2019-05-07 03:12:51 +02:00
|
|
|
// Copyright 2019 The Gitea Authors. All rights reserved.
|
|
|
|
// Copyright 2018 Jonas Franz. All rights reserved.
|
2022-11-27 19:20:29 +01:00
|
|
|
// SPDX-License-Identifier: MIT
|
2019-05-07 03:12:51 +02:00
|
|
|
|
|
|
|
package migrations
|
|
|
|
|
|
|
|
import (
|
2020-09-02 19:49:25 +02:00
|
|
|
"context"
|
2022-02-25 10:20:50 +01:00
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2022-02-01 19:20:28 +01:00
|
|
|
"strconv"
|
2019-05-07 03:12:51 +02:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
2021-09-19 13:49:59 +02:00
|
|
|
"code.gitea.io/gitea/models/db"
|
2022-04-08 11:11:15 +02:00
|
|
|
issues_model "code.gitea.io/gitea/models/issues"
|
2021-12-10 02:27:50 +01:00
|
|
|
repo_model "code.gitea.io/gitea/models/repo"
|
2021-11-12 15:36:47 +01:00
|
|
|
"code.gitea.io/gitea/models/unittest"
|
2021-11-24 10:49:20 +01:00
|
|
|
user_model "code.gitea.io/gitea/models/user"
|
2022-02-25 10:20:50 +01:00
|
|
|
"code.gitea.io/gitea/modules/git"
|
Simplify how git repositories are opened (#28937)
## Purpose
This is a refactor toward building an abstraction over managing git
repositories.
Afterwards, it does not matter anymore if they are stored on the local
disk or somewhere remote.
## What this PR changes
We used `git.OpenRepository` everywhere previously.
Now, we should split them into two distinct functions:
Firstly, there are temporary repositories which do not change:
```go
git.OpenRepository(ctx, diskPath)
```
Gitea managed repositories having a record in the database in the
`repository` table are moved into the new package `gitrepo`:
```go
gitrepo.OpenRepository(ctx, repo_model.Repo)
```
Why is `repo_model.Repository` the second parameter instead of file
path?
Because then we can easily adapt our repository storage strategy.
The repositories can be stored locally, however, they could just as well
be stored on a remote server.
## Further changes in other PRs
- A Git Command wrapper on package `gitrepo` could be created. i.e.
`NewCommand(ctx, repo_model.Repository, commands...)`. `git.RunOpts{Dir:
repo.RepoPath()}`, the directory should be empty before invoking this
method and it can be filled in the function only. #28940
- Remove the `RepoPath()`/`WikiPath()` functions to reduce the
possibility of mistakes.
---------
Co-authored-by: delvh <dev.lh@web.de>
2024-01-27 21:09:51 +01:00
|
|
|
"code.gitea.io/gitea/modules/gitrepo"
|
2019-12-17 05:16:54 +01:00
|
|
|
"code.gitea.io/gitea/modules/graceful"
|
2022-02-25 10:20:50 +01:00
|
|
|
"code.gitea.io/gitea/modules/log"
|
2021-11-16 16:25:33 +01:00
|
|
|
base "code.gitea.io/gitea/modules/migration"
|
2024-03-02 16:42:31 +01:00
|
|
|
"code.gitea.io/gitea/modules/optional"
|
2019-10-13 15:23:14 +02:00
|
|
|
"code.gitea.io/gitea/modules/structs"
|
2023-04-21 22:32:25 +02:00
|
|
|
"code.gitea.io/gitea/modules/test"
|
2019-05-07 03:12:51 +02:00
|
|
|
|
|
|
|
"github.com/stretchr/testify/assert"
|
2024-07-30 21:41:10 +02:00
|
|
|
"github.com/stretchr/testify/require"
|
2019-05-07 03:12:51 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestGiteaUploadRepo(t *testing.T) {
|
|
|
|
// FIXME: Since no accesskey or user/password will trigger rate limit of github, just skip
|
|
|
|
t.Skip()
|
|
|
|
|
2021-11-12 15:36:47 +01:00
|
|
|
unittest.PrepareTestEnv(t)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2022-08-16 04:22:25 +02:00
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
2019-05-07 03:12:51 +02:00
|
|
|
|
|
|
|
var (
|
2022-05-20 16:08:52 +02:00
|
|
|
ctx = context.Background()
|
|
|
|
downloader = NewGithubDownloaderV3(ctx, "https://github.com", "", "", "", "go-xorm", "builder")
|
2019-05-07 03:12:51 +02:00
|
|
|
repoName = "builder-" + time.Now().Format("2006-01-02-15-04-05")
|
2019-12-17 05:16:54 +01:00
|
|
|
uploader = NewGiteaLocalUploader(graceful.GetManager().HammerContext(), user, user.Name, repoName)
|
2019-05-07 03:12:51 +02:00
|
|
|
)
|
|
|
|
|
2023-09-16 16:39:12 +02:00
|
|
|
err := migrateRepository(db.DefaultContext, user, downloader, uploader, base.MigrateOptions{
|
2019-10-13 15:23:14 +02:00
|
|
|
CloneAddr: "https://github.com/go-xorm/builder",
|
|
|
|
RepoName: repoName,
|
2019-05-07 03:12:51 +02:00
|
|
|
AuthUsername: "",
|
|
|
|
|
2019-07-08 04:14:12 +02:00
|
|
|
Wiki: true,
|
|
|
|
Issues: true,
|
|
|
|
Milestones: true,
|
|
|
|
Labels: true,
|
|
|
|
Releases: true,
|
|
|
|
Comments: true,
|
|
|
|
PullRequests: true,
|
|
|
|
Private: true,
|
|
|
|
Mirror: false,
|
2021-06-17 00:02:24 +02:00
|
|
|
}, nil)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2022-08-16 04:22:25 +02:00
|
|
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{OwnerID: user.ID, Name: repoName})
|
2019-05-07 03:12:51 +02:00
|
|
|
assert.True(t, repo.HasWiki())
|
2021-12-10 02:27:50 +01:00
|
|
|
assert.EqualValues(t, repo_model.RepositoryReady, repo.Status)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2023-12-11 09:56:48 +01:00
|
|
|
milestones, err := db.Find[issues_model.Milestone](db.DefaultContext, issues_model.FindMilestoneOptions{
|
|
|
|
RepoID: repo.ID,
|
2024-03-02 16:42:31 +01:00
|
|
|
IsClosed: optional.Some(false),
|
2020-07-28 13:30:40 +02:00
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, milestones, 1)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2023-12-11 09:56:48 +01:00
|
|
|
milestones, err = db.Find[issues_model.Milestone](db.DefaultContext, issues_model.FindMilestoneOptions{
|
|
|
|
RepoID: repo.ID,
|
2024-03-02 16:42:31 +01:00
|
|
|
IsClosed: optional.Some(true),
|
2020-07-28 13:30:40 +02:00
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Empty(t, milestones)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2022-06-13 11:37:59 +02:00
|
|
|
labels, err := issues_model.GetLabelsByRepoID(ctx, repo.ID, "", db.ListOptions{})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-08-18 02:47:18 +02:00
|
|
|
assert.Len(t, labels, 12)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2024-01-15 03:19:25 +01:00
|
|
|
releases, err := db.Find[repo_model.Release](db.DefaultContext, repo_model.FindReleasesOptions{
|
2021-09-24 13:32:56 +02:00
|
|
|
ListOptions: db.ListOptions{
|
2020-01-24 20:00:29 +01:00
|
|
|
PageSize: 10,
|
|
|
|
Page: 0,
|
|
|
|
},
|
2019-05-07 03:12:51 +02:00
|
|
|
IncludeTags: true,
|
2024-01-15 03:19:25 +01:00
|
|
|
RepoID: repo.ID,
|
2020-01-24 20:00:29 +01:00
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, releases, 8)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2024-01-15 03:19:25 +01:00
|
|
|
releases, err = db.Find[repo_model.Release](db.DefaultContext, repo_model.FindReleasesOptions{
|
2021-09-24 13:32:56 +02:00
|
|
|
ListOptions: db.ListOptions{
|
2020-01-24 20:00:29 +01:00
|
|
|
PageSize: 10,
|
|
|
|
Page: 0,
|
|
|
|
},
|
2019-05-07 03:12:51 +02:00
|
|
|
IncludeTags: false,
|
2024-01-15 03:19:25 +01:00
|
|
|
RepoID: repo.ID,
|
2020-01-24 20:00:29 +01:00
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, releases, 1)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2022-11-19 09:12:33 +01:00
|
|
|
issues, err := issues_model.Issues(db.DefaultContext, &issues_model.IssuesOptions{
|
2023-05-19 16:17:48 +02:00
|
|
|
RepoIDs: []int64{repo.ID},
|
2024-03-02 16:42:31 +01:00
|
|
|
IsPull: optional.Some(false),
|
2019-05-07 03:12:51 +02:00
|
|
|
SortType: "oldest",
|
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-08-18 02:47:18 +02:00
|
|
|
assert.Len(t, issues, 15)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, issues[0].LoadDiscussComments(db.DefaultContext))
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Empty(t, issues[0].Comments)
|
2019-05-07 03:12:51 +02:00
|
|
|
|
2023-09-15 08:13:19 +02:00
|
|
|
pulls, _, err := issues_model.PullRequests(db.DefaultContext, repo.ID, &issues_model.PullRequestsOptions{
|
2019-05-07 03:12:51 +02:00
|
|
|
SortType: "oldest",
|
|
|
|
})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2021-08-18 02:47:18 +02:00
|
|
|
assert.Len(t, pulls, 30)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, pulls[0].LoadIssue(db.DefaultContext))
|
|
|
|
require.NoError(t, pulls[0].Issue.LoadDiscussComments(db.DefaultContext))
|
2021-06-07 07:27:09 +02:00
|
|
|
assert.Len(t, pulls[0].Issue.Comments, 2)
|
2019-05-07 03:12:51 +02:00
|
|
|
}
|
2022-02-01 19:20:28 +01:00
|
|
|
|
2022-02-06 10:05:29 +01:00
|
|
|
func TestGiteaUploadRemapLocalUser(t *testing.T) {
|
|
|
|
unittest.PrepareTestEnv(t)
|
2022-08-16 04:22:25 +02:00
|
|
|
doer := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
|
|
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2022-02-06 10:05:29 +01:00
|
|
|
|
|
|
|
repoName := "migrated"
|
|
|
|
uploader := NewGiteaLocalUploader(context.Background(), doer, doer.Name, repoName)
|
|
|
|
// call remapLocalUser
|
|
|
|
uploader.sameApp = true
|
|
|
|
|
|
|
|
externalID := int64(1234567)
|
|
|
|
externalName := "username"
|
|
|
|
source := base.Release{
|
|
|
|
PublisherID: externalID,
|
|
|
|
PublisherName: externalName,
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// The externalID does not match any existing user, everything
|
2024-05-28 12:40:11 +02:00
|
|
|
// belongs to the Ghost user
|
2022-02-06 10:05:29 +01:00
|
|
|
//
|
2022-08-25 04:31:57 +02:00
|
|
|
target := repo_model.Release{}
|
2022-02-06 10:05:29 +01:00
|
|
|
uploader.userMap = make(map[int64]int64)
|
|
|
|
err := uploader.remapUser(&source, &target)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2024-05-28 12:40:11 +02:00
|
|
|
assert.EqualValues(t, user_model.GhostUserID, target.GetUserID())
|
2022-02-06 10:05:29 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// The externalID matches a known user but the name does not match,
|
2024-05-28 12:40:11 +02:00
|
|
|
// everything belongs to the Ghost user
|
2022-02-06 10:05:29 +01:00
|
|
|
//
|
|
|
|
source.PublisherID = user.ID
|
2022-08-25 04:31:57 +02:00
|
|
|
target = repo_model.Release{}
|
2022-02-06 10:05:29 +01:00
|
|
|
uploader.userMap = make(map[int64]int64)
|
|
|
|
err = uploader.remapUser(&source, &target)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2024-05-28 12:40:11 +02:00
|
|
|
assert.EqualValues(t, user_model.GhostUserID, target.GetUserID())
|
2022-02-06 10:05:29 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// The externalID and externalName match an existing user, everything
|
|
|
|
// belongs to the existing user
|
|
|
|
//
|
|
|
|
source.PublisherName = user.Name
|
2022-08-25 04:31:57 +02:00
|
|
|
target = repo_model.Release{}
|
2022-02-06 10:05:29 +01:00
|
|
|
uploader.userMap = make(map[int64]int64)
|
|
|
|
err = uploader.remapUser(&source, &target)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-06 10:05:29 +01:00
|
|
|
assert.EqualValues(t, user.ID, target.GetUserID())
|
|
|
|
}
|
|
|
|
|
2022-02-01 19:20:28 +01:00
|
|
|
func TestGiteaUploadRemapExternalUser(t *testing.T) {
|
|
|
|
unittest.PrepareTestEnv(t)
|
2022-08-16 04:22:25 +02:00
|
|
|
doer := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 1})
|
2022-02-01 19:20:28 +01:00
|
|
|
|
|
|
|
repoName := "migrated"
|
|
|
|
uploader := NewGiteaLocalUploader(context.Background(), doer, doer.Name, repoName)
|
|
|
|
uploader.gitServiceType = structs.GiteaService
|
2022-02-06 10:05:29 +01:00
|
|
|
// call remapExternalUser
|
|
|
|
uploader.sameApp = false
|
2022-02-01 19:20:28 +01:00
|
|
|
|
|
|
|
externalID := int64(1234567)
|
2022-02-06 10:05:29 +01:00
|
|
|
externalName := "username"
|
2022-02-01 19:20:28 +01:00
|
|
|
source := base.Release{
|
|
|
|
PublisherID: externalID,
|
|
|
|
PublisherName: externalName,
|
|
|
|
}
|
|
|
|
|
|
|
|
//
|
|
|
|
// When there is no user linked to the external ID, the migrated data is authored
|
2024-05-28 12:40:11 +02:00
|
|
|
// by the Ghost user
|
2022-02-01 19:20:28 +01:00
|
|
|
//
|
2022-02-06 10:05:29 +01:00
|
|
|
uploader.userMap = make(map[int64]int64)
|
2022-08-25 04:31:57 +02:00
|
|
|
target := repo_model.Release{}
|
2022-02-06 10:05:29 +01:00
|
|
|
err := uploader.remapUser(&source, &target)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2024-05-28 12:40:11 +02:00
|
|
|
assert.EqualValues(t, user_model.GhostUserID, target.GetUserID())
|
2022-02-01 19:20:28 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// Link the external ID to an existing user
|
|
|
|
//
|
2022-08-16 04:22:25 +02:00
|
|
|
linkedUser := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
|
2022-02-01 19:20:28 +01:00
|
|
|
externalLoginUser := &user_model.ExternalLoginUser{
|
|
|
|
ExternalID: strconv.FormatInt(externalID, 10),
|
|
|
|
UserID: linkedUser.ID,
|
|
|
|
LoginSourceID: 0,
|
|
|
|
Provider: structs.GiteaService.Name(),
|
|
|
|
}
|
2023-10-14 10:37:24 +02:00
|
|
|
err = user_model.LinkExternalToUser(db.DefaultContext, linkedUser, externalLoginUser)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-01 19:20:28 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// When a user is linked to the external ID, it becomes the author of
|
|
|
|
// the migrated data
|
|
|
|
//
|
2022-02-06 10:05:29 +01:00
|
|
|
uploader.userMap = make(map[int64]int64)
|
2022-08-25 04:31:57 +02:00
|
|
|
target = repo_model.Release{}
|
2022-02-06 10:05:29 +01:00
|
|
|
err = uploader.remapUser(&source, &target)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-06 10:05:29 +01:00
|
|
|
assert.EqualValues(t, linkedUser.ID, target.GetUserID())
|
2022-02-01 19:20:28 +01:00
|
|
|
}
|
2022-02-25 10:20:50 +01:00
|
|
|
|
|
|
|
func TestGiteaUploadUpdateGitForPullRequest(t *testing.T) {
|
|
|
|
unittest.PrepareTestEnv(t)
|
|
|
|
|
|
|
|
//
|
|
|
|
// fromRepo master
|
|
|
|
//
|
2022-08-16 04:22:25 +02:00
|
|
|
fromRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 1})
|
2022-02-25 10:20:50 +01:00
|
|
|
baseRef := "master"
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, git.InitRepository(git.DefaultContext, fromRepo.RepoPath(), false, fromRepo.ObjectFormatName))
|
2022-10-23 16:44:45 +02:00
|
|
|
err := git.NewCommand(git.DefaultContext, "symbolic-ref").AddDynamicArguments("HEAD", git.BranchPrefix+baseRef).Run(&git.RunOpts{Dir: fromRepo.RepoPath()})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, os.WriteFile(filepath.Join(fromRepo.RepoPath(), "README.md"), []byte(fmt.Sprintf("# Testing Repository\n\nOriginally created in: %s", fromRepo.RepoPath())), 0o644))
|
|
|
|
require.NoError(t, git.AddChanges(fromRepo.RepoPath(), true))
|
2022-02-25 10:20:50 +01:00
|
|
|
signature := git.Signature{
|
|
|
|
Email: "test@example.com",
|
|
|
|
Name: "test",
|
|
|
|
When: time.Now(),
|
|
|
|
}
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, git.CommitChanges(fromRepo.RepoPath(), git.CommitChangesOptions{
|
2022-02-25 10:20:50 +01:00
|
|
|
Committer: &signature,
|
|
|
|
Author: &signature,
|
|
|
|
Message: "Initial Commit",
|
|
|
|
}))
|
Simplify how git repositories are opened (#28937)
## Purpose
This is a refactor toward building an abstraction over managing git
repositories.
Afterwards, it does not matter anymore if they are stored on the local
disk or somewhere remote.
## What this PR changes
We used `git.OpenRepository` everywhere previously.
Now, we should split them into two distinct functions:
Firstly, there are temporary repositories which do not change:
```go
git.OpenRepository(ctx, diskPath)
```
Gitea managed repositories having a record in the database in the
`repository` table are moved into the new package `gitrepo`:
```go
gitrepo.OpenRepository(ctx, repo_model.Repo)
```
Why is `repo_model.Repository` the second parameter instead of file
path?
Because then we can easily adapt our repository storage strategy.
The repositories can be stored locally, however, they could just as well
be stored on a remote server.
## Further changes in other PRs
- A Git Command wrapper on package `gitrepo` could be created. i.e.
`NewCommand(ctx, repo_model.Repository, commands...)`. `git.RunOpts{Dir:
repo.RepoPath()}`, the directory should be empty before invoking this
method and it can be filled in the function only. #28940
- Remove the `RepoPath()`/`WikiPath()` functions to reduce the
possibility of mistakes.
---------
Co-authored-by: delvh <dev.lh@web.de>
2024-01-27 21:09:51 +01:00
|
|
|
fromGitRepo, err := gitrepo.OpenRepository(git.DefaultContext, fromRepo)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
defer fromGitRepo.Close()
|
|
|
|
baseSHA, err := fromGitRepo.GetBranchCommitID(baseRef)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// fromRepo branch1
|
|
|
|
//
|
|
|
|
headRef := "branch1"
|
2022-10-23 16:44:45 +02:00
|
|
|
_, _, err = git.NewCommand(git.DefaultContext, "checkout", "-b").AddDynamicArguments(headRef).RunStdString(&git.RunOpts{Dir: fromRepo.RepoPath()})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, os.WriteFile(filepath.Join(fromRepo.RepoPath(), "README.md"), []byte("SOMETHING"), 0o644))
|
|
|
|
require.NoError(t, git.AddChanges(fromRepo.RepoPath(), true))
|
2022-02-25 10:20:50 +01:00
|
|
|
signature.When = time.Now()
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, git.CommitChanges(fromRepo.RepoPath(), git.CommitChangesOptions{
|
2022-02-25 10:20:50 +01:00
|
|
|
Committer: &signature,
|
|
|
|
Author: &signature,
|
|
|
|
Message: "Pull request",
|
|
|
|
}))
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
headSHA, err := fromGitRepo.GetBranchCommitID(headRef)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
|
2022-08-16 04:22:25 +02:00
|
|
|
fromRepoOwner := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: fromRepo.OwnerID})
|
2022-02-25 10:20:50 +01:00
|
|
|
|
|
|
|
//
|
|
|
|
// forkRepo branch2
|
|
|
|
//
|
|
|
|
forkHeadRef := "branch2"
|
2022-08-16 04:22:25 +02:00
|
|
|
forkRepo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 8})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, git.CloneWithArgs(git.DefaultContext, nil, fromRepo.RepoPath(), forkRepo.RepoPath(), git.CloneRepoOptions{
|
2022-02-25 10:20:50 +01:00
|
|
|
Branch: headRef,
|
|
|
|
}))
|
2022-10-23 16:44:45 +02:00
|
|
|
_, _, err = git.NewCommand(git.DefaultContext, "checkout", "-b").AddDynamicArguments(forkHeadRef).RunStdString(&git.RunOpts{Dir: forkRepo.RepoPath()})
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
|
|
|
require.NoError(t, os.WriteFile(filepath.Join(forkRepo.RepoPath(), "README.md"), []byte(fmt.Sprintf("# branch2 %s", forkRepo.RepoPath())), 0o644))
|
|
|
|
require.NoError(t, git.AddChanges(forkRepo.RepoPath(), true))
|
|
|
|
require.NoError(t, git.CommitChanges(forkRepo.RepoPath(), git.CommitChangesOptions{
|
2022-02-25 10:20:50 +01:00
|
|
|
Committer: &signature,
|
|
|
|
Author: &signature,
|
|
|
|
Message: "branch2 commit",
|
|
|
|
}))
|
Simplify how git repositories are opened (#28937)
## Purpose
This is a refactor toward building an abstraction over managing git
repositories.
Afterwards, it does not matter anymore if they are stored on the local
disk or somewhere remote.
## What this PR changes
We used `git.OpenRepository` everywhere previously.
Now, we should split them into two distinct functions:
Firstly, there are temporary repositories which do not change:
```go
git.OpenRepository(ctx, diskPath)
```
Gitea managed repositories having a record in the database in the
`repository` table are moved into the new package `gitrepo`:
```go
gitrepo.OpenRepository(ctx, repo_model.Repo)
```
Why is `repo_model.Repository` the second parameter instead of file
path?
Because then we can easily adapt our repository storage strategy.
The repositories can be stored locally, however, they could just as well
be stored on a remote server.
## Further changes in other PRs
- A Git Command wrapper on package `gitrepo` could be created. i.e.
`NewCommand(ctx, repo_model.Repository, commands...)`. `git.RunOpts{Dir:
repo.RepoPath()}`, the directory should be empty before invoking this
method and it can be filled in the function only. #28940
- Remove the `RepoPath()`/`WikiPath()` functions to reduce the
possibility of mistakes.
---------
Co-authored-by: delvh <dev.lh@web.de>
2024-01-27 21:09:51 +01:00
|
|
|
forkGitRepo, err := gitrepo.OpenRepository(git.DefaultContext, forkRepo)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
defer forkGitRepo.Close()
|
|
|
|
forkHeadSHA, err := forkGitRepo.GetBranchCommitID(forkHeadRef)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
|
|
|
|
toRepoName := "migrated"
|
|
|
|
uploader := NewGiteaLocalUploader(context.Background(), fromRepoOwner, fromRepoOwner.Name, toRepoName)
|
|
|
|
uploader.gitServiceType = structs.GiteaService
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, uploader.CreateRepo(&base.Repository{
|
2022-02-25 10:20:50 +01:00
|
|
|
Description: "description",
|
|
|
|
OriginalURL: fromRepo.RepoPath(),
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
IsPrivate: false,
|
|
|
|
IsMirror: true,
|
|
|
|
}, base.MigrateOptions{
|
|
|
|
GitServiceType: structs.GiteaService,
|
|
|
|
Private: false,
|
|
|
|
Mirror: true,
|
|
|
|
}))
|
|
|
|
|
|
|
|
for _, testCase := range []struct {
|
2023-04-21 22:32:25 +02:00
|
|
|
name string
|
|
|
|
head string
|
|
|
|
logFilter []string
|
|
|
|
logFiltered []bool
|
|
|
|
pr base.PullRequest
|
2022-02-25 10:20:50 +01:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "fork, good Head.SHA",
|
|
|
|
head: fmt.Sprintf("%s/%s", forkRepo.OwnerName, forkHeadRef),
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: forkRepo.RepoPath(),
|
|
|
|
Ref: forkHeadRef,
|
|
|
|
SHA: forkHeadSHA,
|
|
|
|
RepoName: forkRepo.Name,
|
|
|
|
OwnerName: forkRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "fork, invalid Head.Ref",
|
|
|
|
head: "unknown repository",
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: forkRepo.RepoPath(),
|
|
|
|
Ref: "INVALID",
|
|
|
|
SHA: forkHeadSHA,
|
|
|
|
RepoName: forkRepo.Name,
|
|
|
|
OwnerName: forkRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
2023-04-21 22:32:25 +02:00
|
|
|
logFilter: []string{"Fetch branch from"},
|
|
|
|
logFiltered: []bool{true},
|
2022-02-25 10:20:50 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "invalid fork CloneURL",
|
|
|
|
head: "unknown repository",
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: "UNLIKELY",
|
|
|
|
Ref: forkHeadRef,
|
|
|
|
SHA: forkHeadSHA,
|
|
|
|
RepoName: forkRepo.Name,
|
|
|
|
OwnerName: "WRONG",
|
|
|
|
},
|
|
|
|
},
|
2023-04-21 22:32:25 +02:00
|
|
|
logFilter: []string{"AddRemote"},
|
|
|
|
logFiltered: []bool{true},
|
2022-02-25 10:20:50 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no fork, good Head.SHA",
|
|
|
|
head: headRef,
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: headRef,
|
|
|
|
SHA: headSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no fork, empty Head.SHA",
|
|
|
|
head: headRef,
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: headRef,
|
|
|
|
SHA: "",
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
2023-04-21 22:32:25 +02:00
|
|
|
logFilter: []string{"Empty reference", "Cannot remove local head"},
|
|
|
|
logFiltered: []bool{true, false},
|
2022-02-25 10:20:50 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no fork, invalid Head.SHA",
|
|
|
|
head: headRef,
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: headRef,
|
|
|
|
SHA: "brokenSHA",
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
2023-04-21 22:32:25 +02:00
|
|
|
logFilter: []string{"Deprecated local head"},
|
|
|
|
logFiltered: []bool{true},
|
2022-02-25 10:20:50 +01:00
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "no fork, not found Head.SHA",
|
|
|
|
head: headRef,
|
|
|
|
pr: base.PullRequest{
|
|
|
|
PatchURL: "",
|
|
|
|
Number: 1,
|
|
|
|
State: "open",
|
|
|
|
Base: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: baseRef,
|
|
|
|
SHA: baseSHA,
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
Head: base.PullRequestBranch{
|
|
|
|
CloneURL: fromRepo.RepoPath(),
|
|
|
|
Ref: headRef,
|
|
|
|
SHA: "2697b352310fcd01cbd1f3dbd43b894080027f68",
|
|
|
|
RepoName: fromRepo.Name,
|
|
|
|
OwnerName: fromRepo.OwnerName,
|
|
|
|
},
|
|
|
|
},
|
2023-04-21 22:32:25 +02:00
|
|
|
logFilter: []string{"Deprecated local head", "Cannot remove local head"},
|
|
|
|
logFiltered: []bool{true, false},
|
2022-02-25 10:20:50 +01:00
|
|
|
},
|
|
|
|
} {
|
|
|
|
t.Run(testCase.name, func(t *testing.T) {
|
2023-04-21 22:32:25 +02:00
|
|
|
stopMark := fmt.Sprintf(">>>>>>>>>>>>>STOP: %s<<<<<<<<<<<<<<<", testCase.name)
|
|
|
|
|
2024-01-25 11:35:29 +01:00
|
|
|
logChecker, cleanup := test.NewLogChecker(log.DEFAULT, log.INFO)
|
2023-04-21 22:32:25 +02:00
|
|
|
logChecker.Filter(testCase.logFilter...).StopMark(stopMark)
|
|
|
|
defer cleanup()
|
2022-02-25 10:20:50 +01:00
|
|
|
|
2022-09-04 12:47:56 +02:00
|
|
|
testCase.pr.EnsuredSafe = true
|
|
|
|
|
2022-02-25 10:20:50 +01:00
|
|
|
head, err := uploader.updateGitForPullRequest(&testCase.pr)
|
2024-07-30 21:41:10 +02:00
|
|
|
require.NoError(t, err)
|
2022-02-25 10:20:50 +01:00
|
|
|
assert.EqualValues(t, testCase.head, head)
|
2023-04-21 22:32:25 +02:00
|
|
|
|
|
|
|
log.Info(stopMark)
|
|
|
|
|
|
|
|
logFiltered, logStopped := logChecker.Check(5 * time.Second)
|
|
|
|
assert.True(t, logStopped)
|
|
|
|
if len(testCase.logFilter) > 0 {
|
|
|
|
assert.EqualValues(t, testCase.logFiltered, logFiltered, "for log message filters: %v", testCase.logFilter)
|
2022-02-25 10:20:50 +01:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|