You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

api_packages_chef_test.go 18KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560
  1. // Copyright 2023 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "archive/tar"
  6. "bytes"
  7. "compress/gzip"
  8. "crypto"
  9. "crypto/rand"
  10. "crypto/rsa"
  11. "crypto/sha1"
  12. "crypto/x509"
  13. "encoding/base64"
  14. "encoding/pem"
  15. "fmt"
  16. "hash"
  17. "math/big"
  18. "mime/multipart"
  19. "net/http"
  20. "path"
  21. "strings"
  22. "testing"
  23. "time"
  24. "code.gitea.io/gitea/models/db"
  25. "code.gitea.io/gitea/models/packages"
  26. "code.gitea.io/gitea/models/unittest"
  27. user_model "code.gitea.io/gitea/models/user"
  28. chef_module "code.gitea.io/gitea/modules/packages/chef"
  29. "code.gitea.io/gitea/modules/setting"
  30. chef_router "code.gitea.io/gitea/routers/api/packages/chef"
  31. "code.gitea.io/gitea/tests"
  32. "github.com/minio/sha256-simd"
  33. "github.com/stretchr/testify/assert"
  34. )
  35. func TestPackageChef(t *testing.T) {
  36. defer tests.PrepareTestEnv(t)()
  37. user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
  38. privPem := `-----BEGIN RSA PRIVATE KEY-----
  39. MIIEpQIBAAKCAQEAtWp2PZz4TSU5A6ixw41HdbfBuGJwPuTtrsdoUf0DQ0/DJBNP
  40. qOCBAgEu6ZdUqIbWJ5Da+nevjtncy5hENdi6XrXjyzlUxghMuXjE5SeLGpgfQvkq
  41. bTkYaFpMe8PTzNeze3fei8+Eu6mzeb6g1GrqXznuPIc7bNss0w5iX9RiBM9dWPuX
  42. onx9xSEy0LYqJm7yXmshNe1aRwkjG/y5C26BzBFnMKp9YRTua0DO1WqLNhcaRnda
  43. lIFYouDNVTbwxSlYL16bZVoebqzZvLGrPvZJkPuCu6vH9brvOuYo0q8hLVNkBeXc
  44. imRpsDjLhQYzEJjoMTbaiVGnjBky+PWNiofJnwIDAQABAoIBAQCotF1KxLt/ejr/
  45. 9ROCh9JJXV3v6tL5GgkSPOv9Oq2bHgSZer/cixJNW+5VWd5nbiSe3K1WuJBw5pbW
  46. Wj4sWORPiRRR+3mjQzqeS/nGJDTOwWJo9K8IrUzOVhLEEYLX/ksxaXJyT8PehFyb
  47. vbNwdhCIB6ZNcXDItTWE+95twWJ5lxAIj2dNwZZni3UkwwjYnCnqFtvHCKOg0NH2
  48. RjQcFYmu3fncNeqLezUSdVyRyXxSCHsUdlYeX/e44StCnXdrmLUHlb2P27ZVdPGh
  49. SW7qTUPpmJKekYiRPOpTLj+ZKXIsANkyWO+7dVtZLBm5bIyAsmp0W/DmK+wRsejj
  50. alFbIsh5AoGBANJr7HSG695wkfn+kvu/V8qHbt+KDv4WjWHjGRsUqvxoHOUNkQmW
  51. vZWdk4gjHYn1l+QHWmoOE3AgyqtCZ4bFILkZPLN/F8Mh3+r4B0Ac4biJJt7XGMNQ
  52. Nv4wsk7TR7CCARsjO7GP1PT60hpjMvYmc1E36gNM7QIZE9jBE+L8eWYtAoGBANy2
  53. JOAWf+QeBlur6o9feH76cEmpQzUUq4Lj9mmnXgIirSsFoBnDb8VA6Ws+ltL9U9H2
  54. vaCoaTyi9twW9zWj+Ywg2mVR5nlSAPfdlTWS1GLUbDotlj5apc/lvnGuNlWzN+I4
  55. Tu64hhgBXqGvRZ0o7HzFodqRAkpVXp6CQCqBM7p7AoGAIgO0K3oL8t87ma/fTra1
  56. mFWgRJ5qogQ/Qo2VZ11F7ptd4GD7CxPE/cSFLsKOadi7fu75XJ994OhMGrcXSR/g
  57. lEtSFqn6y15UdgU2FtUUX+I72FXo+Nmkqh5xFHDu68d4Kkzdv2xCvn81K3LRsByz
  58. E3P4biQnQ+mN3cIIVu79KNkCgYEAm6uctrEn4y2KLn5DInyj8GuTZ2ELFhVOIzPG
  59. SR7TH451tTJyiblezDHMcOfkWUx0IlN1zCr8jtgiZXmNQzg0erFxWKU7ebZtGGYh
  60. J3g4dLx+2Unt/mzRJqFUgbnueOO/Nr+gbJ+ZdLUCmeeVohOLOTXrws0kYGl2Izab
  61. K1+VrKECgYEAxQohoOegA0f4mofisXItbwwqTIX3bLpxBc4woa1sB4kjNrLo4slc
  62. qtWZGVlRxwBvQUg0cYj+xtr5nyBdHLy0qwX/kMq4GqQnvW6NqsbrP3MjCZ8NX/Sj
  63. A2W0jx50Hs/XNw6IZFLYgWVoOzCaD+jYFpHhzUZyQD6/rYhwhHrNQmU=
  64. -----END RSA PRIVATE KEY-----`
  65. tmp, _ := pem.Decode([]byte(privPem))
  66. privKey, _ := x509.ParsePKCS1PrivateKey(tmp.Bytes)
  67. pubPem := `-----BEGIN PUBLIC KEY-----
  68. MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtWp2PZz4TSU5A6ixw41H
  69. dbfBuGJwPuTtrsdoUf0DQ0/DJBNPqOCBAgEu6ZdUqIbWJ5Da+nevjtncy5hENdi6
  70. XrXjyzlUxghMuXjE5SeLGpgfQvkqbTkYaFpMe8PTzNeze3fei8+Eu6mzeb6g1Grq
  71. XznuPIc7bNss0w5iX9RiBM9dWPuXonx9xSEy0LYqJm7yXmshNe1aRwkjG/y5C26B
  72. zBFnMKp9YRTua0DO1WqLNhcaRndalIFYouDNVTbwxSlYL16bZVoebqzZvLGrPvZJ
  73. kPuCu6vH9brvOuYo0q8hLVNkBeXcimRpsDjLhQYzEJjoMTbaiVGnjBky+PWNiofJ
  74. nwIDAQAB
  75. -----END PUBLIC KEY-----`
  76. err := user_model.SetUserSetting(db.DefaultContext, user.ID, chef_module.SettingPublicPem, pubPem)
  77. assert.NoError(t, err)
  78. t.Run("Authenticate", func(t *testing.T) {
  79. auth := &chef_router.Auth{}
  80. t.Run("MissingUser", func(t *testing.T) {
  81. defer tests.PrintCurrentTest(t)()
  82. req := NewRequest(t, "POST", "/dummy")
  83. u, err := auth.Verify(req, nil, nil, nil)
  84. assert.Nil(t, u)
  85. assert.NoError(t, err)
  86. })
  87. t.Run("NotExistingUser", func(t *testing.T) {
  88. defer tests.PrintCurrentTest(t)()
  89. req := NewRequest(t, "POST", "/dummy")
  90. req.Header.Set("X-Ops-Userid", "not-existing-user")
  91. u, err := auth.Verify(req, nil, nil, nil)
  92. assert.Nil(t, u)
  93. assert.Error(t, err)
  94. })
  95. t.Run("Timestamp", func(t *testing.T) {
  96. defer tests.PrintCurrentTest(t)()
  97. req := NewRequest(t, "POST", "/dummy")
  98. req.Header.Set("X-Ops-Userid", user.Name)
  99. u, err := auth.Verify(req, nil, nil, nil)
  100. assert.Nil(t, u)
  101. assert.Error(t, err)
  102. req.Header.Set("X-Ops-Timestamp", "2023-01-01T00:00:00Z")
  103. u, err = auth.Verify(req, nil, nil, nil)
  104. assert.Nil(t, u)
  105. assert.Error(t, err)
  106. })
  107. t.Run("SigningVersion", func(t *testing.T) {
  108. defer tests.PrintCurrentTest(t)()
  109. req := NewRequest(t, "POST", "/dummy")
  110. req.Header.Set("X-Ops-Userid", user.Name)
  111. req.Header.Set("X-Ops-Timestamp", time.Now().UTC().Format(time.RFC3339))
  112. u, err := auth.Verify(req, nil, nil, nil)
  113. assert.Nil(t, u)
  114. assert.Error(t, err)
  115. req.Header.Set("X-Ops-Sign", "version=none")
  116. u, err = auth.Verify(req, nil, nil, nil)
  117. assert.Nil(t, u)
  118. assert.Error(t, err)
  119. req.Header.Set("X-Ops-Sign", "version=1.4")
  120. u, err = auth.Verify(req, nil, nil, nil)
  121. assert.Nil(t, u)
  122. assert.Error(t, err)
  123. req.Header.Set("X-Ops-Sign", "version=1.0;algorithm=sha2")
  124. u, err = auth.Verify(req, nil, nil, nil)
  125. assert.Nil(t, u)
  126. assert.Error(t, err)
  127. req.Header.Set("X-Ops-Sign", "version=1.0;algorithm=sha256")
  128. u, err = auth.Verify(req, nil, nil, nil)
  129. assert.Nil(t, u)
  130. assert.Error(t, err)
  131. })
  132. t.Run("SignedHeaders", func(t *testing.T) {
  133. defer tests.PrintCurrentTest(t)()
  134. ts := time.Now().UTC().Format(time.RFC3339)
  135. req := NewRequest(t, "POST", "/dummy")
  136. req.Header.Set("X-Ops-Userid", user.Name)
  137. req.Header.Set("X-Ops-Timestamp", ts)
  138. req.Header.Set("X-Ops-Sign", "version=1.0;algorithm=sha1")
  139. req.Header.Set("X-Ops-Content-Hash", "unused")
  140. req.Header.Set("X-Ops-Authorization-4", "dummy")
  141. u, err := auth.Verify(req, nil, nil, nil)
  142. assert.Nil(t, u)
  143. assert.Error(t, err)
  144. signRequest := func(t *testing.T, req *http.Request, version string) {
  145. username := req.Header.Get("X-Ops-Userid")
  146. if version != "1.0" && version != "1.3" {
  147. sum := sha1.Sum([]byte(username))
  148. username = base64.StdEncoding.EncodeToString(sum[:])
  149. }
  150. req.Header.Set("X-Ops-Sign", "version="+version)
  151. var data []byte
  152. if version == "1.3" {
  153. data = []byte(fmt.Sprintf(
  154. "Method:%s\nPath:%s\nX-Ops-Content-Hash:%s\nX-Ops-Sign:version=%s\nX-Ops-Timestamp:%s\nX-Ops-UserId:%s\nX-Ops-Server-API-Version:%s",
  155. req.Method,
  156. path.Clean(req.URL.Path),
  157. req.Header.Get("X-Ops-Content-Hash"),
  158. version,
  159. req.Header.Get("X-Ops-Timestamp"),
  160. username,
  161. req.Header.Get("X-Ops-Server-Api-Version"),
  162. ))
  163. } else {
  164. sum := sha1.Sum([]byte(path.Clean(req.URL.Path)))
  165. data = []byte(fmt.Sprintf(
  166. "Method:%s\nHashed Path:%s\nX-Ops-Content-Hash:%s\nX-Ops-Timestamp:%s\nX-Ops-UserId:%s",
  167. req.Method,
  168. base64.StdEncoding.EncodeToString(sum[:]),
  169. req.Header.Get("X-Ops-Content-Hash"),
  170. req.Header.Get("X-Ops-Timestamp"),
  171. username,
  172. ))
  173. }
  174. for k := range req.Header {
  175. if strings.HasPrefix(k, "X-Ops-Authorization-") {
  176. req.Header.Del(k)
  177. }
  178. }
  179. var signature []byte
  180. if version == "1.3" || version == "1.2" {
  181. var h hash.Hash
  182. var ch crypto.Hash
  183. if version == "1.3" {
  184. h = sha256.New()
  185. ch = crypto.SHA256
  186. } else {
  187. h = sha1.New()
  188. ch = crypto.SHA1
  189. }
  190. h.Write(data)
  191. signature, _ = rsa.SignPKCS1v15(rand.Reader, privKey, ch, h.Sum(nil))
  192. } else {
  193. c := new(big.Int).SetBytes(data)
  194. m := new(big.Int).Exp(c, privKey.D, privKey.N)
  195. signature = m.Bytes()
  196. }
  197. enc := base64.StdEncoding.EncodeToString(signature)
  198. const chunkSize = 60
  199. chunks := make([]string, 0, (len(enc)-1)/chunkSize+1)
  200. currentLen := 0
  201. currentStart := 0
  202. for i := range enc {
  203. if currentLen == chunkSize {
  204. chunks = append(chunks, enc[currentStart:i])
  205. currentLen = 0
  206. currentStart = i
  207. }
  208. currentLen++
  209. }
  210. chunks = append(chunks, enc[currentStart:])
  211. for i, chunk := range chunks {
  212. req.Header.Set(fmt.Sprintf("X-Ops-Authorization-%d", i+1), chunk)
  213. }
  214. }
  215. for _, v := range []string{"1.0", "1.1", "1.2", "1.3"} {
  216. t.Run(v, func(t *testing.T) {
  217. defer tests.PrintCurrentTest(t)()
  218. signRequest(t, req, v)
  219. u, err = auth.Verify(req, nil, nil, nil)
  220. assert.NotNil(t, u)
  221. assert.NoError(t, err)
  222. })
  223. }
  224. })
  225. })
  226. packageName := "test"
  227. packageVersion := "1.0.1"
  228. packageDescription := "Test Description"
  229. packageAuthor := "KN4CK3R"
  230. root := fmt.Sprintf("/api/packages/%s/chef/api/v1", user.Name)
  231. uploadPackage := func(t *testing.T, version string, expectedStatus int) {
  232. var body bytes.Buffer
  233. mpw := multipart.NewWriter(&body)
  234. part, _ := mpw.CreateFormFile("tarball", fmt.Sprintf("%s.tar.gz", version))
  235. zw := gzip.NewWriter(part)
  236. tw := tar.NewWriter(zw)
  237. content := `{"name":"` + packageName + `","version":"` + version + `","description":"` + packageDescription + `","maintainer":"` + packageAuthor + `"}`
  238. hdr := &tar.Header{
  239. Name: packageName + "/metadata.json",
  240. Mode: 0o600,
  241. Size: int64(len(content)),
  242. }
  243. tw.WriteHeader(hdr)
  244. tw.Write([]byte(content))
  245. tw.Close()
  246. zw.Close()
  247. mpw.Close()
  248. req := NewRequestWithBody(t, "POST", root+"/cookbooks", &body)
  249. req.Header.Add("Content-Type", mpw.FormDataContentType())
  250. AddBasicAuthHeader(req, user.Name)
  251. MakeRequest(t, req, expectedStatus)
  252. }
  253. t.Run("Upload", func(t *testing.T) {
  254. defer tests.PrintCurrentTest(t)()
  255. req := NewRequestWithBody(t, "POST", root+"/cookbooks", bytes.NewReader([]byte{}))
  256. MakeRequest(t, req, http.StatusUnauthorized)
  257. uploadPackage(t, packageVersion, http.StatusCreated)
  258. pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeChef)
  259. assert.NoError(t, err)
  260. assert.Len(t, pvs, 1)
  261. pd, err := packages.GetPackageDescriptor(db.DefaultContext, pvs[0])
  262. assert.NoError(t, err)
  263. assert.NotNil(t, pd.SemVer)
  264. assert.IsType(t, &chef_module.Metadata{}, pd.Metadata)
  265. assert.Equal(t, packageName, pd.Package.Name)
  266. assert.Equal(t, packageVersion, pd.Version.Version)
  267. pfs, err := packages.GetFilesByVersionID(db.DefaultContext, pvs[0].ID)
  268. assert.NoError(t, err)
  269. assert.Len(t, pfs, 1)
  270. assert.Equal(t, fmt.Sprintf("%s.tar.gz", packageVersion), pfs[0].Name)
  271. assert.True(t, pfs[0].IsLead)
  272. uploadPackage(t, packageVersion, http.StatusBadRequest)
  273. })
  274. t.Run("Download", func(t *testing.T) {
  275. defer tests.PrintCurrentTest(t)()
  276. req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s/versions/%s/download", root, packageName, packageVersion))
  277. MakeRequest(t, req, http.StatusOK)
  278. })
  279. t.Run("Universe", func(t *testing.T) {
  280. defer tests.PrintCurrentTest(t)()
  281. req := NewRequest(t, "GET", root+"/universe")
  282. resp := MakeRequest(t, req, http.StatusOK)
  283. type VersionInfo struct {
  284. LocationType string `json:"location_type"`
  285. LocationPath string `json:"location_path"`
  286. DownloadURL string `json:"download_url"`
  287. Dependencies map[string]string `json:"dependencies"`
  288. }
  289. var result map[string]map[string]*VersionInfo
  290. DecodeJSON(t, resp, &result)
  291. assert.Len(t, result, 1)
  292. assert.Contains(t, result, packageName)
  293. versions := result[packageName]
  294. assert.Len(t, versions, 1)
  295. assert.Contains(t, versions, packageVersion)
  296. info := versions[packageVersion]
  297. assert.Equal(t, "opscode", info.LocationType)
  298. assert.Equal(t, setting.AppURL+root[1:], info.LocationPath)
  299. assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s/versions/%s/download", setting.AppURL, root[1:], packageName, packageVersion), info.DownloadURL)
  300. })
  301. t.Run("Search", func(t *testing.T) {
  302. defer tests.PrintCurrentTest(t)()
  303. cases := []struct {
  304. Query string
  305. Start int
  306. Items int
  307. ExpectedTotal int
  308. ExpectedResults int
  309. }{
  310. {"", 0, 0, 1, 1},
  311. {"", 0, 10, 1, 1},
  312. {"gitea", 0, 10, 0, 0},
  313. {"test", 0, 10, 1, 1},
  314. {"test", 1, 10, 1, 0},
  315. }
  316. type Item struct {
  317. CookbookName string `json:"cookbook_name"`
  318. CookbookMaintainer string `json:"cookbook_maintainer"`
  319. CookbookDescription string `json:"cookbook_description"`
  320. Cookbook string `json:"cookbook"`
  321. }
  322. type Result struct {
  323. Start int `json:"start"`
  324. Total int `json:"total"`
  325. Items []*Item `json:"items"`
  326. }
  327. for i, c := range cases {
  328. req := NewRequest(t, "GET", fmt.Sprintf("%s/search?q=%s&start=%d&items=%d", root, c.Query, c.Start, c.Items))
  329. req = AddBasicAuthHeader(req, user.Name)
  330. resp := MakeRequest(t, req, http.StatusOK)
  331. var result Result
  332. DecodeJSON(t, resp, &result)
  333. assert.Equal(t, c.ExpectedTotal, result.Total, "case %d: unexpected total hits", i)
  334. assert.Len(t, result.Items, c.ExpectedResults, "case %d: unexpected result count", i)
  335. if len(result.Items) == 1 {
  336. item := result.Items[0]
  337. assert.Equal(t, packageName, item.CookbookName)
  338. assert.Equal(t, packageAuthor, item.CookbookMaintainer)
  339. assert.Equal(t, packageDescription, item.CookbookDescription)
  340. assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName), item.Cookbook)
  341. }
  342. }
  343. })
  344. t.Run("EnumeratePackages", func(t *testing.T) {
  345. defer tests.PrintCurrentTest(t)()
  346. cases := []struct {
  347. Sort string
  348. Start int
  349. Items int
  350. ExpectedTotal int
  351. ExpectedResults int
  352. }{
  353. {"", 0, 0, 1, 1},
  354. {"", 0, 10, 1, 1},
  355. {"RECENTLY_ADDED", 0, 10, 1, 1},
  356. {"RECENTLY_UPDATED", 0, 10, 1, 1},
  357. {"", 1, 10, 1, 0},
  358. }
  359. type Item struct {
  360. CookbookName string `json:"cookbook_name"`
  361. CookbookMaintainer string `json:"cookbook_maintainer"`
  362. CookbookDescription string `json:"cookbook_description"`
  363. Cookbook string `json:"cookbook"`
  364. }
  365. type Result struct {
  366. Start int `json:"start"`
  367. Total int `json:"total"`
  368. Items []*Item `json:"items"`
  369. }
  370. for i, c := range cases {
  371. req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks?start=%d&items=%d&sort=%s", root, c.Start, c.Items, c.Sort))
  372. req = AddBasicAuthHeader(req, user.Name)
  373. resp := MakeRequest(t, req, http.StatusOK)
  374. var result Result
  375. DecodeJSON(t, resp, &result)
  376. assert.Equal(t, c.ExpectedTotal, result.Total, "case %d: unexpected total hits", i)
  377. assert.Len(t, result.Items, c.ExpectedResults, "case %d: unexpected result count", i)
  378. if len(result.Items) == 1 {
  379. item := result.Items[0]
  380. assert.Equal(t, packageName, item.CookbookName)
  381. assert.Equal(t, packageAuthor, item.CookbookMaintainer)
  382. assert.Equal(t, packageDescription, item.CookbookDescription)
  383. assert.Equal(t, fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName), item.Cookbook)
  384. }
  385. }
  386. })
  387. t.Run("PackageMetadata", func(t *testing.T) {
  388. defer tests.PrintCurrentTest(t)()
  389. req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s", root, packageName))
  390. resp := MakeRequest(t, req, http.StatusOK)
  391. type Result struct {
  392. Name string `json:"name"`
  393. Maintainer string `json:"maintainer"`
  394. Description string `json:"description"`
  395. Category string `json:"category"`
  396. LatestVersion string `json:"latest_version"`
  397. SourceURL string `json:"source_url"`
  398. CreatedAt time.Time `json:"created_at"`
  399. UpdatedAt time.Time `json:"updated_at"`
  400. Deprecated bool `json:"deprecated"`
  401. Versions []string `json:"versions"`
  402. }
  403. var result Result
  404. DecodeJSON(t, resp, &result)
  405. versionURL := fmt.Sprintf("%s%s/cookbooks/%s/versions/%s", setting.AppURL, root[1:], packageName, packageVersion)
  406. assert.Equal(t, packageName, result.Name)
  407. assert.Equal(t, packageAuthor, result.Maintainer)
  408. assert.Equal(t, packageDescription, result.Description)
  409. assert.Equal(t, versionURL, result.LatestVersion)
  410. assert.False(t, result.Deprecated)
  411. assert.ElementsMatch(t, []string{versionURL}, result.Versions)
  412. })
  413. t.Run("PackageVersionMetadata", func(t *testing.T) {
  414. defer tests.PrintCurrentTest(t)()
  415. req := NewRequest(t, "GET", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, packageVersion))
  416. resp := MakeRequest(t, req, http.StatusOK)
  417. type Result struct {
  418. Version string `json:"version"`
  419. TarballFileSize int64 `json:"tarball_file_size"`
  420. PublishedAt time.Time `json:"published_at"`
  421. Cookbook string `json:"cookbook"`
  422. File string `json:"file"`
  423. License string `json:"license"`
  424. Dependencies map[string]string `json:"dependencies"`
  425. }
  426. var result Result
  427. DecodeJSON(t, resp, &result)
  428. packageURL := fmt.Sprintf("%s%s/cookbooks/%s", setting.AppURL, root[1:], packageName)
  429. assert.Equal(t, packageVersion, result.Version)
  430. assert.Equal(t, packageURL, result.Cookbook)
  431. assert.Equal(t, fmt.Sprintf("%s/versions/%s/download", packageURL, packageVersion), result.File)
  432. })
  433. t.Run("Delete", func(t *testing.T) {
  434. uploadPackage(t, "1.0.2", http.StatusCreated)
  435. uploadPackage(t, "1.0.3", http.StatusCreated)
  436. t.Run("Version", func(t *testing.T) {
  437. defer tests.PrintCurrentTest(t)()
  438. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, "1.0.2"))
  439. MakeRequest(t, req, http.StatusUnauthorized)
  440. req = NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s/versions/%s", root, packageName, "1.0.2"))
  441. AddBasicAuthHeader(req, user.Name)
  442. MakeRequest(t, req, http.StatusOK)
  443. pv, err := packages.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages.TypeChef, packageName, "1.0.2")
  444. assert.Nil(t, pv)
  445. assert.Error(t, err)
  446. })
  447. t.Run("Package", func(t *testing.T) {
  448. defer tests.PrintCurrentTest(t)()
  449. req := NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s", root, packageName))
  450. MakeRequest(t, req, http.StatusUnauthorized)
  451. req = NewRequest(t, "DELETE", fmt.Sprintf("%s/cookbooks/%s", root, packageName))
  452. AddBasicAuthHeader(req, user.Name)
  453. MakeRequest(t, req, http.StatusOK)
  454. pvs, err := packages.GetVersionsByPackageType(db.DefaultContext, user.ID, packages.TypeChef)
  455. assert.NoError(t, err)
  456. assert.Empty(t, pvs)
  457. })
  458. })
  459. }