mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-11-04 04:14:01 +01:00 
			
		
		
		
	Fixes #28853 Needs both https://gitea.com/gitea/act_runner/pulls/473 and https://gitea.com/gitea/act_runner/pulls/471 on the runner side and patched `actions/upload-artifact@v4` / `actions/download-artifact@v4`, like `christopherhx/gitea-upload-artifact@v4` and `christopherhx/gitea-download-artifact@v4`, to not return errors due to GHES not beeing supported yet.
		
			
				
	
	
		
			225 lines
		
	
	
		
			8.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			225 lines
		
	
	
		
			8.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// Copyright 2024 The Gitea Authors. All rights reserved.
 | 
						|
// SPDX-License-Identifier: MIT
 | 
						|
 | 
						|
package integration
 | 
						|
 | 
						|
import (
 | 
						|
	"bytes"
 | 
						|
	"crypto/sha256"
 | 
						|
	"encoding/hex"
 | 
						|
	"io"
 | 
						|
	"net/http"
 | 
						|
	"strings"
 | 
						|
	"testing"
 | 
						|
	"time"
 | 
						|
 | 
						|
	"code.gitea.io/gitea/routers/api/actions"
 | 
						|
	actions_service "code.gitea.io/gitea/services/actions"
 | 
						|
	"code.gitea.io/gitea/tests"
 | 
						|
 | 
						|
	"github.com/stretchr/testify/assert"
 | 
						|
	"google.golang.org/protobuf/encoding/protojson"
 | 
						|
	"google.golang.org/protobuf/reflect/protoreflect"
 | 
						|
	"google.golang.org/protobuf/types/known/timestamppb"
 | 
						|
	"google.golang.org/protobuf/types/known/wrapperspb"
 | 
						|
)
 | 
						|
 | 
						|
func toProtoJSON(m protoreflect.ProtoMessage) io.Reader {
 | 
						|
	resp, _ := protojson.Marshal(m)
 | 
						|
	buf := bytes.Buffer{}
 | 
						|
	buf.Write(resp)
 | 
						|
	return &buf
 | 
						|
}
 | 
						|
 | 
						|
func TestActionsArtifactV4UploadSingleFile(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	token, err := actions_service.CreateAuthorizationToken(48, 792, 193)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	// acquire artifact upload url
 | 
						|
	req := NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/CreateArtifact", toProtoJSON(&actions.CreateArtifactRequest{
 | 
						|
		Version:                 4,
 | 
						|
		Name:                    "artifact",
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).AddTokenAuth(token)
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
	var uploadResp actions.CreateArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &uploadResp)
 | 
						|
	assert.True(t, uploadResp.Ok)
 | 
						|
	assert.Contains(t, uploadResp.SignedUploadUrl, "/twirp/github.actions.results.api.v1.ArtifactService/UploadArtifact")
 | 
						|
 | 
						|
	// get upload url
 | 
						|
	idx := strings.Index(uploadResp.SignedUploadUrl, "/twirp/")
 | 
						|
	url := uploadResp.SignedUploadUrl[idx:] + "&comp=block"
 | 
						|
 | 
						|
	// upload artifact chunk
 | 
						|
	body := strings.Repeat("A", 1024)
 | 
						|
	req = NewRequestWithBody(t, "PUT", url, strings.NewReader(body))
 | 
						|
	MakeRequest(t, req, http.StatusCreated)
 | 
						|
 | 
						|
	t.Logf("Create artifact confirm")
 | 
						|
 | 
						|
	sha := sha256.Sum256([]byte(body))
 | 
						|
 | 
						|
	// confirm artifact upload
 | 
						|
	req = NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/FinalizeArtifact", toProtoJSON(&actions.FinalizeArtifactRequest{
 | 
						|
		Name:                    "artifact",
 | 
						|
		Size:                    1024,
 | 
						|
		Hash:                    wrapperspb.String("sha256:" + hex.EncodeToString(sha[:])),
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).
 | 
						|
		AddTokenAuth(token)
 | 
						|
	resp = MakeRequest(t, req, http.StatusOK)
 | 
						|
	var finalizeResp actions.FinalizeArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &finalizeResp)
 | 
						|
	assert.True(t, finalizeResp.Ok)
 | 
						|
}
 | 
						|
 | 
						|
func TestActionsArtifactV4UploadSingleFileWrongChecksum(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	token, err := actions_service.CreateAuthorizationToken(48, 792, 193)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	// acquire artifact upload url
 | 
						|
	req := NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/CreateArtifact", toProtoJSON(&actions.CreateArtifactRequest{
 | 
						|
		Version:                 4,
 | 
						|
		Name:                    "artifact-invalid-checksum",
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).AddTokenAuth(token)
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
	var uploadResp actions.CreateArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &uploadResp)
 | 
						|
	assert.True(t, uploadResp.Ok)
 | 
						|
	assert.Contains(t, uploadResp.SignedUploadUrl, "/twirp/github.actions.results.api.v1.ArtifactService/UploadArtifact")
 | 
						|
 | 
						|
	// get upload url
 | 
						|
	idx := strings.Index(uploadResp.SignedUploadUrl, "/twirp/")
 | 
						|
	url := uploadResp.SignedUploadUrl[idx:] + "&comp=block"
 | 
						|
 | 
						|
	// upload artifact chunk
 | 
						|
	body := strings.Repeat("B", 1024)
 | 
						|
	req = NewRequestWithBody(t, "PUT", url, strings.NewReader(body))
 | 
						|
	MakeRequest(t, req, http.StatusCreated)
 | 
						|
 | 
						|
	t.Logf("Create artifact confirm")
 | 
						|
 | 
						|
	sha := sha256.Sum256([]byte(strings.Repeat("A", 1024)))
 | 
						|
 | 
						|
	// confirm artifact upload
 | 
						|
	req = NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/FinalizeArtifact", toProtoJSON(&actions.FinalizeArtifactRequest{
 | 
						|
		Name:                    "artifact-invalid-checksum",
 | 
						|
		Size:                    1024,
 | 
						|
		Hash:                    wrapperspb.String("sha256:" + hex.EncodeToString(sha[:])),
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).
 | 
						|
		AddTokenAuth(token)
 | 
						|
	MakeRequest(t, req, http.StatusInternalServerError)
 | 
						|
}
 | 
						|
 | 
						|
func TestActionsArtifactV4UploadSingleFileWithRetentionDays(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	token, err := actions_service.CreateAuthorizationToken(48, 792, 193)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	// acquire artifact upload url
 | 
						|
	req := NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/CreateArtifact", toProtoJSON(&actions.CreateArtifactRequest{
 | 
						|
		Version:                 4,
 | 
						|
		ExpiresAt:               timestamppb.New(time.Now().Add(5 * 24 * time.Hour)),
 | 
						|
		Name:                    "artifactWithRetentionDays",
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).AddTokenAuth(token)
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
	var uploadResp actions.CreateArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &uploadResp)
 | 
						|
	assert.True(t, uploadResp.Ok)
 | 
						|
	assert.Contains(t, uploadResp.SignedUploadUrl, "/twirp/github.actions.results.api.v1.ArtifactService/UploadArtifact")
 | 
						|
 | 
						|
	// get upload url
 | 
						|
	idx := strings.Index(uploadResp.SignedUploadUrl, "/twirp/")
 | 
						|
	url := uploadResp.SignedUploadUrl[idx:] + "&comp=block"
 | 
						|
 | 
						|
	// upload artifact chunk
 | 
						|
	body := strings.Repeat("A", 1024)
 | 
						|
	req = NewRequestWithBody(t, "PUT", url, strings.NewReader(body))
 | 
						|
	MakeRequest(t, req, http.StatusCreated)
 | 
						|
 | 
						|
	t.Logf("Create artifact confirm")
 | 
						|
 | 
						|
	sha := sha256.Sum256([]byte(body))
 | 
						|
 | 
						|
	// confirm artifact upload
 | 
						|
	req = NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/FinalizeArtifact", toProtoJSON(&actions.FinalizeArtifactRequest{
 | 
						|
		Name:                    "artifactWithRetentionDays",
 | 
						|
		Size:                    1024,
 | 
						|
		Hash:                    wrapperspb.String("sha256:" + hex.EncodeToString(sha[:])),
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).
 | 
						|
		AddTokenAuth(token)
 | 
						|
	resp = MakeRequest(t, req, http.StatusOK)
 | 
						|
	var finalizeResp actions.FinalizeArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &finalizeResp)
 | 
						|
	assert.True(t, finalizeResp.Ok)
 | 
						|
}
 | 
						|
 | 
						|
func TestActionsArtifactV4DownloadSingle(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	token, err := actions_service.CreateAuthorizationToken(48, 792, 193)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	// acquire artifact upload url
 | 
						|
	req := NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/ListArtifacts", toProtoJSON(&actions.ListArtifactsRequest{
 | 
						|
		NameFilter:              wrapperspb.String("artifact"),
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).AddTokenAuth(token)
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
	var listResp actions.ListArtifactsResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &listResp)
 | 
						|
	assert.Len(t, listResp.Artifacts, 1)
 | 
						|
 | 
						|
	// confirm artifact upload
 | 
						|
	req = NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/GetSignedArtifactURL", toProtoJSON(&actions.GetSignedArtifactURLRequest{
 | 
						|
		Name:                    "artifact",
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).
 | 
						|
		AddTokenAuth(token)
 | 
						|
	resp = MakeRequest(t, req, http.StatusOK)
 | 
						|
	var finalizeResp actions.GetSignedArtifactURLResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &finalizeResp)
 | 
						|
	assert.NotEmpty(t, finalizeResp.SignedUrl)
 | 
						|
 | 
						|
	req = NewRequest(t, "GET", finalizeResp.SignedUrl)
 | 
						|
	resp = MakeRequest(t, req, http.StatusOK)
 | 
						|
	body := strings.Repeat("A", 1024)
 | 
						|
	assert.Equal(t, resp.Body.String(), body)
 | 
						|
}
 | 
						|
 | 
						|
func TestActionsArtifactV4Delete(t *testing.T) {
 | 
						|
	defer tests.PrepareTestEnv(t)()
 | 
						|
 | 
						|
	token, err := actions_service.CreateAuthorizationToken(48, 792, 193)
 | 
						|
	assert.NoError(t, err)
 | 
						|
 | 
						|
	// delete artifact by name
 | 
						|
	req := NewRequestWithBody(t, "POST", "/twirp/github.actions.results.api.v1.ArtifactService/DeleteArtifact", toProtoJSON(&actions.DeleteArtifactRequest{
 | 
						|
		Name:                    "artifact",
 | 
						|
		WorkflowRunBackendId:    "792",
 | 
						|
		WorkflowJobRunBackendId: "193",
 | 
						|
	})).AddTokenAuth(token)
 | 
						|
	resp := MakeRequest(t, req, http.StatusOK)
 | 
						|
	var deleteResp actions.DeleteArtifactResponse
 | 
						|
	protojson.Unmarshal(resp.Body.Bytes(), &deleteResp)
 | 
						|
	assert.True(t, deleteResp.Ok)
 | 
						|
}
 |