Show More
@@ -0,0 +1,244 b'' | |||||
|
1 | # -*- coding: utf-8 -*- | |||
|
2 | ||||
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |||
|
4 | # | |||
|
5 | # This program is free software: you can redistribute it and/or modify | |||
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |||
|
7 | # (only), as published by the Free Software Foundation. | |||
|
8 | # | |||
|
9 | # This program is distributed in the hope that it will be useful, | |||
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |||
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |||
|
12 | # GNU General Public License for more details. | |||
|
13 | # | |||
|
14 | # You should have received a copy of the GNU Affero General Public License | |||
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |||
|
16 | # | |||
|
17 | # This program is dual-licensed. If you wish to learn more about the | |||
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |||
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |||
|
20 | ||||
|
21 | import os | |||
|
22 | ||||
|
23 | import pytest | |||
|
24 | ||||
|
25 | from rhodecode.lib.vcs.backends.git.repository import GitRepository | |||
|
26 | from rhodecode.lib.vcs.backends.hg.repository import MercurialRepository | |||
|
27 | from rhodecode.lib.vcs.nodes import FileNode | |||
|
28 | from rhodecode.model.meta import Session | |||
|
29 | ||||
|
30 | from rhodecode.tests.vcs_operations import ( | |||
|
31 | Command, _check_proper_clone, _check_proper_git_push, _check_proper_hg_push) | |||
|
32 | ||||
|
33 | ||||
|
34 | @pytest.mark.usefixtures("disable_locking") | |||
|
35 | class TestVCSOperationsSpecial(object): | |||
|
36 | ||||
|
37 | def test_git_sets_default_branch_if_not_master( | |||
|
38 | self, backend_git, tmpdir, rc_web_server): | |||
|
39 | empty_repo = backend_git.create_repo() | |||
|
40 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) | |||
|
41 | ||||
|
42 | cmd = Command(tmpdir.strpath) | |||
|
43 | cmd.execute('git clone', clone_url) | |||
|
44 | ||||
|
45 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
46 | repo.in_memory_commit.add(FileNode('file', content='')) | |||
|
47 | repo.in_memory_commit.commit( | |||
|
48 | message='Commit on branch test', | |||
|
49 | author='Automatic test', | |||
|
50 | branch='test') | |||
|
51 | ||||
|
52 | repo_cmd = Command(repo.path) | |||
|
53 | stdout, stderr = repo_cmd.execute('git push --verbose origin test') | |||
|
54 | _check_proper_git_push( | |||
|
55 | stdout, stderr, branch='test', should_set_default_branch=True) | |||
|
56 | ||||
|
57 | stdout, stderr = cmd.execute( | |||
|
58 | 'git clone', clone_url, empty_repo.repo_name + '-clone') | |||
|
59 | _check_proper_clone(stdout, stderr, 'git') | |||
|
60 | ||||
|
61 | # Doing an explicit commit in order to get latest user logs on MySQL | |||
|
62 | Session().commit() | |||
|
63 | ||||
|
64 | # def test_git_fetches_from_remote_repository_with_annotated_tags( | |||
|
65 | # self, backend_git, rc_web_server): | |||
|
66 | # # Note: This is a test specific to the git backend. It checks the | |||
|
67 | # # integration of fetching from a remote repository which contains | |||
|
68 | # # annotated tags. | |||
|
69 | # | |||
|
70 | # # Dulwich shows this specific behavior only when | |||
|
71 | # # operating against a remote repository. | |||
|
72 | # source_repo = backend_git['annotated-tag'] | |||
|
73 | # target_vcs_repo = backend_git.create_repo().scm_instance() | |||
|
74 | # target_vcs_repo.fetch(rc_web_server.repo_clone_url(source_repo.repo_name)) | |||
|
75 | ||||
|
76 | def test_git_push_shows_pull_request_refs(self, backend_git, rc_web_server, tmpdir): | |||
|
77 | """ | |||
|
78 | test if remote info about refs is visible | |||
|
79 | """ | |||
|
80 | empty_repo = backend_git.create_repo() | |||
|
81 | ||||
|
82 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) | |||
|
83 | ||||
|
84 | cmd = Command(tmpdir.strpath) | |||
|
85 | cmd.execute('git clone', clone_url) | |||
|
86 | ||||
|
87 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
88 | repo.in_memory_commit.add(FileNode('readme.md', content='## Hello')) | |||
|
89 | repo.in_memory_commit.commit( | |||
|
90 | message='Commit on branch Master', | |||
|
91 | author='Automatic test', | |||
|
92 | branch='master') | |||
|
93 | ||||
|
94 | repo_cmd = Command(repo.path) | |||
|
95 | stdout, stderr = repo_cmd.execute('git push --verbose origin master') | |||
|
96 | _check_proper_git_push(stdout, stderr, branch='master') | |||
|
97 | ||||
|
98 | ref = '{}/{}/pull-request/new?branch=master'.format( | |||
|
99 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
100 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr | |||
|
101 | assert 'remote: RhodeCode: push completed' in stderr | |||
|
102 | ||||
|
103 | # push on the same branch | |||
|
104 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
105 | repo.in_memory_commit.add(FileNode('setup.py', content='print\n')) | |||
|
106 | repo.in_memory_commit.commit( | |||
|
107 | message='Commit2 on branch Master', | |||
|
108 | author='Automatic test2', | |||
|
109 | branch='master') | |||
|
110 | ||||
|
111 | repo_cmd = Command(repo.path) | |||
|
112 | stdout, stderr = repo_cmd.execute('git push --verbose origin master') | |||
|
113 | _check_proper_git_push(stdout, stderr, branch='master') | |||
|
114 | ||||
|
115 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr | |||
|
116 | assert 'remote: RhodeCode: push completed' in stderr | |||
|
117 | ||||
|
118 | # new Branch | |||
|
119 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
120 | repo.in_memory_commit.add(FileNode('feature1.py', content='## Hello world')) | |||
|
121 | repo.in_memory_commit.commit( | |||
|
122 | message='Commit on branch feature', | |||
|
123 | author='Automatic test', | |||
|
124 | branch='feature') | |||
|
125 | ||||
|
126 | repo_cmd = Command(repo.path) | |||
|
127 | stdout, stderr = repo_cmd.execute('git push --verbose origin feature') | |||
|
128 | _check_proper_git_push(stdout, stderr, branch='feature') | |||
|
129 | ||||
|
130 | ref = '{}/{}/pull-request/new?branch=feature'.format( | |||
|
131 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
132 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr | |||
|
133 | assert 'remote: RhodeCode: push completed' in stderr | |||
|
134 | ||||
|
135 | def test_hg_push_shows_pull_request_refs(self, backend_hg, rc_web_server, tmpdir): | |||
|
136 | empty_repo = backend_hg.create_repo() | |||
|
137 | ||||
|
138 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) | |||
|
139 | ||||
|
140 | cmd = Command(tmpdir.strpath) | |||
|
141 | cmd.execute('hg clone', clone_url) | |||
|
142 | ||||
|
143 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
144 | repo.in_memory_commit.add(FileNode(u'readme.md', content=u'## Hello')) | |||
|
145 | repo.in_memory_commit.commit( | |||
|
146 | message=u'Commit on branch default', | |||
|
147 | author=u'Automatic test', | |||
|
148 | branch='default') | |||
|
149 | ||||
|
150 | repo_cmd = Command(repo.path) | |||
|
151 | repo_cmd.execute('hg checkout default') | |||
|
152 | ||||
|
153 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) | |||
|
154 | _check_proper_hg_push(stdout, stderr, branch='default') | |||
|
155 | ||||
|
156 | ref = '{}/{}/pull-request/new?branch=default'.format( | |||
|
157 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
158 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
159 | assert 'remote: RhodeCode: push completed' in stdout | |||
|
160 | ||||
|
161 | # push on the same branch | |||
|
162 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
163 | repo.in_memory_commit.add(FileNode(u'setup.py', content=u'print\n')) | |||
|
164 | repo.in_memory_commit.commit( | |||
|
165 | message=u'Commit2 on branch default', | |||
|
166 | author=u'Automatic test2', | |||
|
167 | branch=u'default') | |||
|
168 | ||||
|
169 | repo_cmd = Command(repo.path) | |||
|
170 | repo_cmd.execute('hg checkout default') | |||
|
171 | ||||
|
172 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) | |||
|
173 | _check_proper_hg_push(stdout, stderr, branch='default') | |||
|
174 | ||||
|
175 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
176 | assert 'remote: RhodeCode: push completed' in stdout | |||
|
177 | ||||
|
178 | # new Branch | |||
|
179 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
180 | repo.in_memory_commit.add(FileNode(u'feature1.py', content=u'## Hello world')) | |||
|
181 | repo.in_memory_commit.commit( | |||
|
182 | message=u'Commit on branch feature', | |||
|
183 | author=u'Automatic test', | |||
|
184 | branch=u'feature') | |||
|
185 | ||||
|
186 | repo_cmd = Command(repo.path) | |||
|
187 | repo_cmd.execute('hg checkout feature') | |||
|
188 | ||||
|
189 | stdout, stderr = repo_cmd.execute('hg push --new-branch --verbose', clone_url) | |||
|
190 | _check_proper_hg_push(stdout, stderr, branch='feature') | |||
|
191 | ||||
|
192 | ref = '{}/{}/pull-request/new?branch=feature'.format( | |||
|
193 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
194 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
195 | assert 'remote: RhodeCode: push completed' in stdout | |||
|
196 | ||||
|
197 | def test_hg_push_shows_pull_request_refs_book(self, backend_hg, rc_web_server, tmpdir): | |||
|
198 | empty_repo = backend_hg.create_repo() | |||
|
199 | ||||
|
200 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) | |||
|
201 | ||||
|
202 | cmd = Command(tmpdir.strpath) | |||
|
203 | cmd.execute('hg clone', clone_url) | |||
|
204 | ||||
|
205 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
206 | repo.in_memory_commit.add(FileNode(u'readme.md', content=u'## Hello')) | |||
|
207 | repo.in_memory_commit.commit( | |||
|
208 | message=u'Commit on branch default', | |||
|
209 | author=u'Automatic test', | |||
|
210 | branch='default') | |||
|
211 | ||||
|
212 | repo_cmd = Command(repo.path) | |||
|
213 | repo_cmd.execute('hg checkout default') | |||
|
214 | ||||
|
215 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) | |||
|
216 | _check_proper_hg_push(stdout, stderr, branch='default') | |||
|
217 | ||||
|
218 | ref = '{}/{}/pull-request/new?branch=default'.format( | |||
|
219 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
220 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
221 | assert 'remote: RhodeCode: push completed' in stdout | |||
|
222 | ||||
|
223 | # add bookmark | |||
|
224 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |||
|
225 | repo.in_memory_commit.add(FileNode(u'setup.py', content=u'print\n')) | |||
|
226 | repo.in_memory_commit.commit( | |||
|
227 | message=u'Commit2 on branch default', | |||
|
228 | author=u'Automatic test2', | |||
|
229 | branch=u'default') | |||
|
230 | ||||
|
231 | repo_cmd = Command(repo.path) | |||
|
232 | repo_cmd.execute('hg checkout default') | |||
|
233 | repo_cmd.execute('hg bookmark feature2') | |||
|
234 | stdout, stderr = repo_cmd.execute('hg push -B feature2 --verbose', clone_url) | |||
|
235 | _check_proper_hg_push(stdout, stderr, branch='default') | |||
|
236 | ||||
|
237 | ref = '{}/{}/pull-request/new?branch=default'.format( | |||
|
238 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
239 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
240 | ref = '{}/{}/pull-request/new?bookmark=feature2'.format( | |||
|
241 | rc_web_server.host_url(), empty_repo.repo_name) | |||
|
242 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout | |||
|
243 | assert 'remote: RhodeCode: push completed' in stdout | |||
|
244 | assert 'exporting bookmark feature2' in stdout |
@@ -1,410 +1,408 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import os |
|
21 | import os | |
22 | import json |
|
22 | import json | |
|
23 | import time | |||
23 | import platform |
|
24 | import platform | |
24 | import socket |
|
25 | import socket | |
25 | import tempfile |
|
26 | import tempfile | |
|
27 | import subprocess32 | |||
26 |
|
28 | |||
27 | import subprocess32 |
|
|||
28 | import time |
|
|||
29 | from urllib2 import urlopen, URLError |
|
29 | from urllib2 import urlopen, URLError | |
30 |
|
30 | |||
31 | import configobj |
|
31 | import configobj | |
32 | import pytest |
|
32 | import pytest | |
33 |
|
33 | |||
34 | import pyramid.paster |
|
|||
35 |
|
34 | |||
36 | from rhodecode.lib.pyramid_utils import get_app_config |
|
35 | from rhodecode.lib.pyramid_utils import get_app_config | |
37 | from rhodecode.tests.fixture import TestINI |
|
36 | from rhodecode.tests.fixture import TestINI | |
38 | import rhodecode |
|
37 | from rhodecode.tests.vcs_operations.conftest import get_host_url, get_port | |
39 | from rhodecode.tests.other.vcs_operations.conftest import get_host_url, get_port |
|
|||
40 |
|
38 | |||
41 | VCSSERVER_LOG = os.path.join(tempfile.gettempdir(), 'rc-vcsserver.log') |
|
39 | VCSSERVER_LOG = os.path.join(tempfile.gettempdir(), 'rc-vcsserver.log') | |
42 |
|
40 | |||
43 |
|
41 | |||
44 | def _parse_json(value): |
|
42 | def _parse_json(value): | |
45 | return json.loads(value) if value else None |
|
43 | return json.loads(value) if value else None | |
46 |
|
44 | |||
47 |
|
45 | |||
48 | def pytest_addoption(parser): |
|
46 | def pytest_addoption(parser): | |
49 | parser.addoption( |
|
47 | parser.addoption( | |
50 | '--test-loglevel', dest='test_loglevel', |
|
48 | '--test-loglevel', dest='test_loglevel', | |
51 | help="Set default Logging level for tests, warn (default), info, debug") |
|
49 | help="Set default Logging level for tests, warn (default), info, debug") | |
52 | group = parser.getgroup('pylons') |
|
50 | group = parser.getgroup('pylons') | |
53 | group.addoption( |
|
51 | group.addoption( | |
54 | '--with-pylons', dest='pyramid_config', |
|
52 | '--with-pylons', dest='pyramid_config', | |
55 | help="Set up a Pylons environment with the specified config file.") |
|
53 | help="Set up a Pylons environment with the specified config file.") | |
56 | group.addoption( |
|
54 | group.addoption( | |
57 | '--ini-config-override', action='store', type=_parse_json, |
|
55 | '--ini-config-override', action='store', type=_parse_json, | |
58 | default=None, dest='pyramid_config_override', help=( |
|
56 | default=None, dest='pyramid_config_override', help=( | |
59 | "Overrides the .ini file settings. Should be specified in JSON" |
|
57 | "Overrides the .ini file settings. Should be specified in JSON" | |
60 | " format, e.g. '{\"section\": {\"parameter\": \"value\", ...}}'" |
|
58 | " format, e.g. '{\"section\": {\"parameter\": \"value\", ...}}'" | |
61 | ) |
|
59 | ) | |
62 | ) |
|
60 | ) | |
63 | parser.addini( |
|
61 | parser.addini( | |
64 | 'pyramid_config', |
|
62 | 'pyramid_config', | |
65 | "Set up a Pyramid environment with the specified config file.") |
|
63 | "Set up a Pyramid environment with the specified config file.") | |
66 |
|
64 | |||
67 | vcsgroup = parser.getgroup('vcs') |
|
65 | vcsgroup = parser.getgroup('vcs') | |
68 | vcsgroup.addoption( |
|
66 | vcsgroup.addoption( | |
69 | '--without-vcsserver', dest='with_vcsserver', action='store_false', |
|
67 | '--without-vcsserver', dest='with_vcsserver', action='store_false', | |
70 | help="Do not start the VCSServer in a background process.") |
|
68 | help="Do not start the VCSServer in a background process.") | |
71 | vcsgroup.addoption( |
|
69 | vcsgroup.addoption( | |
72 | '--with-vcsserver-http', dest='vcsserver_config_http', |
|
70 | '--with-vcsserver-http', dest='vcsserver_config_http', | |
73 | help="Start the HTTP VCSServer with the specified config file.") |
|
71 | help="Start the HTTP VCSServer with the specified config file.") | |
74 | vcsgroup.addoption( |
|
72 | vcsgroup.addoption( | |
75 | '--vcsserver-protocol', dest='vcsserver_protocol', |
|
73 | '--vcsserver-protocol', dest='vcsserver_protocol', | |
76 | help="Start the VCSServer with HTTP protocol support.") |
|
74 | help="Start the VCSServer with HTTP protocol support.") | |
77 | vcsgroup.addoption( |
|
75 | vcsgroup.addoption( | |
78 | '--vcsserver-config-override', action='store', type=_parse_json, |
|
76 | '--vcsserver-config-override', action='store', type=_parse_json, | |
79 | default=None, dest='vcsserver_config_override', help=( |
|
77 | default=None, dest='vcsserver_config_override', help=( | |
80 | "Overrides the .ini file settings for the VCSServer. " |
|
78 | "Overrides the .ini file settings for the VCSServer. " | |
81 | "Should be specified in JSON " |
|
79 | "Should be specified in JSON " | |
82 | "format, e.g. '{\"section\": {\"parameter\": \"value\", ...}}'" |
|
80 | "format, e.g. '{\"section\": {\"parameter\": \"value\", ...}}'" | |
83 | ) |
|
81 | ) | |
84 | ) |
|
82 | ) | |
85 | vcsgroup.addoption( |
|
83 | vcsgroup.addoption( | |
86 | '--vcsserver-port', action='store', type=int, |
|
84 | '--vcsserver-port', action='store', type=int, | |
87 | default=None, help=( |
|
85 | default=None, help=( | |
88 | "Allows to set the port of the vcsserver. Useful when testing " |
|
86 | "Allows to set the port of the vcsserver. Useful when testing " | |
89 | "against an already running server and random ports cause " |
|
87 | "against an already running server and random ports cause " | |
90 | "trouble.")) |
|
88 | "trouble.")) | |
91 | parser.addini( |
|
89 | parser.addini( | |
92 | 'vcsserver_config_http', |
|
90 | 'vcsserver_config_http', | |
93 | "Start the HTTP VCSServer with the specified config file.") |
|
91 | "Start the HTTP VCSServer with the specified config file.") | |
94 | parser.addini( |
|
92 | parser.addini( | |
95 | 'vcsserver_protocol', |
|
93 | 'vcsserver_protocol', | |
96 | "Start the VCSServer with HTTP protocol support.") |
|
94 | "Start the VCSServer with HTTP protocol support.") | |
97 |
|
95 | |||
98 |
|
96 | |||
99 | @pytest.fixture(scope="session") |
|
97 | @pytest.fixture(scope="session") | |
100 | def vcs_server_config_override(request): |
|
98 | def vcs_server_config_override(request): | |
101 | """ |
|
99 | """ | |
102 | Allows injecting the overrides by specifying this inside test class |
|
100 | Allows injecting the overrides by specifying this inside test class | |
103 | """ |
|
101 | """ | |
104 |
|
102 | |||
105 | return () |
|
103 | return () | |
106 |
|
104 | |||
107 |
|
105 | |||
108 | @pytest.fixture(scope='session') |
|
106 | @pytest.fixture(scope='session') | |
109 | def vcsserver(request, vcsserver_port, vcsserver_factory, vcs_server_config_override): |
|
107 | def vcsserver(request, vcsserver_port, vcsserver_factory, vcs_server_config_override): | |
110 | """ |
|
108 | """ | |
111 | Session scope VCSServer. |
|
109 | Session scope VCSServer. | |
112 |
|
110 | |||
113 | Tests wich need the VCSServer have to rely on this fixture in order |
|
111 | Tests wich need the VCSServer have to rely on this fixture in order | |
114 | to ensure it will be running. |
|
112 | to ensure it will be running. | |
115 |
|
113 | |||
116 | For specific needs, the fixture vcsserver_factory can be used. It allows to |
|
114 | For specific needs, the fixture vcsserver_factory can be used. It allows to | |
117 | adjust the configuration file for the test run. |
|
115 | adjust the configuration file for the test run. | |
118 |
|
116 | |||
119 | Command line args: |
|
117 | Command line args: | |
120 |
|
118 | |||
121 | --without-vcsserver: Allows to switch this fixture off. You have to |
|
119 | --without-vcsserver: Allows to switch this fixture off. You have to | |
122 | manually start the server. |
|
120 | manually start the server. | |
123 |
|
121 | |||
124 | --vcsserver-port: Will expect the VCSServer to listen on this port. |
|
122 | --vcsserver-port: Will expect the VCSServer to listen on this port. | |
125 | """ |
|
123 | """ | |
126 |
|
124 | |||
127 | if not request.config.getoption('with_vcsserver'): |
|
125 | if not request.config.getoption('with_vcsserver'): | |
128 | return None |
|
126 | return None | |
129 |
|
127 | |||
130 | use_http = _use_vcs_http_server(request.config) |
|
128 | use_http = _use_vcs_http_server(request.config) | |
131 | return vcsserver_factory( |
|
129 | return vcsserver_factory( | |
132 | request, use_http=use_http, vcsserver_port=vcsserver_port, |
|
130 | request, use_http=use_http, vcsserver_port=vcsserver_port, | |
133 | overrides=vcs_server_config_override) |
|
131 | overrides=vcs_server_config_override) | |
134 |
|
132 | |||
135 |
|
133 | |||
136 | @pytest.fixture(scope='session') |
|
134 | @pytest.fixture(scope='session') | |
137 | def vcsserver_factory(tmpdir_factory): |
|
135 | def vcsserver_factory(tmpdir_factory): | |
138 | """ |
|
136 | """ | |
139 | Use this if you need a running vcsserver with a special configuration. |
|
137 | Use this if you need a running vcsserver with a special configuration. | |
140 | """ |
|
138 | """ | |
141 |
|
139 | |||
142 | def factory(request, use_http=True, overrides=(), vcsserver_port=None): |
|
140 | def factory(request, use_http=True, overrides=(), vcsserver_port=None): | |
143 |
|
141 | |||
144 | if vcsserver_port is None: |
|
142 | if vcsserver_port is None: | |
145 | vcsserver_port = get_available_port() |
|
143 | vcsserver_port = get_available_port() | |
146 |
|
144 | |||
147 | overrides = list(overrides) |
|
145 | overrides = list(overrides) | |
148 | if use_http: |
|
146 | if use_http: | |
149 | overrides.append({'server:main': {'port': vcsserver_port}}) |
|
147 | overrides.append({'server:main': {'port': vcsserver_port}}) | |
150 | else: |
|
148 | else: | |
151 | overrides.append({'DEFAULT': {'port': vcsserver_port}}) |
|
149 | overrides.append({'DEFAULT': {'port': vcsserver_port}}) | |
152 |
|
150 | |||
153 | if is_cygwin(): |
|
151 | if is_cygwin(): | |
154 | platform_override = {'DEFAULT': { |
|
152 | platform_override = {'DEFAULT': { | |
155 | 'beaker.cache.repo_object.type': 'nocache'}} |
|
153 | 'beaker.cache.repo_object.type': 'nocache'}} | |
156 | overrides.append(platform_override) |
|
154 | overrides.append(platform_override) | |
157 |
|
155 | |||
158 | option_name = 'vcsserver_config_http' if use_http else '' |
|
156 | option_name = 'vcsserver_config_http' if use_http else '' | |
159 | override_option_name = 'vcsserver_config_override' |
|
157 | override_option_name = 'vcsserver_config_override' | |
160 | config_file = get_config( |
|
158 | config_file = get_config( | |
161 | request.config, option_name=option_name, |
|
159 | request.config, option_name=option_name, | |
162 | override_option_name=override_option_name, overrides=overrides, |
|
160 | override_option_name=override_option_name, overrides=overrides, | |
163 | basetemp=tmpdir_factory.getbasetemp().strpath, |
|
161 | basetemp=tmpdir_factory.getbasetemp().strpath, | |
164 | prefix='test_vcs_') |
|
162 | prefix='test_vcs_') | |
165 |
|
163 | |||
166 | print("Using the VCSServer configuration:{}".format(config_file)) |
|
164 | print("Using the VCSServer configuration:{}".format(config_file)) | |
167 | ServerClass = HttpVCSServer if use_http else None |
|
165 | ServerClass = HttpVCSServer if use_http else None | |
168 | server = ServerClass(config_file) |
|
166 | server = ServerClass(config_file) | |
169 | server.start() |
|
167 | server.start() | |
170 |
|
168 | |||
171 | @request.addfinalizer |
|
169 | @request.addfinalizer | |
172 | def cleanup(): |
|
170 | def cleanup(): | |
173 | server.shutdown() |
|
171 | server.shutdown() | |
174 |
|
172 | |||
175 | server.wait_until_ready() |
|
173 | server.wait_until_ready() | |
176 | return server |
|
174 | return server | |
177 |
|
175 | |||
178 | return factory |
|
176 | return factory | |
179 |
|
177 | |||
180 |
|
178 | |||
181 | def is_cygwin(): |
|
179 | def is_cygwin(): | |
182 | return 'cygwin' in platform.system().lower() |
|
180 | return 'cygwin' in platform.system().lower() | |
183 |
|
181 | |||
184 |
|
182 | |||
185 | def _use_vcs_http_server(config): |
|
183 | def _use_vcs_http_server(config): | |
186 | protocol_option = 'vcsserver_protocol' |
|
184 | protocol_option = 'vcsserver_protocol' | |
187 | protocol = ( |
|
185 | protocol = ( | |
188 | config.getoption(protocol_option) or |
|
186 | config.getoption(protocol_option) or | |
189 | config.getini(protocol_option) or |
|
187 | config.getini(protocol_option) or | |
190 | 'http') |
|
188 | 'http') | |
191 | return protocol == 'http' |
|
189 | return protocol == 'http' | |
192 |
|
190 | |||
193 |
|
191 | |||
194 | def _use_log_level(config): |
|
192 | def _use_log_level(config): | |
195 | level = config.getoption('test_loglevel') or 'warn' |
|
193 | level = config.getoption('test_loglevel') or 'warn' | |
196 | return level.upper() |
|
194 | return level.upper() | |
197 |
|
195 | |||
198 |
|
196 | |||
199 | class VCSServer(object): |
|
197 | class VCSServer(object): | |
200 | """ |
|
198 | """ | |
201 | Represents a running VCSServer instance. |
|
199 | Represents a running VCSServer instance. | |
202 | """ |
|
200 | """ | |
203 |
|
201 | |||
204 | _args = [] |
|
202 | _args = [] | |
205 |
|
203 | |||
206 | def start(self): |
|
204 | def start(self): | |
207 | print("Starting the VCSServer: {}".format(self._args)) |
|
205 | print("Starting the VCSServer: {}".format(self._args)) | |
208 | self.process = subprocess32.Popen(self._args) |
|
206 | self.process = subprocess32.Popen(self._args) | |
209 |
|
207 | |||
210 | def wait_until_ready(self, timeout=30): |
|
208 | def wait_until_ready(self, timeout=30): | |
211 | raise NotImplementedError() |
|
209 | raise NotImplementedError() | |
212 |
|
210 | |||
213 | def shutdown(self): |
|
211 | def shutdown(self): | |
214 | self.process.kill() |
|
212 | self.process.kill() | |
215 |
|
213 | |||
216 |
|
214 | |||
217 | class HttpVCSServer(VCSServer): |
|
215 | class HttpVCSServer(VCSServer): | |
218 | """ |
|
216 | """ | |
219 | Represents a running VCSServer instance. |
|
217 | Represents a running VCSServer instance. | |
220 | """ |
|
218 | """ | |
221 | def __init__(self, config_file): |
|
219 | def __init__(self, config_file): | |
222 | self.config_file = config_file |
|
220 | self.config_file = config_file | |
223 | config_data = configobj.ConfigObj(config_file) |
|
221 | config_data = configobj.ConfigObj(config_file) | |
224 | self._config = config_data['server:main'] |
|
222 | self._config = config_data['server:main'] | |
225 |
|
223 | |||
226 | args = ['gunicorn', '--paste', config_file] |
|
224 | args = ['gunicorn', '--paste', config_file] | |
227 | self._args = args |
|
225 | self._args = args | |
228 |
|
226 | |||
229 | @property |
|
227 | @property | |
230 | def http_url(self): |
|
228 | def http_url(self): | |
231 | template = 'http://{host}:{port}/' |
|
229 | template = 'http://{host}:{port}/' | |
232 | return template.format(**self._config) |
|
230 | return template.format(**self._config) | |
233 |
|
231 | |||
234 | def start(self): |
|
232 | def start(self): | |
235 | env = os.environ.copy() |
|
233 | env = os.environ.copy() | |
236 | host_url = 'http://' + get_host_url(self.config_file) |
|
234 | host_url = 'http://' + get_host_url(self.config_file) | |
237 |
|
235 | |||
238 | rc_log = list(VCSSERVER_LOG.partition('.log')) |
|
236 | rc_log = list(VCSSERVER_LOG.partition('.log')) | |
239 | rc_log.insert(1, get_port(self.config_file)) |
|
237 | rc_log.insert(1, get_port(self.config_file)) | |
240 | rc_log = ''.join(rc_log) |
|
238 | rc_log = ''.join(rc_log) | |
241 |
|
239 | |||
242 | server_out = open(rc_log, 'w') |
|
240 | server_out = open(rc_log, 'w') | |
243 |
|
241 | |||
244 | command = ' '.join(self._args) |
|
242 | command = ' '.join(self._args) | |
245 | print('rhodecode-vcsserver starting at: {}'.format(host_url)) |
|
243 | print('rhodecode-vcsserver starting at: {}'.format(host_url)) | |
246 | print('rhodecode-vcsserver command: {}'.format(command)) |
|
244 | print('rhodecode-vcsserver command: {}'.format(command)) | |
247 | print('rhodecode-vcsserver logfile: {}'.format(rc_log)) |
|
245 | print('rhodecode-vcsserver logfile: {}'.format(rc_log)) | |
248 | self.process = subprocess32.Popen( |
|
246 | self.process = subprocess32.Popen( | |
249 | self._args, bufsize=0, env=env, stdout=server_out, stderr=server_out) |
|
247 | self._args, bufsize=0, env=env, stdout=server_out, stderr=server_out) | |
250 |
|
248 | |||
251 | def wait_until_ready(self, timeout=30): |
|
249 | def wait_until_ready(self, timeout=30): | |
252 | host = self._config['host'] |
|
250 | host = self._config['host'] | |
253 | port = self._config['port'] |
|
251 | port = self._config['port'] | |
254 | status_url = 'http://{host}:{port}/status'.format(host=host, port=port) |
|
252 | status_url = 'http://{host}:{port}/status'.format(host=host, port=port) | |
255 | start = time.time() |
|
253 | start = time.time() | |
256 |
|
254 | |||
257 | while time.time() - start < timeout: |
|
255 | while time.time() - start < timeout: | |
258 | try: |
|
256 | try: | |
259 | urlopen(status_url) |
|
257 | urlopen(status_url) | |
260 | break |
|
258 | break | |
261 | except URLError: |
|
259 | except URLError: | |
262 | time.sleep(0.2) |
|
260 | time.sleep(0.2) | |
263 | else: |
|
261 | else: | |
264 | pytest.exit( |
|
262 | pytest.exit( | |
265 | "Starting the VCSServer failed or took more than {} " |
|
263 | "Starting the VCSServer failed or took more than {} " | |
266 | "seconds. cmd: `{}`".format(timeout, ' '.join(self._args))) |
|
264 | "seconds. cmd: `{}`".format(timeout, ' '.join(self._args))) | |
267 |
|
265 | |||
268 | def shutdown(self): |
|
266 | def shutdown(self): | |
269 | self.process.kill() |
|
267 | self.process.kill() | |
270 |
|
268 | |||
271 |
|
269 | |||
272 | @pytest.fixture(scope='session') |
|
270 | @pytest.fixture(scope='session') | |
273 | def ini_config(request, tmpdir_factory, rcserver_port, vcsserver_port): |
|
271 | def ini_config(request, tmpdir_factory, rcserver_port, vcsserver_port): | |
274 | option_name = 'pyramid_config' |
|
272 | option_name = 'pyramid_config' | |
275 | log_level = _use_log_level(request.config) |
|
273 | log_level = _use_log_level(request.config) | |
276 |
|
274 | |||
277 | overrides = [ |
|
275 | overrides = [ | |
278 | {'server:main': {'port': rcserver_port}}, |
|
276 | {'server:main': {'port': rcserver_port}}, | |
279 | {'app:main': { |
|
277 | {'app:main': { | |
280 | 'vcs.server': 'localhost:%s' % vcsserver_port, |
|
278 | 'vcs.server': 'localhost:%s' % vcsserver_port, | |
281 | # johbo: We will always start the VCSServer on our own based on the |
|
279 | # johbo: We will always start the VCSServer on our own based on the | |
282 | # fixtures of the test cases. For the test run it must always be |
|
280 | # fixtures of the test cases. For the test run it must always be | |
283 | # off in the INI file. |
|
281 | # off in the INI file. | |
284 | 'vcs.start_server': 'false', |
|
282 | 'vcs.start_server': 'false', | |
285 | }}, |
|
283 | }}, | |
286 |
|
284 | |||
287 | {'handler_console': { |
|
285 | {'handler_console': { | |
288 | 'class ': 'StreamHandler', |
|
286 | 'class ': 'StreamHandler', | |
289 | 'args ': '(sys.stderr,)', |
|
287 | 'args ': '(sys.stderr,)', | |
290 | 'level': log_level, |
|
288 | 'level': log_level, | |
291 | }}, |
|
289 | }}, | |
292 |
|
290 | |||
293 | ] |
|
291 | ] | |
294 | if _use_vcs_http_server(request.config): |
|
292 | if _use_vcs_http_server(request.config): | |
295 | overrides.append({ |
|
293 | overrides.append({ | |
296 | 'app:main': { |
|
294 | 'app:main': { | |
297 | 'vcs.server.protocol': 'http', |
|
295 | 'vcs.server.protocol': 'http', | |
298 | 'vcs.scm_app_implementation': 'http', |
|
296 | 'vcs.scm_app_implementation': 'http', | |
299 | 'vcs.hooks.protocol': 'http', |
|
297 | 'vcs.hooks.protocol': 'http', | |
300 | } |
|
298 | } | |
301 | }) |
|
299 | }) | |
302 |
|
300 | |||
303 | filename = get_config( |
|
301 | filename = get_config( | |
304 | request.config, option_name=option_name, |
|
302 | request.config, option_name=option_name, | |
305 | override_option_name='{}_override'.format(option_name), |
|
303 | override_option_name='{}_override'.format(option_name), | |
306 | overrides=overrides, |
|
304 | overrides=overrides, | |
307 | basetemp=tmpdir_factory.getbasetemp().strpath, |
|
305 | basetemp=tmpdir_factory.getbasetemp().strpath, | |
308 | prefix='test_rce_') |
|
306 | prefix='test_rce_') | |
309 | return filename |
|
307 | return filename | |
310 |
|
308 | |||
311 |
|
309 | |||
312 | @pytest.fixture(scope='session') |
|
310 | @pytest.fixture(scope='session') | |
313 | def ini_settings(ini_config): |
|
311 | def ini_settings(ini_config): | |
314 | ini_path = ini_config |
|
312 | ini_path = ini_config | |
315 | return get_app_config(ini_path) |
|
313 | return get_app_config(ini_path) | |
316 |
|
314 | |||
317 |
|
315 | |||
318 | @pytest.fixture(scope='session') |
|
316 | @pytest.fixture(scope='session') | |
319 | def rcserver_port(request): |
|
317 | def rcserver_port(request): | |
320 | port = get_available_port() |
|
318 | port = get_available_port() | |
321 | print('Using rcserver port {}'.format(port)) |
|
319 | print('Using rcserver port {}'.format(port)) | |
322 | return port |
|
320 | return port | |
323 |
|
321 | |||
324 |
|
322 | |||
325 | @pytest.fixture(scope='session') |
|
323 | @pytest.fixture(scope='session') | |
326 | def vcsserver_port(request): |
|
324 | def vcsserver_port(request): | |
327 | port = request.config.getoption('--vcsserver-port') |
|
325 | port = request.config.getoption('--vcsserver-port') | |
328 | if port is None: |
|
326 | if port is None: | |
329 | port = get_available_port() |
|
327 | port = get_available_port() | |
330 | print('Using vcsserver port {}'.format(port)) |
|
328 | print('Using vcsserver port {}'.format(port)) | |
331 | return port |
|
329 | return port | |
332 |
|
330 | |||
333 |
|
331 | |||
334 | def get_available_port(): |
|
332 | def get_available_port(): | |
335 | family = socket.AF_INET |
|
333 | family = socket.AF_INET | |
336 | socktype = socket.SOCK_STREAM |
|
334 | socktype = socket.SOCK_STREAM | |
337 | host = '127.0.0.1' |
|
335 | host = '127.0.0.1' | |
338 |
|
336 | |||
339 | mysocket = socket.socket(family, socktype) |
|
337 | mysocket = socket.socket(family, socktype) | |
340 | mysocket.bind((host, 0)) |
|
338 | mysocket.bind((host, 0)) | |
341 | port = mysocket.getsockname()[1] |
|
339 | port = mysocket.getsockname()[1] | |
342 | mysocket.close() |
|
340 | mysocket.close() | |
343 | del mysocket |
|
341 | del mysocket | |
344 | return port |
|
342 | return port | |
345 |
|
343 | |||
346 |
|
344 | |||
347 | @pytest.fixture(scope='session') |
|
345 | @pytest.fixture(scope='session') | |
348 | def available_port_factory(): |
|
346 | def available_port_factory(): | |
349 | """ |
|
347 | """ | |
350 | Returns a callable which returns free port numbers. |
|
348 | Returns a callable which returns free port numbers. | |
351 | """ |
|
349 | """ | |
352 | return get_available_port |
|
350 | return get_available_port | |
353 |
|
351 | |||
354 |
|
352 | |||
355 | @pytest.fixture |
|
353 | @pytest.fixture | |
356 | def available_port(available_port_factory): |
|
354 | def available_port(available_port_factory): | |
357 | """ |
|
355 | """ | |
358 | Gives you one free port for the current test. |
|
356 | Gives you one free port for the current test. | |
359 |
|
357 | |||
360 | Uses "available_port_factory" to retrieve the port. |
|
358 | Uses "available_port_factory" to retrieve the port. | |
361 | """ |
|
359 | """ | |
362 | return available_port_factory() |
|
360 | return available_port_factory() | |
363 |
|
361 | |||
364 |
|
362 | |||
365 | @pytest.fixture(scope='session') |
|
363 | @pytest.fixture(scope='session') | |
366 | def testini_factory(tmpdir_factory, ini_config): |
|
364 | def testini_factory(tmpdir_factory, ini_config): | |
367 | """ |
|
365 | """ | |
368 | Factory to create an INI file based on TestINI. |
|
366 | Factory to create an INI file based on TestINI. | |
369 |
|
367 | |||
370 | It will make sure to place the INI file in the correct directory. |
|
368 | It will make sure to place the INI file in the correct directory. | |
371 | """ |
|
369 | """ | |
372 | basetemp = tmpdir_factory.getbasetemp().strpath |
|
370 | basetemp = tmpdir_factory.getbasetemp().strpath | |
373 | return TestIniFactory(basetemp, ini_config) |
|
371 | return TestIniFactory(basetemp, ini_config) | |
374 |
|
372 | |||
375 |
|
373 | |||
376 | class TestIniFactory(object): |
|
374 | class TestIniFactory(object): | |
377 |
|
375 | |||
378 | def __init__(self, basetemp, template_ini): |
|
376 | def __init__(self, basetemp, template_ini): | |
379 | self._basetemp = basetemp |
|
377 | self._basetemp = basetemp | |
380 | self._template_ini = template_ini |
|
378 | self._template_ini = template_ini | |
381 |
|
379 | |||
382 | def __call__(self, ini_params, new_file_prefix='test'): |
|
380 | def __call__(self, ini_params, new_file_prefix='test'): | |
383 | ini_file = TestINI( |
|
381 | ini_file = TestINI( | |
384 | self._template_ini, ini_params=ini_params, |
|
382 | self._template_ini, ini_params=ini_params, | |
385 | new_file_prefix=new_file_prefix, dir=self._basetemp) |
|
383 | new_file_prefix=new_file_prefix, dir=self._basetemp) | |
386 | result = ini_file.create() |
|
384 | result = ini_file.create() | |
387 | return result |
|
385 | return result | |
388 |
|
386 | |||
389 |
|
387 | |||
390 | def get_config( |
|
388 | def get_config( | |
391 | config, option_name, override_option_name, overrides=None, |
|
389 | config, option_name, override_option_name, overrides=None, | |
392 | basetemp=None, prefix='test'): |
|
390 | basetemp=None, prefix='test'): | |
393 | """ |
|
391 | """ | |
394 | Find a configuration file and apply overrides for the given `prefix`. |
|
392 | Find a configuration file and apply overrides for the given `prefix`. | |
395 | """ |
|
393 | """ | |
396 | config_file = ( |
|
394 | config_file = ( | |
397 | config.getoption(option_name) or config.getini(option_name)) |
|
395 | config.getoption(option_name) or config.getini(option_name)) | |
398 | if not config_file: |
|
396 | if not config_file: | |
399 | pytest.exit( |
|
397 | pytest.exit( | |
400 | "Configuration error, could not extract {}.".format(option_name)) |
|
398 | "Configuration error, could not extract {}.".format(option_name)) | |
401 |
|
399 | |||
402 | overrides = overrides or [] |
|
400 | overrides = overrides or [] | |
403 | config_override = config.getoption(override_option_name) |
|
401 | config_override = config.getoption(override_option_name) | |
404 | if config_override: |
|
402 | if config_override: | |
405 | overrides.append(config_override) |
|
403 | overrides.append(config_override) | |
406 | temp_ini_file = TestINI( |
|
404 | temp_ini_file = TestINI( | |
407 | config_file, ini_params=overrides, new_file_prefix=prefix, |
|
405 | config_file, ini_params=overrides, new_file_prefix=prefix, | |
408 | dir=basetemp) |
|
406 | dir=basetemp) | |
409 |
|
407 | |||
410 | return temp_ini_file.create() |
|
408 | return temp_ini_file.create() |
@@ -1,257 +1,262 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | import time |
|
21 | import time | |
22 | import shutil |
|
22 | import shutil | |
23 | import datetime |
|
23 | import datetime | |
24 |
|
24 | |||
25 | import pytest |
|
25 | import pytest | |
26 |
|
26 | |||
27 | from rhodecode.lib.vcs.backends import get_backend |
|
27 | from rhodecode.lib.vcs.backends import get_backend | |
28 | from rhodecode.lib.vcs.backends.base import Config |
|
28 | from rhodecode.lib.vcs.backends.base import Config | |
29 | from rhodecode.lib.vcs.nodes import FileNode |
|
29 | from rhodecode.lib.vcs.nodes import FileNode | |
30 | from rhodecode.tests import get_new_dir |
|
30 | from rhodecode.tests import get_new_dir | |
31 | from rhodecode.tests.utils import check_skip_backends, check_xfail_backends |
|
31 | from rhodecode.tests.utils import check_skip_backends, check_xfail_backends | |
32 |
|
32 | |||
33 |
|
33 | |||
|
34 | @pytest.fixture(scope="session") | |||
|
35 | def vcs_server_config_override(): | |||
|
36 | return ({'server:main': {'workers': 1}},) | |||
|
37 | ||||
|
38 | ||||
34 | @pytest.fixture() |
|
39 | @pytest.fixture() | |
35 | def vcs_repository_support( |
|
40 | def vcs_repository_support( | |
36 | request, backend_alias, baseapp, _vcs_repo_container): |
|
41 | request, backend_alias, baseapp, _vcs_repo_container): | |
37 | """ |
|
42 | """ | |
38 | Provide a test repository for the test run. |
|
43 | Provide a test repository for the test run. | |
39 |
|
44 | |||
40 | Depending on the value of `recreate_repo_per_test` a new repo for each |
|
45 | Depending on the value of `recreate_repo_per_test` a new repo for each | |
41 | test will be created. |
|
46 | test will be created. | |
42 |
|
47 | |||
43 | The parameter `--backends` can be used to limit this fixture to specific |
|
48 | The parameter `--backends` can be used to limit this fixture to specific | |
44 | backend implementations. |
|
49 | backend implementations. | |
45 | """ |
|
50 | """ | |
46 | cls = request.cls |
|
51 | cls = request.cls | |
47 |
|
52 | |||
48 | check_skip_backends(request.node, backend_alias) |
|
53 | check_skip_backends(request.node, backend_alias) | |
49 | check_xfail_backends(request.node, backend_alias) |
|
54 | check_xfail_backends(request.node, backend_alias) | |
50 |
|
55 | |||
51 | if _should_create_repo_per_test(cls): |
|
56 | if _should_create_repo_per_test(cls): | |
52 | _vcs_repo_container = _create_vcs_repo_container(request) |
|
57 | _vcs_repo_container = _create_vcs_repo_container(request) | |
53 |
|
58 | |||
54 | repo = _vcs_repo_container.get_repo(cls, backend_alias=backend_alias) |
|
59 | repo = _vcs_repo_container.get_repo(cls, backend_alias=backend_alias) | |
55 |
|
60 | |||
56 | # TODO: johbo: Supporting old test class api, think about removing this |
|
61 | # TODO: johbo: Supporting old test class api, think about removing this | |
57 | cls.repo = repo |
|
62 | cls.repo = repo | |
58 | cls.repo_path = repo.path |
|
63 | cls.repo_path = repo.path | |
59 | cls.default_branch = repo.DEFAULT_BRANCH_NAME |
|
64 | cls.default_branch = repo.DEFAULT_BRANCH_NAME | |
60 | cls.Backend = cls.backend_class = repo.__class__ |
|
65 | cls.Backend = cls.backend_class = repo.__class__ | |
61 | cls.imc = repo.in_memory_commit |
|
66 | cls.imc = repo.in_memory_commit | |
62 |
|
67 | |||
63 | return backend_alias, repo |
|
68 | return backend_alias, repo | |
64 |
|
69 | |||
65 |
|
70 | |||
66 | @pytest.fixture(scope='class') |
|
71 | @pytest.fixture(scope='class') | |
67 | def _vcs_repo_container(request): |
|
72 | def _vcs_repo_container(request): | |
68 | """ |
|
73 | """ | |
69 | Internal fixture intended to help support class based scoping on demand. |
|
74 | Internal fixture intended to help support class based scoping on demand. | |
70 | """ |
|
75 | """ | |
71 | return _create_vcs_repo_container(request) |
|
76 | return _create_vcs_repo_container(request) | |
72 |
|
77 | |||
73 |
|
78 | |||
74 | def _create_vcs_repo_container(request): |
|
79 | def _create_vcs_repo_container(request): | |
75 | repo_container = VcsRepoContainer() |
|
80 | repo_container = VcsRepoContainer() | |
76 | if not request.config.getoption('--keep-tmp-path'): |
|
81 | if not request.config.getoption('--keep-tmp-path'): | |
77 | request.addfinalizer(repo_container.cleanup) |
|
82 | request.addfinalizer(repo_container.cleanup) | |
78 | return repo_container |
|
83 | return repo_container | |
79 |
|
84 | |||
80 |
|
85 | |||
81 | class VcsRepoContainer(object): |
|
86 | class VcsRepoContainer(object): | |
82 |
|
87 | |||
83 | def __init__(self): |
|
88 | def __init__(self): | |
84 | self._cleanup_paths = [] |
|
89 | self._cleanup_paths = [] | |
85 | self._repos = {} |
|
90 | self._repos = {} | |
86 |
|
91 | |||
87 | def get_repo(self, test_class, backend_alias): |
|
92 | def get_repo(self, test_class, backend_alias): | |
88 | if backend_alias not in self._repos: |
|
93 | if backend_alias not in self._repos: | |
89 | repo = _create_empty_repository(test_class, backend_alias) |
|
94 | repo = _create_empty_repository(test_class, backend_alias) | |
90 |
|
95 | |||
91 | self._cleanup_paths.append(repo.path) |
|
96 | self._cleanup_paths.append(repo.path) | |
92 | self._repos[backend_alias] = repo |
|
97 | self._repos[backend_alias] = repo | |
93 | return self._repos[backend_alias] |
|
98 | return self._repos[backend_alias] | |
94 |
|
99 | |||
95 | def cleanup(self): |
|
100 | def cleanup(self): | |
96 | for repo_path in reversed(self._cleanup_paths): |
|
101 | for repo_path in reversed(self._cleanup_paths): | |
97 | shutil.rmtree(repo_path) |
|
102 | shutil.rmtree(repo_path) | |
98 |
|
103 | |||
99 |
|
104 | |||
100 | def _should_create_repo_per_test(cls): |
|
105 | def _should_create_repo_per_test(cls): | |
101 | return getattr(cls, 'recreate_repo_per_test', False) |
|
106 | return getattr(cls, 'recreate_repo_per_test', False) | |
102 |
|
107 | |||
103 |
|
108 | |||
104 | def _create_empty_repository(cls, backend_alias=None): |
|
109 | def _create_empty_repository(cls, backend_alias=None): | |
105 | Backend = get_backend(backend_alias or cls.backend_alias) |
|
110 | Backend = get_backend(backend_alias or cls.backend_alias) | |
106 | repo_path = get_new_dir(str(time.time())) |
|
111 | repo_path = get_new_dir(str(time.time())) | |
107 | repo = Backend(repo_path, create=True) |
|
112 | repo = Backend(repo_path, create=True) | |
108 | if hasattr(cls, '_get_commits'): |
|
113 | if hasattr(cls, '_get_commits'): | |
109 | commits = cls._get_commits() |
|
114 | commits = cls._get_commits() | |
110 | cls.tip = _add_commits_to_repo(repo, commits) |
|
115 | cls.tip = _add_commits_to_repo(repo, commits) | |
111 |
|
116 | |||
112 | return repo |
|
117 | return repo | |
113 |
|
118 | |||
114 |
|
119 | |||
115 | @pytest.fixture |
|
120 | @pytest.fixture | |
116 | def config(): |
|
121 | def config(): | |
117 | """ |
|
122 | """ | |
118 | Instance of a repository config. |
|
123 | Instance of a repository config. | |
119 |
|
124 | |||
120 | The instance contains only one value: |
|
125 | The instance contains only one value: | |
121 |
|
126 | |||
122 | - Section: "section-a" |
|
127 | - Section: "section-a" | |
123 | - Key: "a-1" |
|
128 | - Key: "a-1" | |
124 | - Value: "value-a-1" |
|
129 | - Value: "value-a-1" | |
125 |
|
130 | |||
126 | The intended usage is for cases where a config instance is needed but no |
|
131 | The intended usage is for cases where a config instance is needed but no | |
127 | specific content is required. |
|
132 | specific content is required. | |
128 | """ |
|
133 | """ | |
129 | config = Config() |
|
134 | config = Config() | |
130 | config.set('section-a', 'a-1', 'value-a-1') |
|
135 | config.set('section-a', 'a-1', 'value-a-1') | |
131 | return config |
|
136 | return config | |
132 |
|
137 | |||
133 |
|
138 | |||
134 | def _add_commits_to_repo(repo, commits): |
|
139 | def _add_commits_to_repo(repo, commits): | |
135 | imc = repo.in_memory_commit |
|
140 | imc = repo.in_memory_commit | |
136 | tip = None |
|
141 | tip = None | |
137 |
|
142 | |||
138 | for commit in commits: |
|
143 | for commit in commits: | |
139 | for node in commit.get('added', []): |
|
144 | for node in commit.get('added', []): | |
140 | imc.add(FileNode(node.path, content=node.content)) |
|
145 | imc.add(FileNode(node.path, content=node.content)) | |
141 | for node in commit.get('changed', []): |
|
146 | for node in commit.get('changed', []): | |
142 | imc.change(FileNode(node.path, content=node.content)) |
|
147 | imc.change(FileNode(node.path, content=node.content)) | |
143 | for node in commit.get('removed', []): |
|
148 | for node in commit.get('removed', []): | |
144 | imc.remove(FileNode(node.path)) |
|
149 | imc.remove(FileNode(node.path)) | |
145 |
|
150 | |||
146 | tip = imc.commit( |
|
151 | tip = imc.commit( | |
147 | message=unicode(commit['message']), |
|
152 | message=unicode(commit['message']), | |
148 | author=unicode(commit['author']), |
|
153 | author=unicode(commit['author']), | |
149 | date=commit['date'], |
|
154 | date=commit['date'], | |
150 | branch=commit.get('branch')) |
|
155 | branch=commit.get('branch')) | |
151 |
|
156 | |||
152 | return tip |
|
157 | return tip | |
153 |
|
158 | |||
154 |
|
159 | |||
155 | @pytest.fixture |
|
160 | @pytest.fixture | |
156 | def vcs_repo(request, backend_alias): |
|
161 | def vcs_repo(request, backend_alias): | |
157 | Backend = get_backend(backend_alias) |
|
162 | Backend = get_backend(backend_alias) | |
158 | repo_path = get_new_dir(str(time.time())) |
|
163 | repo_path = get_new_dir(str(time.time())) | |
159 | repo = Backend(repo_path, create=True) |
|
164 | repo = Backend(repo_path, create=True) | |
160 |
|
165 | |||
161 | @request.addfinalizer |
|
166 | @request.addfinalizer | |
162 | def cleanup(): |
|
167 | def cleanup(): | |
163 | shutil.rmtree(repo_path) |
|
168 | shutil.rmtree(repo_path) | |
164 |
|
169 | |||
165 | return repo |
|
170 | return repo | |
166 |
|
171 | |||
167 |
|
172 | |||
168 | @pytest.fixture |
|
173 | @pytest.fixture | |
169 | def generate_repo_with_commits(vcs_repo): |
|
174 | def generate_repo_with_commits(vcs_repo): | |
170 | """ |
|
175 | """ | |
171 | Creates a fabric to generate N comits with some file nodes on a randomly |
|
176 | Creates a fabric to generate N comits with some file nodes on a randomly | |
172 | generated repository |
|
177 | generated repository | |
173 | """ |
|
178 | """ | |
174 |
|
179 | |||
175 | def commit_generator(num): |
|
180 | def commit_generator(num): | |
176 | start_date = datetime.datetime(2010, 1, 1, 20) |
|
181 | start_date = datetime.datetime(2010, 1, 1, 20) | |
177 | for x in xrange(num): |
|
182 | for x in xrange(num): | |
178 | yield { |
|
183 | yield { | |
179 | 'message': 'Commit %d' % x, |
|
184 | 'message': 'Commit %d' % x, | |
180 | 'author': 'Joe Doe <joe.doe@example.com>', |
|
185 | 'author': 'Joe Doe <joe.doe@example.com>', | |
181 | 'date': start_date + datetime.timedelta(hours=12 * x), |
|
186 | 'date': start_date + datetime.timedelta(hours=12 * x), | |
182 | 'added': [ |
|
187 | 'added': [ | |
183 | FileNode('file_%d.txt' % x, content='Foobar %d' % x), |
|
188 | FileNode('file_%d.txt' % x, content='Foobar %d' % x), | |
184 | ], |
|
189 | ], | |
185 | 'modified': [ |
|
190 | 'modified': [ | |
186 | FileNode('file_%d.txt' % x, |
|
191 | FileNode('file_%d.txt' % x, | |
187 | content='Foobar %d modified' % (x-1)), |
|
192 | content='Foobar %d modified' % (x-1)), | |
188 | ] |
|
193 | ] | |
189 | } |
|
194 | } | |
190 |
|
195 | |||
191 | def commit_maker(num=5): |
|
196 | def commit_maker(num=5): | |
192 | _add_commits_to_repo(vcs_repo, commit_generator(num)) |
|
197 | _add_commits_to_repo(vcs_repo, commit_generator(num)) | |
193 | return vcs_repo |
|
198 | return vcs_repo | |
194 |
|
199 | |||
195 | return commit_maker |
|
200 | return commit_maker | |
196 |
|
201 | |||
197 |
|
202 | |||
198 | @pytest.fixture |
|
203 | @pytest.fixture | |
199 | def hg_repo(request, vcs_repo): |
|
204 | def hg_repo(request, vcs_repo): | |
200 | repo = vcs_repo |
|
205 | repo = vcs_repo | |
201 |
|
206 | |||
202 | commits = repo._get_commits() |
|
207 | commits = repo._get_commits() | |
203 | _add_commits_to_repo(repo, commits) |
|
208 | _add_commits_to_repo(repo, commits) | |
204 |
|
209 | |||
205 | return repo |
|
210 | return repo | |
206 |
|
211 | |||
207 |
|
212 | |||
208 | @pytest.fixture |
|
213 | @pytest.fixture | |
209 | def hg_commit(hg_repo): |
|
214 | def hg_commit(hg_repo): | |
210 | return hg_repo.get_commit() |
|
215 | return hg_repo.get_commit() | |
211 |
|
216 | |||
212 |
|
217 | |||
213 | class BackendTestMixin(object): |
|
218 | class BackendTestMixin(object): | |
214 | """ |
|
219 | """ | |
215 | This is a backend independent test case class which should be created |
|
220 | This is a backend independent test case class which should be created | |
216 | with ``type`` method. |
|
221 | with ``type`` method. | |
217 |
|
222 | |||
218 | It is required to set following attributes at subclass: |
|
223 | It is required to set following attributes at subclass: | |
219 |
|
224 | |||
220 | - ``backend_alias``: alias of used backend (see ``vcs.BACKENDS``) |
|
225 | - ``backend_alias``: alias of used backend (see ``vcs.BACKENDS``) | |
221 | - ``repo_path``: path to the repository which would be created for set of |
|
226 | - ``repo_path``: path to the repository which would be created for set of | |
222 | tests |
|
227 | tests | |
223 | - ``recreate_repo_per_test``: If set to ``False``, repo would NOT be |
|
228 | - ``recreate_repo_per_test``: If set to ``False``, repo would NOT be | |
224 | created |
|
229 | created | |
225 | before every single test. Defaults to ``True``. |
|
230 | before every single test. Defaults to ``True``. | |
226 | """ |
|
231 | """ | |
227 | recreate_repo_per_test = True |
|
232 | recreate_repo_per_test = True | |
228 |
|
233 | |||
229 | @classmethod |
|
234 | @classmethod | |
230 | def _get_commits(cls): |
|
235 | def _get_commits(cls): | |
231 | commits = [ |
|
236 | commits = [ | |
232 | { |
|
237 | { | |
233 | 'message': u'Initial commit', |
|
238 | 'message': u'Initial commit', | |
234 | 'author': u'Joe Doe <joe.doe@example.com>', |
|
239 | 'author': u'Joe Doe <joe.doe@example.com>', | |
235 | 'date': datetime.datetime(2010, 1, 1, 20), |
|
240 | 'date': datetime.datetime(2010, 1, 1, 20), | |
236 | 'added': [ |
|
241 | 'added': [ | |
237 | FileNode('foobar', content='Foobar'), |
|
242 | FileNode('foobar', content='Foobar'), | |
238 | FileNode('foobar2', content='Foobar II'), |
|
243 | FileNode('foobar2', content='Foobar II'), | |
239 | FileNode('foo/bar/baz', content='baz here!'), |
|
244 | FileNode('foo/bar/baz', content='baz here!'), | |
240 | ], |
|
245 | ], | |
241 | }, |
|
246 | }, | |
242 | { |
|
247 | { | |
243 | 'message': u'Changes...', |
|
248 | 'message': u'Changes...', | |
244 | 'author': u'Jane Doe <jane.doe@example.com>', |
|
249 | 'author': u'Jane Doe <jane.doe@example.com>', | |
245 | 'date': datetime.datetime(2010, 1, 1, 21), |
|
250 | 'date': datetime.datetime(2010, 1, 1, 21), | |
246 | 'added': [ |
|
251 | 'added': [ | |
247 | FileNode('some/new.txt', content='news...'), |
|
252 | FileNode('some/new.txt', content='news...'), | |
248 | ], |
|
253 | ], | |
249 | 'changed': [ |
|
254 | 'changed': [ | |
250 | FileNode('foobar', 'Foobar I'), |
|
255 | FileNode('foobar', 'Foobar I'), | |
251 | ], |
|
256 | ], | |
252 | 'removed': [], |
|
257 | 'removed': [], | |
253 | }, |
|
258 | }, | |
254 | ] |
|
259 | ] | |
255 | return commits |
|
260 | return commits | |
256 |
|
261 | |||
257 |
|
262 |
1 | NO CONTENT: file renamed from rhodecode/tests/other/vcs_operations/__init__.py to rhodecode/tests/vcs_operations/__init__.py |
|
NO CONTENT: file renamed from rhodecode/tests/other/vcs_operations/__init__.py to rhodecode/tests/vcs_operations/__init__.py |
@@ -1,271 +1,276 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | py.test config for test suite for making push/pull operations. |
|
22 | py.test config for test suite for making push/pull operations. | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import ConfigParser |
|
30 | import ConfigParser | |
31 | import os |
|
31 | import os | |
32 | import subprocess32 |
|
32 | import subprocess32 | |
33 | import tempfile |
|
33 | import tempfile | |
34 | import textwrap |
|
34 | import textwrap | |
35 | import pytest |
|
35 | import pytest | |
36 |
|
36 | |||
37 | import rhodecode |
|
37 | import rhodecode | |
38 | from rhodecode.model.db import Repository |
|
38 | from rhodecode.model.db import Repository | |
39 | from rhodecode.model.meta import Session |
|
39 | from rhodecode.model.meta import Session | |
40 | from rhodecode.model.settings import SettingsModel |
|
40 | from rhodecode.model.settings import SettingsModel | |
41 | from rhodecode.tests import ( |
|
41 | from rhodecode.tests import ( | |
42 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS,) |
|
42 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_ADMIN_PASS,) | |
43 | from rhodecode.tests.fixture import Fixture |
|
43 | from rhodecode.tests.fixture import Fixture | |
44 | from rhodecode.tests.utils import is_url_reachable, wait_for_url |
|
44 | from rhodecode.tests.utils import is_url_reachable, wait_for_url | |
45 |
|
45 | |||
46 | RC_LOG = os.path.join(tempfile.gettempdir(), 'rc.log') |
|
46 | RC_LOG = os.path.join(tempfile.gettempdir(), 'rc.log') | |
47 | REPO_GROUP = 'a_repo_group' |
|
47 | REPO_GROUP = 'a_repo_group' | |
48 | HG_REPO_WITH_GROUP = '%s/%s' % (REPO_GROUP, HG_REPO) |
|
48 | HG_REPO_WITH_GROUP = '%s/%s' % (REPO_GROUP, HG_REPO) | |
49 | GIT_REPO_WITH_GROUP = '%s/%s' % (REPO_GROUP, GIT_REPO) |
|
49 | GIT_REPO_WITH_GROUP = '%s/%s' % (REPO_GROUP, GIT_REPO) | |
50 |
|
50 | |||
51 |
|
51 | |||
52 | def assert_no_running_instance(url): |
|
52 | def assert_no_running_instance(url): | |
53 | if is_url_reachable(url): |
|
53 | if is_url_reachable(url): | |
54 | print("Hint: Usually this means another instance of Enterprise " |
|
54 | print("Hint: Usually this means another instance of Enterprise " | |
55 | "is running in the background.") |
|
55 | "is running in the background.") | |
56 | pytest.fail( |
|
56 | pytest.fail( | |
57 | "Port is not free at %s, cannot start web interface" % url) |
|
57 | "Port is not free at %s, cannot start web interface" % url) | |
58 |
|
58 | |||
59 |
|
59 | |||
60 | def get_port(pyramid_config): |
|
60 | def get_port(pyramid_config): | |
61 | config = ConfigParser.ConfigParser() |
|
61 | config = ConfigParser.ConfigParser() | |
62 | config.read(pyramid_config) |
|
62 | config.read(pyramid_config) | |
63 | return config.get('server:main', 'port') |
|
63 | return config.get('server:main', 'port') | |
64 |
|
64 | |||
65 |
|
65 | |||
66 | def get_host_url(pyramid_config): |
|
66 | def get_host_url(pyramid_config): | |
67 | """Construct the host url using the port in the test configuration.""" |
|
67 | """Construct the host url using the port in the test configuration.""" | |
68 | return '127.0.0.1:%s' % get_port(pyramid_config) |
|
68 | return '127.0.0.1:%s' % get_port(pyramid_config) | |
69 |
|
69 | |||
70 |
|
70 | |||
71 | class RcWebServer(object): |
|
71 | class RcWebServer(object): | |
72 | """ |
|
72 | """ | |
73 | Represents a running RCE web server used as a test fixture. |
|
73 | Represents a running RCE web server used as a test fixture. | |
74 | """ |
|
74 | """ | |
75 | def __init__(self, pyramid_config, log_file): |
|
75 | def __init__(self, pyramid_config, log_file): | |
76 | self.pyramid_config = pyramid_config |
|
76 | self.pyramid_config = pyramid_config | |
77 | self.log_file = log_file |
|
77 | self.log_file = log_file | |
78 |
|
78 | |||
79 | def repo_clone_url(self, repo_name, **kwargs): |
|
79 | def repo_clone_url(self, repo_name, **kwargs): | |
80 | params = { |
|
80 | params = { | |
81 | 'user': TEST_USER_ADMIN_LOGIN, |
|
81 | 'user': TEST_USER_ADMIN_LOGIN, | |
82 | 'passwd': TEST_USER_ADMIN_PASS, |
|
82 | 'passwd': TEST_USER_ADMIN_PASS, | |
83 | 'host': get_host_url(self.pyramid_config), |
|
83 | 'host': get_host_url(self.pyramid_config), | |
84 | 'cloned_repo': repo_name, |
|
84 | 'cloned_repo': repo_name, | |
85 | } |
|
85 | } | |
86 | params.update(**kwargs) |
|
86 | params.update(**kwargs) | |
87 | _url = 'http://%(user)s:%(passwd)s@%(host)s/%(cloned_repo)s' % params |
|
87 | _url = 'http://%(user)s:%(passwd)s@%(host)s/%(cloned_repo)s' % params | |
88 | return _url |
|
88 | return _url | |
89 |
|
89 | |||
90 | def host_url(self): |
|
90 | def host_url(self): | |
91 | return 'http://' + get_host_url(self.pyramid_config) |
|
91 | return 'http://' + get_host_url(self.pyramid_config) | |
92 |
|
92 | |||
93 | def get_rc_log(self): |
|
93 | def get_rc_log(self): | |
94 | with open(self.log_file) as f: |
|
94 | with open(self.log_file) as f: | |
95 | return f.read() |
|
95 | return f.read() | |
96 |
|
96 | |||
97 |
|
97 | |||
98 | @pytest.fixture(scope="module") |
|
98 | @pytest.fixture(scope="module") | |
99 | def rcextensions(request, baseapp, tmpdir_factory): |
|
99 | def rcextensions(request, baseapp, tmpdir_factory): | |
100 | """ |
|
100 | """ | |
101 | Installs a testing rcextensions pack to ensure they work as expected. |
|
101 | Installs a testing rcextensions pack to ensure they work as expected. | |
102 | """ |
|
102 | """ | |
103 | init_content = textwrap.dedent(""" |
|
103 | init_content = textwrap.dedent(""" | |
104 | # Forward import the example rcextensions to make it |
|
104 | # Forward import the example rcextensions to make it | |
105 | # active for our tests. |
|
105 | # active for our tests. | |
106 | from rhodecode.tests.other.example_rcextensions import * |
|
106 | from rhodecode.tests.other.example_rcextensions import * | |
107 | """) |
|
107 | """) | |
108 |
|
108 | |||
109 | # Note: rcextensions are looked up based on the path of the ini file |
|
109 | # Note: rcextensions are looked up based on the path of the ini file | |
110 | root_path = tmpdir_factory.getbasetemp() |
|
110 | root_path = tmpdir_factory.getbasetemp() | |
111 | rcextensions_path = root_path.join('rcextensions') |
|
111 | rcextensions_path = root_path.join('rcextensions') | |
112 | init_path = rcextensions_path.join('__init__.py') |
|
112 | init_path = rcextensions_path.join('__init__.py') | |
113 |
|
113 | |||
114 | if rcextensions_path.check(): |
|
114 | if rcextensions_path.check(): | |
115 | pytest.fail( |
|
115 | pytest.fail( | |
116 | "Path for rcextensions already exists, please clean up before " |
|
116 | "Path for rcextensions already exists, please clean up before " | |
117 | "test run this path: %s" % (rcextensions_path, )) |
|
117 | "test run this path: %s" % (rcextensions_path, )) | |
118 | return |
|
118 | return | |
119 |
|
119 | |||
120 | request.addfinalizer(rcextensions_path.remove) |
|
120 | request.addfinalizer(rcextensions_path.remove) | |
121 | init_path.write_binary(init_content, ensure=True) |
|
121 | init_path.write_binary(init_content, ensure=True) | |
122 |
|
122 | |||
123 |
|
123 | |||
124 | @pytest.fixture(scope="module") |
|
124 | @pytest.fixture(scope="module") | |
125 | def repos(request, baseapp): |
|
125 | def repos(request, baseapp): | |
126 | """Create a copy of each test repo in a repo group.""" |
|
126 | """Create a copy of each test repo in a repo group.""" | |
127 | fixture = Fixture() |
|
127 | fixture = Fixture() | |
128 | repo_group = fixture.create_repo_group(REPO_GROUP) |
|
128 | repo_group = fixture.create_repo_group(REPO_GROUP) | |
129 | repo_group_id = repo_group.group_id |
|
129 | repo_group_id = repo_group.group_id | |
130 | fixture.create_fork(HG_REPO, HG_REPO, |
|
130 | fixture.create_fork(HG_REPO, HG_REPO, | |
131 | repo_name_full=HG_REPO_WITH_GROUP, |
|
131 | repo_name_full=HG_REPO_WITH_GROUP, | |
132 | repo_group=repo_group_id) |
|
132 | repo_group=repo_group_id) | |
133 | fixture.create_fork(GIT_REPO, GIT_REPO, |
|
133 | fixture.create_fork(GIT_REPO, GIT_REPO, | |
134 | repo_name_full=GIT_REPO_WITH_GROUP, |
|
134 | repo_name_full=GIT_REPO_WITH_GROUP, | |
135 | repo_group=repo_group_id) |
|
135 | repo_group=repo_group_id) | |
136 |
|
136 | |||
137 | @request.addfinalizer |
|
137 | @request.addfinalizer | |
138 | def cleanup(): |
|
138 | def cleanup(): | |
139 | fixture.destroy_repo(HG_REPO_WITH_GROUP) |
|
139 | fixture.destroy_repo(HG_REPO_WITH_GROUP) | |
140 | fixture.destroy_repo(GIT_REPO_WITH_GROUP) |
|
140 | fixture.destroy_repo(GIT_REPO_WITH_GROUP) | |
141 | fixture.destroy_repo_group(repo_group_id) |
|
141 | fixture.destroy_repo_group(repo_group_id) | |
142 |
|
142 | |||
143 |
|
143 | |||
|
144 | @pytest.fixture(scope="session") | |||
|
145 | def vcs_server_config_override(): | |||
|
146 | return ({'server:main': {'workers': 2}},) | |||
|
147 | ||||
|
148 | ||||
144 | @pytest.fixture(scope="module") |
|
149 | @pytest.fixture(scope="module") | |
145 | def rc_web_server_config(testini_factory): |
|
150 | def rc_web_server_config(testini_factory): | |
146 | """ |
|
151 | """ | |
147 | Configuration file used for the fixture `rc_web_server`. |
|
152 | Configuration file used for the fixture `rc_web_server`. | |
148 | """ |
|
153 | """ | |
149 | CUSTOM_PARAMS = [ |
|
154 | CUSTOM_PARAMS = [ | |
150 | {'handler_console': {'level': 'DEBUG'}}, |
|
155 | {'handler_console': {'level': 'DEBUG'}}, | |
151 | ] |
|
156 | ] | |
152 | return testini_factory(CUSTOM_PARAMS) |
|
157 | return testini_factory(CUSTOM_PARAMS) | |
153 |
|
158 | |||
154 |
|
159 | |||
155 | @pytest.fixture(scope="module") |
|
160 | @pytest.fixture(scope="module") | |
156 | def rc_web_server( |
|
161 | def rc_web_server( | |
157 | request, baseapp, rc_web_server_config, repos, rcextensions): |
|
162 | request, baseapp, rc_web_server_config, repos, rcextensions): | |
158 | """ |
|
163 | """ | |
159 | Run the web server as a subprocess. |
|
164 | Run the web server as a subprocess. | |
160 |
|
165 | |||
161 | Since we have already a running vcsserver, this is not spawned again. |
|
166 | Since we have already a running vcsserver, this is not spawned again. | |
162 | """ |
|
167 | """ | |
163 | env = os.environ.copy() |
|
168 | env = os.environ.copy() | |
164 | env['RC_NO_TMP_PATH'] = '1' |
|
169 | env['RC_NO_TMP_PATH'] = '1' | |
165 |
|
170 | |||
166 | rc_log = list(RC_LOG.partition('.log')) |
|
171 | rc_log = list(RC_LOG.partition('.log')) | |
167 | rc_log.insert(1, get_port(rc_web_server_config)) |
|
172 | rc_log.insert(1, get_port(rc_web_server_config)) | |
168 | rc_log = ''.join(rc_log) |
|
173 | rc_log = ''.join(rc_log) | |
169 |
|
174 | |||
170 | server_out = open(rc_log, 'w') |
|
175 | server_out = open(rc_log, 'w') | |
171 |
|
176 | |||
172 | host_url = 'http://' + get_host_url(rc_web_server_config) |
|
177 | host_url = 'http://' + get_host_url(rc_web_server_config) | |
173 | assert_no_running_instance(host_url) |
|
178 | assert_no_running_instance(host_url) | |
174 | command = ['gunicorn', '--worker-class', 'gevent', '--paste', rc_web_server_config] |
|
179 | command = ['gunicorn', '--worker-class', 'gevent', '--paste', rc_web_server_config] | |
175 |
|
180 | |||
176 | print('rhodecode-web starting at: {}'.format(host_url)) |
|
181 | print('rhodecode-web starting at: {}'.format(host_url)) | |
177 | print('rhodecode-web command: {}'.format(command)) |
|
182 | print('rhodecode-web command: {}'.format(command)) | |
178 | print('rhodecode-web logfile: {}'.format(rc_log)) |
|
183 | print('rhodecode-web logfile: {}'.format(rc_log)) | |
179 |
|
184 | |||
180 | proc = subprocess32.Popen( |
|
185 | proc = subprocess32.Popen( | |
181 | command, bufsize=0, env=env, stdout=server_out, stderr=server_out) |
|
186 | command, bufsize=0, env=env, stdout=server_out, stderr=server_out) | |
182 |
|
187 | |||
183 | wait_for_url(host_url, timeout=30) |
|
188 | wait_for_url(host_url, timeout=30) | |
184 |
|
189 | |||
185 | @request.addfinalizer |
|
190 | @request.addfinalizer | |
186 | def stop_web_server(): |
|
191 | def stop_web_server(): | |
187 | # TODO: Find out how to integrate with the reporting of py.test to |
|
192 | # TODO: Find out how to integrate with the reporting of py.test to | |
188 | # make this information available. |
|
193 | # make this information available. | |
189 | print("\nServer log file written to %s" % (rc_log, )) |
|
194 | print("\nServer log file written to %s" % (rc_log, )) | |
190 | proc.kill() |
|
195 | proc.kill() | |
191 | server_out.flush() |
|
196 | server_out.flush() | |
192 | server_out.close() |
|
197 | server_out.close() | |
193 |
|
198 | |||
194 | return RcWebServer(rc_web_server_config, log_file=rc_log) |
|
199 | return RcWebServer(rc_web_server_config, log_file=rc_log) | |
195 |
|
200 | |||
196 |
|
201 | |||
197 | @pytest.fixture |
|
202 | @pytest.fixture | |
198 | def disable_locking(baseapp): |
|
203 | def disable_locking(baseapp): | |
199 | r = Repository.get_by_repo_name(GIT_REPO) |
|
204 | r = Repository.get_by_repo_name(GIT_REPO) | |
200 | Repository.unlock(r) |
|
205 | Repository.unlock(r) | |
201 | r.enable_locking = False |
|
206 | r.enable_locking = False | |
202 | Session().add(r) |
|
207 | Session().add(r) | |
203 | Session().commit() |
|
208 | Session().commit() | |
204 |
|
209 | |||
205 | r = Repository.get_by_repo_name(HG_REPO) |
|
210 | r = Repository.get_by_repo_name(HG_REPO) | |
206 | Repository.unlock(r) |
|
211 | Repository.unlock(r) | |
207 | r.enable_locking = False |
|
212 | r.enable_locking = False | |
208 | Session().add(r) |
|
213 | Session().add(r) | |
209 | Session().commit() |
|
214 | Session().commit() | |
210 |
|
215 | |||
211 |
|
216 | |||
212 | @pytest.fixture |
|
217 | @pytest.fixture | |
213 | def enable_auth_plugins(request, baseapp, csrf_token): |
|
218 | def enable_auth_plugins(request, baseapp, csrf_token): | |
214 | """ |
|
219 | """ | |
215 | Return a factory object that when called, allows to control which |
|
220 | Return a factory object that when called, allows to control which | |
216 | authentication plugins are enabled. |
|
221 | authentication plugins are enabled. | |
217 | """ |
|
222 | """ | |
218 | def _enable_plugins(plugins_list, override=None): |
|
223 | def _enable_plugins(plugins_list, override=None): | |
219 | override = override or {} |
|
224 | override = override or {} | |
220 | params = { |
|
225 | params = { | |
221 | 'auth_plugins': ','.join(plugins_list), |
|
226 | 'auth_plugins': ','.join(plugins_list), | |
222 | } |
|
227 | } | |
223 |
|
228 | |||
224 | # helper translate some names to others |
|
229 | # helper translate some names to others | |
225 | name_map = { |
|
230 | name_map = { | |
226 | 'token': 'authtoken' |
|
231 | 'token': 'authtoken' | |
227 | } |
|
232 | } | |
228 |
|
233 | |||
229 | for module in plugins_list: |
|
234 | for module in plugins_list: | |
230 | plugin_name = module.partition('#')[-1] |
|
235 | plugin_name = module.partition('#')[-1] | |
231 | if plugin_name in name_map: |
|
236 | if plugin_name in name_map: | |
232 | plugin_name = name_map[plugin_name] |
|
237 | plugin_name = name_map[plugin_name] | |
233 | enabled_plugin = 'auth_%s_enabled' % plugin_name |
|
238 | enabled_plugin = 'auth_%s_enabled' % plugin_name | |
234 | cache_ttl = 'auth_%s_cache_ttl' % plugin_name |
|
239 | cache_ttl = 'auth_%s_cache_ttl' % plugin_name | |
235 |
|
240 | |||
236 | # default params that are needed for each plugin, |
|
241 | # default params that are needed for each plugin, | |
237 | # `enabled` and `cache_ttl` |
|
242 | # `enabled` and `cache_ttl` | |
238 | params.update({ |
|
243 | params.update({ | |
239 | enabled_plugin: True, |
|
244 | enabled_plugin: True, | |
240 | cache_ttl: 0 |
|
245 | cache_ttl: 0 | |
241 | }) |
|
246 | }) | |
242 | if override.get: |
|
247 | if override.get: | |
243 | params.update(override.get(module, {})) |
|
248 | params.update(override.get(module, {})) | |
244 |
|
249 | |||
245 | validated_params = params |
|
250 | validated_params = params | |
246 | for k, v in validated_params.items(): |
|
251 | for k, v in validated_params.items(): | |
247 | setting = SettingsModel().create_or_update_setting(k, v) |
|
252 | setting = SettingsModel().create_or_update_setting(k, v) | |
248 | Session().add(setting) |
|
253 | Session().add(setting) | |
249 | Session().commit() |
|
254 | Session().commit() | |
250 |
|
255 | |||
251 | def cleanup(): |
|
256 | def cleanup(): | |
252 | _enable_plugins(['egg:rhodecode-enterprise-ce#rhodecode']) |
|
257 | _enable_plugins(['egg:rhodecode-enterprise-ce#rhodecode']) | |
253 |
|
258 | |||
254 | request.addfinalizer(cleanup) |
|
259 | request.addfinalizer(cleanup) | |
255 |
|
260 | |||
256 | return _enable_plugins |
|
261 | return _enable_plugins | |
257 |
|
262 | |||
258 |
|
263 | |||
259 | @pytest.fixture |
|
264 | @pytest.fixture | |
260 | def fs_repo_only(request, rhodecode_fixtures): |
|
265 | def fs_repo_only(request, rhodecode_fixtures): | |
261 | def fs_repo_fabric(repo_name, repo_type): |
|
266 | def fs_repo_fabric(repo_name, repo_type): | |
262 | rhodecode_fixtures.create_repo(repo_name, repo_type=repo_type) |
|
267 | rhodecode_fixtures.create_repo(repo_name, repo_type=repo_type) | |
263 | rhodecode_fixtures.destroy_repo(repo_name, fs_remove=False) |
|
268 | rhodecode_fixtures.destroy_repo(repo_name, fs_remove=False) | |
264 |
|
269 | |||
265 | def cleanup(): |
|
270 | def cleanup(): | |
266 | rhodecode_fixtures.destroy_repo(repo_name, fs_remove=True) |
|
271 | rhodecode_fixtures.destroy_repo(repo_name, fs_remove=True) | |
267 | rhodecode_fixtures.destroy_repo_on_filesystem(repo_name) |
|
272 | rhodecode_fixtures.destroy_repo_on_filesystem(repo_name) | |
268 |
|
273 | |||
269 | request.addfinalizer(cleanup) |
|
274 | request.addfinalizer(cleanup) | |
270 |
|
275 | |||
271 | return fs_repo_fabric |
|
276 | return fs_repo_fabric |
@@ -1,59 +1,59 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import pytest |
|
30 | import pytest | |
31 |
|
31 | |||
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) |
|
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) | |
33 |
from rhodecode.tests. |
|
33 | from rhodecode.tests.vcs_operations import Command | |
34 |
|
34 | |||
35 |
|
35 | |||
36 | # override rc_web_server_config fixture with custom INI |
|
36 | # override rc_web_server_config fixture with custom INI | |
37 | @pytest.fixture(scope='module') |
|
37 | @pytest.fixture(scope='module') | |
38 | def rc_web_server_config(testini_factory): |
|
38 | def rc_web_server_config(testini_factory): | |
39 | CUSTOM_PARAMS = [ |
|
39 | CUSTOM_PARAMS = [ | |
40 | {'app:main': {'auth_ret_code': '403'}}, |
|
40 | {'app:main': {'auth_ret_code': '403'}}, | |
41 | {'app:main': {'auth_ret_code_detection': 'true'}}, |
|
41 | {'app:main': {'auth_ret_code_detection': 'true'}}, | |
42 | ] |
|
42 | ] | |
43 | return testini_factory(CUSTOM_PARAMS) |
|
43 | return testini_factory(CUSTOM_PARAMS) | |
44 |
|
44 | |||
45 |
|
45 | |||
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
47 | class TestVCSOperationsOnCustomIniConfig(object): |
|
47 | class TestVCSOperationsOnCustomIniConfig(object): | |
48 |
|
48 | |||
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): |
|
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): | |
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') |
|
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') | |
51 | stdout, stderr = Command('/tmp').execute( |
|
51 | stdout, stderr = Command('/tmp').execute( | |
52 | 'hg clone', clone_url, tmpdir.strpath) |
|
52 | 'hg clone', clone_url, tmpdir.strpath) | |
53 | assert 'abort: HTTP Error 403: Forbidden' in stderr |
|
53 | assert 'abort: HTTP Error 403: Forbidden' in stderr | |
54 |
|
54 | |||
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): |
|
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): | |
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') |
|
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') | |
57 | stdout, stderr = Command('/tmp').execute( |
|
57 | stdout, stderr = Command('/tmp').execute( | |
58 | 'git clone', clone_url, tmpdir.strpath) |
|
58 | 'git clone', clone_url, tmpdir.strpath) | |
59 | assert 'The requested URL returned error: 403' in stderr |
|
59 | assert 'The requested URL returned error: 403' in stderr |
@@ -1,59 +1,59 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import pytest |
|
30 | import pytest | |
31 |
|
31 | |||
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) |
|
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) | |
33 |
from rhodecode.tests. |
|
33 | from rhodecode.tests.vcs_operations import Command | |
34 |
|
34 | |||
35 |
|
35 | |||
36 | # override rc_web_server_config fixture with custom INI |
|
36 | # override rc_web_server_config fixture with custom INI | |
37 | @pytest.fixture(scope='module') |
|
37 | @pytest.fixture(scope='module') | |
38 | def rc_web_server_config(testini_factory): |
|
38 | def rc_web_server_config(testini_factory): | |
39 | CUSTOM_PARAMS = [ |
|
39 | CUSTOM_PARAMS = [ | |
40 | {'app:main': {'auth_ret_code': '404'}}, |
|
40 | {'app:main': {'auth_ret_code': '404'}}, | |
41 | {'app:main': {'auth_ret_code_detection': 'false'}}, |
|
41 | {'app:main': {'auth_ret_code_detection': 'false'}}, | |
42 | ] |
|
42 | ] | |
43 | return testini_factory(CUSTOM_PARAMS) |
|
43 | return testini_factory(CUSTOM_PARAMS) | |
44 |
|
44 | |||
45 |
|
45 | |||
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
47 | class TestVCSOperationsOnCustomIniConfig(object): |
|
47 | class TestVCSOperationsOnCustomIniConfig(object): | |
48 |
|
48 | |||
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): |
|
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): | |
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') |
|
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') | |
51 | stdout, stderr = Command('/tmp').execute( |
|
51 | stdout, stderr = Command('/tmp').execute( | |
52 | 'hg clone', clone_url, tmpdir.strpath) |
|
52 | 'hg clone', clone_url, tmpdir.strpath) | |
53 | assert 'abort: HTTP Error 404: Not Found' in stderr |
|
53 | assert 'abort: HTTP Error 404: Not Found' in stderr | |
54 |
|
54 | |||
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): |
|
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): | |
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') |
|
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') | |
57 | stdout, stderr = Command('/tmp').execute( |
|
57 | stdout, stderr = Command('/tmp').execute( | |
58 | 'git clone', clone_url, tmpdir.strpath) |
|
58 | 'git clone', clone_url, tmpdir.strpath) | |
59 | assert 'not found' in stderr |
|
59 | assert 'not found' in stderr |
@@ -1,59 +1,59 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import pytest |
|
30 | import pytest | |
31 |
|
31 | |||
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) |
|
32 | from rhodecode.tests import (GIT_REPO, HG_REPO) | |
33 |
from rhodecode.tests. |
|
33 | from rhodecode.tests.vcs_operations import Command | |
34 |
|
34 | |||
35 |
|
35 | |||
36 | # override rc_web_server_config fixture with custom INI |
|
36 | # override rc_web_server_config fixture with custom INI | |
37 | @pytest.fixture(scope='module') |
|
37 | @pytest.fixture(scope='module') | |
38 | def rc_web_server_config(testini_factory): |
|
38 | def rc_web_server_config(testini_factory): | |
39 | CUSTOM_PARAMS = [ |
|
39 | CUSTOM_PARAMS = [ | |
40 | {'app:main': {'auth_ret_code': '600'}}, |
|
40 | {'app:main': {'auth_ret_code': '600'}}, | |
41 | {'app:main': {'auth_ret_code_detection': 'false'}}, |
|
41 | {'app:main': {'auth_ret_code_detection': 'false'}}, | |
42 | ] |
|
42 | ] | |
43 | return testini_factory(CUSTOM_PARAMS) |
|
43 | return testini_factory(CUSTOM_PARAMS) | |
44 |
|
44 | |||
45 |
|
45 | |||
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
46 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
47 | class TestVCSOperationsOnCustomIniConfig(object): |
|
47 | class TestVCSOperationsOnCustomIniConfig(object): | |
48 |
|
48 | |||
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): |
|
49 | def test_clone_wrong_credentials_hg_ret_code(self, rc_web_server, tmpdir): | |
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') |
|
50 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') | |
51 | stdout, stderr = Command('/tmp').execute( |
|
51 | stdout, stderr = Command('/tmp').execute( | |
52 | 'hg clone', clone_url, tmpdir.strpath) |
|
52 | 'hg clone', clone_url, tmpdir.strpath) | |
53 | assert 'abort: HTTP Error 403: Forbidden' in stderr |
|
53 | assert 'abort: HTTP Error 403: Forbidden' in stderr | |
54 |
|
54 | |||
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): |
|
55 | def test_clone_wrong_credentials_git_ret_code(self, rc_web_server, tmpdir): | |
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') |
|
56 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') | |
57 | stdout, stderr = Command('/tmp').execute( |
|
57 | stdout, stderr = Command('/tmp').execute( | |
58 | 'git clone', clone_url, tmpdir.strpath) |
|
58 | 'git clone', clone_url, tmpdir.strpath) | |
59 | assert 'The requested URL returned error: 403' in stderr |
|
59 | assert 'The requested URL returned error: 403' in stderr |
@@ -1,79 +1,79 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import os |
|
30 | import os | |
31 | import pytest |
|
31 | import pytest | |
32 |
|
32 | |||
33 | from rhodecode.lib.vcs.backends.git.repository import GitRepository |
|
33 | from rhodecode.lib.vcs.backends.git.repository import GitRepository | |
34 | from rhodecode.lib.vcs.nodes import FileNode |
|
34 | from rhodecode.lib.vcs.nodes import FileNode | |
35 | from rhodecode.tests import GIT_REPO |
|
35 | from rhodecode.tests import GIT_REPO | |
36 |
from rhodecode.tests. |
|
36 | from rhodecode.tests.vcs_operations import Command | |
37 | from .test_vcs_operations import _check_proper_clone, _check_proper_git_push |
|
37 | from .test_vcs_operations import _check_proper_clone, _check_proper_git_push | |
38 |
|
38 | |||
39 |
|
39 | |||
40 | # override rc_web_server_config fixture with custom INI |
|
40 | # override rc_web_server_config fixture with custom INI | |
41 | @pytest.fixture(scope="module") |
|
41 | @pytest.fixture(scope="module") | |
42 | def rc_web_server_config(testini_factory): |
|
42 | def rc_web_server_config(testini_factory): | |
43 | """ |
|
43 | """ | |
44 | Configuration file used for the fixture `rc_web_server`. |
|
44 | Configuration file used for the fixture `rc_web_server`. | |
45 | """ |
|
45 | """ | |
46 | CUSTOM_PARAMS = [ |
|
46 | CUSTOM_PARAMS = [ | |
47 | {'handler_console': {'level': 'DEBUG'}}, |
|
47 | {'handler_console': {'level': 'DEBUG'}}, | |
48 | ] |
|
48 | ] | |
49 | return testini_factory(CUSTOM_PARAMS) |
|
49 | return testini_factory(CUSTOM_PARAMS) | |
50 |
|
50 | |||
51 |
|
51 | |||
52 | def test_git_clone_with_small_push_buffer(backend_git, rc_web_server, tmpdir): |
|
52 | def test_git_clone_with_small_push_buffer(backend_git, rc_web_server, tmpdir): | |
53 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
53 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
54 | cmd = Command('/tmp') |
|
54 | cmd = Command('/tmp') | |
55 | stdout, stderr = cmd.execute( |
|
55 | stdout, stderr = cmd.execute( | |
56 | 'git -c http.postBuffer=1024 clone', clone_url, tmpdir.strpath) |
|
56 | 'git -c http.postBuffer=1024 clone', clone_url, tmpdir.strpath) | |
57 | _check_proper_clone(stdout, stderr, 'git') |
|
57 | _check_proper_clone(stdout, stderr, 'git') | |
58 | cmd.assert_returncode_success() |
|
58 | cmd.assert_returncode_success() | |
59 |
|
59 | |||
60 |
|
60 | |||
61 | def test_git_push_with_small_push_buffer(backend_git, rc_web_server, tmpdir): |
|
61 | def test_git_push_with_small_push_buffer(backend_git, rc_web_server, tmpdir): | |
62 | empty_repo = backend_git.create_repo() |
|
62 | empty_repo = backend_git.create_repo() | |
63 |
|
63 | |||
64 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) |
|
64 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) | |
65 |
|
65 | |||
66 | cmd = Command(tmpdir.strpath) |
|
66 | cmd = Command(tmpdir.strpath) | |
67 | cmd.execute('git clone', clone_url) |
|
67 | cmd.execute('git clone', clone_url) | |
68 |
|
68 | |||
69 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
69 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) | |
70 | repo.in_memory_commit.add(FileNode('readme.md', content='## Hello')) |
|
70 | repo.in_memory_commit.add(FileNode('readme.md', content='## Hello')) | |
71 | repo.in_memory_commit.commit( |
|
71 | repo.in_memory_commit.commit( | |
72 | message='Commit on branch Master', |
|
72 | message='Commit on branch Master', | |
73 | author='Automatic test', |
|
73 | author='Automatic test', | |
74 | branch='master') |
|
74 | branch='master') | |
75 |
|
75 | |||
76 | repo_cmd = Command(repo.path) |
|
76 | repo_cmd = Command(repo.path) | |
77 | stdout, stderr = repo_cmd.execute( |
|
77 | stdout, stderr = repo_cmd.execute( | |
78 | 'git -c http.postBuffer=1024 push --verbose origin master') |
|
78 | 'git -c http.postBuffer=1024 push --verbose origin master') | |
79 | _check_proper_git_push(stdout, stderr, branch='master') |
|
79 | _check_proper_git_push(stdout, stderr, branch='master') |
@@ -1,682 +1,460 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 |
|
30 | |||
31 | import os |
|
|||
32 | import time |
|
31 | import time | |
33 |
|
32 | |||
34 | import pytest |
|
33 | import pytest | |
35 |
|
34 | |||
36 | from rhodecode.lib.vcs.backends.git.repository import GitRepository |
|
|||
37 | from rhodecode.lib.vcs.backends.hg.repository import MercurialRepository |
|
|||
38 | from rhodecode.lib.vcs.nodes import FileNode |
|
|||
39 | from rhodecode.model.auth_token import AuthTokenModel |
|
35 | from rhodecode.model.auth_token import AuthTokenModel | |
40 | from rhodecode.model.db import Repository, UserIpMap, CacheKey |
|
36 | from rhodecode.model.db import Repository, UserIpMap, CacheKey | |
41 | from rhodecode.model.meta import Session |
|
37 | from rhodecode.model.meta import Session | |
42 | from rhodecode.model.repo import RepoModel |
|
38 | from rhodecode.model.repo import RepoModel | |
43 | from rhodecode.model.user import UserModel |
|
39 | from rhodecode.model.user import UserModel | |
44 | from rhodecode.tests import (GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN) |
|
40 | from rhodecode.tests import (GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN) | |
45 |
|
41 | |||
46 |
from rhodecode.tests. |
|
42 | from rhodecode.tests.vcs_operations import ( | |
47 | Command, _check_proper_clone, _check_proper_git_push, |
|
43 | Command, _check_proper_clone, _check_proper_git_push, | |
48 | _check_proper_hg_push, _add_files_and_push, |
|
44 | _add_files_and_push, HG_REPO_WITH_GROUP, GIT_REPO_WITH_GROUP) | |
49 | HG_REPO_WITH_GROUP, GIT_REPO_WITH_GROUP) |
|
|||
50 |
|
||||
51 |
|
||||
52 | @pytest.fixture(scope="session") |
|
|||
53 | def vcs_server_config_override(): |
|
|||
54 | return ({'server:main': {'workers': 2}},) |
|
|||
55 |
|
45 | |||
56 |
|
46 | |||
57 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
47 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
58 | class TestVCSOperations(object): |
|
48 | class TestVCSOperations(object): | |
59 |
|
49 | |||
60 | def test_clone_hg_repo_by_admin(self, rc_web_server, tmpdir): |
|
50 | def test_clone_hg_repo_by_admin(self, rc_web_server, tmpdir): | |
61 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
51 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
62 | stdout, stderr = Command('/tmp').execute( |
|
52 | stdout, stderr = Command('/tmp').execute( | |
63 | 'hg clone', clone_url, tmpdir.strpath) |
|
53 | 'hg clone', clone_url, tmpdir.strpath) | |
64 | _check_proper_clone(stdout, stderr, 'hg') |
|
54 | _check_proper_clone(stdout, stderr, 'hg') | |
65 |
|
55 | |||
66 | def test_clone_git_repo_by_admin(self, rc_web_server, tmpdir): |
|
56 | def test_clone_git_repo_by_admin(self, rc_web_server, tmpdir): | |
67 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
57 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
68 | cmd = Command('/tmp') |
|
58 | cmd = Command('/tmp') | |
69 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) |
|
59 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) | |
70 | _check_proper_clone(stdout, stderr, 'git') |
|
60 | _check_proper_clone(stdout, stderr, 'git') | |
71 | cmd.assert_returncode_success() |
|
61 | cmd.assert_returncode_success() | |
72 |
|
62 | |||
73 | def test_clone_git_repo_by_admin_with_git_suffix(self, rc_web_server, tmpdir): |
|
63 | def test_clone_git_repo_by_admin_with_git_suffix(self, rc_web_server, tmpdir): | |
74 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
64 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
75 | cmd = Command('/tmp') |
|
65 | cmd = Command('/tmp') | |
76 | stdout, stderr = cmd.execute('git clone', clone_url+".git", tmpdir.strpath) |
|
66 | stdout, stderr = cmd.execute('git clone', clone_url+".git", tmpdir.strpath) | |
77 | _check_proper_clone(stdout, stderr, 'git') |
|
67 | _check_proper_clone(stdout, stderr, 'git') | |
78 | cmd.assert_returncode_success() |
|
68 | cmd.assert_returncode_success() | |
79 |
|
69 | |||
80 | def test_clone_hg_repo_by_id_by_admin(self, rc_web_server, tmpdir): |
|
70 | def test_clone_hg_repo_by_id_by_admin(self, rc_web_server, tmpdir): | |
81 | repo_id = Repository.get_by_repo_name(HG_REPO).repo_id |
|
71 | repo_id = Repository.get_by_repo_name(HG_REPO).repo_id | |
82 | clone_url = rc_web_server.repo_clone_url('_%s' % repo_id) |
|
72 | clone_url = rc_web_server.repo_clone_url('_%s' % repo_id) | |
83 | stdout, stderr = Command('/tmp').execute( |
|
73 | stdout, stderr = Command('/tmp').execute( | |
84 | 'hg clone', clone_url, tmpdir.strpath) |
|
74 | 'hg clone', clone_url, tmpdir.strpath) | |
85 | _check_proper_clone(stdout, stderr, 'hg') |
|
75 | _check_proper_clone(stdout, stderr, 'hg') | |
86 |
|
76 | |||
87 | def test_clone_git_repo_by_id_by_admin(self, rc_web_server, tmpdir): |
|
77 | def test_clone_git_repo_by_id_by_admin(self, rc_web_server, tmpdir): | |
88 | repo_id = Repository.get_by_repo_name(GIT_REPO).repo_id |
|
78 | repo_id = Repository.get_by_repo_name(GIT_REPO).repo_id | |
89 | clone_url = rc_web_server.repo_clone_url('_%s' % repo_id) |
|
79 | clone_url = rc_web_server.repo_clone_url('_%s' % repo_id) | |
90 | cmd = Command('/tmp') |
|
80 | cmd = Command('/tmp') | |
91 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) |
|
81 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) | |
92 | _check_proper_clone(stdout, stderr, 'git') |
|
82 | _check_proper_clone(stdout, stderr, 'git') | |
93 | cmd.assert_returncode_success() |
|
83 | cmd.assert_returncode_success() | |
94 |
|
84 | |||
95 | def test_clone_hg_repo_with_group_by_admin(self, rc_web_server, tmpdir): |
|
85 | def test_clone_hg_repo_with_group_by_admin(self, rc_web_server, tmpdir): | |
96 | clone_url = rc_web_server.repo_clone_url(HG_REPO_WITH_GROUP) |
|
86 | clone_url = rc_web_server.repo_clone_url(HG_REPO_WITH_GROUP) | |
97 | stdout, stderr = Command('/tmp').execute( |
|
87 | stdout, stderr = Command('/tmp').execute( | |
98 | 'hg clone', clone_url, tmpdir.strpath) |
|
88 | 'hg clone', clone_url, tmpdir.strpath) | |
99 | _check_proper_clone(stdout, stderr, 'hg') |
|
89 | _check_proper_clone(stdout, stderr, 'hg') | |
100 |
|
90 | |||
101 | def test_clone_git_repo_with_group_by_admin(self, rc_web_server, tmpdir): |
|
91 | def test_clone_git_repo_with_group_by_admin(self, rc_web_server, tmpdir): | |
102 | clone_url = rc_web_server.repo_clone_url(GIT_REPO_WITH_GROUP) |
|
92 | clone_url = rc_web_server.repo_clone_url(GIT_REPO_WITH_GROUP) | |
103 | cmd = Command('/tmp') |
|
93 | cmd = Command('/tmp') | |
104 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) |
|
94 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) | |
105 | _check_proper_clone(stdout, stderr, 'git') |
|
95 | _check_proper_clone(stdout, stderr, 'git') | |
106 | cmd.assert_returncode_success() |
|
96 | cmd.assert_returncode_success() | |
107 |
|
97 | |||
108 | def test_clone_git_repo_shallow_by_admin(self, rc_web_server, tmpdir): |
|
98 | def test_clone_git_repo_shallow_by_admin(self, rc_web_server, tmpdir): | |
109 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
99 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
110 | cmd = Command('/tmp') |
|
100 | cmd = Command('/tmp') | |
111 | stdout, stderr = cmd.execute( |
|
101 | stdout, stderr = cmd.execute( | |
112 | 'git clone --depth=1', clone_url, tmpdir.strpath) |
|
102 | 'git clone --depth=1', clone_url, tmpdir.strpath) | |
113 |
|
103 | |||
114 | assert '' == stdout |
|
104 | assert '' == stdout | |
115 | assert 'Cloning into' in stderr |
|
105 | assert 'Cloning into' in stderr | |
116 | cmd.assert_returncode_success() |
|
106 | cmd.assert_returncode_success() | |
117 |
|
107 | |||
118 | def test_clone_wrong_credentials_hg(self, rc_web_server, tmpdir): |
|
108 | def test_clone_wrong_credentials_hg(self, rc_web_server, tmpdir): | |
119 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') |
|
109 | clone_url = rc_web_server.repo_clone_url(HG_REPO, passwd='bad!') | |
120 | stdout, stderr = Command('/tmp').execute( |
|
110 | stdout, stderr = Command('/tmp').execute( | |
121 | 'hg clone', clone_url, tmpdir.strpath) |
|
111 | 'hg clone', clone_url, tmpdir.strpath) | |
122 | assert 'abort: authorization failed' in stderr |
|
112 | assert 'abort: authorization failed' in stderr | |
123 |
|
113 | |||
124 | def test_clone_wrong_credentials_git(self, rc_web_server, tmpdir): |
|
114 | def test_clone_wrong_credentials_git(self, rc_web_server, tmpdir): | |
125 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') |
|
115 | clone_url = rc_web_server.repo_clone_url(GIT_REPO, passwd='bad!') | |
126 | stdout, stderr = Command('/tmp').execute( |
|
116 | stdout, stderr = Command('/tmp').execute( | |
127 | 'git clone', clone_url, tmpdir.strpath) |
|
117 | 'git clone', clone_url, tmpdir.strpath) | |
128 | assert 'fatal: Authentication failed' in stderr |
|
118 | assert 'fatal: Authentication failed' in stderr | |
129 |
|
119 | |||
130 | def test_clone_git_dir_as_hg(self, rc_web_server, tmpdir): |
|
120 | def test_clone_git_dir_as_hg(self, rc_web_server, tmpdir): | |
131 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
121 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
132 | stdout, stderr = Command('/tmp').execute( |
|
122 | stdout, stderr = Command('/tmp').execute( | |
133 | 'hg clone', clone_url, tmpdir.strpath) |
|
123 | 'hg clone', clone_url, tmpdir.strpath) | |
134 | assert 'HTTP Error 404: Not Found' in stderr |
|
124 | assert 'HTTP Error 404: Not Found' in stderr | |
135 |
|
125 | |||
136 | def test_clone_hg_repo_as_git(self, rc_web_server, tmpdir): |
|
126 | def test_clone_hg_repo_as_git(self, rc_web_server, tmpdir): | |
137 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
127 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
138 | stdout, stderr = Command('/tmp').execute( |
|
128 | stdout, stderr = Command('/tmp').execute( | |
139 | 'git clone', clone_url, tmpdir.strpath) |
|
129 | 'git clone', clone_url, tmpdir.strpath) | |
140 | assert 'not found' in stderr |
|
130 | assert 'not found' in stderr | |
141 |
|
131 | |||
142 | def test_clone_non_existing_path_hg(self, rc_web_server, tmpdir): |
|
132 | def test_clone_non_existing_path_hg(self, rc_web_server, tmpdir): | |
143 | clone_url = rc_web_server.repo_clone_url('trololo') |
|
133 | clone_url = rc_web_server.repo_clone_url('trololo') | |
144 | stdout, stderr = Command('/tmp').execute( |
|
134 | stdout, stderr = Command('/tmp').execute( | |
145 | 'hg clone', clone_url, tmpdir.strpath) |
|
135 | 'hg clone', clone_url, tmpdir.strpath) | |
146 | assert 'HTTP Error 404: Not Found' in stderr |
|
136 | assert 'HTTP Error 404: Not Found' in stderr | |
147 |
|
137 | |||
148 | def test_clone_non_existing_path_git(self, rc_web_server, tmpdir): |
|
138 | def test_clone_non_existing_path_git(self, rc_web_server, tmpdir): | |
149 | clone_url = rc_web_server.repo_clone_url('trololo') |
|
139 | clone_url = rc_web_server.repo_clone_url('trololo') | |
150 | stdout, stderr = Command('/tmp').execute('git clone', clone_url) |
|
140 | stdout, stderr = Command('/tmp').execute('git clone', clone_url) | |
151 | assert 'not found' in stderr |
|
141 | assert 'not found' in stderr | |
152 |
|
142 | |||
153 | def test_clone_existing_path_hg_not_in_database( |
|
143 | def test_clone_existing_path_hg_not_in_database( | |
154 | self, rc_web_server, tmpdir, fs_repo_only): |
|
144 | self, rc_web_server, tmpdir, fs_repo_only): | |
155 |
|
145 | |||
156 | db_name = fs_repo_only('not-in-db-hg', repo_type='hg') |
|
146 | db_name = fs_repo_only('not-in-db-hg', repo_type='hg') | |
157 | clone_url = rc_web_server.repo_clone_url(db_name) |
|
147 | clone_url = rc_web_server.repo_clone_url(db_name) | |
158 | stdout, stderr = Command('/tmp').execute( |
|
148 | stdout, stderr = Command('/tmp').execute( | |
159 | 'hg clone', clone_url, tmpdir.strpath) |
|
149 | 'hg clone', clone_url, tmpdir.strpath) | |
160 | assert 'HTTP Error 404: Not Found' in stderr |
|
150 | assert 'HTTP Error 404: Not Found' in stderr | |
161 |
|
151 | |||
162 | def test_clone_existing_path_git_not_in_database( |
|
152 | def test_clone_existing_path_git_not_in_database( | |
163 | self, rc_web_server, tmpdir, fs_repo_only): |
|
153 | self, rc_web_server, tmpdir, fs_repo_only): | |
164 | db_name = fs_repo_only('not-in-db-git', repo_type='git') |
|
154 | db_name = fs_repo_only('not-in-db-git', repo_type='git') | |
165 | clone_url = rc_web_server.repo_clone_url(db_name) |
|
155 | clone_url = rc_web_server.repo_clone_url(db_name) | |
166 | stdout, stderr = Command('/tmp').execute( |
|
156 | stdout, stderr = Command('/tmp').execute( | |
167 | 'git clone', clone_url, tmpdir.strpath) |
|
157 | 'git clone', clone_url, tmpdir.strpath) | |
168 | assert 'not found' in stderr |
|
158 | assert 'not found' in stderr | |
169 |
|
159 | |||
170 | def test_clone_existing_path_hg_not_in_database_different_scm( |
|
160 | def test_clone_existing_path_hg_not_in_database_different_scm( | |
171 | self, rc_web_server, tmpdir, fs_repo_only): |
|
161 | self, rc_web_server, tmpdir, fs_repo_only): | |
172 | db_name = fs_repo_only('not-in-db-git', repo_type='git') |
|
162 | db_name = fs_repo_only('not-in-db-git', repo_type='git') | |
173 | clone_url = rc_web_server.repo_clone_url(db_name) |
|
163 | clone_url = rc_web_server.repo_clone_url(db_name) | |
174 | stdout, stderr = Command('/tmp').execute( |
|
164 | stdout, stderr = Command('/tmp').execute( | |
175 | 'hg clone', clone_url, tmpdir.strpath) |
|
165 | 'hg clone', clone_url, tmpdir.strpath) | |
176 | assert 'HTTP Error 404: Not Found' in stderr |
|
166 | assert 'HTTP Error 404: Not Found' in stderr | |
177 |
|
167 | |||
178 | def test_clone_existing_path_git_not_in_database_different_scm( |
|
168 | def test_clone_existing_path_git_not_in_database_different_scm( | |
179 | self, rc_web_server, tmpdir, fs_repo_only): |
|
169 | self, rc_web_server, tmpdir, fs_repo_only): | |
180 | db_name = fs_repo_only('not-in-db-hg', repo_type='hg') |
|
170 | db_name = fs_repo_only('not-in-db-hg', repo_type='hg') | |
181 | clone_url = rc_web_server.repo_clone_url(db_name) |
|
171 | clone_url = rc_web_server.repo_clone_url(db_name) | |
182 | stdout, stderr = Command('/tmp').execute( |
|
172 | stdout, stderr = Command('/tmp').execute( | |
183 | 'git clone', clone_url, tmpdir.strpath) |
|
173 | 'git clone', clone_url, tmpdir.strpath) | |
184 | assert 'not found' in stderr |
|
174 | assert 'not found' in stderr | |
185 |
|
175 | |||
186 | def test_clone_non_existing_store_path_hg(self, rc_web_server, tmpdir, user_util): |
|
176 | def test_clone_non_existing_store_path_hg(self, rc_web_server, tmpdir, user_util): | |
187 | repo = user_util.create_repo() |
|
177 | repo = user_util.create_repo() | |
188 | clone_url = rc_web_server.repo_clone_url(repo.repo_name) |
|
178 | clone_url = rc_web_server.repo_clone_url(repo.repo_name) | |
189 |
|
179 | |||
190 | # Damage repo by removing it's folder |
|
180 | # Damage repo by removing it's folder | |
191 | RepoModel()._delete_filesystem_repo(repo) |
|
181 | RepoModel()._delete_filesystem_repo(repo) | |
192 |
|
182 | |||
193 | stdout, stderr = Command('/tmp').execute( |
|
183 | stdout, stderr = Command('/tmp').execute( | |
194 | 'hg clone', clone_url, tmpdir.strpath) |
|
184 | 'hg clone', clone_url, tmpdir.strpath) | |
195 | assert 'HTTP Error 404: Not Found' in stderr |
|
185 | assert 'HTTP Error 404: Not Found' in stderr | |
196 |
|
186 | |||
197 | def test_clone_non_existing_store_path_git(self, rc_web_server, tmpdir, user_util): |
|
187 | def test_clone_non_existing_store_path_git(self, rc_web_server, tmpdir, user_util): | |
198 | repo = user_util.create_repo(repo_type='git') |
|
188 | repo = user_util.create_repo(repo_type='git') | |
199 | clone_url = rc_web_server.repo_clone_url(repo.repo_name) |
|
189 | clone_url = rc_web_server.repo_clone_url(repo.repo_name) | |
200 |
|
190 | |||
201 | # Damage repo by removing it's folder |
|
191 | # Damage repo by removing it's folder | |
202 | RepoModel()._delete_filesystem_repo(repo) |
|
192 | RepoModel()._delete_filesystem_repo(repo) | |
203 |
|
193 | |||
204 | stdout, stderr = Command('/tmp').execute( |
|
194 | stdout, stderr = Command('/tmp').execute( | |
205 | 'git clone', clone_url, tmpdir.strpath) |
|
195 | 'git clone', clone_url, tmpdir.strpath) | |
206 | assert 'not found' in stderr |
|
196 | assert 'not found' in stderr | |
207 |
|
197 | |||
208 | def test_push_new_file_hg(self, rc_web_server, tmpdir): |
|
198 | def test_push_new_file_hg(self, rc_web_server, tmpdir): | |
209 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
199 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
210 | stdout, stderr = Command('/tmp').execute( |
|
200 | stdout, stderr = Command('/tmp').execute( | |
211 | 'hg clone', clone_url, tmpdir.strpath) |
|
201 | 'hg clone', clone_url, tmpdir.strpath) | |
212 |
|
202 | |||
213 | stdout, stderr = _add_files_and_push( |
|
203 | stdout, stderr = _add_files_and_push( | |
214 | 'hg', tmpdir.strpath, clone_url=clone_url) |
|
204 | 'hg', tmpdir.strpath, clone_url=clone_url) | |
215 |
|
205 | |||
216 | assert 'pushing to' in stdout |
|
206 | assert 'pushing to' in stdout | |
217 | assert 'size summary' in stdout |
|
207 | assert 'size summary' in stdout | |
218 |
|
208 | |||
219 | def test_push_new_file_git(self, rc_web_server, tmpdir): |
|
209 | def test_push_new_file_git(self, rc_web_server, tmpdir): | |
220 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
210 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
221 | stdout, stderr = Command('/tmp').execute( |
|
211 | stdout, stderr = Command('/tmp').execute( | |
222 | 'git clone', clone_url, tmpdir.strpath) |
|
212 | 'git clone', clone_url, tmpdir.strpath) | |
223 |
|
213 | |||
224 | # commit some stuff into this repo |
|
214 | # commit some stuff into this repo | |
225 | stdout, stderr = _add_files_and_push( |
|
215 | stdout, stderr = _add_files_and_push( | |
226 | 'git', tmpdir.strpath, clone_url=clone_url) |
|
216 | 'git', tmpdir.strpath, clone_url=clone_url) | |
227 |
|
217 | |||
228 | _check_proper_git_push(stdout, stderr) |
|
218 | _check_proper_git_push(stdout, stderr) | |
229 |
|
219 | |||
230 | def test_push_invalidates_cache_hg(self, rc_web_server, tmpdir): |
|
220 | def test_push_invalidates_cache_hg(self, rc_web_server, tmpdir): | |
231 | key = CacheKey.query().filter(CacheKey.cache_key == HG_REPO).scalar() |
|
221 | key = CacheKey.query().filter(CacheKey.cache_key == HG_REPO).scalar() | |
232 | if not key: |
|
222 | if not key: | |
233 | key = CacheKey(HG_REPO, HG_REPO) |
|
223 | key = CacheKey(HG_REPO, HG_REPO) | |
234 |
|
224 | |||
235 | key.cache_active = True |
|
225 | key.cache_active = True | |
236 | Session().add(key) |
|
226 | Session().add(key) | |
237 | Session().commit() |
|
227 | Session().commit() | |
238 |
|
228 | |||
239 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
229 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
240 | stdout, stderr = Command('/tmp').execute( |
|
230 | stdout, stderr = Command('/tmp').execute( | |
241 | 'hg clone', clone_url, tmpdir.strpath) |
|
231 | 'hg clone', clone_url, tmpdir.strpath) | |
242 |
|
232 | |||
243 | stdout, stderr = _add_files_and_push( |
|
233 | stdout, stderr = _add_files_and_push( | |
244 | 'hg', tmpdir.strpath, clone_url=clone_url, files_no=1) |
|
234 | 'hg', tmpdir.strpath, clone_url=clone_url, files_no=1) | |
245 |
|
235 | |||
246 | key = CacheKey.query().filter(CacheKey.cache_key == HG_REPO).one() |
|
236 | key = CacheKey.query().filter(CacheKey.cache_key == HG_REPO).one() | |
247 | assert key.cache_active is False |
|
237 | assert key.cache_active is False | |
248 |
|
238 | |||
249 | def test_push_invalidates_cache_git(self, rc_web_server, tmpdir): |
|
239 | def test_push_invalidates_cache_git(self, rc_web_server, tmpdir): | |
250 | key = CacheKey.query().filter(CacheKey.cache_key == GIT_REPO).scalar() |
|
240 | key = CacheKey.query().filter(CacheKey.cache_key == GIT_REPO).scalar() | |
251 | if not key: |
|
241 | if not key: | |
252 | key = CacheKey(GIT_REPO, GIT_REPO) |
|
242 | key = CacheKey(GIT_REPO, GIT_REPO) | |
253 |
|
243 | |||
254 | key.cache_active = True |
|
244 | key.cache_active = True | |
255 | Session().add(key) |
|
245 | Session().add(key) | |
256 | Session().commit() |
|
246 | Session().commit() | |
257 |
|
247 | |||
258 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
248 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
259 | stdout, stderr = Command('/tmp').execute( |
|
249 | stdout, stderr = Command('/tmp').execute( | |
260 | 'git clone', clone_url, tmpdir.strpath) |
|
250 | 'git clone', clone_url, tmpdir.strpath) | |
261 |
|
251 | |||
262 | # commit some stuff into this repo |
|
252 | # commit some stuff into this repo | |
263 | stdout, stderr = _add_files_and_push( |
|
253 | stdout, stderr = _add_files_and_push( | |
264 | 'git', tmpdir.strpath, clone_url=clone_url, files_no=1) |
|
254 | 'git', tmpdir.strpath, clone_url=clone_url, files_no=1) | |
265 | _check_proper_git_push(stdout, stderr) |
|
255 | _check_proper_git_push(stdout, stderr) | |
266 |
|
256 | |||
267 | key = CacheKey.query().filter(CacheKey.cache_key == GIT_REPO).one() |
|
257 | key = CacheKey.query().filter(CacheKey.cache_key == GIT_REPO).one() | |
268 |
|
258 | |||
269 | assert key.cache_active is False |
|
259 | assert key.cache_active is False | |
270 |
|
260 | |||
271 | def test_push_wrong_credentials_hg(self, rc_web_server, tmpdir): |
|
261 | def test_push_wrong_credentials_hg(self, rc_web_server, tmpdir): | |
272 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
262 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
273 | stdout, stderr = Command('/tmp').execute( |
|
263 | stdout, stderr = Command('/tmp').execute( | |
274 | 'hg clone', clone_url, tmpdir.strpath) |
|
264 | 'hg clone', clone_url, tmpdir.strpath) | |
275 |
|
265 | |||
276 | push_url = rc_web_server.repo_clone_url( |
|
266 | push_url = rc_web_server.repo_clone_url( | |
277 | HG_REPO, user='bad', passwd='name') |
|
267 | HG_REPO, user='bad', passwd='name') | |
278 | stdout, stderr = _add_files_and_push( |
|
268 | stdout, stderr = _add_files_and_push( | |
279 | 'hg', tmpdir.strpath, clone_url=push_url) |
|
269 | 'hg', tmpdir.strpath, clone_url=push_url) | |
280 |
|
270 | |||
281 | assert 'abort: authorization failed' in stderr |
|
271 | assert 'abort: authorization failed' in stderr | |
282 |
|
272 | |||
283 | def test_push_wrong_credentials_git(self, rc_web_server, tmpdir): |
|
273 | def test_push_wrong_credentials_git(self, rc_web_server, tmpdir): | |
284 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
274 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
285 | stdout, stderr = Command('/tmp').execute( |
|
275 | stdout, stderr = Command('/tmp').execute( | |
286 | 'git clone', clone_url, tmpdir.strpath) |
|
276 | 'git clone', clone_url, tmpdir.strpath) | |
287 |
|
277 | |||
288 | push_url = rc_web_server.repo_clone_url( |
|
278 | push_url = rc_web_server.repo_clone_url( | |
289 | GIT_REPO, user='bad', passwd='name') |
|
279 | GIT_REPO, user='bad', passwd='name') | |
290 | stdout, stderr = _add_files_and_push( |
|
280 | stdout, stderr = _add_files_and_push( | |
291 | 'git', tmpdir.strpath, clone_url=push_url) |
|
281 | 'git', tmpdir.strpath, clone_url=push_url) | |
292 |
|
282 | |||
293 | assert 'fatal: Authentication failed' in stderr |
|
283 | assert 'fatal: Authentication failed' in stderr | |
294 |
|
284 | |||
295 | def test_push_back_to_wrong_url_hg(self, rc_web_server, tmpdir): |
|
285 | def test_push_back_to_wrong_url_hg(self, rc_web_server, tmpdir): | |
296 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
286 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
297 | stdout, stderr = Command('/tmp').execute( |
|
287 | stdout, stderr = Command('/tmp').execute( | |
298 | 'hg clone', clone_url, tmpdir.strpath) |
|
288 | 'hg clone', clone_url, tmpdir.strpath) | |
299 |
|
289 | |||
300 | stdout, stderr = _add_files_and_push( |
|
290 | stdout, stderr = _add_files_and_push( | |
301 | 'hg', tmpdir.strpath, |
|
291 | 'hg', tmpdir.strpath, | |
302 | clone_url=rc_web_server.repo_clone_url('not-existing')) |
|
292 | clone_url=rc_web_server.repo_clone_url('not-existing')) | |
303 |
|
293 | |||
304 | assert 'HTTP Error 404: Not Found' in stderr |
|
294 | assert 'HTTP Error 404: Not Found' in stderr | |
305 |
|
295 | |||
306 | def test_push_back_to_wrong_url_git(self, rc_web_server, tmpdir): |
|
296 | def test_push_back_to_wrong_url_git(self, rc_web_server, tmpdir): | |
307 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
297 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
308 | stdout, stderr = Command('/tmp').execute( |
|
298 | stdout, stderr = Command('/tmp').execute( | |
309 | 'git clone', clone_url, tmpdir.strpath) |
|
299 | 'git clone', clone_url, tmpdir.strpath) | |
310 |
|
300 | |||
311 | stdout, stderr = _add_files_and_push( |
|
301 | stdout, stderr = _add_files_and_push( | |
312 | 'git', tmpdir.strpath, |
|
302 | 'git', tmpdir.strpath, | |
313 | clone_url=rc_web_server.repo_clone_url('not-existing')) |
|
303 | clone_url=rc_web_server.repo_clone_url('not-existing')) | |
314 |
|
304 | |||
315 | assert 'not found' in stderr |
|
305 | assert 'not found' in stderr | |
316 |
|
306 | |||
317 | def test_ip_restriction_hg(self, rc_web_server, tmpdir): |
|
307 | def test_ip_restriction_hg(self, rc_web_server, tmpdir): | |
318 | user_model = UserModel() |
|
308 | user_model = UserModel() | |
319 | try: |
|
309 | try: | |
320 | user_model.add_extra_ip(TEST_USER_ADMIN_LOGIN, '10.10.10.10/32') |
|
310 | user_model.add_extra_ip(TEST_USER_ADMIN_LOGIN, '10.10.10.10/32') | |
321 | Session().commit() |
|
311 | Session().commit() | |
322 | time.sleep(2) |
|
312 | time.sleep(2) | |
323 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
313 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
324 | stdout, stderr = Command('/tmp').execute( |
|
314 | stdout, stderr = Command('/tmp').execute( | |
325 | 'hg clone', clone_url, tmpdir.strpath) |
|
315 | 'hg clone', clone_url, tmpdir.strpath) | |
326 | assert 'abort: HTTP Error 403: Forbidden' in stderr |
|
316 | assert 'abort: HTTP Error 403: Forbidden' in stderr | |
327 | finally: |
|
317 | finally: | |
328 | # release IP restrictions |
|
318 | # release IP restrictions | |
329 | for ip in UserIpMap.getAll(): |
|
319 | for ip in UserIpMap.getAll(): | |
330 | UserIpMap.delete(ip.ip_id) |
|
320 | UserIpMap.delete(ip.ip_id) | |
331 | Session().commit() |
|
321 | Session().commit() | |
332 |
|
322 | |||
333 | time.sleep(2) |
|
323 | time.sleep(2) | |
334 |
|
324 | |||
335 | stdout, stderr = Command('/tmp').execute( |
|
325 | stdout, stderr = Command('/tmp').execute( | |
336 | 'hg clone', clone_url, tmpdir.strpath) |
|
326 | 'hg clone', clone_url, tmpdir.strpath) | |
337 | _check_proper_clone(stdout, stderr, 'hg') |
|
327 | _check_proper_clone(stdout, stderr, 'hg') | |
338 |
|
328 | |||
339 | def test_ip_restriction_git(self, rc_web_server, tmpdir): |
|
329 | def test_ip_restriction_git(self, rc_web_server, tmpdir): | |
340 | user_model = UserModel() |
|
330 | user_model = UserModel() | |
341 | try: |
|
331 | try: | |
342 | user_model.add_extra_ip(TEST_USER_ADMIN_LOGIN, '10.10.10.10/32') |
|
332 | user_model.add_extra_ip(TEST_USER_ADMIN_LOGIN, '10.10.10.10/32') | |
343 | Session().commit() |
|
333 | Session().commit() | |
344 | time.sleep(2) |
|
334 | time.sleep(2) | |
345 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
335 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
346 | stdout, stderr = Command('/tmp').execute( |
|
336 | stdout, stderr = Command('/tmp').execute( | |
347 | 'git clone', clone_url, tmpdir.strpath) |
|
337 | 'git clone', clone_url, tmpdir.strpath) | |
348 | msg = "The requested URL returned error: 403" |
|
338 | msg = "The requested URL returned error: 403" | |
349 | assert msg in stderr |
|
339 | assert msg in stderr | |
350 | finally: |
|
340 | finally: | |
351 | # release IP restrictions |
|
341 | # release IP restrictions | |
352 | for ip in UserIpMap.getAll(): |
|
342 | for ip in UserIpMap.getAll(): | |
353 | UserIpMap.delete(ip.ip_id) |
|
343 | UserIpMap.delete(ip.ip_id) | |
354 | Session().commit() |
|
344 | Session().commit() | |
355 |
|
345 | |||
356 | time.sleep(2) |
|
346 | time.sleep(2) | |
357 |
|
347 | |||
358 | cmd = Command('/tmp') |
|
348 | cmd = Command('/tmp') | |
359 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) |
|
349 | stdout, stderr = cmd.execute('git clone', clone_url, tmpdir.strpath) | |
360 | cmd.assert_returncode_success() |
|
350 | cmd.assert_returncode_success() | |
361 | _check_proper_clone(stdout, stderr, 'git') |
|
351 | _check_proper_clone(stdout, stderr, 'git') | |
362 |
|
352 | |||
363 | def test_clone_by_auth_token( |
|
353 | def test_clone_by_auth_token( | |
364 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
354 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
365 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
355 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
366 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
356 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
367 |
|
357 | |||
368 | user = user_util.create_user() |
|
358 | user = user_util.create_user() | |
369 | token = user.auth_tokens[1] |
|
359 | token = user.auth_tokens[1] | |
370 |
|
360 | |||
371 | clone_url = rc_web_server.repo_clone_url( |
|
361 | clone_url = rc_web_server.repo_clone_url( | |
372 | HG_REPO, user=user.username, passwd=token) |
|
362 | HG_REPO, user=user.username, passwd=token) | |
373 |
|
363 | |||
374 | stdout, stderr = Command('/tmp').execute( |
|
364 | stdout, stderr = Command('/tmp').execute( | |
375 | 'hg clone', clone_url, tmpdir.strpath) |
|
365 | 'hg clone', clone_url, tmpdir.strpath) | |
376 | _check_proper_clone(stdout, stderr, 'hg') |
|
366 | _check_proper_clone(stdout, stderr, 'hg') | |
377 |
|
367 | |||
378 | def test_clone_by_auth_token_expired( |
|
368 | def test_clone_by_auth_token_expired( | |
379 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
369 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
380 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
370 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
381 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
371 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
382 |
|
372 | |||
383 | user = user_util.create_user() |
|
373 | user = user_util.create_user() | |
384 | auth_token = AuthTokenModel().create( |
|
374 | auth_token = AuthTokenModel().create( | |
385 | user.user_id, 'test-token', -10, AuthTokenModel.cls.ROLE_VCS) |
|
375 | user.user_id, 'test-token', -10, AuthTokenModel.cls.ROLE_VCS) | |
386 | token = auth_token.api_key |
|
376 | token = auth_token.api_key | |
387 |
|
377 | |||
388 | clone_url = rc_web_server.repo_clone_url( |
|
378 | clone_url = rc_web_server.repo_clone_url( | |
389 | HG_REPO, user=user.username, passwd=token) |
|
379 | HG_REPO, user=user.username, passwd=token) | |
390 |
|
380 | |||
391 | stdout, stderr = Command('/tmp').execute( |
|
381 | stdout, stderr = Command('/tmp').execute( | |
392 | 'hg clone', clone_url, tmpdir.strpath) |
|
382 | 'hg clone', clone_url, tmpdir.strpath) | |
393 | assert 'abort: authorization failed' in stderr |
|
383 | assert 'abort: authorization failed' in stderr | |
394 |
|
384 | |||
395 | def test_clone_by_auth_token_bad_role( |
|
385 | def test_clone_by_auth_token_bad_role( | |
396 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
386 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
397 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
387 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
398 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
388 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
399 |
|
389 | |||
400 | user = user_util.create_user() |
|
390 | user = user_util.create_user() | |
401 | auth_token = AuthTokenModel().create( |
|
391 | auth_token = AuthTokenModel().create( | |
402 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_API) |
|
392 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_API) | |
403 | token = auth_token.api_key |
|
393 | token = auth_token.api_key | |
404 |
|
394 | |||
405 | clone_url = rc_web_server.repo_clone_url( |
|
395 | clone_url = rc_web_server.repo_clone_url( | |
406 | HG_REPO, user=user.username, passwd=token) |
|
396 | HG_REPO, user=user.username, passwd=token) | |
407 |
|
397 | |||
408 | stdout, stderr = Command('/tmp').execute( |
|
398 | stdout, stderr = Command('/tmp').execute( | |
409 | 'hg clone', clone_url, tmpdir.strpath) |
|
399 | 'hg clone', clone_url, tmpdir.strpath) | |
410 | assert 'abort: authorization failed' in stderr |
|
400 | assert 'abort: authorization failed' in stderr | |
411 |
|
401 | |||
412 | def test_clone_by_auth_token_user_disabled( |
|
402 | def test_clone_by_auth_token_user_disabled( | |
413 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
403 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
414 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
404 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
415 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
405 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
416 | user = user_util.create_user() |
|
406 | user = user_util.create_user() | |
417 | user.active = False |
|
407 | user.active = False | |
418 | Session().add(user) |
|
408 | Session().add(user) | |
419 | Session().commit() |
|
409 | Session().commit() | |
420 | token = user.auth_tokens[1] |
|
410 | token = user.auth_tokens[1] | |
421 |
|
411 | |||
422 | clone_url = rc_web_server.repo_clone_url( |
|
412 | clone_url = rc_web_server.repo_clone_url( | |
423 | HG_REPO, user=user.username, passwd=token) |
|
413 | HG_REPO, user=user.username, passwd=token) | |
424 |
|
414 | |||
425 | stdout, stderr = Command('/tmp').execute( |
|
415 | stdout, stderr = Command('/tmp').execute( | |
426 | 'hg clone', clone_url, tmpdir.strpath) |
|
416 | 'hg clone', clone_url, tmpdir.strpath) | |
427 | assert 'abort: authorization failed' in stderr |
|
417 | assert 'abort: authorization failed' in stderr | |
428 |
|
418 | |||
429 | def test_clone_by_auth_token_with_scope( |
|
419 | def test_clone_by_auth_token_with_scope( | |
430 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
420 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
431 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
421 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
432 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
422 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
433 | user = user_util.create_user() |
|
423 | user = user_util.create_user() | |
434 | auth_token = AuthTokenModel().create( |
|
424 | auth_token = AuthTokenModel().create( | |
435 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_VCS) |
|
425 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_VCS) | |
436 | token = auth_token.api_key |
|
426 | token = auth_token.api_key | |
437 |
|
427 | |||
438 | # manually set scope |
|
428 | # manually set scope | |
439 | auth_token.repo = Repository.get_by_repo_name(HG_REPO) |
|
429 | auth_token.repo = Repository.get_by_repo_name(HG_REPO) | |
440 | Session().add(auth_token) |
|
430 | Session().add(auth_token) | |
441 | Session().commit() |
|
431 | Session().commit() | |
442 |
|
432 | |||
443 | clone_url = rc_web_server.repo_clone_url( |
|
433 | clone_url = rc_web_server.repo_clone_url( | |
444 | HG_REPO, user=user.username, passwd=token) |
|
434 | HG_REPO, user=user.username, passwd=token) | |
445 |
|
435 | |||
446 | stdout, stderr = Command('/tmp').execute( |
|
436 | stdout, stderr = Command('/tmp').execute( | |
447 | 'hg clone', clone_url, tmpdir.strpath) |
|
437 | 'hg clone', clone_url, tmpdir.strpath) | |
448 | _check_proper_clone(stdout, stderr, 'hg') |
|
438 | _check_proper_clone(stdout, stderr, 'hg') | |
449 |
|
439 | |||
450 | def test_clone_by_auth_token_with_wrong_scope( |
|
440 | def test_clone_by_auth_token_with_wrong_scope( | |
451 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): |
|
441 | self, rc_web_server, tmpdir, user_util, enable_auth_plugins): | |
452 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', |
|
442 | enable_auth_plugins(['egg:rhodecode-enterprise-ce#token', | |
453 | 'egg:rhodecode-enterprise-ce#rhodecode']) |
|
443 | 'egg:rhodecode-enterprise-ce#rhodecode']) | |
454 | user = user_util.create_user() |
|
444 | user = user_util.create_user() | |
455 | auth_token = AuthTokenModel().create( |
|
445 | auth_token = AuthTokenModel().create( | |
456 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_VCS) |
|
446 | user.user_id, 'test-token', -1, AuthTokenModel.cls.ROLE_VCS) | |
457 | token = auth_token.api_key |
|
447 | token = auth_token.api_key | |
458 |
|
448 | |||
459 | # manually set scope |
|
449 | # manually set scope | |
460 | auth_token.repo = Repository.get_by_repo_name(GIT_REPO) |
|
450 | auth_token.repo = Repository.get_by_repo_name(GIT_REPO) | |
461 | Session().add(auth_token) |
|
451 | Session().add(auth_token) | |
462 | Session().commit() |
|
452 | Session().commit() | |
463 |
|
453 | |||
464 | clone_url = rc_web_server.repo_clone_url( |
|
454 | clone_url = rc_web_server.repo_clone_url( | |
465 | HG_REPO, user=user.username, passwd=token) |
|
455 | HG_REPO, user=user.username, passwd=token) | |
466 |
|
456 | |||
467 | stdout, stderr = Command('/tmp').execute( |
|
457 | stdout, stderr = Command('/tmp').execute( | |
468 | 'hg clone', clone_url, tmpdir.strpath) |
|
458 | 'hg clone', clone_url, tmpdir.strpath) | |
469 | assert 'abort: authorization failed' in stderr |
|
459 | assert 'abort: authorization failed' in stderr | |
470 |
|
460 | |||
471 |
|
||||
472 | @pytest.mark.usefixtures("disable_locking") |
|
|||
473 | class TestVCSOperationsSpecial(object): |
|
|||
474 |
|
||||
475 | def test_git_sets_default_branch_if_not_master( |
|
|||
476 | self, backend_git, tmpdir, rc_web_server): |
|
|||
477 | empty_repo = backend_git.create_repo() |
|
|||
478 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) |
|
|||
479 |
|
||||
480 | cmd = Command(tmpdir.strpath) |
|
|||
481 | cmd.execute('git clone', clone_url) |
|
|||
482 |
|
||||
483 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
484 | repo.in_memory_commit.add(FileNode('file', content='')) |
|
|||
485 | repo.in_memory_commit.commit( |
|
|||
486 | message='Commit on branch test', |
|
|||
487 | author='Automatic test', |
|
|||
488 | branch='test') |
|
|||
489 |
|
||||
490 | repo_cmd = Command(repo.path) |
|
|||
491 | stdout, stderr = repo_cmd.execute('git push --verbose origin test') |
|
|||
492 | _check_proper_git_push( |
|
|||
493 | stdout, stderr, branch='test', should_set_default_branch=True) |
|
|||
494 |
|
||||
495 | stdout, stderr = cmd.execute( |
|
|||
496 | 'git clone', clone_url, empty_repo.repo_name + '-clone') |
|
|||
497 | _check_proper_clone(stdout, stderr, 'git') |
|
|||
498 |
|
||||
499 | # Doing an explicit commit in order to get latest user logs on MySQL |
|
|||
500 | Session().commit() |
|
|||
501 |
|
||||
502 | def test_git_fetches_from_remote_repository_with_annotated_tags( |
|
|||
503 | self, backend_git, rc_web_server): |
|
|||
504 | # Note: This is a test specific to the git backend. It checks the |
|
|||
505 | # integration of fetching from a remote repository which contains |
|
|||
506 | # annotated tags. |
|
|||
507 |
|
||||
508 | # Dulwich shows this specific behavior only when |
|
|||
509 | # operating against a remote repository. |
|
|||
510 | source_repo = backend_git['annotated-tag'] |
|
|||
511 | target_vcs_repo = backend_git.create_repo().scm_instance() |
|
|||
512 | target_vcs_repo.fetch(rc_web_server.repo_clone_url(source_repo.repo_name)) |
|
|||
513 |
|
||||
514 | def test_git_push_shows_pull_request_refs(self, backend_git, rc_web_server, tmpdir): |
|
|||
515 | """ |
|
|||
516 | test if remote info about refs is visible |
|
|||
517 | """ |
|
|||
518 | empty_repo = backend_git.create_repo() |
|
|||
519 |
|
||||
520 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) |
|
|||
521 |
|
||||
522 | cmd = Command(tmpdir.strpath) |
|
|||
523 | cmd.execute('git clone', clone_url) |
|
|||
524 |
|
||||
525 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
526 | repo.in_memory_commit.add(FileNode('readme.md', content='## Hello')) |
|
|||
527 | repo.in_memory_commit.commit( |
|
|||
528 | message='Commit on branch Master', |
|
|||
529 | author='Automatic test', |
|
|||
530 | branch='master') |
|
|||
531 |
|
||||
532 | repo_cmd = Command(repo.path) |
|
|||
533 | stdout, stderr = repo_cmd.execute('git push --verbose origin master') |
|
|||
534 | _check_proper_git_push(stdout, stderr, branch='master') |
|
|||
535 |
|
||||
536 | ref = '{}/{}/pull-request/new?branch=master'.format( |
|
|||
537 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
538 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr |
|
|||
539 | assert 'remote: RhodeCode: push completed' in stderr |
|
|||
540 |
|
||||
541 | # push on the same branch |
|
|||
542 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
543 | repo.in_memory_commit.add(FileNode('setup.py', content='print\n')) |
|
|||
544 | repo.in_memory_commit.commit( |
|
|||
545 | message='Commit2 on branch Master', |
|
|||
546 | author='Automatic test2', |
|
|||
547 | branch='master') |
|
|||
548 |
|
||||
549 | repo_cmd = Command(repo.path) |
|
|||
550 | stdout, stderr = repo_cmd.execute('git push --verbose origin master') |
|
|||
551 | _check_proper_git_push(stdout, stderr, branch='master') |
|
|||
552 |
|
||||
553 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr |
|
|||
554 | assert 'remote: RhodeCode: push completed' in stderr |
|
|||
555 |
|
||||
556 | # new Branch |
|
|||
557 | repo = GitRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
558 | repo.in_memory_commit.add(FileNode('feature1.py', content='## Hello world')) |
|
|||
559 | repo.in_memory_commit.commit( |
|
|||
560 | message='Commit on branch feature', |
|
|||
561 | author='Automatic test', |
|
|||
562 | branch='feature') |
|
|||
563 |
|
||||
564 | repo_cmd = Command(repo.path) |
|
|||
565 | stdout, stderr = repo_cmd.execute('git push --verbose origin feature') |
|
|||
566 | _check_proper_git_push(stdout, stderr, branch='feature') |
|
|||
567 |
|
||||
568 | ref = '{}/{}/pull-request/new?branch=feature'.format( |
|
|||
569 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
570 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stderr |
|
|||
571 | assert 'remote: RhodeCode: push completed' in stderr |
|
|||
572 |
|
||||
573 | def test_hg_push_shows_pull_request_refs(self, backend_hg, rc_web_server, tmpdir): |
|
|||
574 | empty_repo = backend_hg.create_repo() |
|
|||
575 |
|
||||
576 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) |
|
|||
577 |
|
||||
578 | cmd = Command(tmpdir.strpath) |
|
|||
579 | cmd.execute('hg clone', clone_url) |
|
|||
580 |
|
||||
581 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
582 | repo.in_memory_commit.add(FileNode(u'readme.md', content=u'## Hello')) |
|
|||
583 | repo.in_memory_commit.commit( |
|
|||
584 | message=u'Commit on branch default', |
|
|||
585 | author=u'Automatic test', |
|
|||
586 | branch='default') |
|
|||
587 |
|
||||
588 | repo_cmd = Command(repo.path) |
|
|||
589 | repo_cmd.execute('hg checkout default') |
|
|||
590 |
|
||||
591 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) |
|
|||
592 | _check_proper_hg_push(stdout, stderr, branch='default') |
|
|||
593 |
|
||||
594 | ref = '{}/{}/pull-request/new?branch=default'.format( |
|
|||
595 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
596 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
597 | assert 'remote: RhodeCode: push completed' in stdout |
|
|||
598 |
|
||||
599 | # push on the same branch |
|
|||
600 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
601 | repo.in_memory_commit.add(FileNode(u'setup.py', content=u'print\n')) |
|
|||
602 | repo.in_memory_commit.commit( |
|
|||
603 | message=u'Commit2 on branch default', |
|
|||
604 | author=u'Automatic test2', |
|
|||
605 | branch=u'default') |
|
|||
606 |
|
||||
607 | repo_cmd = Command(repo.path) |
|
|||
608 | repo_cmd.execute('hg checkout default') |
|
|||
609 |
|
||||
610 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) |
|
|||
611 | _check_proper_hg_push(stdout, stderr, branch='default') |
|
|||
612 |
|
||||
613 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
614 | assert 'remote: RhodeCode: push completed' in stdout |
|
|||
615 |
|
||||
616 | # new Branch |
|
|||
617 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
618 | repo.in_memory_commit.add(FileNode(u'feature1.py', content=u'## Hello world')) |
|
|||
619 | repo.in_memory_commit.commit( |
|
|||
620 | message=u'Commit on branch feature', |
|
|||
621 | author=u'Automatic test', |
|
|||
622 | branch=u'feature') |
|
|||
623 |
|
||||
624 | repo_cmd = Command(repo.path) |
|
|||
625 | repo_cmd.execute('hg checkout feature') |
|
|||
626 |
|
||||
627 | stdout, stderr = repo_cmd.execute('hg push --new-branch --verbose', clone_url) |
|
|||
628 | _check_proper_hg_push(stdout, stderr, branch='feature') |
|
|||
629 |
|
||||
630 | ref = '{}/{}/pull-request/new?branch=feature'.format( |
|
|||
631 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
632 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
633 | assert 'remote: RhodeCode: push completed' in stdout |
|
|||
634 |
|
||||
635 | def test_hg_push_shows_pull_request_refs_book(self, backend_hg, rc_web_server, tmpdir): |
|
|||
636 | empty_repo = backend_hg.create_repo() |
|
|||
637 |
|
||||
638 | clone_url = rc_web_server.repo_clone_url(empty_repo.repo_name) |
|
|||
639 |
|
||||
640 | cmd = Command(tmpdir.strpath) |
|
|||
641 | cmd.execute('hg clone', clone_url) |
|
|||
642 |
|
||||
643 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
644 | repo.in_memory_commit.add(FileNode(u'readme.md', content=u'## Hello')) |
|
|||
645 | repo.in_memory_commit.commit( |
|
|||
646 | message=u'Commit on branch default', |
|
|||
647 | author=u'Automatic test', |
|
|||
648 | branch='default') |
|
|||
649 |
|
||||
650 | repo_cmd = Command(repo.path) |
|
|||
651 | repo_cmd.execute('hg checkout default') |
|
|||
652 |
|
||||
653 | stdout, stderr = repo_cmd.execute('hg push --verbose', clone_url) |
|
|||
654 | _check_proper_hg_push(stdout, stderr, branch='default') |
|
|||
655 |
|
||||
656 | ref = '{}/{}/pull-request/new?branch=default'.format( |
|
|||
657 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
658 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
659 | assert 'remote: RhodeCode: push completed' in stdout |
|
|||
660 |
|
||||
661 | # add bookmark |
|
|||
662 | repo = MercurialRepository(os.path.join(tmpdir.strpath, empty_repo.repo_name)) |
|
|||
663 | repo.in_memory_commit.add(FileNode(u'setup.py', content=u'print\n')) |
|
|||
664 | repo.in_memory_commit.commit( |
|
|||
665 | message=u'Commit2 on branch default', |
|
|||
666 | author=u'Automatic test2', |
|
|||
667 | branch=u'default') |
|
|||
668 |
|
||||
669 | repo_cmd = Command(repo.path) |
|
|||
670 | repo_cmd.execute('hg checkout default') |
|
|||
671 | repo_cmd.execute('hg bookmark feature2') |
|
|||
672 | stdout, stderr = repo_cmd.execute('hg push -B feature2 --verbose', clone_url) |
|
|||
673 | _check_proper_hg_push(stdout, stderr, branch='default') |
|
|||
674 |
|
||||
675 | ref = '{}/{}/pull-request/new?branch=default'.format( |
|
|||
676 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
677 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
678 | ref = '{}/{}/pull-request/new?bookmark=feature2'.format( |
|
|||
679 | rc_web_server.host_url(), empty_repo.repo_name) |
|
|||
680 | assert 'remote: RhodeCode: open pull request link: {}'.format(ref) in stdout |
|
|||
681 | assert 'remote: RhodeCode: push completed' in stdout |
|
|||
682 | assert 'exporting bookmark feature2' in stdout |
|
@@ -1,222 +1,222 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 |
|
30 | |||
31 | import pytest |
|
31 | import pytest | |
32 |
|
32 | |||
33 | from rhodecode.model.db import User, Repository |
|
33 | from rhodecode.model.db import User, Repository | |
34 | from rhodecode.model.meta import Session |
|
34 | from rhodecode.model.meta import Session | |
35 | from rhodecode.model.repo import RepoModel |
|
35 | from rhodecode.model.repo import RepoModel | |
36 |
|
36 | |||
37 | from rhodecode.tests import ( |
|
37 | from rhodecode.tests import ( | |
38 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN, |
|
38 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN, | |
39 | TEST_USER_REGULAR_PASS) |
|
39 | TEST_USER_REGULAR_PASS) | |
40 |
from rhodecode.tests. |
|
40 | from rhodecode.tests.vcs_operations import ( | |
41 | Command, _check_proper_clone, _check_proper_git_push, _add_files_and_push) |
|
41 | Command, _check_proper_clone, _check_proper_git_push, _add_files_and_push) | |
42 |
|
42 | |||
43 |
|
43 | |||
44 | # override rc_web_server_config fixture with custom INI |
|
44 | # override rc_web_server_config fixture with custom INI | |
45 | @pytest.fixture(scope='module') |
|
45 | @pytest.fixture(scope='module') | |
46 | def rc_web_server_config(testini_factory): |
|
46 | def rc_web_server_config(testini_factory): | |
47 | CUSTOM_PARAMS = [ |
|
47 | CUSTOM_PARAMS = [ | |
48 | {'app:main': {'lock_ret_code': '423'}}, |
|
48 | {'app:main': {'lock_ret_code': '423'}}, | |
49 | ] |
|
49 | ] | |
50 | return testini_factory(CUSTOM_PARAMS) |
|
50 | return testini_factory(CUSTOM_PARAMS) | |
51 |
|
51 | |||
52 |
|
52 | |||
53 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
53 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
54 | class TestVCSOperationsOnCustomIniConfig(object): |
|
54 | class TestVCSOperationsOnCustomIniConfig(object): | |
55 |
|
55 | |||
56 | def test_clone_and_create_lock_hg(self, rc_web_server, tmpdir): |
|
56 | def test_clone_and_create_lock_hg(self, rc_web_server, tmpdir): | |
57 | # enable locking |
|
57 | # enable locking | |
58 | r = Repository.get_by_repo_name(HG_REPO) |
|
58 | r = Repository.get_by_repo_name(HG_REPO) | |
59 | r.enable_locking = True |
|
59 | r.enable_locking = True | |
60 | Session().add(r) |
|
60 | Session().add(r) | |
61 | Session().commit() |
|
61 | Session().commit() | |
62 | # clone |
|
62 | # clone | |
63 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
63 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
64 | stdout, stderr = Command('/tmp').execute( |
|
64 | stdout, stderr = Command('/tmp').execute( | |
65 | 'hg clone', clone_url, tmpdir.strpath) |
|
65 | 'hg clone', clone_url, tmpdir.strpath) | |
66 |
|
66 | |||
67 | # check if lock was made |
|
67 | # check if lock was made | |
68 | r = Repository.get_by_repo_name(HG_REPO) |
|
68 | r = Repository.get_by_repo_name(HG_REPO) | |
69 | assert r.locked[0] == User.get_by_username( |
|
69 | assert r.locked[0] == User.get_by_username( | |
70 | TEST_USER_ADMIN_LOGIN).user_id |
|
70 | TEST_USER_ADMIN_LOGIN).user_id | |
71 |
|
71 | |||
72 | def test_clone_and_create_lock_git(self, rc_web_server, tmpdir): |
|
72 | def test_clone_and_create_lock_git(self, rc_web_server, tmpdir): | |
73 | # enable locking |
|
73 | # enable locking | |
74 | r = Repository.get_by_repo_name(GIT_REPO) |
|
74 | r = Repository.get_by_repo_name(GIT_REPO) | |
75 | r.enable_locking = True |
|
75 | r.enable_locking = True | |
76 | Session().add(r) |
|
76 | Session().add(r) | |
77 | Session().commit() |
|
77 | Session().commit() | |
78 | # clone |
|
78 | # clone | |
79 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
79 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
80 | stdout, stderr = Command('/tmp').execute( |
|
80 | stdout, stderr = Command('/tmp').execute( | |
81 | 'git clone', clone_url, tmpdir.strpath) |
|
81 | 'git clone', clone_url, tmpdir.strpath) | |
82 |
|
82 | |||
83 | # check if lock was made |
|
83 | # check if lock was made | |
84 | r = Repository.get_by_repo_name(GIT_REPO) |
|
84 | r = Repository.get_by_repo_name(GIT_REPO) | |
85 | assert r.locked[0] == User.get_by_username( |
|
85 | assert r.locked[0] == User.get_by_username( | |
86 | TEST_USER_ADMIN_LOGIN).user_id |
|
86 | TEST_USER_ADMIN_LOGIN).user_id | |
87 |
|
87 | |||
88 | def test_clone_after_repo_was_locked_hg(self, rc_web_server, tmpdir): |
|
88 | def test_clone_after_repo_was_locked_hg(self, rc_web_server, tmpdir): | |
89 | # lock repo |
|
89 | # lock repo | |
90 | r = Repository.get_by_repo_name(HG_REPO) |
|
90 | r = Repository.get_by_repo_name(HG_REPO) | |
91 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
91 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
92 | # pull fails since repo is locked |
|
92 | # pull fails since repo is locked | |
93 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
93 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
94 | stdout, stderr = Command('/tmp').execute( |
|
94 | stdout, stderr = Command('/tmp').execute( | |
95 | 'hg clone', clone_url, tmpdir.strpath) |
|
95 | 'hg clone', clone_url, tmpdir.strpath) | |
96 | msg = ("""abort: HTTP Error 423: Repository `%s` locked by user `%s`""" |
|
96 | msg = ("""abort: HTTP Error 423: Repository `%s` locked by user `%s`""" | |
97 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) |
|
97 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) | |
98 | assert msg in stderr |
|
98 | assert msg in stderr | |
99 |
|
99 | |||
100 | def test_clone_after_repo_was_locked_git(self, rc_web_server, tmpdir): |
|
100 | def test_clone_after_repo_was_locked_git(self, rc_web_server, tmpdir): | |
101 | # lock repo |
|
101 | # lock repo | |
102 | r = Repository.get_by_repo_name(GIT_REPO) |
|
102 | r = Repository.get_by_repo_name(GIT_REPO) | |
103 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
103 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
104 | # pull fails since repo is locked |
|
104 | # pull fails since repo is locked | |
105 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
105 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
106 | stdout, stderr = Command('/tmp').execute( |
|
106 | stdout, stderr = Command('/tmp').execute( | |
107 | 'git clone', clone_url, tmpdir.strpath) |
|
107 | 'git clone', clone_url, tmpdir.strpath) | |
108 |
|
108 | |||
109 | lock_msg = ( |
|
109 | lock_msg = ( | |
110 | 'remote: ERROR: Repository `vcs_test_git` locked by user ' + |
|
110 | 'remote: ERROR: Repository `vcs_test_git` locked by user ' + | |
111 | '`test_admin`. Reason:`lock_auto`') |
|
111 | '`test_admin`. Reason:`lock_auto`') | |
112 | assert lock_msg in stderr |
|
112 | assert lock_msg in stderr | |
113 | assert 'remote: Pre pull hook failed: aborting' in stderr |
|
113 | assert 'remote: Pre pull hook failed: aborting' in stderr | |
114 | assert 'fatal: remote did not send all necessary objects' in stderr |
|
114 | assert 'fatal: remote did not send all necessary objects' in stderr | |
115 |
|
115 | |||
116 | def test_push_on_locked_repo_by_other_user_hg(self, rc_web_server, tmpdir): |
|
116 | def test_push_on_locked_repo_by_other_user_hg(self, rc_web_server, tmpdir): | |
117 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
117 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
118 | stdout, stderr = Command('/tmp').execute( |
|
118 | stdout, stderr = Command('/tmp').execute( | |
119 | 'hg clone', clone_url, tmpdir.strpath) |
|
119 | 'hg clone', clone_url, tmpdir.strpath) | |
120 |
|
120 | |||
121 | # lock repo |
|
121 | # lock repo | |
122 | r = Repository.get_by_repo_name(HG_REPO) |
|
122 | r = Repository.get_by_repo_name(HG_REPO) | |
123 | # let this user actually push ! |
|
123 | # let this user actually push ! | |
124 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, |
|
124 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, | |
125 | perm='repository.write') |
|
125 | perm='repository.write') | |
126 | Session().commit() |
|
126 | Session().commit() | |
127 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
127 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
128 |
|
128 | |||
129 | # push fails repo is locked by other user ! |
|
129 | # push fails repo is locked by other user ! | |
130 | push_url = rc_web_server.repo_clone_url( |
|
130 | push_url = rc_web_server.repo_clone_url( | |
131 | HG_REPO, |
|
131 | HG_REPO, | |
132 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) |
|
132 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) | |
133 | stdout, stderr = _add_files_and_push( |
|
133 | stdout, stderr = _add_files_and_push( | |
134 | 'hg', tmpdir.strpath, clone_url=push_url) |
|
134 | 'hg', tmpdir.strpath, clone_url=push_url) | |
135 | msg = ("""abort: HTTP Error 423: Repository `%s` locked by user `%s`""" |
|
135 | msg = ("""abort: HTTP Error 423: Repository `%s` locked by user `%s`""" | |
136 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) |
|
136 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) | |
137 | assert msg in stderr |
|
137 | assert msg in stderr | |
138 |
|
138 | |||
139 | def test_push_on_locked_repo_by_other_user_git( |
|
139 | def test_push_on_locked_repo_by_other_user_git( | |
140 | self, rc_web_server, tmpdir): |
|
140 | self, rc_web_server, tmpdir): | |
141 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
141 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
142 | stdout, stderr = Command('/tmp').execute( |
|
142 | stdout, stderr = Command('/tmp').execute( | |
143 | 'git clone', clone_url, tmpdir.strpath) |
|
143 | 'git clone', clone_url, tmpdir.strpath) | |
144 |
|
144 | |||
145 | # lock repo |
|
145 | # lock repo | |
146 | r = Repository.get_by_repo_name(GIT_REPO) |
|
146 | r = Repository.get_by_repo_name(GIT_REPO) | |
147 | # let this user actually push ! |
|
147 | # let this user actually push ! | |
148 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, |
|
148 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, | |
149 | perm='repository.write') |
|
149 | perm='repository.write') | |
150 | Session().commit() |
|
150 | Session().commit() | |
151 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
151 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
152 |
|
152 | |||
153 | # push fails repo is locked by other user! |
|
153 | # push fails repo is locked by other user! | |
154 | push_url = rc_web_server.repo_clone_url( |
|
154 | push_url = rc_web_server.repo_clone_url( | |
155 | GIT_REPO, |
|
155 | GIT_REPO, | |
156 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) |
|
156 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) | |
157 | stdout, stderr = _add_files_and_push( |
|
157 | stdout, stderr = _add_files_and_push( | |
158 | 'git', tmpdir.strpath, clone_url=push_url) |
|
158 | 'git', tmpdir.strpath, clone_url=push_url) | |
159 |
|
159 | |||
160 | err = 'Repository `%s` locked by user `%s`' % ( |
|
160 | err = 'Repository `%s` locked by user `%s`' % ( | |
161 | GIT_REPO, TEST_USER_ADMIN_LOGIN) |
|
161 | GIT_REPO, TEST_USER_ADMIN_LOGIN) | |
162 | # err = 'RPC failed; result=22, HTTP code = 423' |
|
162 | # err = 'RPC failed; result=22, HTTP code = 423' | |
163 | assert err in stderr |
|
163 | assert err in stderr | |
164 |
|
164 | |||
165 | def test_push_unlocks_repository_hg(self, rc_web_server, tmpdir): |
|
165 | def test_push_unlocks_repository_hg(self, rc_web_server, tmpdir): | |
166 | # enable locking |
|
166 | # enable locking | |
167 | r = Repository.get_by_repo_name(HG_REPO) |
|
167 | r = Repository.get_by_repo_name(HG_REPO) | |
168 | r.enable_locking = True |
|
168 | r.enable_locking = True | |
169 | Session().add(r) |
|
169 | Session().add(r) | |
170 | Session().commit() |
|
170 | Session().commit() | |
171 |
|
171 | |||
172 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
172 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
173 | stdout, stderr = Command('/tmp').execute( |
|
173 | stdout, stderr = Command('/tmp').execute( | |
174 | 'hg clone', clone_url, tmpdir.strpath) |
|
174 | 'hg clone', clone_url, tmpdir.strpath) | |
175 | _check_proper_clone(stdout, stderr, 'hg') |
|
175 | _check_proper_clone(stdout, stderr, 'hg') | |
176 |
|
176 | |||
177 | # check for lock repo after clone |
|
177 | # check for lock repo after clone | |
178 | r = Repository.get_by_repo_name(HG_REPO) |
|
178 | r = Repository.get_by_repo_name(HG_REPO) | |
179 | uid = User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id |
|
179 | uid = User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id | |
180 | assert r.locked[0] == uid |
|
180 | assert r.locked[0] == uid | |
181 |
|
181 | |||
182 | # push is ok and repo is now unlocked |
|
182 | # push is ok and repo is now unlocked | |
183 | stdout, stderr = _add_files_and_push( |
|
183 | stdout, stderr = _add_files_and_push( | |
184 | 'hg', tmpdir.strpath, clone_url=clone_url) |
|
184 | 'hg', tmpdir.strpath, clone_url=clone_url) | |
185 | assert ('remote: Released lock on repo `%s`' % HG_REPO) in stdout |
|
185 | assert ('remote: Released lock on repo `%s`' % HG_REPO) in stdout | |
186 | # we need to cleanup the Session Here ! |
|
186 | # we need to cleanup the Session Here ! | |
187 | Session.remove() |
|
187 | Session.remove() | |
188 | r = Repository.get_by_repo_name(HG_REPO) |
|
188 | r = Repository.get_by_repo_name(HG_REPO) | |
189 | assert r.locked == [None, None, None] |
|
189 | assert r.locked == [None, None, None] | |
190 |
|
190 | |||
191 | def test_push_unlocks_repository_git(self, rc_web_server, tmpdir): |
|
191 | def test_push_unlocks_repository_git(self, rc_web_server, tmpdir): | |
192 |
|
192 | |||
193 | # Note: Did a first debugging session. Seems that |
|
193 | # Note: Did a first debugging session. Seems that | |
194 | # Repository.get_locking_state is called twice. The second call |
|
194 | # Repository.get_locking_state is called twice. The second call | |
195 | # has the action "pull" and does not reset the lock. |
|
195 | # has the action "pull" and does not reset the lock. | |
196 |
|
196 | |||
197 | # enable locking |
|
197 | # enable locking | |
198 | r = Repository.get_by_repo_name(GIT_REPO) |
|
198 | r = Repository.get_by_repo_name(GIT_REPO) | |
199 | r.enable_locking = True |
|
199 | r.enable_locking = True | |
200 | Session().add(r) |
|
200 | Session().add(r) | |
201 | Session().commit() |
|
201 | Session().commit() | |
202 |
|
202 | |||
203 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
203 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
204 | stdout, stderr = Command('/tmp').execute( |
|
204 | stdout, stderr = Command('/tmp').execute( | |
205 | 'git clone', clone_url, tmpdir.strpath) |
|
205 | 'git clone', clone_url, tmpdir.strpath) | |
206 | _check_proper_clone(stdout, stderr, 'git') |
|
206 | _check_proper_clone(stdout, stderr, 'git') | |
207 |
|
207 | |||
208 | # check for lock repo after clone |
|
208 | # check for lock repo after clone | |
209 | r = Repository.get_by_repo_name(GIT_REPO) |
|
209 | r = Repository.get_by_repo_name(GIT_REPO) | |
210 | assert r.locked[0] == User.get_by_username( |
|
210 | assert r.locked[0] == User.get_by_username( | |
211 | TEST_USER_ADMIN_LOGIN).user_id |
|
211 | TEST_USER_ADMIN_LOGIN).user_id | |
212 |
|
212 | |||
213 | # push is ok and repo is now unlocked |
|
213 | # push is ok and repo is now unlocked | |
214 | stdout, stderr = _add_files_and_push( |
|
214 | stdout, stderr = _add_files_and_push( | |
215 | 'git', tmpdir.strpath, clone_url=clone_url) |
|
215 | 'git', tmpdir.strpath, clone_url=clone_url) | |
216 | _check_proper_git_push(stdout, stderr) |
|
216 | _check_proper_git_push(stdout, stderr) | |
217 |
|
217 | |||
218 | # assert ('remote: Released lock on repo `%s`' % GIT_REPO) in stdout |
|
218 | # assert ('remote: Released lock on repo `%s`' % GIT_REPO) in stdout | |
219 | # we need to cleanup the Session Here ! |
|
219 | # we need to cleanup the Session Here ! | |
220 | Session.remove() |
|
220 | Session.remove() | |
221 | r = Repository.get_by_repo_name(GIT_REPO) |
|
221 | r = Repository.get_by_repo_name(GIT_REPO) | |
222 | assert r.locked == [None, None, None] |
|
222 | assert r.locked == [None, None, None] |
@@ -1,130 +1,130 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 |
|
30 | |||
31 | import pytest |
|
31 | import pytest | |
32 |
|
32 | |||
33 | from rhodecode.model.db import User, Repository |
|
33 | from rhodecode.model.db import User, Repository | |
34 | from rhodecode.model.meta import Session |
|
34 | from rhodecode.model.meta import Session | |
35 | from rhodecode.model.repo import RepoModel |
|
35 | from rhodecode.model.repo import RepoModel | |
36 |
|
36 | |||
37 | from rhodecode.tests import ( |
|
37 | from rhodecode.tests import ( | |
38 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN, |
|
38 | GIT_REPO, HG_REPO, TEST_USER_ADMIN_LOGIN, TEST_USER_REGULAR_LOGIN, | |
39 | TEST_USER_REGULAR_PASS) |
|
39 | TEST_USER_REGULAR_PASS) | |
40 |
from rhodecode.tests |
|
40 | from rhodecode.tests.vcs_operations import Command, _add_files_and_push | |
41 |
|
41 | |||
42 |
|
42 | |||
43 | # override rc_web_server_config fixture with custom INI |
|
43 | # override rc_web_server_config fixture with custom INI | |
44 | @pytest.fixture(scope='module') |
|
44 | @pytest.fixture(scope='module') | |
45 | def rc_web_server_config(testini_factory): |
|
45 | def rc_web_server_config(testini_factory): | |
46 | CUSTOM_PARAMS = [ |
|
46 | CUSTOM_PARAMS = [ | |
47 | {'app:main': {'lock_ret_code': '400'}}, |
|
47 | {'app:main': {'lock_ret_code': '400'}}, | |
48 | ] |
|
48 | ] | |
49 | return testini_factory(CUSTOM_PARAMS) |
|
49 | return testini_factory(CUSTOM_PARAMS) | |
50 |
|
50 | |||
51 |
|
51 | |||
52 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") |
|
52 | @pytest.mark.usefixtures("disable_locking", "disable_anonymous_user") | |
53 | class TestVCSOperationsOnCustomIniConfig(object): |
|
53 | class TestVCSOperationsOnCustomIniConfig(object): | |
54 |
|
54 | |||
55 | def test_clone_after_repo_was_locked_hg(self, rc_web_server, tmpdir): |
|
55 | def test_clone_after_repo_was_locked_hg(self, rc_web_server, tmpdir): | |
56 | # lock repo |
|
56 | # lock repo | |
57 | r = Repository.get_by_repo_name(HG_REPO) |
|
57 | r = Repository.get_by_repo_name(HG_REPO) | |
58 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
58 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
59 | # pull fails since repo is locked |
|
59 | # pull fails since repo is locked | |
60 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
60 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
61 | stdout, stderr = Command('/tmp').execute( |
|
61 | stdout, stderr = Command('/tmp').execute( | |
62 | 'hg clone', clone_url, tmpdir.strpath) |
|
62 | 'hg clone', clone_url, tmpdir.strpath) | |
63 | msg = ("""abort: HTTP Error 400: Repository `%s` locked by user `%s`""" |
|
63 | msg = ("""abort: HTTP Error 400: Repository `%s` locked by user `%s`""" | |
64 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) |
|
64 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) | |
65 | assert msg in stderr |
|
65 | assert msg in stderr | |
66 |
|
66 | |||
67 | def test_clone_after_repo_was_locked_git(self, rc_web_server, tmpdir): |
|
67 | def test_clone_after_repo_was_locked_git(self, rc_web_server, tmpdir): | |
68 | # lock repo |
|
68 | # lock repo | |
69 | r = Repository.get_by_repo_name(GIT_REPO) |
|
69 | r = Repository.get_by_repo_name(GIT_REPO) | |
70 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
70 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
71 | # pull fails since repo is locked |
|
71 | # pull fails since repo is locked | |
72 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
72 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
73 | stdout, stderr = Command('/tmp').execute( |
|
73 | stdout, stderr = Command('/tmp').execute( | |
74 | 'git clone', clone_url, tmpdir.strpath) |
|
74 | 'git clone', clone_url, tmpdir.strpath) | |
75 |
|
75 | |||
76 | lock_msg = ( |
|
76 | lock_msg = ( | |
77 | 'remote: ERROR: Repository `vcs_test_git` locked by user ' + |
|
77 | 'remote: ERROR: Repository `vcs_test_git` locked by user ' + | |
78 | '`test_admin`. Reason:`lock_auto`') |
|
78 | '`test_admin`. Reason:`lock_auto`') | |
79 | assert lock_msg in stderr |
|
79 | assert lock_msg in stderr | |
80 | assert 'remote: Pre pull hook failed: aborting' in stderr |
|
80 | assert 'remote: Pre pull hook failed: aborting' in stderr | |
81 | assert 'fatal: remote did not send all necessary objects' in stderr |
|
81 | assert 'fatal: remote did not send all necessary objects' in stderr | |
82 |
|
82 | |||
83 | def test_push_on_locked_repo_by_other_user_hg(self, rc_web_server, tmpdir): |
|
83 | def test_push_on_locked_repo_by_other_user_hg(self, rc_web_server, tmpdir): | |
84 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
84 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
85 | stdout, stderr = Command('/tmp').execute( |
|
85 | stdout, stderr = Command('/tmp').execute( | |
86 | 'hg clone', clone_url, tmpdir.strpath) |
|
86 | 'hg clone', clone_url, tmpdir.strpath) | |
87 |
|
87 | |||
88 | # lock repo |
|
88 | # lock repo | |
89 | r = Repository.get_by_repo_name(HG_REPO) |
|
89 | r = Repository.get_by_repo_name(HG_REPO) | |
90 | # let this user actually push ! |
|
90 | # let this user actually push ! | |
91 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, |
|
91 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, | |
92 | perm='repository.write') |
|
92 | perm='repository.write') | |
93 | Session().commit() |
|
93 | Session().commit() | |
94 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
94 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
95 |
|
95 | |||
96 | # push fails repo is locked by other user ! |
|
96 | # push fails repo is locked by other user ! | |
97 | push_url = rc_web_server.repo_clone_url( |
|
97 | push_url = rc_web_server.repo_clone_url( | |
98 | HG_REPO, |
|
98 | HG_REPO, | |
99 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) |
|
99 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) | |
100 | stdout, stderr = _add_files_and_push( |
|
100 | stdout, stderr = _add_files_and_push( | |
101 | 'hg', tmpdir.strpath, clone_url=push_url) |
|
101 | 'hg', tmpdir.strpath, clone_url=push_url) | |
102 | msg = ("""abort: HTTP Error 400: Repository `%s` locked by user `%s`""" |
|
102 | msg = ("""abort: HTTP Error 400: Repository `%s` locked by user `%s`""" | |
103 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) |
|
103 | % (HG_REPO, TEST_USER_ADMIN_LOGIN)) | |
104 | assert msg in stderr |
|
104 | assert msg in stderr | |
105 |
|
105 | |||
106 | def test_push_on_locked_repo_by_other_user_git( |
|
106 | def test_push_on_locked_repo_by_other_user_git( | |
107 | self, rc_web_server, tmpdir): |
|
107 | self, rc_web_server, tmpdir): | |
108 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
108 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
109 | stdout, stderr = Command('/tmp').execute( |
|
109 | stdout, stderr = Command('/tmp').execute( | |
110 | 'git clone', clone_url, tmpdir.strpath) |
|
110 | 'git clone', clone_url, tmpdir.strpath) | |
111 |
|
111 | |||
112 | # lock repo |
|
112 | # lock repo | |
113 | r = Repository.get_by_repo_name(GIT_REPO) |
|
113 | r = Repository.get_by_repo_name(GIT_REPO) | |
114 | # let this user actually push ! |
|
114 | # let this user actually push ! | |
115 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, |
|
115 | RepoModel().grant_user_permission(repo=r, user=TEST_USER_REGULAR_LOGIN, | |
116 | perm='repository.write') |
|
116 | perm='repository.write') | |
117 | Session().commit() |
|
117 | Session().commit() | |
118 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) |
|
118 | Repository.lock(r, User.get_by_username(TEST_USER_ADMIN_LOGIN).user_id) | |
119 |
|
119 | |||
120 | # push fails repo is locked by other user! |
|
120 | # push fails repo is locked by other user! | |
121 | push_url = rc_web_server.repo_clone_url( |
|
121 | push_url = rc_web_server.repo_clone_url( | |
122 | GIT_REPO, |
|
122 | GIT_REPO, | |
123 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) |
|
123 | user=TEST_USER_REGULAR_LOGIN, passwd=TEST_USER_REGULAR_PASS) | |
124 | stdout, stderr = _add_files_and_push( |
|
124 | stdout, stderr = _add_files_and_push( | |
125 | 'git', tmpdir.strpath, clone_url=push_url) |
|
125 | 'git', tmpdir.strpath, clone_url=push_url) | |
126 |
|
126 | |||
127 | err = 'Repository `%s` locked by user `%s`' % ( |
|
127 | err = 'Repository `%s` locked by user `%s`' % ( | |
128 | GIT_REPO, TEST_USER_ADMIN_LOGIN) |
|
128 | GIT_REPO, TEST_USER_ADMIN_LOGIN) | |
129 |
|
129 | |||
130 | assert err in stderr |
|
130 | assert err in stderr |
@@ -1,146 +1,141 b'' | |||||
1 | # -*- coding: utf-8 -*- |
|
1 | # -*- coding: utf-8 -*- | |
2 |
|
2 | |||
3 | # Copyright (C) 2010-2017 RhodeCode GmbH |
|
3 | # Copyright (C) 2010-2017 RhodeCode GmbH | |
4 | # |
|
4 | # | |
5 | # This program is free software: you can redistribute it and/or modify |
|
5 | # This program is free software: you can redistribute it and/or modify | |
6 | # it under the terms of the GNU Affero General Public License, version 3 |
|
6 | # it under the terms of the GNU Affero General Public License, version 3 | |
7 | # (only), as published by the Free Software Foundation. |
|
7 | # (only), as published by the Free Software Foundation. | |
8 | # |
|
8 | # | |
9 | # This program is distributed in the hope that it will be useful, |
|
9 | # This program is distributed in the hope that it will be useful, | |
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
10 | # but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
11 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | # GNU General Public License for more details. |
|
12 | # GNU General Public License for more details. | |
13 | # |
|
13 | # | |
14 | # You should have received a copy of the GNU Affero General Public License |
|
14 | # You should have received a copy of the GNU Affero General Public License | |
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
15 | # along with this program. If not, see <http://www.gnu.org/licenses/>. | |
16 | # |
|
16 | # | |
17 | # This program is dual-licensed. If you wish to learn more about the |
|
17 | # This program is dual-licensed. If you wish to learn more about the | |
18 | # RhodeCode Enterprise Edition, including its added features, Support services, |
|
18 | # RhodeCode Enterprise Edition, including its added features, Support services, | |
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ |
|
19 | # and proprietary license terms, please see https://rhodecode.com/licenses/ | |
20 |
|
20 | |||
21 | """ |
|
21 | """ | |
22 | Test suite for making push/pull operations, on specially modified INI files |
|
22 | Test suite for making push/pull operations, on specially modified INI files | |
23 |
|
23 | |||
24 | .. important:: |
|
24 | .. important:: | |
25 |
|
25 | |||
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started |
|
26 | You must have git >= 1.8.5 for tests to work fine. With 68b939b git started | |
27 | to redirect things to stderr instead of stdout. |
|
27 | to redirect things to stderr instead of stdout. | |
28 | """ |
|
28 | """ | |
29 |
|
29 | |||
30 | import pytest |
|
30 | import pytest | |
31 | import requests |
|
31 | import requests | |
32 |
|
32 | |||
33 | from rhodecode import events |
|
33 | from rhodecode import events | |
34 | from rhodecode.model.db import Integration |
|
34 | from rhodecode.model.db import Integration | |
35 | from rhodecode.model.integration import IntegrationModel |
|
35 | from rhodecode.model.integration import IntegrationModel | |
36 | from rhodecode.model.meta import Session |
|
36 | from rhodecode.model.meta import Session | |
37 |
|
37 | |||
38 | from rhodecode.tests import GIT_REPO, HG_REPO |
|
38 | from rhodecode.tests import GIT_REPO, HG_REPO | |
39 |
from rhodecode.tests |
|
39 | from rhodecode.tests.vcs_operations import Command, _add_files_and_push | |
40 | from rhodecode.integrations.types.webhook import WebhookIntegrationType |
|
40 | from rhodecode.integrations.types.webhook import WebhookIntegrationType | |
41 |
|
41 | |||
42 |
|
42 | |||
43 | def check_connection(): |
|
43 | def check_connection(): | |
44 | try: |
|
44 | try: | |
45 | response = requests.get('http://httpbin.org') |
|
45 | response = requests.get('http://httpbin.org') | |
46 | return response.status_code == 200 |
|
46 | return response.status_code == 200 | |
47 | except Exception as e: |
|
47 | except Exception as e: | |
48 | print(e) |
|
48 | print(e) | |
49 |
|
49 | |||
50 | return False |
|
50 | return False | |
51 |
|
51 | |||
52 |
|
52 | |||
53 | connection_available = pytest.mark.skipif( |
|
53 | connection_available = pytest.mark.skipif( | |
54 | not check_connection(), reason="No outside internet connection available") |
|
54 | not check_connection(), reason="No outside internet connection available") | |
55 |
|
55 | |||
56 |
|
56 | |||
57 | @pytest.fixture |
|
57 | @pytest.fixture | |
58 | def enable_webhook_push_integration(request): |
|
58 | def enable_webhook_push_integration(request): | |
59 | integration = Integration() |
|
59 | integration = Integration() | |
60 | integration.integration_type = WebhookIntegrationType.key |
|
60 | integration.integration_type = WebhookIntegrationType.key | |
61 | Session().add(integration) |
|
61 | Session().add(integration) | |
62 |
|
62 | |||
63 | settings = dict( |
|
63 | settings = dict( | |
64 | url='http://httpbin.org', |
|
64 | url='http://httpbin.org', | |
65 | secret_token='secret', |
|
65 | secret_token='secret', | |
66 | username=None, |
|
66 | username=None, | |
67 | password=None, |
|
67 | password=None, | |
68 | custom_header_key=None, |
|
68 | custom_header_key=None, | |
69 | custom_header_val=None, |
|
69 | custom_header_val=None, | |
70 | method_type='get', |
|
70 | method_type='get', | |
71 | events=[events.RepoPushEvent.name], |
|
71 | events=[events.RepoPushEvent.name], | |
72 | log_data=True |
|
72 | log_data=True | |
73 | ) |
|
73 | ) | |
74 |
|
74 | |||
75 | IntegrationModel().update_integration( |
|
75 | IntegrationModel().update_integration( | |
76 | integration, |
|
76 | integration, | |
77 | name='IntegrationWebhookTest', |
|
77 | name='IntegrationWebhookTest', | |
78 | enabled=True, |
|
78 | enabled=True, | |
79 | settings=settings, |
|
79 | settings=settings, | |
80 | repo=None, |
|
80 | repo=None, | |
81 | repo_group=None, |
|
81 | repo_group=None, | |
82 | child_repos_only=False, |
|
82 | child_repos_only=False, | |
83 | ) |
|
83 | ) | |
84 | Session().commit() |
|
84 | Session().commit() | |
85 | integration_id = integration.integration_id |
|
85 | integration_id = integration.integration_id | |
86 |
|
86 | |||
87 | @request.addfinalizer |
|
87 | @request.addfinalizer | |
88 | def cleanup(): |
|
88 | def cleanup(): | |
89 | integration = Integration.get(integration_id) |
|
89 | integration = Integration.get(integration_id) | |
90 | Session().delete(integration) |
|
90 | Session().delete(integration) | |
91 | Session().commit() |
|
91 | Session().commit() | |
92 |
|
92 | |||
93 |
|
93 | |||
94 | @pytest.fixture(scope="session") |
|
|||
95 | def vcs_server_config_override(): |
|
|||
96 | return ({'server:main': {'workers': 2}},) |
|
|||
97 |
|
||||
98 |
|
||||
99 | @pytest.mark.usefixtures( |
|
94 | @pytest.mark.usefixtures( | |
100 | "disable_locking", "disable_anonymous_user", |
|
95 | "disable_locking", "disable_anonymous_user", | |
101 | "enable_webhook_push_integration") |
|
96 | "enable_webhook_push_integration") | |
102 | class TestVCSOperationsOnCustomIniConfig(object): |
|
97 | class TestVCSOperationsOnCustomIniConfig(object): | |
103 |
|
98 | |||
104 | def test_push_tag_with_commit_hg(self, rc_web_server, tmpdir): |
|
99 | def test_push_tag_with_commit_hg(self, rc_web_server, tmpdir): | |
105 | clone_url = rc_web_server.repo_clone_url(HG_REPO) |
|
100 | clone_url = rc_web_server.repo_clone_url(HG_REPO) | |
106 | stdout, stderr = Command('/tmp').execute( |
|
101 | stdout, stderr = Command('/tmp').execute( | |
107 | 'hg clone', clone_url, tmpdir.strpath) |
|
102 | 'hg clone', clone_url, tmpdir.strpath) | |
108 |
|
103 | |||
109 | push_url = rc_web_server.repo_clone_url(HG_REPO) |
|
104 | push_url = rc_web_server.repo_clone_url(HG_REPO) | |
110 | _add_files_and_push( |
|
105 | _add_files_and_push( | |
111 | 'hg', tmpdir.strpath, clone_url=push_url, |
|
106 | 'hg', tmpdir.strpath, clone_url=push_url, | |
112 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) |
|
107 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) | |
113 |
|
108 | |||
114 | rc_log = rc_web_server.get_rc_log() |
|
109 | rc_log = rc_web_server.get_rc_log() | |
115 | assert 'ERROR' not in rc_log |
|
110 | assert 'ERROR' not in rc_log | |
116 | assert "'name': u'v1.0.0'" in rc_log |
|
111 | assert "'name': u'v1.0.0'" in rc_log | |
117 |
|
112 | |||
118 | def test_push_tag_with_commit_git( |
|
113 | def test_push_tag_with_commit_git( | |
119 | self, rc_web_server, tmpdir): |
|
114 | self, rc_web_server, tmpdir): | |
120 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
115 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
121 | stdout, stderr = Command('/tmp').execute( |
|
116 | stdout, stderr = Command('/tmp').execute( | |
122 | 'git clone', clone_url, tmpdir.strpath) |
|
117 | 'git clone', clone_url, tmpdir.strpath) | |
123 |
|
118 | |||
124 | push_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
119 | push_url = rc_web_server.repo_clone_url(GIT_REPO) | |
125 | _add_files_and_push( |
|
120 | _add_files_and_push( | |
126 | 'git', tmpdir.strpath, clone_url=push_url, |
|
121 | 'git', tmpdir.strpath, clone_url=push_url, | |
127 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) |
|
122 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) | |
128 |
|
123 | |||
129 | rc_log = rc_web_server.get_rc_log() |
|
124 | rc_log = rc_web_server.get_rc_log() | |
130 | assert 'ERROR' not in rc_log |
|
125 | assert 'ERROR' not in rc_log | |
131 | assert "'name': u'v1.0.0'" in rc_log |
|
126 | assert "'name': u'v1.0.0'" in rc_log | |
132 |
|
127 | |||
133 | def test_push_tag_with_no_commit_git( |
|
128 | def test_push_tag_with_no_commit_git( | |
134 | self, rc_web_server, tmpdir): |
|
129 | self, rc_web_server, tmpdir): | |
135 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
130 | clone_url = rc_web_server.repo_clone_url(GIT_REPO) | |
136 | stdout, stderr = Command('/tmp').execute( |
|
131 | stdout, stderr = Command('/tmp').execute( | |
137 | 'git clone', clone_url, tmpdir.strpath) |
|
132 | 'git clone', clone_url, tmpdir.strpath) | |
138 |
|
133 | |||
139 | push_url = rc_web_server.repo_clone_url(GIT_REPO) |
|
134 | push_url = rc_web_server.repo_clone_url(GIT_REPO) | |
140 | _add_files_and_push( |
|
135 | _add_files_and_push( | |
141 | 'git', tmpdir.strpath, clone_url=push_url, |
|
136 | 'git', tmpdir.strpath, clone_url=push_url, | |
142 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) |
|
137 | tags=[{'name': 'v1.0.0', 'commit': 'added tag v1.0.0'}]) | |
143 |
|
138 | |||
144 | rc_log = rc_web_server.get_rc_log() |
|
139 | rc_log = rc_web_server.get_rc_log() | |
145 | assert 'ERROR' not in rc_log |
|
140 | assert 'ERROR' not in rc_log | |
146 | assert "'name': u'v1.0.0'" in rc_log |
|
141 | assert "'name': u'v1.0.0'" in rc_log |
General Comments 0
You need to be logged in to leave comments.
Login now