg_repo = Repository.get_by_repo_name(HG_REPO) | |||
# init cache objects | ||||
CacheKey.delete_all_cache() | ||||
repo_namespace_key = CacheKey.REPO_INVALIDATION_NAMESPACE.format(repo_id=hg_repo.repo_id) | ||||
inv_context_manager = rc_cache.InvalidationContext(key=repo_namespace_key) | ||||
with inv_context_manager as invalidation_context: | ||||
# __enter__ will create and register cache objects | ||||
pass | ||||
cache_keys = hg_repo.cache_keys | ||||
assert cache_keys != [] | ||||
old_ids = [x.cache_state_uid for x in cache_keys] | ||||
# clone to init cache | ||||
r5607 | clone_url = rcstack.repo_clone_url(hg_repo.repo_name) | |||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
cache_keys = hg_repo.cache_keys | ||||
assert cache_keys != [] | ||||
for key in cache_keys: | ||||
assert key.cache_active is True | ||||
# PUSH that should trigger invalidation cache | ||||
stdout, stderr = _add_files_and_push( | ||||
'hg', tmpdir.strpath, clone_url=clone_url, files_no=1) | ||||
# flush... | ||||
Session().commit() | ||||
hg_repo = Repository.get_by_repo_name(HG_REPO) | ||||
cache_keys = hg_repo.cache_keys | ||||
assert cache_keys != [] | ||||
new_ids = [x.cache_state_uid for x in cache_keys] | ||||
assert new_ids != old_ids | ||||
r5607 | def test_push_wrong_credentials_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
r5607 | push_url = rcstack.repo_clone_url( | |||
r5459 | HG_REPO, user='bad', passwd='name') | |||
stdout, stderr = _add_files_and_push( | ||||
'hg', tmpdir.strpath, clone_url=push_url) | ||||
assert 'abort: authorization failed' in stderr | ||||
r5607 | def test_push_back_to_wrong_url_hg(self, rcstack, tmpdir): | |||
clone_url = rcstack.repo_clone_url(HG_REPO) | ||||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
stdout, stderr = _add_files_and_push( | ||||
'hg', tmpdir.strpath, | ||||
r5607 | clone_url=rcstack.repo_clone_url('not-existing')) | |||
r5459 | ||||
assert 'HTTP Error 404: Not Found' in stderr | ||||
r5607 | def test_ip_restriction_hg(self, rcstack, tmpdir): | |||
r5459 | user_model = UserModel() | |||
try: | ||||
user_model.add_extra_ip(TEST_USER_ADMIN_LOGIN, '10.10.10.10/32') | ||||
Session().commit() | ||||
time.sleep(2) | ||||
r5607 | clone_url = rcstack.repo_clone_url(HG_REPO) | |||
stdout, stderr = Command(tmpdir.strpath).execute( | ||||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
assert 'abort: HTTP Error 403: Forbidden' in stderr | ||||
finally: | ||||
# release IP restrictions | ||||
for ip in UserIpMap.getAll(): | ||||
UserIpMap.delete(ip.ip_id) | ||||
Session().commit() | ||||
time.sleep(2) | ||||
r5607 | stdout, stderr = Command(tmpdir.strpath).execute( | |||
r5459 | 'hg clone', clone_url, tmpdir.strpath) | |||
_check_proper_clone(stdout, stderr, 'hg') | ||||