code.gitea.io/gitea@v1.22.3/tests/integration/api_packages_test.go (about)

     1  // Copyright 2021 The Gitea Authors. All rights reserved.
     2  // SPDX-License-Identifier: MIT
     3  
     4  package integration
     5  
     6  import (
     7  	"bytes"
     8  	"crypto/sha256"
     9  	"fmt"
    10  	"net/http"
    11  	"strings"
    12  	"testing"
    13  	"time"
    14  
    15  	auth_model "code.gitea.io/gitea/models/auth"
    16  	"code.gitea.io/gitea/models/db"
    17  	packages_model "code.gitea.io/gitea/models/packages"
    18  	container_model "code.gitea.io/gitea/models/packages/container"
    19  	"code.gitea.io/gitea/models/unittest"
    20  	user_model "code.gitea.io/gitea/models/user"
    21  	"code.gitea.io/gitea/modules/setting"
    22  	api "code.gitea.io/gitea/modules/structs"
    23  	"code.gitea.io/gitea/modules/util"
    24  	packages_service "code.gitea.io/gitea/services/packages"
    25  	packages_cleanup_service "code.gitea.io/gitea/services/packages/cleanup"
    26  	"code.gitea.io/gitea/tests"
    27  
    28  	"github.com/stretchr/testify/assert"
    29  )
    30  
    31  func TestPackageAPI(t *testing.T) {
    32  	defer tests.PrepareTestEnv(t)()
    33  
    34  	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4})
    35  	session := loginUser(t, user.Name)
    36  	tokenReadPackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadPackage)
    37  	tokenDeletePackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWritePackage)
    38  
    39  	packageName := "test-package"
    40  	packageVersion := "1.0.3"
    41  	filename := "file.bin"
    42  
    43  	url := fmt.Sprintf("/api/packages/%s/generic/%s/%s/%s", user.Name, packageName, packageVersion, filename)
    44  	req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{})).
    45  		AddBasicAuth(user.Name)
    46  	MakeRequest(t, req, http.StatusCreated)
    47  
    48  	t.Run("ListPackages", func(t *testing.T) {
    49  		defer tests.PrintCurrentTest(t)()
    50  
    51  		req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s", user.Name)).
    52  			AddTokenAuth(tokenReadPackage)
    53  		resp := MakeRequest(t, req, http.StatusOK)
    54  
    55  		var apiPackages []*api.Package
    56  		DecodeJSON(t, resp, &apiPackages)
    57  
    58  		assert.Len(t, apiPackages, 1)
    59  		assert.Equal(t, string(packages_model.TypeGeneric), apiPackages[0].Type)
    60  		assert.Equal(t, packageName, apiPackages[0].Name)
    61  		assert.Equal(t, packageVersion, apiPackages[0].Version)
    62  		assert.NotNil(t, apiPackages[0].Creator)
    63  		assert.Equal(t, user.Name, apiPackages[0].Creator.UserName)
    64  	})
    65  
    66  	t.Run("GetPackage", func(t *testing.T) {
    67  		defer tests.PrintCurrentTest(t)()
    68  
    69  		req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s", user.Name, packageName, packageVersion)).
    70  			AddTokenAuth(tokenReadPackage)
    71  		MakeRequest(t, req, http.StatusNotFound)
    72  
    73  		req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)).
    74  			AddTokenAuth(tokenReadPackage)
    75  		resp := MakeRequest(t, req, http.StatusOK)
    76  
    77  		var p *api.Package
    78  		DecodeJSON(t, resp, &p)
    79  
    80  		assert.Equal(t, string(packages_model.TypeGeneric), p.Type)
    81  		assert.Equal(t, packageName, p.Name)
    82  		assert.Equal(t, packageVersion, p.Version)
    83  		assert.NotNil(t, p.Creator)
    84  		assert.Equal(t, user.Name, p.Creator.UserName)
    85  
    86  		t.Run("RepositoryLink", func(t *testing.T) {
    87  			defer tests.PrintCurrentTest(t)()
    88  
    89  			p, err := packages_model.GetPackageByName(db.DefaultContext, user.ID, packages_model.TypeGeneric, packageName)
    90  			assert.NoError(t, err)
    91  
    92  			// no repository link
    93  			req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)).
    94  				AddTokenAuth(tokenReadPackage)
    95  			resp := MakeRequest(t, req, http.StatusOK)
    96  
    97  			var ap1 *api.Package
    98  			DecodeJSON(t, resp, &ap1)
    99  			assert.Nil(t, ap1.Repository)
   100  
   101  			// link to public repository
   102  			assert.NoError(t, packages_model.SetRepositoryLink(db.DefaultContext, p.ID, 1))
   103  
   104  			req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)).
   105  				AddTokenAuth(tokenReadPackage)
   106  			resp = MakeRequest(t, req, http.StatusOK)
   107  
   108  			var ap2 *api.Package
   109  			DecodeJSON(t, resp, &ap2)
   110  			assert.NotNil(t, ap2.Repository)
   111  			assert.EqualValues(t, 1, ap2.Repository.ID)
   112  
   113  			// link to private repository
   114  			assert.NoError(t, packages_model.SetRepositoryLink(db.DefaultContext, p.ID, 2))
   115  
   116  			req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)).
   117  				AddTokenAuth(tokenReadPackage)
   118  			resp = MakeRequest(t, req, http.StatusOK)
   119  
   120  			var ap3 *api.Package
   121  			DecodeJSON(t, resp, &ap3)
   122  			assert.Nil(t, ap3.Repository)
   123  
   124  			assert.NoError(t, packages_model.UnlinkRepositoryFromAllPackages(db.DefaultContext, 2))
   125  		})
   126  	})
   127  
   128  	t.Run("ListPackageFiles", func(t *testing.T) {
   129  		defer tests.PrintCurrentTest(t)()
   130  
   131  		req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s/files", user.Name, packageName, packageVersion)).
   132  			AddTokenAuth(tokenReadPackage)
   133  		MakeRequest(t, req, http.StatusNotFound)
   134  
   135  		req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s/files", user.Name, packageName, packageVersion)).
   136  			AddTokenAuth(tokenReadPackage)
   137  		resp := MakeRequest(t, req, http.StatusOK)
   138  
   139  		var files []*api.PackageFile
   140  		DecodeJSON(t, resp, &files)
   141  
   142  		assert.Len(t, files, 1)
   143  		assert.Equal(t, int64(0), files[0].Size)
   144  		assert.Equal(t, filename, files[0].Name)
   145  		assert.Equal(t, "d41d8cd98f00b204e9800998ecf8427e", files[0].HashMD5)
   146  		assert.Equal(t, "da39a3ee5e6b4b0d3255bfef95601890afd80709", files[0].HashSHA1)
   147  		assert.Equal(t, "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", files[0].HashSHA256)
   148  		assert.Equal(t, "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e", files[0].HashSHA512)
   149  	})
   150  
   151  	t.Run("DeletePackage", func(t *testing.T) {
   152  		defer tests.PrintCurrentTest(t)()
   153  
   154  		req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s", user.Name, packageName, packageVersion)).
   155  			AddTokenAuth(tokenDeletePackage)
   156  		MakeRequest(t, req, http.StatusNotFound)
   157  
   158  		req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)).
   159  			AddTokenAuth(tokenDeletePackage)
   160  		MakeRequest(t, req, http.StatusNoContent)
   161  	})
   162  }
   163  
   164  func TestPackageAccess(t *testing.T) {
   165  	defer tests.PrepareTestEnv(t)()
   166  
   167  	admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
   168  	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5})
   169  	inactive := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 9})
   170  	limitedUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 33})
   171  	privateUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 31})
   172  	privateOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 23}) // user has package write access
   173  	limitedOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 36}) // user has package write access
   174  	publicOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 25})  // user has package read access
   175  	privateOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 35})
   176  	limitedOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 22})
   177  	publicOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 17})
   178  
   179  	uploadPackage := func(doer, owner *user_model.User, filename string, expectedStatus int) {
   180  		url := fmt.Sprintf("/api/packages/%s/generic/test-package/1.0/%s.bin", owner.Name, filename)
   181  		req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1}))
   182  		if doer != nil {
   183  			req.AddBasicAuth(doer.Name)
   184  		}
   185  		MakeRequest(t, req, expectedStatus)
   186  	}
   187  
   188  	downloadPackage := func(doer, owner *user_model.User, expectedStatus int) {
   189  		url := fmt.Sprintf("/api/packages/%s/generic/test-package/1.0/admin.bin", owner.Name)
   190  		req := NewRequest(t, "GET", url)
   191  		if doer != nil {
   192  			req.AddBasicAuth(doer.Name)
   193  		}
   194  		MakeRequest(t, req, expectedStatus)
   195  	}
   196  
   197  	type Target struct {
   198  		Owner          *user_model.User
   199  		ExpectedStatus int
   200  	}
   201  
   202  	t.Run("Upload", func(t *testing.T) {
   203  		defer tests.PrintCurrentTest(t)()
   204  
   205  		cases := []struct {
   206  			Doer     *user_model.User
   207  			Filename string
   208  			Targets  []Target
   209  		}{
   210  			{ // Admins can upload to every owner
   211  				Doer:     admin,
   212  				Filename: "admin",
   213  				Targets: []Target{
   214  					{admin, http.StatusCreated},
   215  					{inactive, http.StatusCreated},
   216  					{user, http.StatusCreated},
   217  					{limitedUser, http.StatusCreated},
   218  					{privateUser, http.StatusCreated},
   219  					{privateOrgMember, http.StatusCreated},
   220  					{limitedOrgMember, http.StatusCreated},
   221  					{publicOrgMember, http.StatusCreated},
   222  					{privateOrgNoMember, http.StatusCreated},
   223  					{limitedOrgNoMember, http.StatusCreated},
   224  					{publicOrgNoMember, http.StatusCreated},
   225  				},
   226  			},
   227  			{ // Without credentials no upload should be possible
   228  				Doer:     nil,
   229  				Filename: "nil",
   230  				Targets: []Target{
   231  					{admin, http.StatusUnauthorized},
   232  					{inactive, http.StatusUnauthorized},
   233  					{user, http.StatusUnauthorized},
   234  					{limitedUser, http.StatusUnauthorized},
   235  					{privateUser, http.StatusUnauthorized},
   236  					{privateOrgMember, http.StatusUnauthorized},
   237  					{limitedOrgMember, http.StatusUnauthorized},
   238  					{publicOrgMember, http.StatusUnauthorized},
   239  					{privateOrgNoMember, http.StatusUnauthorized},
   240  					{limitedOrgNoMember, http.StatusUnauthorized},
   241  					{publicOrgNoMember, http.StatusUnauthorized},
   242  				},
   243  			},
   244  			{ // Inactive users can't upload anywhere
   245  				Doer:     inactive,
   246  				Filename: "inactive",
   247  				Targets: []Target{
   248  					{admin, http.StatusUnauthorized},
   249  					{inactive, http.StatusUnauthorized},
   250  					{user, http.StatusUnauthorized},
   251  					{limitedUser, http.StatusUnauthorized},
   252  					{privateUser, http.StatusUnauthorized},
   253  					{privateOrgMember, http.StatusUnauthorized},
   254  					{limitedOrgMember, http.StatusUnauthorized},
   255  					{publicOrgMember, http.StatusUnauthorized},
   256  					{privateOrgNoMember, http.StatusUnauthorized},
   257  					{limitedOrgNoMember, http.StatusUnauthorized},
   258  					{publicOrgNoMember, http.StatusUnauthorized},
   259  				},
   260  			},
   261  			{ // Normal users can upload to self and orgs in which they are members and have package write access
   262  				Doer:     user,
   263  				Filename: "user",
   264  				Targets: []Target{
   265  					{admin, http.StatusUnauthorized},
   266  					{inactive, http.StatusUnauthorized},
   267  					{user, http.StatusCreated},
   268  					{limitedUser, http.StatusUnauthorized},
   269  					{privateUser, http.StatusUnauthorized},
   270  					{privateOrgMember, http.StatusCreated},
   271  					{limitedOrgMember, http.StatusCreated},
   272  					{publicOrgMember, http.StatusUnauthorized},
   273  					{privateOrgNoMember, http.StatusUnauthorized},
   274  					{limitedOrgNoMember, http.StatusUnauthorized},
   275  					{publicOrgNoMember, http.StatusUnauthorized},
   276  				},
   277  			},
   278  		}
   279  
   280  		for _, c := range cases {
   281  			for _, t := range c.Targets {
   282  				uploadPackage(c.Doer, t.Owner, c.Filename, t.ExpectedStatus)
   283  			}
   284  		}
   285  	})
   286  
   287  	t.Run("Download", func(t *testing.T) {
   288  		defer tests.PrintCurrentTest(t)()
   289  
   290  		cases := []struct {
   291  			Doer     *user_model.User
   292  			Filename string
   293  			Targets  []Target
   294  		}{
   295  			{ // Admins can access everything
   296  				Doer: admin,
   297  				Targets: []Target{
   298  					{admin, http.StatusOK},
   299  					{inactive, http.StatusOK},
   300  					{user, http.StatusOK},
   301  					{limitedUser, http.StatusOK},
   302  					{privateUser, http.StatusOK},
   303  					{privateOrgMember, http.StatusOK},
   304  					{limitedOrgMember, http.StatusOK},
   305  					{publicOrgMember, http.StatusOK},
   306  					{privateOrgNoMember, http.StatusOK},
   307  					{limitedOrgNoMember, http.StatusOK},
   308  					{publicOrgNoMember, http.StatusOK},
   309  				},
   310  			},
   311  			{ // Without credentials only public owners are accessible
   312  				Doer: nil,
   313  				Targets: []Target{
   314  					{admin, http.StatusOK},
   315  					{inactive, http.StatusOK},
   316  					{user, http.StatusOK},
   317  					{limitedUser, http.StatusUnauthorized},
   318  					{privateUser, http.StatusUnauthorized},
   319  					{privateOrgMember, http.StatusUnauthorized},
   320  					{limitedOrgMember, http.StatusUnauthorized},
   321  					{publicOrgMember, http.StatusOK},
   322  					{privateOrgNoMember, http.StatusUnauthorized},
   323  					{limitedOrgNoMember, http.StatusUnauthorized},
   324  					{publicOrgNoMember, http.StatusOK},
   325  				},
   326  			},
   327  			{ // Inactive users have no access
   328  				Doer: inactive,
   329  				Targets: []Target{
   330  					{admin, http.StatusUnauthorized},
   331  					{inactive, http.StatusUnauthorized},
   332  					{user, http.StatusUnauthorized},
   333  					{limitedUser, http.StatusUnauthorized},
   334  					{privateUser, http.StatusUnauthorized},
   335  					{privateOrgMember, http.StatusUnauthorized},
   336  					{limitedOrgMember, http.StatusUnauthorized},
   337  					{publicOrgMember, http.StatusUnauthorized},
   338  					{privateOrgNoMember, http.StatusUnauthorized},
   339  					{limitedOrgNoMember, http.StatusUnauthorized},
   340  					{publicOrgNoMember, http.StatusUnauthorized},
   341  				},
   342  			},
   343  			{ // Normal users can access self, public or limited users/orgs and private orgs in which they are members
   344  				Doer: user,
   345  				Targets: []Target{
   346  					{admin, http.StatusOK},
   347  					{inactive, http.StatusOK},
   348  					{user, http.StatusOK},
   349  					{limitedUser, http.StatusOK},
   350  					{privateUser, http.StatusUnauthorized},
   351  					{privateOrgMember, http.StatusOK},
   352  					{limitedOrgMember, http.StatusOK},
   353  					{publicOrgMember, http.StatusOK},
   354  					{privateOrgNoMember, http.StatusUnauthorized},
   355  					{limitedOrgNoMember, http.StatusOK},
   356  					{publicOrgNoMember, http.StatusOK},
   357  				},
   358  			},
   359  		}
   360  
   361  		for _, c := range cases {
   362  			for _, target := range c.Targets {
   363  				downloadPackage(c.Doer, target.Owner, target.ExpectedStatus)
   364  			}
   365  		}
   366  	})
   367  
   368  	t.Run("API", func(t *testing.T) {
   369  		defer tests.PrintCurrentTest(t)()
   370  
   371  		session := loginUser(t, user.Name)
   372  		tokenReadPackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadPackage)
   373  
   374  		for _, target := range []Target{
   375  			{admin, http.StatusOK},
   376  			{inactive, http.StatusOK},
   377  			{user, http.StatusOK},
   378  			{limitedUser, http.StatusOK},
   379  			{privateUser, http.StatusForbidden},
   380  			{privateOrgMember, http.StatusOK},
   381  			{limitedOrgMember, http.StatusOK},
   382  			{publicOrgMember, http.StatusOK},
   383  			{privateOrgNoMember, http.StatusForbidden},
   384  			{limitedOrgNoMember, http.StatusOK},
   385  			{publicOrgNoMember, http.StatusOK},
   386  		} {
   387  			req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s", target.Owner.Name)).
   388  				AddTokenAuth(tokenReadPackage)
   389  			MakeRequest(t, req, target.ExpectedStatus)
   390  		}
   391  	})
   392  }
   393  
   394  func TestPackageQuota(t *testing.T) {
   395  	defer tests.PrepareTestEnv(t)()
   396  
   397  	limitTotalOwnerCount, limitTotalOwnerSize := setting.Packages.LimitTotalOwnerCount, setting.Packages.LimitTotalOwnerSize
   398  
   399  	// Exceeded quota result in StatusForbidden for normal users but admins are always allowed to upload.
   400  	admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
   401  	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 10})
   402  
   403  	t.Run("Common", func(t *testing.T) {
   404  		defer tests.PrintCurrentTest(t)()
   405  
   406  		limitSizeGeneric := setting.Packages.LimitSizeGeneric
   407  
   408  		uploadPackage := func(doer *user_model.User, version string, expectedStatus int) {
   409  			url := fmt.Sprintf("/api/packages/%s/generic/test-package/%s/file.bin", user.Name, version)
   410  			req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1})).
   411  				AddBasicAuth(doer.Name)
   412  			MakeRequest(t, req, expectedStatus)
   413  		}
   414  
   415  		setting.Packages.LimitTotalOwnerCount = 0
   416  		uploadPackage(user, "1.0", http.StatusForbidden)
   417  		uploadPackage(admin, "1.0", http.StatusCreated)
   418  		setting.Packages.LimitTotalOwnerCount = limitTotalOwnerCount
   419  
   420  		setting.Packages.LimitTotalOwnerSize = 0
   421  		uploadPackage(user, "1.1", http.StatusForbidden)
   422  		uploadPackage(admin, "1.1", http.StatusCreated)
   423  		setting.Packages.LimitTotalOwnerSize = limitTotalOwnerSize
   424  
   425  		setting.Packages.LimitSizeGeneric = 0
   426  		uploadPackage(user, "1.2", http.StatusForbidden)
   427  		uploadPackage(admin, "1.2", http.StatusCreated)
   428  		setting.Packages.LimitSizeGeneric = limitSizeGeneric
   429  	})
   430  
   431  	t.Run("Container", func(t *testing.T) {
   432  		defer tests.PrintCurrentTest(t)()
   433  
   434  		limitSizeContainer := setting.Packages.LimitSizeContainer
   435  
   436  		uploadBlob := func(doer *user_model.User, data string, expectedStatus int) {
   437  			url := fmt.Sprintf("/v2/%s/quota-test/blobs/uploads?digest=sha256:%x", user.Name, sha256.Sum256([]byte(data)))
   438  			req := NewRequestWithBody(t, "POST", url, strings.NewReader(data)).
   439  				AddBasicAuth(doer.Name)
   440  			MakeRequest(t, req, expectedStatus)
   441  		}
   442  
   443  		setting.Packages.LimitTotalOwnerSize = 0
   444  		uploadBlob(user, "2", http.StatusForbidden)
   445  		uploadBlob(admin, "2", http.StatusCreated)
   446  		setting.Packages.LimitTotalOwnerSize = limitTotalOwnerSize
   447  
   448  		setting.Packages.LimitSizeContainer = 0
   449  		uploadBlob(user, "3", http.StatusForbidden)
   450  		uploadBlob(admin, "3", http.StatusCreated)
   451  		setting.Packages.LimitSizeContainer = limitSizeContainer
   452  	})
   453  }
   454  
   455  func TestPackageCleanup(t *testing.T) {
   456  	defer tests.PrepareTestEnv(t)()
   457  
   458  	user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
   459  
   460  	duration, _ := time.ParseDuration("-1h")
   461  
   462  	t.Run("Common", func(t *testing.T) {
   463  		defer tests.PrintCurrentTest(t)()
   464  
   465  		// Upload and delete a generic package and upload a container blob
   466  		data, _ := util.CryptoRandomBytes(5)
   467  		url := fmt.Sprintf("/api/packages/%s/generic/cleanup-test/1.1.1/file.bin", user.Name)
   468  		req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(data)).
   469  			AddBasicAuth(user.Name)
   470  		MakeRequest(t, req, http.StatusCreated)
   471  
   472  		req = NewRequest(t, "DELETE", url).
   473  			AddBasicAuth(user.Name)
   474  		MakeRequest(t, req, http.StatusNoContent)
   475  
   476  		data, _ = util.CryptoRandomBytes(5)
   477  		url = fmt.Sprintf("/v2/%s/cleanup-test/blobs/uploads?digest=sha256:%x", user.Name, sha256.Sum256(data))
   478  		req = NewRequestWithBody(t, "POST", url, bytes.NewReader(data)).
   479  			AddBasicAuth(user.Name)
   480  		MakeRequest(t, req, http.StatusCreated)
   481  
   482  		pbs, err := packages_model.FindExpiredUnreferencedBlobs(db.DefaultContext, duration)
   483  		assert.NoError(t, err)
   484  		assert.NotEmpty(t, pbs)
   485  
   486  		_, err = packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, "cleanup-test", container_model.UploadVersion)
   487  		assert.NoError(t, err)
   488  
   489  		err = packages_cleanup_service.CleanupTask(db.DefaultContext, duration)
   490  		assert.NoError(t, err)
   491  
   492  		pbs, err = packages_model.FindExpiredUnreferencedBlobs(db.DefaultContext, duration)
   493  		assert.NoError(t, err)
   494  		assert.Empty(t, pbs)
   495  
   496  		_, err = packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, "cleanup-test", container_model.UploadVersion)
   497  		assert.ErrorIs(t, err, packages_model.ErrPackageNotExist)
   498  	})
   499  
   500  	t.Run("CleanupRules", func(t *testing.T) {
   501  		defer tests.PrintCurrentTest(t)()
   502  
   503  		type version struct {
   504  			Version     string
   505  			ShouldExist bool
   506  			Created     int64
   507  		}
   508  
   509  		cases := []struct {
   510  			Name     string
   511  			Versions []version
   512  			Rule     *packages_model.PackageCleanupRule
   513  		}{
   514  			{
   515  				Name: "Disabled",
   516  				Versions: []version{
   517  					{Version: "keep", ShouldExist: true},
   518  				},
   519  				Rule: &packages_model.PackageCleanupRule{
   520  					Enabled: false,
   521  				},
   522  			},
   523  			{
   524  				Name: "KeepCount",
   525  				Versions: []version{
   526  					{Version: "keep", ShouldExist: true},
   527  					{Version: "v1.0", ShouldExist: true},
   528  					{Version: "test-3", ShouldExist: false, Created: 1},
   529  					{Version: "test-4", ShouldExist: false, Created: 1},
   530  				},
   531  				Rule: &packages_model.PackageCleanupRule{
   532  					Enabled:   true,
   533  					KeepCount: 2,
   534  				},
   535  			},
   536  			{
   537  				Name: "KeepPattern",
   538  				Versions: []version{
   539  					{Version: "keep", ShouldExist: true},
   540  					{Version: "v1.0", ShouldExist: false},
   541  				},
   542  				Rule: &packages_model.PackageCleanupRule{
   543  					Enabled:     true,
   544  					KeepPattern: "k.+p",
   545  				},
   546  			},
   547  			{
   548  				Name: "RemoveDays",
   549  				Versions: []version{
   550  					{Version: "keep", ShouldExist: true},
   551  					{Version: "v1.0", ShouldExist: false, Created: 1},
   552  				},
   553  				Rule: &packages_model.PackageCleanupRule{
   554  					Enabled:    true,
   555  					RemoveDays: 60,
   556  				},
   557  			},
   558  			{
   559  				Name: "RemovePattern",
   560  				Versions: []version{
   561  					{Version: "test", ShouldExist: true},
   562  					{Version: "test-3", ShouldExist: false},
   563  					{Version: "test-4", ShouldExist: false},
   564  				},
   565  				Rule: &packages_model.PackageCleanupRule{
   566  					Enabled:       true,
   567  					RemovePattern: `t[e]+st-\d+`,
   568  				},
   569  			},
   570  			{
   571  				Name: "MatchFullName",
   572  				Versions: []version{
   573  					{Version: "keep", ShouldExist: true},
   574  					{Version: "test", ShouldExist: false},
   575  				},
   576  				Rule: &packages_model.PackageCleanupRule{
   577  					Enabled:       true,
   578  					RemovePattern: `package/test|different/keep`,
   579  					MatchFullName: true,
   580  				},
   581  			},
   582  			{
   583  				Name: "Mixed",
   584  				Versions: []version{
   585  					{Version: "keep", ShouldExist: true, Created: time.Now().Add(time.Duration(10000)).Unix()},
   586  					{Version: "dummy", ShouldExist: true, Created: 1},
   587  					{Version: "test-3", ShouldExist: true},
   588  					{Version: "test-4", ShouldExist: false, Created: 1},
   589  				},
   590  				Rule: &packages_model.PackageCleanupRule{
   591  					Enabled:       true,
   592  					KeepCount:     1,
   593  					KeepPattern:   `dummy`,
   594  					RemoveDays:    7,
   595  					RemovePattern: `t[e]+st-\d+`,
   596  				},
   597  			},
   598  		}
   599  
   600  		for _, c := range cases {
   601  			t.Run(c.Name, func(t *testing.T) {
   602  				defer tests.PrintCurrentTest(t)()
   603  
   604  				for _, v := range c.Versions {
   605  					url := fmt.Sprintf("/api/packages/%s/generic/package/%s/file.bin", user.Name, v.Version)
   606  					req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1})).
   607  						AddBasicAuth(user.Name)
   608  					MakeRequest(t, req, http.StatusCreated)
   609  
   610  					if v.Created != 0 {
   611  						pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeGeneric, "package", v.Version)
   612  						assert.NoError(t, err)
   613  						_, err = db.GetEngine(db.DefaultContext).Exec("UPDATE package_version SET created_unix = ? WHERE id = ?", v.Created, pv.ID)
   614  						assert.NoError(t, err)
   615  					}
   616  				}
   617  
   618  				c.Rule.OwnerID = user.ID
   619  				c.Rule.Type = packages_model.TypeGeneric
   620  
   621  				pcr, err := packages_model.InsertCleanupRule(db.DefaultContext, c.Rule)
   622  				assert.NoError(t, err)
   623  
   624  				err = packages_cleanup_service.CleanupTask(db.DefaultContext, duration)
   625  				assert.NoError(t, err)
   626  
   627  				for _, v := range c.Versions {
   628  					pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeGeneric, "package", v.Version)
   629  					if v.ShouldExist {
   630  						assert.NoError(t, err)
   631  						err = packages_service.DeletePackageVersionAndReferences(db.DefaultContext, pv)
   632  						assert.NoError(t, err)
   633  					} else {
   634  						assert.ErrorIs(t, err, packages_model.ErrPackageNotExist)
   635  					}
   636  				}
   637  
   638  				assert.NoError(t, packages_model.DeleteCleanupRuleByID(db.DefaultContext, pcr.ID))
   639  			})
   640  		}
   641  	})
   642  }