code.gitea.io/gitea@v1.22.3/tests/integration/api_packages_test.go (about) 1 // Copyright 2021 The Gitea Authors. All rights reserved. 2 // SPDX-License-Identifier: MIT 3 4 package integration 5 6 import ( 7 "bytes" 8 "crypto/sha256" 9 "fmt" 10 "net/http" 11 "strings" 12 "testing" 13 "time" 14 15 auth_model "code.gitea.io/gitea/models/auth" 16 "code.gitea.io/gitea/models/db" 17 packages_model "code.gitea.io/gitea/models/packages" 18 container_model "code.gitea.io/gitea/models/packages/container" 19 "code.gitea.io/gitea/models/unittest" 20 user_model "code.gitea.io/gitea/models/user" 21 "code.gitea.io/gitea/modules/setting" 22 api "code.gitea.io/gitea/modules/structs" 23 "code.gitea.io/gitea/modules/util" 24 packages_service "code.gitea.io/gitea/services/packages" 25 packages_cleanup_service "code.gitea.io/gitea/services/packages/cleanup" 26 "code.gitea.io/gitea/tests" 27 28 "github.com/stretchr/testify/assert" 29 ) 30 31 func TestPackageAPI(t *testing.T) { 32 defer tests.PrepareTestEnv(t)() 33 34 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 4}) 35 session := loginUser(t, user.Name) 36 tokenReadPackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadPackage) 37 tokenDeletePackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWritePackage) 38 39 packageName := "test-package" 40 packageVersion := "1.0.3" 41 filename := "file.bin" 42 43 url := fmt.Sprintf("/api/packages/%s/generic/%s/%s/%s", user.Name, packageName, packageVersion, filename) 44 req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{})). 45 AddBasicAuth(user.Name) 46 MakeRequest(t, req, http.StatusCreated) 47 48 t.Run("ListPackages", func(t *testing.T) { 49 defer tests.PrintCurrentTest(t)() 50 51 req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s", user.Name)). 52 AddTokenAuth(tokenReadPackage) 53 resp := MakeRequest(t, req, http.StatusOK) 54 55 var apiPackages []*api.Package 56 DecodeJSON(t, resp, &apiPackages) 57 58 assert.Len(t, apiPackages, 1) 59 assert.Equal(t, string(packages_model.TypeGeneric), apiPackages[0].Type) 60 assert.Equal(t, packageName, apiPackages[0].Name) 61 assert.Equal(t, packageVersion, apiPackages[0].Version) 62 assert.NotNil(t, apiPackages[0].Creator) 63 assert.Equal(t, user.Name, apiPackages[0].Creator.UserName) 64 }) 65 66 t.Run("GetPackage", func(t *testing.T) { 67 defer tests.PrintCurrentTest(t)() 68 69 req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s", user.Name, packageName, packageVersion)). 70 AddTokenAuth(tokenReadPackage) 71 MakeRequest(t, req, http.StatusNotFound) 72 73 req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)). 74 AddTokenAuth(tokenReadPackage) 75 resp := MakeRequest(t, req, http.StatusOK) 76 77 var p *api.Package 78 DecodeJSON(t, resp, &p) 79 80 assert.Equal(t, string(packages_model.TypeGeneric), p.Type) 81 assert.Equal(t, packageName, p.Name) 82 assert.Equal(t, packageVersion, p.Version) 83 assert.NotNil(t, p.Creator) 84 assert.Equal(t, user.Name, p.Creator.UserName) 85 86 t.Run("RepositoryLink", func(t *testing.T) { 87 defer tests.PrintCurrentTest(t)() 88 89 p, err := packages_model.GetPackageByName(db.DefaultContext, user.ID, packages_model.TypeGeneric, packageName) 90 assert.NoError(t, err) 91 92 // no repository link 93 req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)). 94 AddTokenAuth(tokenReadPackage) 95 resp := MakeRequest(t, req, http.StatusOK) 96 97 var ap1 *api.Package 98 DecodeJSON(t, resp, &ap1) 99 assert.Nil(t, ap1.Repository) 100 101 // link to public repository 102 assert.NoError(t, packages_model.SetRepositoryLink(db.DefaultContext, p.ID, 1)) 103 104 req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)). 105 AddTokenAuth(tokenReadPackage) 106 resp = MakeRequest(t, req, http.StatusOK) 107 108 var ap2 *api.Package 109 DecodeJSON(t, resp, &ap2) 110 assert.NotNil(t, ap2.Repository) 111 assert.EqualValues(t, 1, ap2.Repository.ID) 112 113 // link to private repository 114 assert.NoError(t, packages_model.SetRepositoryLink(db.DefaultContext, p.ID, 2)) 115 116 req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)). 117 AddTokenAuth(tokenReadPackage) 118 resp = MakeRequest(t, req, http.StatusOK) 119 120 var ap3 *api.Package 121 DecodeJSON(t, resp, &ap3) 122 assert.Nil(t, ap3.Repository) 123 124 assert.NoError(t, packages_model.UnlinkRepositoryFromAllPackages(db.DefaultContext, 2)) 125 }) 126 }) 127 128 t.Run("ListPackageFiles", func(t *testing.T) { 129 defer tests.PrintCurrentTest(t)() 130 131 req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s/files", user.Name, packageName, packageVersion)). 132 AddTokenAuth(tokenReadPackage) 133 MakeRequest(t, req, http.StatusNotFound) 134 135 req = NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s/files", user.Name, packageName, packageVersion)). 136 AddTokenAuth(tokenReadPackage) 137 resp := MakeRequest(t, req, http.StatusOK) 138 139 var files []*api.PackageFile 140 DecodeJSON(t, resp, &files) 141 142 assert.Len(t, files, 1) 143 assert.Equal(t, int64(0), files[0].Size) 144 assert.Equal(t, filename, files[0].Name) 145 assert.Equal(t, "d41d8cd98f00b204e9800998ecf8427e", files[0].HashMD5) 146 assert.Equal(t, "da39a3ee5e6b4b0d3255bfef95601890afd80709", files[0].HashSHA1) 147 assert.Equal(t, "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855", files[0].HashSHA256) 148 assert.Equal(t, "cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e", files[0].HashSHA512) 149 }) 150 151 t.Run("DeletePackage", func(t *testing.T) { 152 defer tests.PrintCurrentTest(t)() 153 154 req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/dummy/%s/%s", user.Name, packageName, packageVersion)). 155 AddTokenAuth(tokenDeletePackage) 156 MakeRequest(t, req, http.StatusNotFound) 157 158 req = NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/packages/%s/generic/%s/%s", user.Name, packageName, packageVersion)). 159 AddTokenAuth(tokenDeletePackage) 160 MakeRequest(t, req, http.StatusNoContent) 161 }) 162 } 163 164 func TestPackageAccess(t *testing.T) { 165 defer tests.PrepareTestEnv(t)() 166 167 admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}) 168 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 5}) 169 inactive := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 9}) 170 limitedUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 33}) 171 privateUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 31}) 172 privateOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 23}) // user has package write access 173 limitedOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 36}) // user has package write access 174 publicOrgMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 25}) // user has package read access 175 privateOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 35}) 176 limitedOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 22}) 177 publicOrgNoMember := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 17}) 178 179 uploadPackage := func(doer, owner *user_model.User, filename string, expectedStatus int) { 180 url := fmt.Sprintf("/api/packages/%s/generic/test-package/1.0/%s.bin", owner.Name, filename) 181 req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1})) 182 if doer != nil { 183 req.AddBasicAuth(doer.Name) 184 } 185 MakeRequest(t, req, expectedStatus) 186 } 187 188 downloadPackage := func(doer, owner *user_model.User, expectedStatus int) { 189 url := fmt.Sprintf("/api/packages/%s/generic/test-package/1.0/admin.bin", owner.Name) 190 req := NewRequest(t, "GET", url) 191 if doer != nil { 192 req.AddBasicAuth(doer.Name) 193 } 194 MakeRequest(t, req, expectedStatus) 195 } 196 197 type Target struct { 198 Owner *user_model.User 199 ExpectedStatus int 200 } 201 202 t.Run("Upload", func(t *testing.T) { 203 defer tests.PrintCurrentTest(t)() 204 205 cases := []struct { 206 Doer *user_model.User 207 Filename string 208 Targets []Target 209 }{ 210 { // Admins can upload to every owner 211 Doer: admin, 212 Filename: "admin", 213 Targets: []Target{ 214 {admin, http.StatusCreated}, 215 {inactive, http.StatusCreated}, 216 {user, http.StatusCreated}, 217 {limitedUser, http.StatusCreated}, 218 {privateUser, http.StatusCreated}, 219 {privateOrgMember, http.StatusCreated}, 220 {limitedOrgMember, http.StatusCreated}, 221 {publicOrgMember, http.StatusCreated}, 222 {privateOrgNoMember, http.StatusCreated}, 223 {limitedOrgNoMember, http.StatusCreated}, 224 {publicOrgNoMember, http.StatusCreated}, 225 }, 226 }, 227 { // Without credentials no upload should be possible 228 Doer: nil, 229 Filename: "nil", 230 Targets: []Target{ 231 {admin, http.StatusUnauthorized}, 232 {inactive, http.StatusUnauthorized}, 233 {user, http.StatusUnauthorized}, 234 {limitedUser, http.StatusUnauthorized}, 235 {privateUser, http.StatusUnauthorized}, 236 {privateOrgMember, http.StatusUnauthorized}, 237 {limitedOrgMember, http.StatusUnauthorized}, 238 {publicOrgMember, http.StatusUnauthorized}, 239 {privateOrgNoMember, http.StatusUnauthorized}, 240 {limitedOrgNoMember, http.StatusUnauthorized}, 241 {publicOrgNoMember, http.StatusUnauthorized}, 242 }, 243 }, 244 { // Inactive users can't upload anywhere 245 Doer: inactive, 246 Filename: "inactive", 247 Targets: []Target{ 248 {admin, http.StatusUnauthorized}, 249 {inactive, http.StatusUnauthorized}, 250 {user, http.StatusUnauthorized}, 251 {limitedUser, http.StatusUnauthorized}, 252 {privateUser, http.StatusUnauthorized}, 253 {privateOrgMember, http.StatusUnauthorized}, 254 {limitedOrgMember, http.StatusUnauthorized}, 255 {publicOrgMember, http.StatusUnauthorized}, 256 {privateOrgNoMember, http.StatusUnauthorized}, 257 {limitedOrgNoMember, http.StatusUnauthorized}, 258 {publicOrgNoMember, http.StatusUnauthorized}, 259 }, 260 }, 261 { // Normal users can upload to self and orgs in which they are members and have package write access 262 Doer: user, 263 Filename: "user", 264 Targets: []Target{ 265 {admin, http.StatusUnauthorized}, 266 {inactive, http.StatusUnauthorized}, 267 {user, http.StatusCreated}, 268 {limitedUser, http.StatusUnauthorized}, 269 {privateUser, http.StatusUnauthorized}, 270 {privateOrgMember, http.StatusCreated}, 271 {limitedOrgMember, http.StatusCreated}, 272 {publicOrgMember, http.StatusUnauthorized}, 273 {privateOrgNoMember, http.StatusUnauthorized}, 274 {limitedOrgNoMember, http.StatusUnauthorized}, 275 {publicOrgNoMember, http.StatusUnauthorized}, 276 }, 277 }, 278 } 279 280 for _, c := range cases { 281 for _, t := range c.Targets { 282 uploadPackage(c.Doer, t.Owner, c.Filename, t.ExpectedStatus) 283 } 284 } 285 }) 286 287 t.Run("Download", func(t *testing.T) { 288 defer tests.PrintCurrentTest(t)() 289 290 cases := []struct { 291 Doer *user_model.User 292 Filename string 293 Targets []Target 294 }{ 295 { // Admins can access everything 296 Doer: admin, 297 Targets: []Target{ 298 {admin, http.StatusOK}, 299 {inactive, http.StatusOK}, 300 {user, http.StatusOK}, 301 {limitedUser, http.StatusOK}, 302 {privateUser, http.StatusOK}, 303 {privateOrgMember, http.StatusOK}, 304 {limitedOrgMember, http.StatusOK}, 305 {publicOrgMember, http.StatusOK}, 306 {privateOrgNoMember, http.StatusOK}, 307 {limitedOrgNoMember, http.StatusOK}, 308 {publicOrgNoMember, http.StatusOK}, 309 }, 310 }, 311 { // Without credentials only public owners are accessible 312 Doer: nil, 313 Targets: []Target{ 314 {admin, http.StatusOK}, 315 {inactive, http.StatusOK}, 316 {user, http.StatusOK}, 317 {limitedUser, http.StatusUnauthorized}, 318 {privateUser, http.StatusUnauthorized}, 319 {privateOrgMember, http.StatusUnauthorized}, 320 {limitedOrgMember, http.StatusUnauthorized}, 321 {publicOrgMember, http.StatusOK}, 322 {privateOrgNoMember, http.StatusUnauthorized}, 323 {limitedOrgNoMember, http.StatusUnauthorized}, 324 {publicOrgNoMember, http.StatusOK}, 325 }, 326 }, 327 { // Inactive users have no access 328 Doer: inactive, 329 Targets: []Target{ 330 {admin, http.StatusUnauthorized}, 331 {inactive, http.StatusUnauthorized}, 332 {user, http.StatusUnauthorized}, 333 {limitedUser, http.StatusUnauthorized}, 334 {privateUser, http.StatusUnauthorized}, 335 {privateOrgMember, http.StatusUnauthorized}, 336 {limitedOrgMember, http.StatusUnauthorized}, 337 {publicOrgMember, http.StatusUnauthorized}, 338 {privateOrgNoMember, http.StatusUnauthorized}, 339 {limitedOrgNoMember, http.StatusUnauthorized}, 340 {publicOrgNoMember, http.StatusUnauthorized}, 341 }, 342 }, 343 { // Normal users can access self, public or limited users/orgs and private orgs in which they are members 344 Doer: user, 345 Targets: []Target{ 346 {admin, http.StatusOK}, 347 {inactive, http.StatusOK}, 348 {user, http.StatusOK}, 349 {limitedUser, http.StatusOK}, 350 {privateUser, http.StatusUnauthorized}, 351 {privateOrgMember, http.StatusOK}, 352 {limitedOrgMember, http.StatusOK}, 353 {publicOrgMember, http.StatusOK}, 354 {privateOrgNoMember, http.StatusUnauthorized}, 355 {limitedOrgNoMember, http.StatusOK}, 356 {publicOrgNoMember, http.StatusOK}, 357 }, 358 }, 359 } 360 361 for _, c := range cases { 362 for _, target := range c.Targets { 363 downloadPackage(c.Doer, target.Owner, target.ExpectedStatus) 364 } 365 } 366 }) 367 368 t.Run("API", func(t *testing.T) { 369 defer tests.PrintCurrentTest(t)() 370 371 session := loginUser(t, user.Name) 372 tokenReadPackage := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeReadPackage) 373 374 for _, target := range []Target{ 375 {admin, http.StatusOK}, 376 {inactive, http.StatusOK}, 377 {user, http.StatusOK}, 378 {limitedUser, http.StatusOK}, 379 {privateUser, http.StatusForbidden}, 380 {privateOrgMember, http.StatusOK}, 381 {limitedOrgMember, http.StatusOK}, 382 {publicOrgMember, http.StatusOK}, 383 {privateOrgNoMember, http.StatusForbidden}, 384 {limitedOrgNoMember, http.StatusOK}, 385 {publicOrgNoMember, http.StatusOK}, 386 } { 387 req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/packages/%s", target.Owner.Name)). 388 AddTokenAuth(tokenReadPackage) 389 MakeRequest(t, req, target.ExpectedStatus) 390 } 391 }) 392 } 393 394 func TestPackageQuota(t *testing.T) { 395 defer tests.PrepareTestEnv(t)() 396 397 limitTotalOwnerCount, limitTotalOwnerSize := setting.Packages.LimitTotalOwnerCount, setting.Packages.LimitTotalOwnerSize 398 399 // Exceeded quota result in StatusForbidden for normal users but admins are always allowed to upload. 400 admin := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1}) 401 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 10}) 402 403 t.Run("Common", func(t *testing.T) { 404 defer tests.PrintCurrentTest(t)() 405 406 limitSizeGeneric := setting.Packages.LimitSizeGeneric 407 408 uploadPackage := func(doer *user_model.User, version string, expectedStatus int) { 409 url := fmt.Sprintf("/api/packages/%s/generic/test-package/%s/file.bin", user.Name, version) 410 req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1})). 411 AddBasicAuth(doer.Name) 412 MakeRequest(t, req, expectedStatus) 413 } 414 415 setting.Packages.LimitTotalOwnerCount = 0 416 uploadPackage(user, "1.0", http.StatusForbidden) 417 uploadPackage(admin, "1.0", http.StatusCreated) 418 setting.Packages.LimitTotalOwnerCount = limitTotalOwnerCount 419 420 setting.Packages.LimitTotalOwnerSize = 0 421 uploadPackage(user, "1.1", http.StatusForbidden) 422 uploadPackage(admin, "1.1", http.StatusCreated) 423 setting.Packages.LimitTotalOwnerSize = limitTotalOwnerSize 424 425 setting.Packages.LimitSizeGeneric = 0 426 uploadPackage(user, "1.2", http.StatusForbidden) 427 uploadPackage(admin, "1.2", http.StatusCreated) 428 setting.Packages.LimitSizeGeneric = limitSizeGeneric 429 }) 430 431 t.Run("Container", func(t *testing.T) { 432 defer tests.PrintCurrentTest(t)() 433 434 limitSizeContainer := setting.Packages.LimitSizeContainer 435 436 uploadBlob := func(doer *user_model.User, data string, expectedStatus int) { 437 url := fmt.Sprintf("/v2/%s/quota-test/blobs/uploads?digest=sha256:%x", user.Name, sha256.Sum256([]byte(data))) 438 req := NewRequestWithBody(t, "POST", url, strings.NewReader(data)). 439 AddBasicAuth(doer.Name) 440 MakeRequest(t, req, expectedStatus) 441 } 442 443 setting.Packages.LimitTotalOwnerSize = 0 444 uploadBlob(user, "2", http.StatusForbidden) 445 uploadBlob(admin, "2", http.StatusCreated) 446 setting.Packages.LimitTotalOwnerSize = limitTotalOwnerSize 447 448 setting.Packages.LimitSizeContainer = 0 449 uploadBlob(user, "3", http.StatusForbidden) 450 uploadBlob(admin, "3", http.StatusCreated) 451 setting.Packages.LimitSizeContainer = limitSizeContainer 452 }) 453 } 454 455 func TestPackageCleanup(t *testing.T) { 456 defer tests.PrepareTestEnv(t)() 457 458 user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) 459 460 duration, _ := time.ParseDuration("-1h") 461 462 t.Run("Common", func(t *testing.T) { 463 defer tests.PrintCurrentTest(t)() 464 465 // Upload and delete a generic package and upload a container blob 466 data, _ := util.CryptoRandomBytes(5) 467 url := fmt.Sprintf("/api/packages/%s/generic/cleanup-test/1.1.1/file.bin", user.Name) 468 req := NewRequestWithBody(t, "PUT", url, bytes.NewReader(data)). 469 AddBasicAuth(user.Name) 470 MakeRequest(t, req, http.StatusCreated) 471 472 req = NewRequest(t, "DELETE", url). 473 AddBasicAuth(user.Name) 474 MakeRequest(t, req, http.StatusNoContent) 475 476 data, _ = util.CryptoRandomBytes(5) 477 url = fmt.Sprintf("/v2/%s/cleanup-test/blobs/uploads?digest=sha256:%x", user.Name, sha256.Sum256(data)) 478 req = NewRequestWithBody(t, "POST", url, bytes.NewReader(data)). 479 AddBasicAuth(user.Name) 480 MakeRequest(t, req, http.StatusCreated) 481 482 pbs, err := packages_model.FindExpiredUnreferencedBlobs(db.DefaultContext, duration) 483 assert.NoError(t, err) 484 assert.NotEmpty(t, pbs) 485 486 _, err = packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, "cleanup-test", container_model.UploadVersion) 487 assert.NoError(t, err) 488 489 err = packages_cleanup_service.CleanupTask(db.DefaultContext, duration) 490 assert.NoError(t, err) 491 492 pbs, err = packages_model.FindExpiredUnreferencedBlobs(db.DefaultContext, duration) 493 assert.NoError(t, err) 494 assert.Empty(t, pbs) 495 496 _, err = packages_model.GetInternalVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeContainer, "cleanup-test", container_model.UploadVersion) 497 assert.ErrorIs(t, err, packages_model.ErrPackageNotExist) 498 }) 499 500 t.Run("CleanupRules", func(t *testing.T) { 501 defer tests.PrintCurrentTest(t)() 502 503 type version struct { 504 Version string 505 ShouldExist bool 506 Created int64 507 } 508 509 cases := []struct { 510 Name string 511 Versions []version 512 Rule *packages_model.PackageCleanupRule 513 }{ 514 { 515 Name: "Disabled", 516 Versions: []version{ 517 {Version: "keep", ShouldExist: true}, 518 }, 519 Rule: &packages_model.PackageCleanupRule{ 520 Enabled: false, 521 }, 522 }, 523 { 524 Name: "KeepCount", 525 Versions: []version{ 526 {Version: "keep", ShouldExist: true}, 527 {Version: "v1.0", ShouldExist: true}, 528 {Version: "test-3", ShouldExist: false, Created: 1}, 529 {Version: "test-4", ShouldExist: false, Created: 1}, 530 }, 531 Rule: &packages_model.PackageCleanupRule{ 532 Enabled: true, 533 KeepCount: 2, 534 }, 535 }, 536 { 537 Name: "KeepPattern", 538 Versions: []version{ 539 {Version: "keep", ShouldExist: true}, 540 {Version: "v1.0", ShouldExist: false}, 541 }, 542 Rule: &packages_model.PackageCleanupRule{ 543 Enabled: true, 544 KeepPattern: "k.+p", 545 }, 546 }, 547 { 548 Name: "RemoveDays", 549 Versions: []version{ 550 {Version: "keep", ShouldExist: true}, 551 {Version: "v1.0", ShouldExist: false, Created: 1}, 552 }, 553 Rule: &packages_model.PackageCleanupRule{ 554 Enabled: true, 555 RemoveDays: 60, 556 }, 557 }, 558 { 559 Name: "RemovePattern", 560 Versions: []version{ 561 {Version: "test", ShouldExist: true}, 562 {Version: "test-3", ShouldExist: false}, 563 {Version: "test-4", ShouldExist: false}, 564 }, 565 Rule: &packages_model.PackageCleanupRule{ 566 Enabled: true, 567 RemovePattern: `t[e]+st-\d+`, 568 }, 569 }, 570 { 571 Name: "MatchFullName", 572 Versions: []version{ 573 {Version: "keep", ShouldExist: true}, 574 {Version: "test", ShouldExist: false}, 575 }, 576 Rule: &packages_model.PackageCleanupRule{ 577 Enabled: true, 578 RemovePattern: `package/test|different/keep`, 579 MatchFullName: true, 580 }, 581 }, 582 { 583 Name: "Mixed", 584 Versions: []version{ 585 {Version: "keep", ShouldExist: true, Created: time.Now().Add(time.Duration(10000)).Unix()}, 586 {Version: "dummy", ShouldExist: true, Created: 1}, 587 {Version: "test-3", ShouldExist: true}, 588 {Version: "test-4", ShouldExist: false, Created: 1}, 589 }, 590 Rule: &packages_model.PackageCleanupRule{ 591 Enabled: true, 592 KeepCount: 1, 593 KeepPattern: `dummy`, 594 RemoveDays: 7, 595 RemovePattern: `t[e]+st-\d+`, 596 }, 597 }, 598 } 599 600 for _, c := range cases { 601 t.Run(c.Name, func(t *testing.T) { 602 defer tests.PrintCurrentTest(t)() 603 604 for _, v := range c.Versions { 605 url := fmt.Sprintf("/api/packages/%s/generic/package/%s/file.bin", user.Name, v.Version) 606 req := NewRequestWithBody(t, "PUT", url, bytes.NewReader([]byte{1})). 607 AddBasicAuth(user.Name) 608 MakeRequest(t, req, http.StatusCreated) 609 610 if v.Created != 0 { 611 pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeGeneric, "package", v.Version) 612 assert.NoError(t, err) 613 _, err = db.GetEngine(db.DefaultContext).Exec("UPDATE package_version SET created_unix = ? WHERE id = ?", v.Created, pv.ID) 614 assert.NoError(t, err) 615 } 616 } 617 618 c.Rule.OwnerID = user.ID 619 c.Rule.Type = packages_model.TypeGeneric 620 621 pcr, err := packages_model.InsertCleanupRule(db.DefaultContext, c.Rule) 622 assert.NoError(t, err) 623 624 err = packages_cleanup_service.CleanupTask(db.DefaultContext, duration) 625 assert.NoError(t, err) 626 627 for _, v := range c.Versions { 628 pv, err := packages_model.GetVersionByNameAndVersion(db.DefaultContext, user.ID, packages_model.TypeGeneric, "package", v.Version) 629 if v.ShouldExist { 630 assert.NoError(t, err) 631 err = packages_service.DeletePackageVersionAndReferences(db.DefaultContext, pv) 632 assert.NoError(t, err) 633 } else { 634 assert.ErrorIs(t, err, packages_model.ErrPackageNotExist) 635 } 636 } 637 638 assert.NoError(t, packages_model.DeleteCleanupRuleByID(db.DefaultContext, pcr.ID)) 639 }) 640 } 641 }) 642 }