Page Menu
Home
Software Heritage
Search
Configure Global Search
Log In
Files
F9345445
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Flag For Later
Size
171 KB
Subscribers
None
View Options
diff --git a/swh/web/tests/api/test_utils.py b/swh/web/tests/api/test_utils.py
index 4c253bcd..c47124c7 100644
--- a/swh/web/tests/api/test_utils.py
+++ b/swh/web/tests/api/test_utils.py
@@ -1,601 +1,597 @@
# Copyright (C) 2015-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
import random
-from hypothesis import given
-
from swh.model.hashutil import DEFAULT_ALGORITHMS
from swh.web.api import utils
from swh.web.common.origin_visits import get_origin_visits
from swh.web.common.utils import resolve_branch_alias, reverse
-from swh.web.tests.strategies import snapshot
url_map = [
{
"rule": "/other/<slug>",
"methods": set(["GET", "POST", "HEAD"]),
"endpoint": "foo",
},
{
"rule": "/some/old/url/<slug>",
"methods": set(["GET", "POST"]),
"endpoint": "blablafn",
},
{
"rule": "/other/old/url/<int:id>",
"methods": set(["GET", "HEAD"]),
"endpoint": "bar",
},
{"rule": "/other", "methods": set([]), "endpoint": None},
{"rule": "/other2", "methods": set([]), "endpoint": None},
]
def test_filter_field_keys_dict_unknown_keys():
actual_res = utils.filter_field_keys(
{"directory": 1, "file": 2, "link": 3}, {"directory1", "file2"}
)
assert actual_res == {}
def test_filter_field_keys_dict():
actual_res = utils.filter_field_keys(
{"directory": 1, "file": 2, "link": 3}, {"directory", "link"}
)
assert actual_res == {"directory": 1, "link": 3}
def test_filter_field_keys_list_unknown_keys():
actual_res = utils.filter_field_keys(
[{"directory": 1, "file": 2, "link": 3}, {"1": 1, "2": 2, "link": 3}], {"d"}
)
assert actual_res == [{}, {}]
def test_filter_field_keys_map():
actual_res = utils.filter_field_keys(
map(
lambda x: {"i": x["i"] + 1, "j": x["j"]},
[{"i": 1, "j": None}, {"i": 2, "j": None}, {"i": 3, "j": None}],
),
{"i"},
)
assert list(actual_res) == [{"i": 2}, {"i": 3}, {"i": 4}]
def test_filter_field_keys_list():
actual_res = utils.filter_field_keys(
[{"directory": 1, "file": 2, "link": 3}, {"dir": 1, "fil": 2, "lin": 3}],
{"directory", "dir"},
)
assert actual_res == [{"directory": 1}, {"dir": 1}]
def test_filter_field_keys_other():
input_set = {1, 2}
actual_res = utils.filter_field_keys(input_set, {"a", "1"})
assert actual_res == input_set
def test_person_to_string():
assert (
utils.person_to_string({"name": "raboof", "email": "foo@bar"})
== "raboof <foo@bar>"
)
def test_enrich_release_empty():
actual_release = utils.enrich_release({})
assert actual_release == {}
def test_enrich_release_content_target(api_request_factory, archive_data, release):
release_data = archive_data.release_get(release)
release_data["target_type"] = "content"
url = reverse("api-1-release", url_args={"sha1_git": release})
request = api_request_factory.get(url)
actual_release = utils.enrich_release(release_data, request)
release_data["target_url"] = reverse(
"api-1-content",
url_args={"q": f'sha1_git:{release_data["target"]}'},
request=request,
)
assert actual_release == release_data
def test_enrich_release_directory_target(api_request_factory, archive_data, release):
release_data = archive_data.release_get(release)
release_data["target_type"] = "directory"
url = reverse("api-1-release", url_args={"sha1_git": release})
request = api_request_factory.get(url)
actual_release = utils.enrich_release(release_data, request)
release_data["target_url"] = reverse(
"api-1-directory",
url_args={"sha1_git": release_data["target"]},
request=request,
)
assert actual_release == release_data
def test_enrich_release_revision_target(api_request_factory, archive_data, release):
release_data = archive_data.release_get(release)
release_data["target_type"] = "revision"
url = reverse("api-1-release", url_args={"sha1_git": release})
request = api_request_factory.get(url)
actual_release = utils.enrich_release(release_data, request)
release_data["target_url"] = reverse(
"api-1-revision", url_args={"sha1_git": release_data["target"]}, request=request
)
assert actual_release == release_data
def test_enrich_release_release_target(api_request_factory, archive_data, release):
release_data = archive_data.release_get(release)
release_data["target_type"] = "release"
url = reverse("api-1-release", url_args={"sha1_git": release})
request = api_request_factory.get(url)
actual_release = utils.enrich_release(release_data, request)
release_data["target_url"] = reverse(
"api-1-release", url_args={"sha1_git": release_data["target"]}, request=request
)
assert actual_release == release_data
def test_enrich_directory_entry_no_type():
assert utils.enrich_directory_entry({"id": "dir-id"}) == {"id": "dir-id"}
def test_enrich_directory_entry_with_type(api_request_factory, archive_data, directory):
dir_content = archive_data.directory_ls(directory)
dir_entry = random.choice(dir_content)
url = reverse("api-1-directory", url_args={"sha1_git": directory})
request = api_request_factory.get(url)
actual_directory = utils.enrich_directory_entry(dir_entry, request)
if dir_entry["type"] == "file":
dir_entry["target_url"] = reverse(
"api-1-content",
url_args={"q": f'sha1_git:{dir_entry["target"]}'},
request=request,
)
elif dir_entry["type"] == "dir":
dir_entry["target_url"] = reverse(
"api-1-directory",
url_args={"sha1_git": dir_entry["target"]},
request=request,
)
elif dir_entry["type"] == "rev":
dir_entry["target_url"] = reverse(
"api-1-revision",
url_args={"sha1_git": dir_entry["target"]},
request=request,
)
assert actual_directory == dir_entry
def test_enrich_content_without_hashes():
assert utils.enrich_content({"id": "123"}) == {"id": "123"}
def test_enrich_content_with_hashes(api_request_factory, content):
for algo in DEFAULT_ALGORITHMS:
content_data = dict(content)
query_string = "%s:%s" % (algo, content_data[algo])
url = reverse("api-1-content", url_args={"q": query_string})
request = api_request_factory.get(url)
enriched_content = utils.enrich_content(
content_data, query_string=query_string, request=request
)
content_data["data_url"] = reverse(
"api-1-content-raw", url_args={"q": query_string}, request=request
)
content_data["filetype_url"] = reverse(
"api-1-content-filetype", url_args={"q": query_string}, request=request
)
content_data["language_url"] = reverse(
"api-1-content-language", url_args={"q": query_string}, request=request
)
content_data["license_url"] = reverse(
"api-1-content-license", url_args={"q": query_string}, request=request
)
assert enriched_content == content_data
def test_enrich_content_with_hashes_and_top_level_url(api_request_factory, content):
for algo in DEFAULT_ALGORITHMS:
content_data = dict(content)
query_string = "%s:%s" % (algo, content_data[algo])
url = reverse("api-1-content", url_args={"q": query_string})
request = api_request_factory.get(url)
enriched_content = utils.enrich_content(
content_data, query_string=query_string, top_url=True, request=request
)
content_data["content_url"] = reverse(
"api-1-content", url_args={"q": query_string}, request=request
)
content_data["data_url"] = reverse(
"api-1-content-raw", url_args={"q": query_string}, request=request
)
content_data["filetype_url"] = reverse(
"api-1-content-filetype", url_args={"q": query_string}, request=request
)
content_data["language_url"] = reverse(
"api-1-content-language", url_args={"q": query_string}, request=request
)
content_data["license_url"] = reverse(
"api-1-content-license", url_args={"q": query_string}, request=request
)
assert enriched_content == content_data
def test_enrich_revision_without_children_or_parent(
api_request_factory, archive_data, revision
):
revision_data = archive_data.revision_get(revision)
del revision_data["parents"]
url = reverse("api-1-revision", url_args={"sha1_git": revision})
request = api_request_factory.get(url)
actual_revision = utils.enrich_revision(revision_data, request)
revision_data["url"] = reverse(
"api-1-revision", url_args={"sha1_git": revision}, request=request
)
revision_data["history_url"] = reverse(
"api-1-revision-log", url_args={"sha1_git": revision}, request=request
)
revision_data["directory_url"] = reverse(
"api-1-directory",
url_args={"sha1_git": revision_data["directory"]},
request=request,
)
assert actual_revision == revision_data
def test_enrich_revision_with_children_and_parent_no_dir(
api_request_factory, archive_data, revisions_list
):
revision, parent_revision, child_revision = revisions_list(size=3)
revision_data = archive_data.revision_get(revision)
del revision_data["directory"]
revision_data["parents"] = revision_data["parents"] + (parent_revision,)
revision_data["children"] = child_revision
url = reverse("api-1-revision", url_args={"sha1_git": revision})
request = api_request_factory.get(url)
actual_revision = utils.enrich_revision(revision_data, request)
revision_data["url"] = reverse(
"api-1-revision", url_args={"sha1_git": revision}, request=request
)
revision_data["history_url"] = reverse(
"api-1-revision-log", url_args={"sha1_git": revision}, request=request
)
revision_data["parents"] = tuple(
{
"id": p["id"],
"url": reverse(
"api-1-revision", url_args={"sha1_git": p["id"]}, request=request
),
}
for p in revision_data["parents"]
)
revision_data["children_urls"] = [
reverse(
"api-1-revision", url_args={"sha1_git": child_revision}, request=request
)
]
assert actual_revision == revision_data
def test_enrich_revisionno_context(api_request_factory, revisions_list):
revision, parent_revision, child_revision = revisions_list(size=3)
revision_data = {
"id": revision,
"parents": [parent_revision],
"children": [child_revision],
}
url = reverse("api-1-revision", url_args={"sha1_git": revision})
request = api_request_factory.get(url)
actual_revision = utils.enrich_revision(revision_data, request)
revision_data["url"] = reverse(
"api-1-revision", url_args={"sha1_git": revision}, request=request
)
revision_data["history_url"] = reverse(
"api-1-revision-log", url_args={"sha1_git": revision}, request=request
)
revision_data["parents"] = tuple(
{
"id": parent_revision,
"url": reverse(
"api-1-revision",
url_args={"sha1_git": parent_revision},
request=request,
),
}
)
revision_data["children_urls"] = [
reverse(
"api-1-revision", url_args={"sha1_git": child_revision}, request=request
)
]
assert actual_revision == revision_data
def test_enrich_revision_with_no_message(
api_request_factory, archive_data, revisions_list
):
revision, parent_revision, child_revision = revisions_list(size=3)
revision_data = archive_data.revision_get(revision)
revision_data["message"] = None
revision_data["parents"] = revision_data["parents"] + (parent_revision,)
revision_data["children"] = child_revision
url = reverse("api-1-revision", url_args={"sha1_git": revision})
request = api_request_factory.get(url)
actual_revision = utils.enrich_revision(revision_data, request)
revision_data["url"] = reverse(
"api-1-revision", url_args={"sha1_git": revision}, request=request
)
revision_data["directory_url"] = reverse(
"api-1-directory",
url_args={"sha1_git": revision_data["directory"]},
request=request,
)
revision_data["history_url"] = reverse(
"api-1-revision-log", url_args={"sha1_git": revision}, request=request
)
revision_data["parents"] = tuple(
{
"id": p["id"],
"url": reverse(
"api-1-revision", url_args={"sha1_git": p["id"]}, request=request
),
}
for p in revision_data["parents"]
)
revision_data["children_urls"] = [
reverse(
"api-1-revision", url_args={"sha1_git": child_revision}, request=request
)
]
assert actual_revision == revision_data
def test_enrich_revision_with_invalid_message(
api_request_factory, archive_data, revisions_list
):
revision, parent_revision, child_revision = revisions_list(size=3)
revision_data = archive_data.revision_get(revision)
revision_data["decoding_failures"] = ["message"]
revision_data["parents"] = revision_data["parents"] + (parent_revision,)
revision_data["children"] = child_revision
url = reverse("api-1-revision", url_args={"sha1_git": revision})
request = api_request_factory.get(url)
actual_revision = utils.enrich_revision(revision_data, request)
revision_data["url"] = reverse(
"api-1-revision", url_args={"sha1_git": revision}, request=request
)
revision_data["message_url"] = reverse(
"api-1-revision-raw-message", url_args={"sha1_git": revision}, request=request
)
revision_data["directory_url"] = reverse(
"api-1-directory",
url_args={"sha1_git": revision_data["directory"]},
request=request,
)
revision_data["history_url"] = reverse(
"api-1-revision-log", url_args={"sha1_git": revision}, request=request
)
revision_data["parents"] = tuple(
{
"id": p["id"],
"url": reverse(
"api-1-revision", url_args={"sha1_git": p["id"]}, request=request
),
}
for p in revision_data["parents"]
)
revision_data["children_urls"] = [
reverse(
"api-1-revision", url_args={"sha1_git": child_revision}, request=request
)
]
assert actual_revision == revision_data
-@given(snapshot())
def test_enrich_snapshot(api_request_factory, archive_data, snapshot):
snapshot_data = archive_data.snapshot_get(snapshot)
url = reverse("api-1-snapshot", url_args={"snapshot_id": snapshot})
request = api_request_factory.get(url)
actual_snapshot = utils.enrich_snapshot(snapshot_data, request)
for _, b in snapshot_data["branches"].items():
if b["target_type"] in ("directory", "revision", "release"):
b["target_url"] = reverse(
f'api-1-{b["target_type"]}',
url_args={"sha1_git": b["target"]},
request=request,
)
elif b["target_type"] == "content":
b["target_url"] = reverse(
"api-1-content",
url_args={"q": f'sha1_git:{b["target"]}'},
request=request,
)
for _, b in snapshot_data["branches"].items():
if b["target_type"] == "alias":
target = resolve_branch_alias(snapshot_data, b)
b["target_url"] = target["target_url"]
assert actual_snapshot == snapshot_data
def test_enrich_origin(api_request_factory, origin):
url = reverse("api-1-origin", url_args={"origin_url": origin["url"]})
request = api_request_factory.get(url)
origin_data = {"url": origin["url"]}
actual_origin = utils.enrich_origin(origin_data, request)
origin_data["origin_visits_url"] = reverse(
"api-1-origin-visits", url_args={"origin_url": origin["url"]}, request=request
)
assert actual_origin == origin_data
def test_enrich_origin_search_result(api_request_factory, origin):
url = reverse("api-1-origin-search", url_args={"url_pattern": origin["url"]})
request = api_request_factory.get(url)
origin_visits_url = reverse(
"api-1-origin-visits", url_args={"origin_url": origin["url"]}, request=request
)
origin_search_result_data = (
[{"url": origin["url"]}],
None,
)
enriched_origin_search_result = (
[{"url": origin["url"], "origin_visits_url": origin_visits_url}],
None,
)
assert (
utils.enrich_origin_search_result(origin_search_result_data, request=request)
== enriched_origin_search_result
)
def test_enrich_origin_visit(api_request_factory, origin):
origin_visit = random.choice(get_origin_visits(origin))
url = reverse(
"api-1-origin-visit",
url_args={"origin_url": origin["url"], "visit_id": origin_visit["visit"]},
)
request = api_request_factory.get(url)
actual_origin_visit = utils.enrich_origin_visit(
origin_visit,
with_origin_link=True,
with_origin_visit_link=True,
request=request,
)
origin_visit["origin_url"] = reverse(
"api-1-origin", url_args={"origin_url": origin["url"]}, request=request
)
origin_visit["origin_visit_url"] = reverse(
"api-1-origin-visit",
url_args={"origin_url": origin["url"], "visit_id": origin_visit["visit"]},
request=request,
)
origin_visit["snapshot_url"] = reverse(
"api-1-snapshot",
url_args={"snapshot_id": origin_visit["snapshot"]},
request=request,
)
assert actual_origin_visit == origin_visit
diff --git a/swh/web/tests/api/views/test_identifiers.py b/swh/web/tests/api/views/test_identifiers.py
index d46b121a..7d842412 100644
--- a/swh/web/tests/api/views/test_identifiers.py
+++ b/swh/web/tests/api/views/test_identifiers.py
@@ -1,182 +1,179 @@
# Copyright (C) 2018-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
from hypothesis import given
from swh.model.swhids import ObjectType
from swh.web.common.identifiers import gen_swhid
from swh.web.common.utils import reverse
from swh.web.tests.data import random_sha1
from swh.web.tests.strategies import (
- snapshot,
unknown_content,
unknown_directory,
unknown_release,
unknown_revision,
unknown_snapshot,
)
from swh.web.tests.utils import check_api_get_responses, check_api_post_responses
-@given(snapshot())
def test_swhid_resolve_success(
api_client, content, directory, origin, release, revision, snapshot
):
for obj_type, obj_id in (
(ObjectType.CONTENT, content["sha1_git"]),
(ObjectType.DIRECTORY, directory),
(ObjectType.RELEASE, release),
(ObjectType.REVISION, revision),
(ObjectType.SNAPSHOT, snapshot),
):
swhid = gen_swhid(obj_type, obj_id, metadata={"origin": origin["url"]})
url = reverse("api-1-resolve-swhid", url_args={"swhid": swhid})
resp = check_api_get_responses(api_client, url, status_code=200)
if obj_type == ObjectType.CONTENT:
url_args = {"query_string": "sha1_git:%s" % obj_id}
elif obj_type == ObjectType.SNAPSHOT:
url_args = {"snapshot_id": obj_id}
else:
url_args = {"sha1_git": obj_id}
obj_type_str = obj_type.name.lower()
browse_rev_url = reverse(
f"browse-{obj_type_str}",
url_args=url_args,
query_params={"origin_url": origin["url"]},
request=resp.wsgi_request,
)
expected_result = {
"browse_url": browse_rev_url,
"metadata": {"origin": origin["url"]},
"namespace": "swh",
"object_id": obj_id,
"object_type": obj_type_str,
"scheme_version": 1,
}
assert resp.data == expected_result
def test_swhid_resolve_invalid(api_client):
rev_id_invalid = "96db9023b8_foo_50d6c108e9a3"
swhid = "swh:1:rev:%s" % rev_id_invalid
url = reverse("api-1-resolve-swhid", url_args={"swhid": swhid})
check_api_get_responses(api_client, url, status_code=400)
@given(
unknown_content(),
unknown_directory(),
unknown_release(),
unknown_revision(),
unknown_snapshot(),
)
def test_swhid_resolve_not_found(
api_client,
unknown_content,
unknown_directory,
unknown_release,
unknown_revision,
unknown_snapshot,
):
for obj_type, obj_id in (
(ObjectType.CONTENT, unknown_content["sha1_git"]),
(ObjectType.DIRECTORY, unknown_directory),
(ObjectType.RELEASE, unknown_release),
(ObjectType.REVISION, unknown_revision),
(ObjectType.SNAPSHOT, unknown_snapshot),
):
swhid = gen_swhid(obj_type, obj_id)
url = reverse("api-1-resolve-swhid", url_args={"swhid": swhid})
check_api_get_responses(api_client, url, status_code=404)
def test_swh_origin_id_not_resolvable(api_client):
ori_swhid = "swh:1:ori:8068d0075010b590762c6cb5682ed53cb3c13deb"
url = reverse("api-1-resolve-swhid", url_args={"swhid": ori_swhid})
check_api_get_responses(api_client, url, status_code=400)
-@given(snapshot())
def test_api_known_swhid_all_present(
api_client, content, directory, release, revision, snapshot
):
input_swhids = [
gen_swhid(ObjectType.CONTENT, content["sha1_git"]),
gen_swhid(ObjectType.DIRECTORY, directory),
gen_swhid(ObjectType.REVISION, revision),
gen_swhid(ObjectType.RELEASE, release),
gen_swhid(ObjectType.SNAPSHOT, snapshot),
]
url = reverse("api-1-known")
resp = check_api_post_responses(api_client, url, data=input_swhids, status_code=200)
assert resp.data == {swhid: {"known": True} for swhid in input_swhids}
def test_api_known_swhid_some_present(api_client, content, directory):
content_ = gen_swhid(ObjectType.CONTENT, content["sha1_git"])
directory_ = gen_swhid(ObjectType.DIRECTORY, directory)
unknown_revision_ = gen_swhid(ObjectType.REVISION, random_sha1())
unknown_release_ = gen_swhid(ObjectType.RELEASE, random_sha1())
unknown_snapshot_ = gen_swhid(ObjectType.SNAPSHOT, random_sha1())
input_swhids = [
content_,
directory_,
unknown_revision_,
unknown_release_,
unknown_snapshot_,
]
url = reverse("api-1-known")
resp = check_api_post_responses(api_client, url, data=input_swhids, status_code=200)
assert resp.data == {
content_: {"known": True},
directory_: {"known": True},
unknown_revision_: {"known": False},
unknown_release_: {"known": False},
unknown_snapshot_: {"known": False},
}
def test_api_known_invalid_swhid(api_client):
invalid_swhid_sha1 = ["swh:1:cnt:8068d0075010b590762c6cb5682ed53cb3c13de;"]
invalid_swhid_type = ["swh:1:cnn:8068d0075010b590762c6cb5682ed53cb3c13deb"]
url = reverse("api-1-known")
check_api_post_responses(api_client, url, data=invalid_swhid_sha1, status_code=400)
check_api_post_responses(api_client, url, data=invalid_swhid_type, status_code=400)
def test_api_known_raises_large_payload_error(api_client):
random_swhid = "swh:1:cnt:8068d0075010b590762c6cb5682ed53cb3c13deb"
limit = 10000
err_msg = "The maximum number of SWHIDs this endpoint can receive is 1000"
swhids = [random_swhid for i in range(limit)]
url = reverse("api-1-known")
resp = check_api_post_responses(api_client, url, data=swhids, status_code=413)
assert resp.data == {"exception": "LargePayloadExc", "reason": err_msg}
diff --git a/swh/web/tests/api/views/test_snapshot.py b/swh/web/tests/api/views/test_snapshot.py
index 0107a1c0..5a2c9148 100644
--- a/swh/web/tests/api/views/test_snapshot.py
+++ b/swh/web/tests/api/views/test_snapshot.py
@@ -1,163 +1,159 @@
# Copyright (C) 2018-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
import random
from hypothesis import given
from swh.model.hashutil import hash_to_hex
from swh.model.model import Snapshot
from swh.web.api.utils import enrich_snapshot
from swh.web.common.utils import reverse
from swh.web.tests.data import random_sha1
-from swh.web.tests.strategies import new_snapshot, snapshot
+from swh.web.tests.strategies import new_snapshot
from swh.web.tests.utils import check_api_get_responses, check_http_get_response
-@given(snapshot())
def test_api_snapshot(api_client, archive_data, snapshot):
url = reverse("api-1-snapshot", url_args={"snapshot_id": snapshot})
rv = check_api_get_responses(api_client, url, status_code=200)
expected_data = {**archive_data.snapshot_get(snapshot), "next_branch": None}
expected_data = enrich_snapshot(expected_data, rv.wsgi_request)
assert rv.data == expected_data
-@given(snapshot())
def test_api_snapshot_paginated(api_client, archive_data, snapshot):
branches_offset = 0
branches_count = 2
snapshot_branches = []
for k, v in sorted(archive_data.snapshot_get(snapshot)["branches"].items()):
snapshot_branches.append(
{"name": k, "target_type": v["target_type"], "target": v["target"]}
)
whole_snapshot = {"id": snapshot, "branches": {}, "next_branch": None}
while branches_offset < len(snapshot_branches):
branches_from = snapshot_branches[branches_offset]["name"]
url = reverse(
"api-1-snapshot",
url_args={"snapshot_id": snapshot},
query_params={
"branches_from": branches_from,
"branches_count": branches_count,
},
)
rv = check_api_get_responses(api_client, url, status_code=200)
expected_data = archive_data.snapshot_get_branches(
snapshot, branches_from, branches_count
)
expected_data = enrich_snapshot(expected_data, rv.wsgi_request)
branches_offset += branches_count
if branches_offset < len(snapshot_branches):
next_branch = snapshot_branches[branches_offset]["name"]
expected_data["next_branch"] = next_branch
else:
expected_data["next_branch"] = None
assert rv.data == expected_data
whole_snapshot["branches"].update(expected_data["branches"])
if branches_offset < len(snapshot_branches):
next_url = rv.wsgi_request.build_absolute_uri(
reverse(
"api-1-snapshot",
url_args={"snapshot_id": snapshot},
query_params={
"branches_from": next_branch,
"branches_count": branches_count,
},
)
)
assert rv["Link"] == '<%s>; rel="next"' % next_url
else:
assert not rv.has_header("Link")
url = reverse("api-1-snapshot", url_args={"snapshot_id": snapshot})
rv = check_api_get_responses(api_client, url, status_code=200)
assert rv.data == whole_snapshot
-@given(snapshot())
def test_api_snapshot_filtered(api_client, archive_data, snapshot):
snapshot_branches = []
for k, v in sorted(archive_data.snapshot_get(snapshot)["branches"].items()):
snapshot_branches.append(
{"name": k, "target_type": v["target_type"], "target": v["target"]}
)
target_type = random.choice(snapshot_branches)["target_type"]
url = reverse(
"api-1-snapshot",
url_args={"snapshot_id": snapshot},
query_params={"target_types": target_type},
)
rv = check_api_get_responses(api_client, url, status_code=200)
expected_data = archive_data.snapshot_get_branches(
snapshot, target_types=target_type
)
expected_data = enrich_snapshot(expected_data, rv.wsgi_request)
assert rv.data == expected_data
def test_api_snapshot_errors(api_client):
unknown_snapshot_ = random_sha1()
url = reverse("api-1-snapshot", url_args={"snapshot_id": "63ce369"})
check_api_get_responses(api_client, url, status_code=400)
url = reverse("api-1-snapshot", url_args={"snapshot_id": unknown_snapshot_})
check_api_get_responses(api_client, url, status_code=404)
-@given(snapshot())
def test_api_snapshot_uppercase(api_client, snapshot):
url = reverse(
"api-1-snapshot-uppercase-checksum", url_args={"snapshot_id": snapshot.upper()}
)
resp = check_http_get_response(api_client, url, status_code=302)
redirect_url = reverse(
"api-1-snapshot-uppercase-checksum", url_args={"snapshot_id": snapshot}
)
assert resp["location"] == redirect_url
@given(new_snapshot(min_size=4))
def test_api_snapshot_null_branch(api_client, archive_data, new_snapshot):
snp_dict = new_snapshot.to_dict()
snp_id = hash_to_hex(snp_dict["id"])
for branch in snp_dict["branches"].keys():
snp_dict["branches"][branch] = None
break
archive_data.snapshot_add([Snapshot.from_dict(snp_dict)])
url = reverse("api-1-snapshot", url_args={"snapshot_id": snp_id})
check_api_get_responses(api_client, url, status_code=200)
def test_api_snapshot_no_pull_request_branches_filtering(
api_client, archive_data, origin_with_pull_request_branches
):
"""Pull request branches should not be filtered out when querying
a snapshot with the Web API."""
snapshot = archive_data.snapshot_get_latest(origin_with_pull_request_branches.url)
url = reverse("api-1-snapshot", url_args={"snapshot_id": snapshot["id"]})
resp = check_api_get_responses(api_client, url, status_code=200)
assert any([b.startswith("refs/pull/") for b in resp.data["branches"]])
diff --git a/swh/web/tests/browse/test_snapshot_context.py b/swh/web/tests/browse/test_snapshot_context.py
index 629e7d06..a84bcbce 100644
--- a/swh/web/tests/browse/test_snapshot_context.py
+++ b/swh/web/tests/browse/test_snapshot_context.py
@@ -1,410 +1,406 @@
# Copyright (C) 2020-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
import random
-from hypothesis import given
-
from swh.model.swhids import ObjectType
from swh.web.browse.snapshot_context import (
_get_release,
get_origin_visit_snapshot,
get_snapshot_content,
get_snapshot_context,
)
from swh.web.browse.utils import gen_revision_url
from swh.web.common.identifiers import gen_swhid
from swh.web.common.origin_visits import get_origin_visit, get_origin_visits
from swh.web.common.typing import (
SnapshotBranchInfo,
SnapshotContext,
SnapshotReleaseInfo,
)
from swh.web.common.utils import format_utc_iso_date, reverse
-from swh.web.tests.strategies import snapshot
def test_get_origin_visit_snapshot_simple(archive_data, origin_with_multiple_visits):
visits = archive_data.origin_visit_get(origin_with_multiple_visits["url"])
for visit in visits:
snapshot = archive_data.snapshot_get(visit["snapshot"])
branches = []
releases = []
def _process_branch_data(branch, branch_data, alias=False):
if branch_data["target_type"] == "revision":
rev_data = archive_data.revision_get(branch_data["target"])
branches.append(
SnapshotBranchInfo(
name=branch,
alias=alias,
revision=branch_data["target"],
directory=rev_data["directory"],
date=format_utc_iso_date(rev_data["date"]),
message=rev_data["message"],
url=None,
)
)
elif branch_data["target_type"] == "release":
rel_data = archive_data.release_get(branch_data["target"])
rev_data = archive_data.revision_get(rel_data["target"])
releases.append(
SnapshotReleaseInfo(
name=rel_data["name"],
alias=alias,
branch_name=branch,
date=format_utc_iso_date(rel_data["date"]),
id=rel_data["id"],
message=rel_data["message"],
target_type=rel_data["target_type"],
target=rel_data["target"],
directory=rev_data["directory"],
url=None,
)
)
aliases = {}
for branch in sorted(snapshot["branches"].keys()):
branch_data = snapshot["branches"][branch]
if branch_data["target_type"] == "alias":
target_data = snapshot["branches"][branch_data["target"]]
aliases[branch] = target_data
_process_branch_data(branch, target_data, alias=True)
else:
_process_branch_data(branch, branch_data)
assert branches and releases, "Incomplete test data."
origin_visit_branches = get_origin_visit_snapshot(
origin_with_multiple_visits, visit_id=visit["visit"]
)
assert origin_visit_branches == (branches, releases, aliases)
-@given(snapshot())
def test_get_snapshot_context_no_origin(archive_data, snapshot):
for browse_context, kwargs in (
("content", {"snapshot_id": snapshot, "path": "/some/path"}),
("directory", {"snapshot_id": snapshot}),
("log", {"snapshot_id": snapshot}),
):
url_args = {"snapshot_id": snapshot}
query_params = dict(kwargs)
query_params.pop("snapshot_id")
snapshot_context = get_snapshot_context(**kwargs, browse_context=browse_context)
branches, releases, _ = get_snapshot_content(snapshot)
releases = list(reversed(releases))
revision_id = None
root_directory = None
for branch in branches:
if branch["name"] == "HEAD":
revision_id = branch["revision"]
root_directory = branch["directory"]
branch["url"] = reverse(
f"browse-snapshot-{browse_context}",
url_args=url_args,
query_params={"branch": branch["name"], **query_params},
)
for release in releases:
release["url"] = reverse(
f"browse-snapshot-{browse_context}",
url_args=url_args,
query_params={"release": release["name"], **query_params},
)
branches_url = reverse("browse-snapshot-branches", url_args=url_args)
releases_url = reverse("browse-snapshot-releases", url_args=url_args)
directory_url = reverse("browse-snapshot-directory", url_args=url_args)
is_empty = not branches and not releases
snapshot_swhid = gen_swhid(ObjectType.SNAPSHOT, snapshot)
snapshot_sizes = archive_data.snapshot_count_branches(snapshot)
expected = SnapshotContext(
branch="HEAD",
branch_alias=True,
branches=branches,
branches_url=branches_url,
is_empty=is_empty,
origin_info=None,
origin_visits_url=None,
release=None,
release_alias=False,
release_id=None,
query_params=query_params,
releases=releases,
releases_url=releases_url,
revision_id=revision_id,
revision_info=_get_revision_info(archive_data, revision_id),
root_directory=root_directory,
snapshot_id=snapshot,
snapshot_sizes=snapshot_sizes,
snapshot_swhid=snapshot_swhid,
url_args=url_args,
visit_info=None,
directory_url=directory_url,
)
if revision_id:
expected["revision_info"]["revision_url"] = gen_revision_url(
revision_id, snapshot_context
)
assert snapshot_context == expected
_check_branch_release_revision_parameters(
archive_data, expected, browse_context, kwargs, branches, releases
)
def test_get_snapshot_context_with_origin(archive_data, origin_with_multiple_visits):
origin_visits = get_origin_visits(origin_with_multiple_visits)
timestamp = format_utc_iso_date(origin_visits[0]["date"], "%Y-%m-%dT%H:%M:%SZ")
visit_id = origin_visits[1]["visit"]
origin_url = origin_with_multiple_visits["url"]
for browse_context, kwargs in (
("content", {"origin_url": origin_url, "path": "/some/path"}),
("directory", {"origin_url": origin_url}),
("log", {"origin_url": origin_url}),
("directory", {"origin_url": origin_url, "timestamp": timestamp,},),
("directory", {"origin_url": origin_url, "visit_id": visit_id,},),
):
visit_id = kwargs["visit_id"] if "visit_id" in kwargs else None
visit_ts = kwargs["timestamp"] if "timestamp" in kwargs else None
visit_info = get_origin_visit(
{"url": kwargs["origin_url"]}, visit_ts=visit_ts, visit_id=visit_id
)
snapshot = visit_info["snapshot"]
snapshot_context = get_snapshot_context(**kwargs, browse_context=browse_context)
query_params = dict(kwargs)
branches, releases, _ = get_snapshot_content(snapshot)
releases = list(reversed(releases))
revision_id = None
root_directory = None
for branch in branches:
if branch["name"] == "HEAD":
revision_id = branch["revision"]
root_directory = branch["directory"]
branch["url"] = reverse(
f"browse-origin-{browse_context}",
query_params={"branch": branch["name"], **query_params},
)
for release in releases:
release["url"] = reverse(
f"browse-origin-{browse_context}",
query_params={"release": release["name"], **query_params},
)
query_params.pop("path", None)
branches_url = reverse("browse-origin-branches", query_params=query_params)
releases_url = reverse("browse-origin-releases", query_params=query_params)
origin_visits_url = reverse(
"browse-origin-visits", query_params={"origin_url": kwargs["origin_url"]}
)
is_empty = not branches and not releases
snapshot_swhid = gen_swhid(ObjectType.SNAPSHOT, snapshot)
snapshot_sizes = archive_data.snapshot_count_branches(snapshot)
visit_info["url"] = directory_url = reverse(
"browse-origin-directory", query_params=query_params
)
visit_info["formatted_date"] = format_utc_iso_date(visit_info["date"])
if "path" in kwargs:
query_params["path"] = kwargs["path"]
expected = SnapshotContext(
branch="HEAD",
branch_alias=True,
branches=branches,
branches_url=branches_url,
is_empty=is_empty,
origin_info={"url": origin_url},
origin_visits_url=origin_visits_url,
release=None,
release_alias=False,
release_id=None,
query_params=query_params,
releases=releases,
releases_url=releases_url,
revision_id=revision_id,
revision_info=_get_revision_info(archive_data, revision_id),
root_directory=root_directory,
snapshot_id=snapshot,
snapshot_sizes=snapshot_sizes,
snapshot_swhid=snapshot_swhid,
url_args={},
visit_info=visit_info,
directory_url=directory_url,
)
if revision_id:
expected["revision_info"]["revision_url"] = gen_revision_url(
revision_id, snapshot_context
)
assert snapshot_context == expected
_check_branch_release_revision_parameters(
archive_data, expected, browse_context, kwargs, branches, releases
)
def _check_branch_release_revision_parameters(
archive_data, base_expected_context, browse_context, kwargs, branches, releases,
):
branch = random.choice(branches)
snapshot_context = get_snapshot_context(
**kwargs, browse_context=browse_context, branch_name=branch["name"]
)
url_args = dict(kwargs)
url_args.pop("path", None)
url_args.pop("timestamp", None)
url_args.pop("visit_id", None)
url_args.pop("origin_url", None)
query_params = dict(kwargs)
query_params.pop("snapshot_id", None)
expected_branch = dict(base_expected_context)
expected_branch["branch"] = branch["name"]
expected_branch["branch_alias"] = branch["alias"]
expected_branch["revision_id"] = branch["revision"]
expected_branch["revision_info"] = _get_revision_info(
archive_data, branch["revision"]
)
expected_branch["root_directory"] = branch["directory"]
expected_branch["query_params"] = {"branch": branch["name"], **query_params}
expected_branch["revision_info"]["revision_url"] = gen_revision_url(
branch["revision"], expected_branch
)
assert snapshot_context == expected_branch
if releases:
release = random.choice(releases)
snapshot_context = get_snapshot_context(
**kwargs, browse_context=browse_context, release_name=release["name"]
)
expected_release = dict(base_expected_context)
expected_release["branch"] = None
expected_release["branch_alias"] = False
expected_release["release"] = release["name"]
expected_release["release_id"] = release["id"]
if release["target_type"] == "revision":
expected_release["revision_id"] = release["target"]
expected_release["revision_info"] = _get_revision_info(
archive_data, release["target"]
)
expected_release["root_directory"] = release["directory"]
expected_release["query_params"] = {"release": release["name"], **query_params}
expected_release["revision_info"]["revision_url"] = gen_revision_url(
release["target"], expected_release
)
assert snapshot_context == expected_release
revision_log = archive_data.revision_log(branch["revision"])
revision = revision_log[-1]
snapshot_context = get_snapshot_context(
**kwargs, browse_context=browse_context, revision_id=revision["id"]
)
if "origin_url" in kwargs:
view_name = f"browse-origin-{browse_context}"
else:
view_name = f"browse-snapshot-{browse_context}"
kwargs.pop("visit_id", None)
revision_browse_url = reverse(
view_name,
url_args=url_args,
query_params={"revision": revision["id"], **query_params},
)
branches.append(
SnapshotBranchInfo(
name=revision["id"],
alias=False,
revision=revision["id"],
directory=revision["directory"],
date=revision["date"],
message=revision["message"],
url=revision_browse_url,
)
)
expected_revision = dict(base_expected_context)
expected_revision["branch"] = None
expected_revision["branch_alias"] = False
expected_revision["branches"] = branches
expected_revision["revision_id"] = revision["id"]
expected_revision["revision_info"] = _get_revision_info(
archive_data, revision["id"]
)
expected_revision["root_directory"] = revision["directory"]
expected_revision["query_params"] = {"revision": revision["id"], **query_params}
expected_revision["revision_info"]["revision_url"] = gen_revision_url(
revision["id"], expected_revision
)
assert snapshot_context == expected_revision
def test_get_release_large_snapshot(archive_data, origin_with_releases):
snapshot = archive_data.snapshot_get_latest(origin_with_releases["url"])
release_id = random.choice(
[
v["target"]
for v in snapshot["branches"].values()
if v["target_type"] == "release"
]
)
release_data = archive_data.release_get(release_id)
# simulate large snapshot processing by providing releases parameter
# as an empty list
release = _get_release(
releases=[], release_name=release_data["name"], snapshot_id=snapshot["id"]
)
assert release_data["name"] == release["name"]
assert release_data["id"] == release["id"]
def _get_revision_info(archive_data, revision_id):
revision_info = None
if revision_id:
revision_info = archive_data.revision_get(revision_id)
revision_info["message_header"] = revision_info["message"].split("\n")[0]
revision_info["date"] = format_utc_iso_date(revision_info["date"])
revision_info["committer_date"] = format_utc_iso_date(
revision_info["committer_date"]
)
return revision_info
diff --git a/swh/web/tests/browse/views/test_identifiers.py b/swh/web/tests/browse/views/test_identifiers.py
index dd188a09..236fc621 100644
--- a/swh/web/tests/browse/views/test_identifiers.py
+++ b/swh/web/tests/browse/views/test_identifiers.py
@@ -1,227 +1,223 @@
# Copyright (C) 2018-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
import random
from urllib.parse import quote
-from hypothesis import given
-
from swh.model.model import Origin
from swh.model.swhids import ObjectType
from swh.web.common.identifiers import gen_swhid
from swh.web.common.utils import reverse
from swh.web.tests.django_asserts import assert_contains
-from swh.web.tests.strategies import snapshot
from swh.web.tests.utils import check_html_get_response
def test_content_id_browse(client, content):
cnt_sha1_git = content["sha1_git"]
swhid = gen_swhid(ObjectType.CONTENT, cnt_sha1_git)
for swhid_ in (swhid, swhid.upper()):
url = reverse("browse-swhid", url_args={"swhid": swhid_})
query_string = "sha1_git:" + cnt_sha1_git
content_browse_url = reverse(
"browse-content", url_args={"query_string": query_string}
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == content_browse_url
def test_directory_id_browse(client, directory):
swhid = gen_swhid(ObjectType.DIRECTORY, directory)
for swhid_ in (swhid, swhid.upper()):
url = reverse("browse-swhid", url_args={"swhid": swhid_})
directory_browse_url = reverse(
"browse-directory", url_args={"sha1_git": directory}
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == directory_browse_url
def test_revision_id_browse(client, revision):
swhid = gen_swhid(ObjectType.REVISION, revision)
for swhid_ in (swhid, swhid.upper()):
url = reverse("browse-swhid", url_args={"swhid": swhid_})
revision_browse_url = reverse(
"browse-revision", url_args={"sha1_git": revision}
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == revision_browse_url
query_params = {"origin_url": "https://github.com/user/repo"}
url = reverse(
"browse-swhid", url_args={"swhid": swhid_}, query_params=query_params
)
revision_browse_url = reverse(
"browse-revision",
url_args={"sha1_git": revision},
query_params=query_params,
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == revision_browse_url
def test_release_id_browse(client, release):
swhid = gen_swhid(ObjectType.RELEASE, release)
for swhid_ in (swhid, swhid.upper()):
url = reverse("browse-swhid", url_args={"swhid": swhid_})
release_browse_url = reverse("browse-release", url_args={"sha1_git": release})
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == release_browse_url
query_params = {"origin_url": "https://github.com/user/repo"}
url = reverse(
"browse-swhid", url_args={"swhid": swhid_}, query_params=query_params
)
release_browse_url = reverse(
"browse-release", url_args={"sha1_git": release}, query_params=query_params
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == release_browse_url
-@given(snapshot())
def test_snapshot_id_browse(client, snapshot):
swhid = gen_swhid(ObjectType.SNAPSHOT, snapshot)
for swhid_ in (swhid, swhid.upper()):
url = reverse("browse-swhid", url_args={"swhid": swhid_})
snapshot_browse_url = reverse(
"browse-snapshot", url_args={"snapshot_id": snapshot}
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == snapshot_browse_url
query_params = {"origin_url": "https://github.com/user/repo"}
url = reverse(
"browse-swhid", url_args={"swhid": swhid_}, query_params=query_params
)
release_browse_url = reverse(
"browse-snapshot",
url_args={"snapshot_id": snapshot},
query_params=query_params,
)
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == release_browse_url
def test_bad_id_browse(client, release):
swhid = f"swh:1:foo:{release}"
url = reverse("browse-swhid", url_args={"swhid": swhid})
check_html_get_response(client, url, status_code=400)
def test_content_id_optional_parts_browse(client, archive_data, content):
cnt_sha1_git = content["sha1_git"]
origin_url = "https://github.com/user/repo"
archive_data.origin_add([Origin(url=origin_url)])
swhid = gen_swhid(
ObjectType.CONTENT,
cnt_sha1_git,
metadata={"lines": "4-20", "origin": origin_url},
)
url = reverse("browse-swhid", url_args={"swhid": swhid})
query_string = "sha1_git:" + cnt_sha1_git
content_browse_url = reverse(
"browse-content",
url_args={"query_string": query_string},
query_params={"origin_url": origin_url},
)
content_browse_url += "#L4-L20"
resp = check_html_get_response(client, url, status_code=302)
assert resp["location"] == content_browse_url
def test_origin_id_not_resolvable(client, release):
swhid = "swh:1:ori:8068d0075010b590762c6cb5682ed53cb3c13deb"
url = reverse("browse-swhid", url_args={"swhid": swhid})
check_html_get_response(client, url, status_code=400)
def test_legacy_swhid_browse(archive_data, client, origin):
snapshot = archive_data.snapshot_get_latest(origin["url"])
revision = archive_data.snapshot_get_head(snapshot)
directory = archive_data.revision_get(revision)["directory"]
directory_content = archive_data.directory_ls(directory)
directory_file = random.choice(
[e for e in directory_content if e["type"] == "file"]
)
legacy_swhid = gen_swhid(
ObjectType.CONTENT,
directory_file["checksums"]["sha1_git"],
metadata={"origin": origin["url"]},
)
url = reverse("browse-swhid", url_args={"swhid": legacy_swhid})
resp = check_html_get_response(client, url, status_code=302)
resp = check_html_get_response(
client, resp["location"], status_code=200, template_used="browse/content.html"
)
swhid = gen_swhid(
ObjectType.CONTENT,
directory_file["checksums"]["sha1_git"],
metadata={
"origin": origin["url"],
"visit": gen_swhid(ObjectType.SNAPSHOT, snapshot["id"]),
"anchor": gen_swhid(ObjectType.REVISION, revision),
},
)
assert_contains(resp, swhid)
# also check legacy SWHID URL with trailing slash
url = reverse("browse-swhid-legacy", url_args={"swhid": swhid})
resp = check_html_get_response(client, url, status_code=302)
resp = check_html_get_response(
client, resp["location"], status_code=200, template_used="browse/content.html"
)
assert_contains(resp, swhid)
def test_browse_swhid_special_characters_escaping(client, archive_data, directory):
origin = "http://example.org/?project=abc;"
archive_data.origin_add([Origin(url=origin)])
origin_swhid_escaped = quote(origin, safe="/?:@&")
origin_swhid_url_escaped = quote(origin, safe="/:@;")
swhid = gen_swhid(
ObjectType.DIRECTORY, directory, metadata={"origin": origin_swhid_escaped}
)
url = reverse("browse-swhid", url_args={"swhid": swhid})
resp = check_html_get_response(client, url, status_code=302)
assert origin_swhid_url_escaped in resp["location"]
diff --git a/swh/web/tests/common/test_archive.py b/swh/web/tests/common/test_archive.py
index 69bd8a8f..d2508336 100644
--- a/swh/web/tests/common/test_archive.py
+++ b/swh/web/tests/common/test_archive.py
@@ -1,1174 +1,1170 @@
# Copyright (C) 2015-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
from collections import defaultdict
import hashlib
import itertools
import random
from hypothesis import given
import pytest
from swh.model.from_disk import DentryPerms
from swh.model.hashutil import hash_to_bytes, hash_to_hex
from swh.model.model import (
Directory,
DirectoryEntry,
Origin,
OriginVisit,
Revision,
Snapshot,
SnapshotBranch,
TargetType,
)
from swh.model.swhids import ObjectType
from swh.web.common import archive
from swh.web.common.exc import BadInputExc, NotFoundExc
from swh.web.common.typing import OriginInfo, PagedResult
from swh.web.tests.conftest import ctags_json_missing, fossology_missing
from swh.web.tests.data import random_content, random_sha1
from swh.web.tests.strategies import (
invalid_sha1,
new_origin,
new_revision,
sha256,
- snapshot,
unknown_content,
unknown_contents,
unknown_directory,
unknown_release,
unknown_revision,
unknown_snapshot,
visit_dates,
)
def test_lookup_multiple_hashes_all_present(contents):
input_data = []
expected_output = []
for cnt in contents:
input_data.append({"sha1": cnt["sha1"]})
expected_output.append({"sha1": cnt["sha1"], "found": True})
assert archive.lookup_multiple_hashes(input_data) == expected_output
@given(unknown_contents())
def test_lookup_multiple_hashes_some_missing(contents, unknown_contents):
input_contents = list(itertools.chain(contents, unknown_contents))
random.shuffle(input_contents)
input_data = []
expected_output = []
for cnt in input_contents:
input_data.append({"sha1": cnt["sha1"]})
expected_output.append({"sha1": cnt["sha1"], "found": cnt in contents})
assert archive.lookup_multiple_hashes(input_data) == expected_output
def test_lookup_hash_does_not_exist():
unknown_content_ = random_content()
actual_lookup = archive.lookup_hash("sha1_git:%s" % unknown_content_["sha1_git"])
assert actual_lookup == {"found": None, "algo": "sha1_git"}
def test_lookup_hash_exist(archive_data, content):
actual_lookup = archive.lookup_hash("sha1:%s" % content["sha1"])
content_metadata = archive_data.content_get(content["sha1"])
assert {"found": content_metadata, "algo": "sha1"} == actual_lookup
def test_search_hash_does_not_exist():
unknown_content_ = random_content()
actual_lookup = archive.search_hash("sha1_git:%s" % unknown_content_["sha1_git"])
assert {"found": False} == actual_lookup
def test_search_hash_exist(content):
actual_lookup = archive.search_hash("sha1:%s" % content["sha1"])
assert {"found": True} == actual_lookup
@pytest.mark.skipif(
ctags_json_missing, reason="requires ctags with json output support"
)
def test_lookup_content_ctags(indexer_data, contents_with_ctags):
content_sha1 = random.choice(contents_with_ctags["sha1s"])
indexer_data.content_add_ctags(content_sha1)
actual_ctags = list(archive.lookup_content_ctags("sha1:%s" % content_sha1))
expected_data = list(indexer_data.content_get_ctags(content_sha1))
for ctag in expected_data:
ctag["id"] = content_sha1
assert actual_ctags == expected_data
def test_lookup_content_ctags_no_hash():
unknown_content_ = random_content()
actual_ctags = list(
archive.lookup_content_ctags("sha1:%s" % unknown_content_["sha1"])
)
assert actual_ctags == []
def test_lookup_content_filetype(indexer_data, content):
indexer_data.content_add_mimetype(content["sha1"])
actual_filetype = archive.lookup_content_filetype(content["sha1"])
expected_filetype = indexer_data.content_get_mimetype(content["sha1"])
assert actual_filetype == expected_filetype
def test_lookup_expression(indexer_data, contents_with_ctags):
per_page = 10
expected_ctags = []
for content_sha1 in contents_with_ctags["sha1s"]:
if len(expected_ctags) == per_page:
break
indexer_data.content_add_ctags(content_sha1)
for ctag in indexer_data.content_get_ctags(content_sha1):
if len(expected_ctags) == per_page:
break
if ctag["name"] == contents_with_ctags["symbol_name"]:
del ctag["id"]
ctag["sha1"] = content_sha1
expected_ctags.append(ctag)
actual_ctags = list(
archive.lookup_expression(
contents_with_ctags["symbol_name"], last_sha1=None, per_page=10
)
)
assert actual_ctags == expected_ctags
def test_lookup_expression_no_result():
expected_ctags = []
actual_ctags = list(
archive.lookup_expression("barfoo", last_sha1=None, per_page=10)
)
assert actual_ctags == expected_ctags
@pytest.mark.skipif(fossology_missing, reason="requires fossology-nomossa installed")
def test_lookup_content_license(indexer_data, content):
indexer_data.content_add_license(content["sha1"])
actual_license = archive.lookup_content_license(content["sha1"])
expected_license = indexer_data.content_get_license(content["sha1"])
assert actual_license == expected_license
def test_stat_counters(archive_data):
actual_stats = archive.stat_counters()
assert actual_stats == archive_data.stat_counters()
@given(new_origin(), visit_dates())
def test_lookup_origin_visits(subtest, new_origin, visit_dates):
# ensure archive_data fixture will be reset between each hypothesis
# example test run
@subtest
def test_inner(archive_data):
archive_data.origin_add([new_origin])
archive_data.origin_visit_add(
[
OriginVisit(origin=new_origin.url, date=ts, type="git",)
for ts in visit_dates
]
)
actual_origin_visits = list(
archive.lookup_origin_visits(new_origin.url, per_page=100)
)
expected_visits = archive_data.origin_visit_get(new_origin.url)
for expected_visit in expected_visits:
expected_visit["origin"] = new_origin.url
assert actual_origin_visits == expected_visits
@given(new_origin(), visit_dates())
def test_lookup_origin_visit(archive_data, new_origin, visit_dates):
archive_data.origin_add([new_origin])
visits = archive_data.origin_visit_add(
[OriginVisit(origin=new_origin.url, date=ts, type="git",) for ts in visit_dates]
)
visit = random.choice(visits).visit
actual_origin_visit = archive.lookup_origin_visit(new_origin.url, visit)
expected_visit = dict(archive_data.origin_visit_get_by(new_origin.url, visit))
assert actual_origin_visit == expected_visit
@given(new_origin())
def test_lookup_origin(archive_data, new_origin):
archive_data.origin_add([new_origin])
actual_origin = archive.lookup_origin({"url": new_origin.url})
expected_origin = archive_data.origin_get([new_origin.url])[0]
assert actual_origin == expected_origin
@given(invalid_sha1())
def test_lookup_release_ko_id_checksum_not_a_sha1(invalid_sha1):
with pytest.raises(BadInputExc) as e:
archive.lookup_release(invalid_sha1)
assert e.match("Invalid checksum")
@given(sha256())
def test_lookup_release_ko_id_checksum_too_long(sha256):
with pytest.raises(BadInputExc) as e:
archive.lookup_release(sha256)
assert e.match("Only sha1_git is supported.")
def test_lookup_release_multiple(archive_data, releases):
actual_releases = list(archive.lookup_release_multiple(releases))
expected_releases = []
for release_id in releases:
release_info = archive_data.release_get(release_id)
expected_releases.append(release_info)
assert actual_releases == expected_releases
def test_lookup_release_multiple_none_found():
unknown_releases_ = [random_sha1(), random_sha1(), random_sha1()]
actual_releases = list(archive.lookup_release_multiple(unknown_releases_))
assert actual_releases == [None] * len(unknown_releases_)
def test_lookup_directory_with_path_not_found(directory):
path = "some/invalid/path/here"
with pytest.raises(NotFoundExc) as e:
archive.lookup_directory_with_path(directory, path)
assert e.match(
f"Directory entry with path {path} from root directory {directory} not found"
)
def test_lookup_directory_with_path_found(archive_data, directory):
directory_content = archive_data.directory_ls(directory)
directory_entry = random.choice(directory_content)
path = directory_entry["name"]
actual_result = archive.lookup_directory_with_path(directory, path)
assert actual_result == directory_entry
def test_lookup_release(archive_data, release):
actual_release = archive.lookup_release(release)
assert actual_release == archive_data.release_get(release)
@given(invalid_sha1(), sha256())
def test_lookup_revision_with_context_ko_not_a_sha1(revision, invalid_sha1, sha256):
sha1_git_root = revision
sha1_git = invalid_sha1
with pytest.raises(BadInputExc) as e:
archive.lookup_revision_with_context(sha1_git_root, sha1_git)
assert e.match("Invalid checksum query string")
sha1_git = sha256
with pytest.raises(BadInputExc) as e:
archive.lookup_revision_with_context(sha1_git_root, sha1_git)
assert e.match("Only sha1_git is supported")
@given(unknown_revision())
def test_lookup_revision_with_context_ko_sha1_git_does_not_exist(
revision, unknown_revision
):
sha1_git_root = revision
sha1_git = unknown_revision
with pytest.raises(NotFoundExc) as e:
archive.lookup_revision_with_context(sha1_git_root, sha1_git)
assert e.match("Revision %s not found" % sha1_git)
@given(unknown_revision())
def test_lookup_revision_with_context_ko_root_sha1_git_does_not_exist(
revision, unknown_revision
):
sha1_git_root = unknown_revision
sha1_git = revision
with pytest.raises(NotFoundExc) as e:
archive.lookup_revision_with_context(sha1_git_root, sha1_git)
assert e.match("Revision root %s not found" % sha1_git_root)
def test_lookup_revision_with_context(archive_data, ancestor_revisions):
sha1_git = ancestor_revisions["sha1_git"]
root_sha1_git = ancestor_revisions["sha1_git_root"]
for sha1_git_root in (root_sha1_git, {"id": hash_to_bytes(root_sha1_git)}):
actual_revision = archive.lookup_revision_with_context(sha1_git_root, sha1_git)
children = []
for rev in archive_data.revision_log(root_sha1_git):
for p_rev in rev["parents"]:
p_rev_hex = hash_to_hex(p_rev)
if p_rev_hex == sha1_git:
children.append(rev["id"])
expected_revision = archive_data.revision_get(sha1_git)
expected_revision["children"] = children
assert actual_revision == expected_revision
def test_lookup_revision_with_context_ko(non_ancestor_revisions):
sha1_git = non_ancestor_revisions["sha1_git"]
root_sha1_git = non_ancestor_revisions["sha1_git_root"]
with pytest.raises(NotFoundExc) as e:
archive.lookup_revision_with_context(root_sha1_git, sha1_git)
assert e.match("Revision %s is not an ancestor of %s" % (sha1_git, root_sha1_git))
def test_lookup_directory_with_revision_not_found():
unknown_revision_ = random_sha1()
with pytest.raises(NotFoundExc) as e:
archive.lookup_directory_with_revision(unknown_revision_)
assert e.match("Revision %s not found" % unknown_revision_)
@given(new_revision())
def test_lookup_directory_with_revision_unknown_content(archive_data, new_revision):
unknown_content_ = random_content()
dir_path = "README.md"
# A directory that points to unknown content
dir = Directory(
entries=(
DirectoryEntry(
name=bytes(dir_path.encode("utf-8")),
type="file",
target=hash_to_bytes(unknown_content_["sha1_git"]),
perms=DentryPerms.content,
),
)
)
# Create a revision that points to a directory
# Which points to unknown content
new_revision = new_revision.to_dict()
new_revision["directory"] = dir.id
del new_revision["id"]
new_revision = Revision.from_dict(new_revision)
# Add the directory and revision in mem
archive_data.directory_add([dir])
archive_data.revision_add([new_revision])
new_revision_id = hash_to_hex(new_revision.id)
with pytest.raises(NotFoundExc) as e:
archive.lookup_directory_with_revision(new_revision_id, dir_path)
assert e.match("Content not found for revision %s" % new_revision_id)
def test_lookup_directory_with_revision_ko_path_to_nowhere(revision):
invalid_path = "path/to/something/unknown"
with pytest.raises(NotFoundExc) as e:
archive.lookup_directory_with_revision(revision, invalid_path)
assert e.match("Directory or File")
assert e.match(invalid_path)
assert e.match("revision %s" % revision)
assert e.match("not found")
def test_lookup_directory_with_revision_submodules(
archive_data, revision_with_submodules
):
rev_sha1_git = revision_with_submodules["rev_sha1_git"]
rev_dir_path = revision_with_submodules["rev_dir_rev_path"]
actual_data = archive.lookup_directory_with_revision(rev_sha1_git, rev_dir_path)
revision = archive_data.revision_get(revision_with_submodules["rev_sha1_git"])
directory = archive_data.directory_ls(revision["directory"])
rev_entry = next(e for e in directory if e["name"] == rev_dir_path)
expected_data = {
"content": archive_data.revision_get(rev_entry["target"]),
"path": rev_dir_path,
"revision": rev_sha1_git,
"type": "rev",
}
assert actual_data == expected_data
def test_lookup_directory_with_revision_without_path(archive_data, revision):
actual_directory_entries = archive.lookup_directory_with_revision(revision)
revision_data = archive_data.revision_get(revision)
expected_directory_entries = archive_data.directory_ls(revision_data["directory"])
assert actual_directory_entries["type"] == "dir"
assert actual_directory_entries["content"] == expected_directory_entries
def test_lookup_directory_with_revision_with_path(archive_data, revision):
rev_data = archive_data.revision_get(revision)
dir_entries = [
e
for e in archive_data.directory_ls(rev_data["directory"])
if e["type"] in ("file", "dir")
]
expected_dir_entry = random.choice(dir_entries)
actual_dir_entry = archive.lookup_directory_with_revision(
revision, expected_dir_entry["name"]
)
assert actual_dir_entry["type"] == expected_dir_entry["type"]
assert actual_dir_entry["revision"] == revision
assert actual_dir_entry["path"] == expected_dir_entry["name"]
if actual_dir_entry["type"] == "file":
del actual_dir_entry["content"]["checksums"]["blake2s256"]
for key in ("checksums", "status", "length"):
assert actual_dir_entry["content"][key] == expected_dir_entry[key]
else:
sub_dir_entries = archive_data.directory_ls(expected_dir_entry["target"])
assert actual_dir_entry["content"] == sub_dir_entries
def test_lookup_directory_with_revision_with_path_to_file_and_data(
archive_data, revision
):
rev_data = archive_data.revision_get(revision)
dir_entries = [
e
for e in archive_data.directory_ls(rev_data["directory"])
if e["type"] == "file"
]
expected_dir_entry = random.choice(dir_entries)
expected_data = archive_data.content_get_data(
expected_dir_entry["checksums"]["sha1"]
)
actual_dir_entry = archive.lookup_directory_with_revision(
revision, expected_dir_entry["name"], with_data=True
)
assert actual_dir_entry["type"] == expected_dir_entry["type"]
assert actual_dir_entry["revision"] == revision
assert actual_dir_entry["path"] == expected_dir_entry["name"]
del actual_dir_entry["content"]["checksums"]["blake2s256"]
for key in ("checksums", "status", "length"):
assert actual_dir_entry["content"][key] == expected_dir_entry[key]
assert actual_dir_entry["content"]["data"] == expected_data["data"]
def test_lookup_revision(archive_data, revision):
actual_revision = archive.lookup_revision(revision)
assert actual_revision == archive_data.revision_get(revision)
@given(new_revision())
def test_lookup_revision_invalid_msg(archive_data, new_revision):
new_revision = new_revision.to_dict()
new_revision["message"] = b"elegant fix for bug \xff"
archive_data.revision_add([Revision.from_dict(new_revision)])
revision = archive.lookup_revision(hash_to_hex(new_revision["id"]))
assert revision["message"] == "elegant fix for bug \\xff"
assert revision["decoding_failures"] == ["message"]
@given(new_revision())
def test_lookup_revision_msg_ok(archive_data, new_revision):
archive_data.revision_add([new_revision])
revision_message = archive.lookup_revision_message(hash_to_hex(new_revision.id))
assert revision_message == {"message": new_revision.message}
def test_lookup_revision_msg_no_rev():
unknown_revision_ = random_sha1()
with pytest.raises(NotFoundExc) as e:
archive.lookup_revision_message(unknown_revision_)
assert e.match("Revision with sha1_git %s not found." % unknown_revision_)
def test_lookup_revision_multiple(archive_data, revisions):
actual_revisions = list(archive.lookup_revision_multiple(revisions))
expected_revisions = []
for rev in revisions:
expected_revisions.append(archive_data.revision_get(rev))
assert actual_revisions == expected_revisions
def test_lookup_revision_multiple_none_found():
unknown_revisions_ = [random_sha1(), random_sha1(), random_sha1()]
actual_revisions = list(archive.lookup_revision_multiple(unknown_revisions_))
assert actual_revisions == [None] * len(unknown_revisions_)
def test_lookup_revision_log(archive_data, revision):
actual_revision_log = list(archive.lookup_revision_log(revision, limit=25))
expected_revision_log = archive_data.revision_log(revision, limit=25)
assert actual_revision_log == expected_revision_log
def _get_origin_branches(archive_data, origin):
origin_visit = archive_data.origin_visit_get(origin["url"])[-1]
snapshot = archive_data.snapshot_get(origin_visit["snapshot"])
branches = {
k: v
for (k, v) in snapshot["branches"].items()
if v["target_type"] == "revision"
}
return branches
def test_lookup_revision_log_by(archive_data, origin):
branches = _get_origin_branches(archive_data, origin)
branch_name = random.choice(list(branches.keys()))
actual_log = list(
archive.lookup_revision_log_by(origin["url"], branch_name, None, limit=25)
)
expected_log = archive_data.revision_log(branches[branch_name]["target"], limit=25)
assert actual_log == expected_log
def test_lookup_revision_log_by_notfound(origin):
with pytest.raises(NotFoundExc):
archive.lookup_revision_log_by(
origin["url"], "unknown_branch_name", None, limit=100
)
def test_lookup_content_raw_not_found():
unknown_content_ = random_content()
with pytest.raises(NotFoundExc) as e:
archive.lookup_content_raw("sha1:" + unknown_content_["sha1"])
assert e.match(
"Content with %s checksum equals to %s not found!"
% ("sha1", unknown_content_["sha1"])
)
def test_lookup_content_raw(archive_data, content):
actual_content = archive.lookup_content_raw("sha256:%s" % content["sha256"])
expected_content = archive_data.content_get_data(content["sha1"])
assert actual_content == expected_content
def test_lookup_empty_content_raw(empty_content):
content_raw = archive.lookup_content_raw(f"sha1_git:{empty_content['sha1_git']}")
assert content_raw["data"] == b""
def test_lookup_content_not_found():
unknown_content_ = random_content()
with pytest.raises(NotFoundExc) as e:
archive.lookup_content("sha1:%s" % unknown_content_["sha1"])
assert e.match(
"Content with %s checksum equals to %s not found!"
% ("sha1", unknown_content_["sha1"])
)
def test_lookup_content_with_sha1(archive_data, content):
actual_content = archive.lookup_content(f"sha1:{content['sha1']}")
expected_content = archive_data.content_get(content["sha1"])
assert actual_content == expected_content
def test_lookup_content_with_sha256(archive_data, content):
actual_content = archive.lookup_content(f"sha256:{content['sha256']}")
expected_content = archive_data.content_get(content["sha1"])
assert actual_content == expected_content
def test_lookup_directory_bad_checksum():
with pytest.raises(BadInputExc):
archive.lookup_directory("directory_id")
def test_lookup_directory_not_found():
unknown_directory_ = random_sha1()
with pytest.raises(NotFoundExc) as e:
archive.lookup_directory(unknown_directory_)
assert e.match("Directory with sha1_git %s not found" % unknown_directory_)
def test_lookup_directory(archive_data, directory):
actual_directory_ls = list(archive.lookup_directory(directory))
expected_directory_ls = archive_data.directory_ls(directory)
assert actual_directory_ls == expected_directory_ls
def test_lookup_directory_empty(empty_directory):
actual_directory_ls = list(archive.lookup_directory(empty_directory))
assert actual_directory_ls == []
def test_lookup_revision_by_nothing_found(origin):
with pytest.raises(NotFoundExc):
archive.lookup_revision_by(origin["url"], "invalid-branch-name")
def test_lookup_revision_by(archive_data, origin):
branches = _get_origin_branches(archive_data, origin)
branch_name = random.choice(list(branches.keys()))
actual_revision = archive.lookup_revision_by(origin["url"], branch_name)
expected_revision = archive_data.revision_get(branches[branch_name]["target"])
assert actual_revision == expected_revision
def test_lookup_revision_with_context_by_ko(origin, revision):
with pytest.raises(NotFoundExc):
archive.lookup_revision_with_context_by(
origin["url"], "invalid-branch-name", None, revision
)
def test_lookup_revision_with_context_by(archive_data, origin):
branches = _get_origin_branches(archive_data, origin)
branch_name = random.choice(list(branches.keys()))
root_rev = branches[branch_name]["target"]
root_rev_log = archive_data.revision_log(root_rev)
children = defaultdict(list)
for rev in root_rev_log:
for rev_p in rev["parents"]:
children[rev_p].append(rev["id"])
rev = root_rev_log[-1]["id"]
actual_root_rev, actual_rev = archive.lookup_revision_with_context_by(
origin["url"], branch_name, None, rev
)
expected_root_rev = archive_data.revision_get(root_rev)
expected_rev = archive_data.revision_get(rev)
expected_rev["children"] = children[rev]
assert actual_root_rev == expected_root_rev
assert actual_rev == expected_rev
def test_lookup_revision_through_ko_not_implemented():
with pytest.raises(NotImplementedError):
archive.lookup_revision_through({"something-unknown": 10})
def test_lookup_revision_through_with_context_by(archive_data, origin):
branches = _get_origin_branches(archive_data, origin)
branch_name = random.choice(list(branches.keys()))
root_rev = branches[branch_name]["target"]
root_rev_log = archive_data.revision_log(root_rev)
rev = root_rev_log[-1]["id"]
assert archive.lookup_revision_through(
{
"origin_url": origin["url"],
"branch_name": branch_name,
"ts": None,
"sha1_git": rev,
}
) == archive.lookup_revision_with_context_by(origin["url"], branch_name, None, rev)
def test_lookup_revision_through_with_revision_by(archive_data, origin):
branches = _get_origin_branches(archive_data, origin)
branch_name = random.choice(list(branches.keys()))
assert archive.lookup_revision_through(
{"origin_url": origin["url"], "branch_name": branch_name, "ts": None,}
) == archive.lookup_revision_by(origin["url"], branch_name, None)
def test_lookup_revision_through_with_context(ancestor_revisions):
sha1_git = ancestor_revisions["sha1_git"]
sha1_git_root = ancestor_revisions["sha1_git_root"]
assert archive.lookup_revision_through(
{"sha1_git_root": sha1_git_root, "sha1_git": sha1_git,}
) == archive.lookup_revision_with_context(sha1_git_root, sha1_git)
def test_lookup_revision_through_with_revision(revision):
assert archive.lookup_revision_through(
{"sha1_git": revision}
) == archive.lookup_revision(revision)
def test_lookup_directory_through_revision_ko_not_found(revision):
with pytest.raises(NotFoundExc):
archive.lookup_directory_through_revision(
{"sha1_git": revision}, "some/invalid/path"
)
def test_lookup_directory_through_revision_ok(archive_data, revision):
rev_data = archive_data.revision_get(revision)
dir_entries = [
e
for e in archive_data.directory_ls(rev_data["directory"])
if e["type"] == "file"
]
dir_entry = random.choice(dir_entries)
assert archive.lookup_directory_through_revision(
{"sha1_git": revision}, dir_entry["name"]
) == (revision, archive.lookup_directory_with_revision(revision, dir_entry["name"]))
def test_lookup_directory_through_revision_ok_with_data(archive_data, revision):
rev_data = archive_data.revision_get(revision)
dir_entries = [
e
for e in archive_data.directory_ls(rev_data["directory"])
if e["type"] == "file"
]
dir_entry = random.choice(dir_entries)
assert archive.lookup_directory_through_revision(
{"sha1_git": revision}, dir_entry["name"], with_data=True
) == (
revision,
archive.lookup_directory_with_revision(
revision, dir_entry["name"], with_data=True
),
)
-@given(snapshot())
def test_lookup_known_objects(
archive_data, content, directory, release, revision, snapshot
):
expected = archive_data.content_find(content)
assert archive.lookup_object(ObjectType.CONTENT, content["sha1_git"]) == expected
expected = archive_data.directory_get(directory)
assert archive.lookup_object(ObjectType.DIRECTORY, directory) == expected
expected = archive_data.release_get(release)
assert archive.lookup_object(ObjectType.RELEASE, release) == expected
expected = archive_data.revision_get(revision)
assert archive.lookup_object(ObjectType.REVISION, revision) == expected
expected = {**archive_data.snapshot_get(snapshot), "next_branch": None}
assert archive.lookup_object(ObjectType.SNAPSHOT, snapshot) == expected
@given(
unknown_content(),
unknown_directory(),
unknown_release(),
unknown_revision(),
unknown_snapshot(),
)
def test_lookup_unknown_objects(
unknown_content,
unknown_directory,
unknown_release,
unknown_revision,
unknown_snapshot,
):
with pytest.raises(NotFoundExc) as e:
archive.lookup_object(ObjectType.CONTENT, unknown_content["sha1_git"])
assert e.match(r"Content.*not found")
with pytest.raises(NotFoundExc) as e:
archive.lookup_object(ObjectType.DIRECTORY, unknown_directory)
assert e.match(r"Directory.*not found")
with pytest.raises(NotFoundExc) as e:
archive.lookup_object(ObjectType.RELEASE, unknown_release)
assert e.match(r"Release.*not found")
with pytest.raises(NotFoundExc) as e:
archive.lookup_object(ObjectType.REVISION, unknown_revision)
assert e.match(r"Revision.*not found")
with pytest.raises(NotFoundExc) as e:
archive.lookup_object(ObjectType.SNAPSHOT, unknown_snapshot)
assert e.match(r"Snapshot.*not found")
@given(invalid_sha1())
def test_lookup_invalid_objects(invalid_sha1):
with pytest.raises(BadInputExc) as e:
archive.lookup_object(ObjectType.CONTENT, invalid_sha1)
assert e.match("Invalid hash")
with pytest.raises(BadInputExc) as e:
archive.lookup_object(ObjectType.DIRECTORY, invalid_sha1)
assert e.match("Invalid checksum")
with pytest.raises(BadInputExc) as e:
archive.lookup_object(ObjectType.RELEASE, invalid_sha1)
assert e.match("Invalid checksum")
with pytest.raises(BadInputExc) as e:
archive.lookup_object(ObjectType.REVISION, invalid_sha1)
assert e.match("Invalid checksum")
with pytest.raises(BadInputExc) as e:
archive.lookup_object(ObjectType.SNAPSHOT, invalid_sha1)
assert e.match("Invalid checksum")
def test_lookup_missing_hashes_non_present():
missing_cnt = random_sha1()
missing_dir = random_sha1()
missing_rev = random_sha1()
missing_rel = random_sha1()
missing_snp = random_sha1()
grouped_swhids = {
ObjectType.CONTENT: [hash_to_bytes(missing_cnt)],
ObjectType.DIRECTORY: [hash_to_bytes(missing_dir)],
ObjectType.REVISION: [hash_to_bytes(missing_rev)],
ObjectType.RELEASE: [hash_to_bytes(missing_rel)],
ObjectType.SNAPSHOT: [hash_to_bytes(missing_snp)],
}
actual_result = archive.lookup_missing_hashes(grouped_swhids)
assert actual_result == {
missing_cnt,
missing_dir,
missing_rev,
missing_rel,
missing_snp,
}
def test_lookup_missing_hashes_some_present(content, directory):
missing_rev = random_sha1()
missing_rel = random_sha1()
missing_snp = random_sha1()
grouped_swhids = {
ObjectType.CONTENT: [hash_to_bytes(content["sha1_git"])],
ObjectType.DIRECTORY: [hash_to_bytes(directory)],
ObjectType.REVISION: [hash_to_bytes(missing_rev)],
ObjectType.RELEASE: [hash_to_bytes(missing_rel)],
ObjectType.SNAPSHOT: [hash_to_bytes(missing_snp)],
}
actual_result = archive.lookup_missing_hashes(grouped_swhids)
assert actual_result == {missing_rev, missing_rel, missing_snp}
def test_lookup_origin_extra_trailing_slash(origin):
origin_info = archive.lookup_origin({"url": f"{origin['url']}/"})
assert origin_info["url"] == origin["url"]
def test_lookup_origin_missing_trailing_slash(archive_data):
deb_origin = Origin(url="http://snapshot.debian.org/package/r-base/")
archive_data.origin_add([deb_origin])
origin_info = archive.lookup_origin({"url": deb_origin.url[:-1]})
assert origin_info["url"] == deb_origin.url
def test_lookup_origin_single_slash_after_protocol(archive_data):
origin_url = "http://snapshot.debian.org/package/r-base/"
malformed_origin_url = "http:/snapshot.debian.org/package/r-base/"
archive_data.origin_add([Origin(url=origin_url)])
origin_info = archive.lookup_origin({"url": malformed_origin_url})
assert origin_info["url"] == origin_url
@given(new_origin())
def test_lookup_origins_get_by_sha1s(origin, unknown_origin):
hasher = hashlib.sha1()
hasher.update(origin["url"].encode("utf-8"))
origin_info = OriginInfo(url=origin["url"])
origin_sha1 = hasher.hexdigest()
hasher = hashlib.sha1()
hasher.update(unknown_origin.url.encode("utf-8"))
unknown_origin_sha1 = hasher.hexdigest()
origins = list(archive.lookup_origins_by_sha1s([origin_sha1]))
assert origins == [origin_info]
origins = list(archive.lookup_origins_by_sha1s([origin_sha1, origin_sha1]))
assert origins == [origin_info, origin_info]
origins = list(archive.lookup_origins_by_sha1s([origin_sha1, unknown_origin_sha1]))
assert origins == [origin_info, None]
def test_search_origin(origin):
results = archive.search_origin(url_pattern=origin["url"])[0]
assert results == [{"url": origin["url"]}]
def test_search_origin_use_ql(mocker, origin):
ORIGIN = [{"url": origin["url"]}]
mock_archive_search = mocker.patch("swh.web.common.archive.search")
mock_archive_search.origin_search.return_value = PagedResult(
results=ORIGIN, next_page_token=None,
)
query = f"origin = '{origin['url']}'"
results = archive.search_origin(url_pattern=query, use_ql=True)[0]
assert results == ORIGIN
mock_archive_search.origin_search.assert_called_with(
query=query, page_token=None, with_visit=False, visit_types=None, limit=50
)
-@given(snapshot())
def test_lookup_snapshot_sizes(archive_data, snapshot):
branches = archive_data.snapshot_get(snapshot)["branches"]
expected_sizes = {
"alias": 0,
"release": 0,
"revision": 0,
}
for branch_name, branch_info in branches.items():
if branch_info is not None:
expected_sizes[branch_info["target_type"]] += 1
assert archive.lookup_snapshot_sizes(snapshot) == expected_sizes
def test_lookup_snapshot_sizes_with_filtering(archive_data, revision):
rev_id = hash_to_bytes(revision)
snapshot = Snapshot(
branches={
b"refs/heads/master": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/heads/incoming": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/pull/1": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/pull/2": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
},
)
archive_data.snapshot_add([snapshot])
expected_sizes = {"alias": 0, "release": 0, "revision": 2}
assert (
archive.lookup_snapshot_sizes(
snapshot.id.hex(), branch_name_exclude_prefix="refs/pull/"
)
== expected_sizes
)
-@given(snapshot())
def test_lookup_snapshot_alias(snapshot):
resolved_alias = archive.lookup_snapshot_alias(snapshot, "HEAD")
assert resolved_alias is not None
assert resolved_alias["target_type"] == "revision"
assert resolved_alias["target"] is not None
def test_lookup_snapshot_missing(revision):
with pytest.raises(NotFoundExc):
archive.lookup_snapshot(revision)
def test_lookup_snapshot_empty_branch_list(archive_data, revision):
rev_id = hash_to_bytes(revision)
snapshot = Snapshot(
branches={
b"refs/heads/master": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
},
)
archive_data.snapshot_add([snapshot])
# FIXME; This test will change once the inconsistency in storage is fixed
# postgres backend returns None in case of a missing branch whereas the
# in-memory implementation (used in tests) returns a data structure;
# hence the inconsistency
branches = archive.lookup_snapshot(
hash_to_hex(snapshot.id), branch_name_include_substring="non-existing",
)["branches"]
assert not branches
def test_lookup_snapshot_branch_names_filtering(archive_data, revision):
rev_id = hash_to_bytes(revision)
snapshot = Snapshot(
branches={
b"refs/heads/master": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/heads/incoming": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/pull/1": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
b"refs/pull/2": SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
"non_ascii_name_é".encode(): SnapshotBranch(
target=rev_id, target_type=TargetType.REVISION,
),
},
)
archive_data.snapshot_add([snapshot])
for include_pattern, exclude_prefix, nb_results in (
("pull", None, 2),
("incoming", None, 1),
("é", None, 1),
(None, "refs/heads/", 3),
("refs", "refs/heads/master", 3),
):
branches = archive.lookup_snapshot(
hash_to_hex(snapshot.id),
branch_name_include_substring=include_pattern,
branch_name_exclude_prefix=exclude_prefix,
)["branches"]
assert len(branches) == nb_results
for branch_name in branches:
if include_pattern:
assert include_pattern in branch_name
if exclude_prefix:
assert not branch_name.startswith(exclude_prefix)
def test_lookup_snapshot_branch_names_filtering_paginated(
archive_data, directory, revision
):
pattern = "foo"
nb_branches_by_target_type = 10
branches = {}
for i in range(nb_branches_by_target_type):
branches[f"branch/directory/bar{i}".encode()] = SnapshotBranch(
target=hash_to_bytes(directory), target_type=TargetType.DIRECTORY,
)
branches[f"branch/revision/bar{i}".encode()] = SnapshotBranch(
target=hash_to_bytes(revision), target_type=TargetType.REVISION,
)
branches[f"branch/directory/{pattern}{i}".encode()] = SnapshotBranch(
target=hash_to_bytes(directory), target_type=TargetType.DIRECTORY,
)
branches[f"branch/revision/{pattern}{i}".encode()] = SnapshotBranch(
target=hash_to_bytes(revision), target_type=TargetType.REVISION,
)
snapshot = Snapshot(branches=branches)
archive_data.snapshot_add([snapshot])
branches_count = nb_branches_by_target_type // 2
for target_type in (
ObjectType.DIRECTORY.name.lower(),
ObjectType.REVISION.name.lower(),
):
partial_branches = archive.lookup_snapshot(
hash_to_hex(snapshot.id),
target_types=[target_type],
branches_count=branches_count,
branch_name_include_substring=pattern,
)
branches = partial_branches["branches"]
assert len(branches) == branches_count
for branch_name, branch_data in branches.items():
assert pattern in branch_name
assert branch_data["target_type"] == target_type
for i in range(branches_count):
assert f"branch/{target_type}/{pattern}{i}" in branches
assert (
partial_branches["next_branch"]
== f"branch/{target_type}/{pattern}{branches_count}"
)
partial_branches = archive.lookup_snapshot(
hash_to_hex(snapshot.id),
target_types=[target_type],
branches_from=partial_branches["next_branch"],
branch_name_include_substring=pattern,
)
branches = partial_branches["branches"]
assert len(branches) == branches_count
for branch_name, branch_data in branches.items():
assert pattern in branch_name
assert branch_data["target_type"] == target_type
for i in range(branches_count, 2 * branches_count):
assert f"branch/{target_type}/{pattern}{i}" in branches
assert partial_branches["next_branch"] is None
diff --git a/swh/web/tests/common/test_identifiers.py b/swh/web/tests/common/test_identifiers.py
index 08516598..030f7df8 100644
--- a/swh/web/tests/common/test_identifiers.py
+++ b/swh/web/tests/common/test_identifiers.py
@@ -1,766 +1,761 @@
# Copyright (C) 2020-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
import random
from urllib.parse import quote
-from hypothesis import given
import pytest
from swh.model.hashutil import hash_to_bytes
from swh.model.model import Origin
from swh.model.swhids import ObjectType, QualifiedSWHID
from swh.web.browse.snapshot_context import get_snapshot_context
from swh.web.common.exc import BadInputExc
from swh.web.common.identifiers import (
gen_swhid,
get_swhid,
get_swhids_info,
group_swhids,
parse_object_type,
resolve_swhid,
)
from swh.web.common.typing import SWHObjectInfo
from swh.web.common.utils import reverse
from swh.web.tests.data import random_sha1
-from swh.web.tests.strategies import snapshot
def test_gen_swhid(content):
swh_object_type = ObjectType.CONTENT
sha1_git = content["sha1_git"]
expected_swhid = "swh:1:cnt:" + sha1_git
assert gen_swhid(swh_object_type, sha1_git) == expected_swhid
assert (
gen_swhid(swh_object_type, sha1_git, metadata={"origin": "test"})
== expected_swhid + ";origin=test"
)
assert (
gen_swhid(swh_object_type, sha1_git, metadata={"origin": None})
== expected_swhid
)
with pytest.raises(BadInputExc) as e:
gen_swhid(swh_object_type, "not a valid id")
assert e.match("Invalid object")
def test_parse_object_type():
assert parse_object_type("content") == ObjectType.CONTENT
assert parse_object_type("directory") == ObjectType.DIRECTORY
assert parse_object_type("revision") == ObjectType.REVISION
assert parse_object_type("release") == ObjectType.RELEASE
assert parse_object_type("snapshot") == ObjectType.SNAPSHOT
with pytest.raises(BadInputExc) as e:
parse_object_type("foo")
assert e.match("Invalid swh object type")
-@given(snapshot())
def test_resolve_swhid_legacy(content, directory, release, revision, snapshot):
for obj_type, obj_id in (
(ObjectType.CONTENT, content["sha1_git"]),
(ObjectType.DIRECTORY, directory),
(ObjectType.RELEASE, release),
(ObjectType.REVISION, revision),
(ObjectType.SNAPSHOT, snapshot),
):
swhid = gen_swhid(obj_type, obj_id)
url_args = {}
if obj_type == ObjectType.CONTENT:
url_args["query_string"] = f"sha1_git:{obj_id}"
elif obj_type == ObjectType.SNAPSHOT:
url_args["snapshot_id"] = obj_id
else:
url_args["sha1_git"] = obj_id
query_params = {"origin_url": "some-origin"}
browse_url = reverse(
f"browse-{obj_type.name.lower()}",
url_args=url_args,
query_params=query_params,
)
for swhid_ in (swhid, swhid.upper()):
resolved_swhid = resolve_swhid(swhid_, query_params)
assert isinstance(resolved_swhid["swhid_parsed"], QualifiedSWHID)
assert str(resolved_swhid["swhid_parsed"]) == swhid
assert resolved_swhid["browse_url"] == browse_url
with pytest.raises(BadInputExc, match="'ori' is not a valid ObjectType"):
resolve_swhid(f"swh:1:ori:{random_sha1()}")
-@given(snapshot())
def test_get_swhid(content, directory, release, revision, snapshot):
for obj_type, obj_id in (
(ObjectType.CONTENT, content["sha1_git"]),
(ObjectType.DIRECTORY, directory),
(ObjectType.RELEASE, release),
(ObjectType.REVISION, revision),
(ObjectType.SNAPSHOT, snapshot),
):
swhid = gen_swhid(obj_type, obj_id)
for swhid_ in (swhid, swhid.upper()):
swh_parsed_swhid = get_swhid(swhid_)
assert isinstance(swh_parsed_swhid, QualifiedSWHID)
assert str(swh_parsed_swhid) == swhid.lower()
with pytest.raises(BadInputExc, match="Error when parsing identifier"):
get_swhid("foo")
-@given(snapshot())
def test_group_swhids(content, directory, release, revision, snapshot):
swhids = []
expected = {}
for obj_type, obj_id in (
(ObjectType.CONTENT, content["sha1_git"]),
(ObjectType.DIRECTORY, directory),
(ObjectType.RELEASE, release),
(ObjectType.REVISION, revision),
(ObjectType.SNAPSHOT, snapshot),
):
swhid = gen_swhid(obj_type, obj_id)
swhid = get_swhid(swhid)
swhids.append(swhid)
expected[obj_type] = [hash_to_bytes(obj_id)]
swhid_groups = group_swhids(swhids)
assert swhid_groups == expected
def test_get_swhids_info_directory_context(archive_data, directory_with_subdirs):
swhid = get_swhids_info(
[
SWHObjectInfo(
object_type=ObjectType.DIRECTORY, object_id=directory_with_subdirs
)
],
snapshot_context=None,
)[0]
assert swhid["swhid_with_context"] is None
# path qualifier should be discarded for a root directory
swhid = get_swhids_info(
[
SWHObjectInfo(
object_type=ObjectType.DIRECTORY, object_id=directory_with_subdirs
)
],
snapshot_context=None,
extra_context={"path": "/"},
)[0]
assert swhid["swhid_with_context"] is None
dir_content = archive_data.directory_ls(directory_with_subdirs)
dir_subdirs = [e for e in dir_content if e["type"] == "dir"]
dir_subdir = random.choice(dir_subdirs)
dir_subdir_path = f'/{dir_subdir["name"]}/'
dir_subdir_content = archive_data.directory_ls(dir_subdir["target"])
dir_subdir_files = [e for e in dir_subdir_content if e["type"] == "file"]
swh_objects_info = [
SWHObjectInfo(object_type=ObjectType.DIRECTORY, object_id=dir_subdir["target"])
]
extra_context = {
"root_directory": directory_with_subdirs,
"path": dir_subdir_path,
}
if dir_subdir_files:
dir_subdir_file = random.choice(dir_subdir_files)
extra_context["filename"] = dir_subdir_file["name"]
swh_objects_info.append(
SWHObjectInfo(
object_type=ObjectType.CONTENT,
object_id=dir_subdir_file["checksums"]["sha1_git"],
)
)
swhids = get_swhids_info(
swh_objects_info, snapshot_context=None, extra_context=extra_context,
)
swhid_lower = swhids[0]["swhid_with_context"]
swhid_upper = swhid_lower.replace(swhids[0]["swhid"], swhids[0]["swhid"].upper())
for swhid in (swhid_lower, swhid_upper):
swhid_dir_parsed = get_swhid(swhid)
anchor = gen_swhid(ObjectType.DIRECTORY, directory_with_subdirs)
assert swhid_dir_parsed.qualifiers() == {
"anchor": anchor,
"path": dir_subdir_path,
}
if dir_subdir_files:
swhid_cnt_parsed = get_swhid(swhids[1]["swhid_with_context"])
assert swhid_cnt_parsed.qualifiers() == {
"anchor": anchor,
"path": f'{dir_subdir_path}{dir_subdir_file["name"]}',
}
def test_get_swhids_info_revision_context(archive_data, revision):
revision_data = archive_data.revision_get(revision)
directory = revision_data["directory"]
dir_content = archive_data.directory_ls(directory)
dir_entry = random.choice(dir_content)
swh_objects = [
SWHObjectInfo(object_type=ObjectType.REVISION, object_id=revision),
SWHObjectInfo(object_type=ObjectType.DIRECTORY, object_id=directory),
]
extra_context = {"revision": revision, "path": "/"}
if dir_entry["type"] == "file":
swh_objects.append(
SWHObjectInfo(
object_type=ObjectType.CONTENT,
object_id=dir_entry["checksums"]["sha1_git"],
)
)
extra_context["filename"] = dir_entry["name"]
swhids = get_swhids_info(
swh_objects, snapshot_context=None, extra_context=extra_context,
)
assert swhids[0]["context"] == {}
swhid_lower = swhids[1]["swhid_with_context"]
swhid_upper = swhid_lower.replace(swhids[1]["swhid"], swhids[1]["swhid"].upper())
for swhid in (swhid_lower, swhid_upper):
swhid_dir_parsed = get_swhid(swhid)
anchor = gen_swhid(ObjectType.REVISION, revision)
assert swhid_dir_parsed.qualifiers() == {
"anchor": anchor,
}
if dir_entry["type"] == "file":
swhid_cnt_parsed = get_swhid(swhids[2]["swhid_with_context"])
assert swhid_cnt_parsed.qualifiers() == {
"anchor": anchor,
"path": f'/{dir_entry["name"]}',
}
def test_get_swhids_info_origin_snapshot_context(
archive_data, origin_with_multiple_visits
):
"""
Test SWHIDs with contextual info computation under a variety of origin / snapshot
browsing contexts.
"""
origin_url = origin_with_multiple_visits["url"]
visits = archive_data.origin_visit_get(origin_url)
for visit in visits:
snapshot = archive_data.snapshot_get(visit["snapshot"])
snapshot_id = snapshot["id"]
branches = {
k: v["target"]
for k, v in snapshot["branches"].items()
if v["target_type"] == "revision"
}
releases = {
k: v["target"]
for k, v in snapshot["branches"].items()
if v["target_type"] == "release"
}
head_rev_id = archive_data.snapshot_get_head(snapshot)
head_rev = archive_data.revision_get(head_rev_id)
root_dir = head_rev["directory"]
dir_content = archive_data.directory_ls(root_dir)
dir_files = [e for e in dir_content if e["type"] == "file"]
dir_file = random.choice(dir_files)
revision_log = [r["id"] for r in archive_data.revision_log(head_rev_id)]
branch_name = random.choice(list(branches))
release = random.choice(list(releases))
release_data = archive_data.release_get(releases[release])
release_name = release_data["name"]
revision_id = random.choice(revision_log)
for snp_ctx_params, anchor_info in (
(
{"snapshot_id": snapshot_id},
{"anchor_type": ObjectType.REVISION, "anchor_id": head_rev_id},
),
(
{"snapshot_id": snapshot_id, "branch_name": branch_name},
{
"anchor_type": ObjectType.REVISION,
"anchor_id": branches[branch_name],
},
),
(
{"snapshot_id": snapshot_id, "release_name": release_name},
{"anchor_type": ObjectType.RELEASE, "anchor_id": releases[release]},
),
(
{"snapshot_id": snapshot_id, "revision_id": revision_id},
{"anchor_type": ObjectType.REVISION, "anchor_id": revision_id},
),
(
{"origin_url": origin_url, "snapshot_id": snapshot_id},
{"anchor_type": ObjectType.REVISION, "anchor_id": head_rev_id},
),
(
{
"origin_url": origin_url,
"snapshot_id": snapshot_id,
"branch_name": branch_name,
},
{
"anchor_type": ObjectType.REVISION,
"anchor_id": branches[branch_name],
},
),
(
{
"origin_url": origin_url,
"snapshot_id": snapshot_id,
"release_name": release_name,
},
{"anchor_type": ObjectType.RELEASE, "anchor_id": releases[release]},
),
(
{
"origin_url": origin_url,
"snapshot_id": snapshot_id,
"revision_id": revision_id,
},
{"anchor_type": ObjectType.REVISION, "anchor_id": revision_id},
),
):
snapshot_context = get_snapshot_context(**snp_ctx_params)
rev_id = head_rev_id
if "branch_name" in snp_ctx_params:
rev_id = branches[branch_name]
elif "release_name" in snp_ctx_params:
rev_id = release_data["target"]
elif "revision_id" in snp_ctx_params:
rev_id = revision_id
swh_objects = [
SWHObjectInfo(
object_type=ObjectType.CONTENT,
object_id=dir_file["checksums"]["sha1_git"],
),
SWHObjectInfo(object_type=ObjectType.DIRECTORY, object_id=root_dir),
SWHObjectInfo(object_type=ObjectType.REVISION, object_id=rev_id),
SWHObjectInfo(object_type=ObjectType.SNAPSHOT, object_id=snapshot_id),
]
if "release_name" in snp_ctx_params:
swh_objects.append(
SWHObjectInfo(
object_type=ObjectType.RELEASE, object_id=release_data["id"]
)
)
swhids = get_swhids_info(
swh_objects,
snapshot_context,
extra_context={"path": "/", "filename": dir_file["name"]},
)
swhid_cnt_parsed = get_swhid(swhids[0]["swhid_with_context"])
swhid_dir_parsed = get_swhid(swhids[1]["swhid_with_context"])
swhid_rev_parsed = get_swhid(swhids[2]["swhid_with_context"])
swhid_snp_parsed = get_swhid(
swhids[3]["swhid_with_context"] or swhids[3]["swhid"]
)
swhid_rel_parsed = None
if "release_name" in snp_ctx_params:
swhid_rel_parsed = get_swhid(swhids[4]["swhid_with_context"])
anchor = gen_swhid(
object_type=anchor_info["anchor_type"],
object_id=anchor_info["anchor_id"],
)
snapshot_swhid = gen_swhid(
object_type=ObjectType.SNAPSHOT, object_id=snapshot_id
)
expected_cnt_context = {
"visit": snapshot_swhid,
"anchor": anchor,
"path": f'/{dir_file["name"]}',
}
expected_dir_context = {
"visit": snapshot_swhid,
"anchor": anchor,
}
expected_rev_context = {"visit": snapshot_swhid}
expected_snp_context = {}
if "origin_url" in snp_ctx_params:
expected_cnt_context["origin"] = origin_url
expected_dir_context["origin"] = origin_url
expected_rev_context["origin"] = origin_url
expected_snp_context["origin"] = origin_url
assert swhid_cnt_parsed.qualifiers() == expected_cnt_context
assert swhid_dir_parsed.qualifiers() == expected_dir_context
assert swhid_rev_parsed.qualifiers() == expected_rev_context
assert swhid_snp_parsed.qualifiers() == expected_snp_context
if "release_name" in snp_ctx_params:
assert swhid_rel_parsed.qualifiers() == expected_rev_context
def test_get_swhids_info_characters_and_url_escaping(archive_data, directory, origin):
snapshot_context = get_snapshot_context(origin_url=origin["url"])
snapshot_context["origin_info"]["url"] = "http://example.org/?project=abc;def%"
path = "/foo;/bar%"
swhid_info = get_swhids_info(
[SWHObjectInfo(object_type=ObjectType.DIRECTORY, object_id=directory)],
snapshot_context=snapshot_context,
extra_context={"path": path},
)[0]
# check special characters in SWHID have been escaped
assert (
swhid_info["context"]["origin"] == "http://example.org/?project%3Dabc%3Bdef%25"
)
assert swhid_info["context"]["path"] == "/foo%3B/bar%25"
# check special characters in SWHID URL have been escaped
parsed_url_swhid = QualifiedSWHID.from_string(
swhid_info["swhid_with_context_url"][1:]
)
assert (
parsed_url_swhid.qualifiers()["origin"]
== "http://example.org/%3Fproject%253Dabc%253Bdef%2525"
)
assert parsed_url_swhid.qualifiers()["path"] == "/foo%253B/bar%2525"
def test_resolve_swhids_snapshot_context(
client, archive_data, origin_with_multiple_visits
):
origin_url = origin_with_multiple_visits["url"]
visits = archive_data.origin_visit_get(origin_url)
visit = random.choice(visits)
snapshot = archive_data.snapshot_get(visit["snapshot"])
head_rev_id = archive_data.snapshot_get_head(snapshot)
branch_info = None
release_info = None
for branch_name in sorted(snapshot["branches"]):
target_type = snapshot["branches"][branch_name]["target_type"]
target = snapshot["branches"][branch_name]["target"]
if target_type == "revision" and branch_info is None:
branch_info = {"name": branch_name, "revision": target}
elif target_type == "release" and release_info is None:
release_info = {"name": branch_name, "release": target}
if branch_info and release_info:
break
release_info["name"] = archive_data.release_get(release_info["release"])["name"]
directory = archive_data.revision_get(branch_info["revision"])["directory"]
directory_content = archive_data.directory_ls(directory)
directory_subdirs = [e for e in directory_content if e["type"] == "dir"]
directory_subdir = None
if directory_subdirs:
directory_subdir = random.choice(directory_subdirs)
directory_files = [e for e in directory_content if e["type"] == "file"]
directory_file = None
if directory_files:
directory_file = random.choice(directory_files)
random_rev_id = random.choice(archive_data.revision_log(head_rev_id))["id"]
for snp_ctx_params in (
{},
{"branch_name": branch_info["name"]},
{"release_name": release_info["name"]},
{"revision_id": random_rev_id},
):
snapshot_context = get_snapshot_context(
snapshot["id"], origin_url, **snp_ctx_params
)
_check_resolved_swhid_browse_url(
ObjectType.SNAPSHOT, snapshot["id"], snapshot_context
)
rev = head_rev_id
if "branch_name" in snp_ctx_params:
rev = branch_info["revision"]
if "revision_id" in snp_ctx_params:
rev = random_rev_id
_check_resolved_swhid_browse_url(ObjectType.REVISION, rev, snapshot_context)
_check_resolved_swhid_browse_url(
ObjectType.DIRECTORY, directory, snapshot_context, path="/"
)
if directory_subdir:
_check_resolved_swhid_browse_url(
ObjectType.DIRECTORY,
directory_subdir["target"],
snapshot_context,
path=f"/{directory_subdir['name']}/",
)
if directory_file:
_check_resolved_swhid_browse_url(
ObjectType.CONTENT,
directory_file["target"],
snapshot_context,
path=f"/{directory_file['name']}",
)
_check_resolved_swhid_browse_url(
ObjectType.CONTENT,
directory_file["target"],
snapshot_context,
path=f"/{directory_file['name']}",
lines="10",
)
_check_resolved_swhid_browse_url(
ObjectType.CONTENT,
directory_file["target"],
snapshot_context,
path=f"/{directory_file['name']}",
lines="10-20",
)
def _check_resolved_swhid_browse_url(
object_type, object_id, snapshot_context, path=None, lines=None
):
snapshot_id = snapshot_context["snapshot_id"]
origin_url = None
if snapshot_context["origin_info"]:
origin_url = snapshot_context["origin_info"]["url"]
obj_context = {}
query_params = {}
if origin_url:
obj_context["origin"] = origin_url
query_params["origin_url"] = origin_url
obj_context["visit"] = gen_swhid(ObjectType.SNAPSHOT, snapshot_id)
query_params["snapshot"] = snapshot_id
if object_type in (ObjectType.CONTENT, ObjectType.DIRECTORY, ObjectType.REVISION):
if snapshot_context["release"]:
obj_context["anchor"] = gen_swhid(
ObjectType.RELEASE, snapshot_context["release_id"]
)
query_params["release"] = snapshot_context["release"]
else:
obj_context["anchor"] = gen_swhid(
ObjectType.REVISION, snapshot_context["revision_id"]
)
if object_type != ObjectType.REVISION:
query_params["revision"] = snapshot_context["revision_id"]
if path:
obj_context["path"] = path
if path != "/":
if object_type == ObjectType.CONTENT:
query_params["path"] = path[1:]
else:
query_params["path"] = path[1:-1]
if object_type == ObjectType.DIRECTORY:
object_id = snapshot_context["root_directory"]
if lines:
obj_context["lines"] = lines
obj_core_swhid = gen_swhid(object_type, object_id)
obj_swhid_lower = gen_swhid(object_type, object_id, metadata=obj_context)
obj_swhid_upper = obj_swhid_lower.replace(obj_core_swhid, obj_core_swhid.upper(), 1)
for obj_swhid in (obj_swhid_lower, obj_swhid_upper):
obj_swhid_resolved = resolve_swhid(obj_swhid)
url_args = {"sha1_git": object_id}
if object_type == ObjectType.CONTENT:
url_args = {"query_string": f"sha1_git:{object_id}"}
elif object_type == ObjectType.SNAPSHOT:
url_args = {"snapshot_id": object_id}
expected_url = reverse(
f"browse-{object_type.name.lower()}",
url_args=url_args,
query_params=query_params,
)
if lines:
lines_number = lines.split("-")
expected_url += f"#L{lines_number[0]}"
if len(lines_number) > 1:
expected_url += f"-L{lines_number[1]}"
assert obj_swhid_resolved["browse_url"] == expected_url
def test_resolve_swhid_with_escaped_chars(archive_data, directory):
origin_url = "http://example.org/?project=abc;"
archive_data.origin_add([Origin(url=origin_url)])
origin_swhid_escaped = quote(origin_url, safe="/?:@&")
origin_swhid_url_escaped = quote(origin_url, safe="/:@;")
swhid = gen_swhid(
ObjectType.DIRECTORY, directory, metadata={"origin": origin_swhid_escaped}
)
resolved_swhid = resolve_swhid(swhid)
assert resolved_swhid["swhid_parsed"].origin == origin_swhid_escaped
assert origin_swhid_url_escaped in resolved_swhid["browse_url"]
def test_resolve_directory_swhid_path_without_trailing_slash(
archive_data, directory_with_subdirs
):
dir_content = archive_data.directory_ls(directory_with_subdirs)
dir_subdirs = [e for e in dir_content if e["type"] == "dir"]
dir_subdir = random.choice(dir_subdirs)
dir_subdir_path = dir_subdir["name"]
anchor = gen_swhid(ObjectType.DIRECTORY, directory_with_subdirs)
swhid = gen_swhid(
ObjectType.DIRECTORY,
dir_subdir["target"],
metadata={"anchor": anchor, "path": "/" + dir_subdir_path},
)
resolved_swhid = resolve_swhid(swhid)
browse_url = reverse(
"browse-directory",
url_args={"sha1_git": directory_with_subdirs},
query_params={"path": dir_subdir_path},
)
assert resolved_swhid["browse_url"] == browse_url
def test_resolve_swhid_with_malformed_origin_url(archive_data, directory):
origin_url = "http://example.org/project/abc"
malformed_origin_url = "http:/example.org/project/abc"
archive_data.origin_add([Origin(url=origin_url)])
swhid = gen_swhid(
ObjectType.DIRECTORY, directory, metadata={"origin": malformed_origin_url}
)
resolved_swhid = resolve_swhid(swhid)
assert origin_url in resolved_swhid["browse_url"]
def test_resolve_dir_entry_swhid_with_anchor_revision(archive_data, revision):
revision_data = archive_data.revision_get(revision)
directory = revision_data["directory"]
dir_content = archive_data.directory_ls(directory)
dir_entry = random.choice(dir_content)
rev_swhid = gen_swhid(ObjectType.REVISION, revision)
if dir_entry["type"] == "rev":
return
if dir_entry["type"] == "file":
swhid = gen_swhid(
ObjectType.CONTENT,
dir_entry["checksums"]["sha1_git"],
metadata={"anchor": rev_swhid, "path": f"/{dir_entry['name']}"},
)
else:
swhid = gen_swhid(
ObjectType.DIRECTORY,
dir_entry["target"],
metadata={"anchor": rev_swhid, "path": f"/{dir_entry['name']}/"},
)
browse_url = reverse(
"browse-revision",
url_args={"sha1_git": revision},
query_params={"path": dir_entry["name"]},
)
resolved_swhid = resolve_swhid(swhid)
assert resolved_swhid["browse_url"] == browse_url
def test_resolve_dir_entry_swhid_with_anchor_directory(
archive_data, directory_with_subdirs
):
dir_content = archive_data.directory_ls(directory_with_subdirs)
dir_entry = random.choice(
[entry for entry in dir_content if entry["type"] == "dir"]
)
dir_swhid = gen_swhid(ObjectType.DIRECTORY, directory_with_subdirs)
swhid = gen_swhid(
ObjectType.DIRECTORY,
dir_entry["target"],
metadata={"anchor": dir_swhid, "path": f"/{dir_entry['name']}/"},
)
browse_url = reverse(
"browse-directory",
url_args={"sha1_git": directory_with_subdirs},
query_params={"path": f"{dir_entry['name']}"},
)
resolved_swhid = resolve_swhid(swhid)
assert resolved_swhid["browse_url"] == browse_url
def test_resolve_file_entry_swhid_with_anchor_directory(
archive_data, directory_with_files
):
dir_content = archive_data.directory_ls(directory_with_files)
file_entry = random.choice(
[entry for entry in dir_content if entry["type"] == "file"]
)
dir_swhid = gen_swhid(ObjectType.DIRECTORY, directory_with_files)
sha1_git = file_entry["checksums"]["sha1_git"]
swhid = gen_swhid(
ObjectType.CONTENT,
sha1_git,
metadata={"anchor": dir_swhid, "path": f"/{file_entry['name']}"},
)
browse_url = reverse(
"browse-content",
url_args={"query_string": f"sha1_git:{sha1_git}"},
query_params={"path": f"{directory_with_files}/{file_entry['name']}"},
)
resolved_swhid = resolve_swhid(swhid)
assert resolved_swhid["browse_url"] == browse_url
diff --git a/swh/web/tests/common/test_middlewares.py b/swh/web/tests/common/test_middlewares.py
index b554301a..d480e745 100644
--- a/swh/web/tests/common/test_middlewares.py
+++ b/swh/web/tests/common/test_middlewares.py
@@ -1,43 +1,39 @@
# Copyright (C) 2020 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
-from hypothesis import given
import pytest
from django.test import modify_settings
from swh.web.common.utils import reverse
-from swh.web.tests.strategies import snapshot
@modify_settings(
MIDDLEWARE={"remove": ["swh.web.common.middlewares.ExceptionMiddleware"]}
)
-@given(snapshot())
def test_exception_middleware_disabled(client, mocker, snapshot):
mock_browse_snapshot_directory = mocker.patch(
"swh.web.browse.views.snapshot.browse_snapshot_directory"
)
mock_browse_snapshot_directory.side_effect = Exception("Something went wrong")
url = reverse("browse-snapshot-directory", url_args={"snapshot_id": snapshot})
with pytest.raises(Exception, match="Something went wrong"):
client.get(url)
-@given(snapshot())
def test_exception_middleware_enabled(client, mocker, snapshot):
mock_browse_snapshot_directory = mocker.patch(
"swh.web.browse.views.snapshot.browse_snapshot_directory"
)
mock_browse_snapshot_directory.side_effect = Exception("Something went wrong")
url = reverse("browse-snapshot-directory", url_args={"snapshot_id": snapshot})
resp = client.get(url)
assert resp.status_code == 500
assert hasattr(resp, "traceback")
assert "Traceback" in getattr(resp, "traceback")
diff --git a/swh/web/tests/conftest.py b/swh/web/tests/conftest.py
index d0a198fe..bd23e65c 100644
--- a/swh/web/tests/conftest.py
+++ b/swh/web/tests/conftest.py
@@ -1,988 +1,1003 @@
# Copyright (C) 2018-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
from collections import defaultdict
from datetime import timedelta
import json
import os
import random
import shutil
from subprocess import PIPE, run
import sys
from typing import Any, Dict, List, Optional
from _pytest.python import Function
from hypothesis import HealthCheck, settings
import pytest
from django.contrib.auth.models import User
from django.core.cache import cache
from django.test.utils import setup_databases # type: ignore
from rest_framework.test import APIClient, APIRequestFactory
from swh.model.hashutil import (
ALGORITHMS,
DEFAULT_ALGORITHMS,
hash_to_bytes,
hash_to_hex,
)
from swh.model.model import Content, Directory
from swh.model.swhids import ObjectType
from swh.scheduler.tests.common import TASK_TYPES
from swh.storage.algos.origin import origin_get_latest_visit_status
from swh.storage.algos.revisions_walker import get_revisions_walker
from swh.storage.algos.snapshot import snapshot_get_all_branches, snapshot_get_latest
from swh.web.auth.utils import OIDC_SWH_WEB_CLIENT_ID
from swh.web.common import converters
from swh.web.common.origin_save import get_scheduler_load_task_types
from swh.web.common.typing import OriginVisitInfo
from swh.web.common.utils import browsers_supported_image_mimes
from swh.web.config import get_config
from swh.web.tests.data import get_tests_data, override_storages
# Used to skip some tests
ctags_json_missing = (
shutil.which("ctags") is None
or b"+json" not in run(["ctags", "--version"], stdout=PIPE).stdout
)
fossology_missing = shutil.which("nomossa") is None
# Register some hypothesis profiles
settings.register_profile("default", settings())
# we use getattr here to keep mypy happy regardless hypothesis version
function_scoped_fixture_check = (
[getattr(HealthCheck, "function_scoped_fixture")]
if hasattr(HealthCheck, "function_scoped_fixture")
else []
)
suppress_health_check = [
HealthCheck.too_slow,
HealthCheck.filter_too_much,
] + function_scoped_fixture_check
settings.register_profile(
"swh-web", settings(deadline=None, suppress_health_check=suppress_health_check,),
)
settings.register_profile(
"swh-web-fast",
settings(
deadline=None, max_examples=5, suppress_health_check=suppress_health_check,
),
)
def pytest_configure(config):
# Use fast hypothesis profile by default if none has been
# explicitly specified in pytest option
if config.getoption("--hypothesis-profile") is None:
settings.load_profile("swh-web-fast")
# Small hack in order to be able to run the unit tests
# without static assets generated by webpack.
# Those assets are not really needed for the Python tests
# but the django templates will fail to load due to missing
# generated file webpack-stats.json describing the js and css
# files to include.
# So generate a dummy webpack-stats.json file to overcome
# that issue.
test_dir = os.path.dirname(__file__)
# location of the static folder when running tests through tox
data_dir = os.path.join(sys.prefix, "share/swh/web")
static_dir = os.path.join(data_dir, "static")
if not os.path.exists(static_dir):
# location of the static folder when running tests locally with pytest
static_dir = os.path.join(test_dir, "../../../static")
webpack_stats = os.path.join(static_dir, "webpack-stats.json")
if os.path.exists(webpack_stats):
return
bundles_dir = os.path.join(test_dir, "../../../assets/src/bundles")
if not os.path.exists(bundles_dir):
# location of the bundles folder when running tests with tox
bundles_dir = os.path.join(data_dir, "assets/src/bundles")
_, bundles, _ = next(os.walk(bundles_dir))
mock_webpack_stats = {
"status": "done",
"publicPath": "/static",
"chunks": {},
"assets": {},
}
for bundle in bundles:
asset = f"js/{bundle}.js"
mock_webpack_stats["chunks"][bundle] = [asset]
mock_webpack_stats["assets"][asset] = {
"name": asset,
"publicPath": f"/static/{asset}",
}
with open(webpack_stats, "w") as outfile:
json.dump(mock_webpack_stats, outfile)
# Clear Django cache before each test
@pytest.fixture(autouse=True)
def django_cache_cleared():
cache.clear()
# Alias rf fixture from pytest-django
@pytest.fixture
def request_factory(rf):
return rf
# Fixture to get test client from Django REST Framework
@pytest.fixture
def api_client():
return APIClient()
# Fixture to get API request factory from Django REST Framework
@pytest.fixture
def api_request_factory():
return APIRequestFactory()
# Initialize tests data
@pytest.fixture(scope="function", autouse=True)
def tests_data():
data = get_tests_data(reset=True)
# Update swh-web configuration to use the in-memory storages
# instantiated in the tests.data module
override_storages(
data["storage"], data["idx_storage"], data["search"], data["counters"]
)
return data
def _known_swh_objects(tests_data, object_type):
return tests_data[object_type]
@pytest.fixture(scope="function")
def content(tests_data):
"""Fixture returning a random content ingested into the test archive.
"""
return random.choice(_known_swh_objects(tests_data, "contents"))
@pytest.fixture(scope="function")
def contents(tests_data):
"""Fixture returning random contents ingested into the test archive.
"""
return random.choices(
_known_swh_objects(tests_data, "contents"), k=random.randint(2, 8)
)
@pytest.fixture(scope="function")
def empty_content():
"""Fixture returning the empty content ingested into the test archive.
"""
empty_content = Content.from_data(data=b"").to_dict()
for algo in DEFAULT_ALGORITHMS:
empty_content[algo] = hash_to_hex(empty_content[algo])
return empty_content
@pytest.fixture(scope="function")
def content_text(tests_data):
"""
Fixture returning a random textual content ingested into the test archive.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"].startswith("text/"),
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_text_non_utf8(tests_data):
"""Fixture returning a random textual content not encoded to UTF-8 ingested
into the test archive.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"].startswith("text/")
and c["encoding"] not in ("utf-8", "us-ascii"),
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_application_no_highlight(tests_data):
"""Fixture returning a random textual content with mimetype
starting with application/ and no detected programming language to
highlight ingested into the test archive.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"].startswith("application/")
and c["encoding"] != "binary"
and c["hljs_language"] == "nohighlight",
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_text_no_highlight(tests_data):
"""Fixture returning a random textual content with no detected
programming language to highlight ingested into the test archive.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"].startswith("text/")
and c["hljs_language"] == "nohighlight",
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_image_type(tests_data):
"""Fixture returning a random image content ingested into the test archive.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"] in browsers_supported_image_mimes,
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_unsupported_image_type_rendering(tests_data):
"""Fixture returning a random image content ingested into the test archive that
can not be rendered by browsers.
"""
return random.choice(
list(
filter(
lambda c: c["mimetype"].startswith("image/")
and c["mimetype"] not in browsers_supported_image_mimes,
_known_swh_objects(tests_data, "contents"),
)
)
)
@pytest.fixture(scope="function")
def content_utf8_detected_as_binary(tests_data):
"""Fixture returning a random textual content detected as binary
by libmagic while they are valid UTF-8 encoded files.
"""
def utf8_binary_detected(content):
if content["encoding"] != "binary":
return False
try:
content["raw_data"].decode("utf-8")
except Exception:
return False
else:
return True
return random.choice(
list(filter(utf8_binary_detected, _known_swh_objects(tests_data, "contents")))
)
@pytest.fixture(scope="function")
def contents_with_ctags():
"""
Fixture returning contents ingested into the test archive.
Those contents are ctags compatible, that is running ctags on those lay results.
"""
return {
"sha1s": [
"0ab37c02043ebff946c1937523f60aadd0844351",
"15554cf7608dde6bfefac7e3d525596343a85b6f",
"2ce837f1489bdfb8faf3ebcc7e72421b5bea83bd",
"30acd0b47fc25e159e27a980102ddb1c4bea0b95",
"4f81f05aaea3efb981f9d90144f746d6b682285b",
"5153aa4b6e4455a62525bc4de38ed0ff6e7dd682",
"59d08bafa6a749110dfb65ba43a61963d5a5bf9f",
"7568285b2d7f31ae483ae71617bd3db873deaa2c",
"7ed3ee8e94ac52ba983dd7690bdc9ab7618247b4",
"8ed7ef2e7ff9ed845e10259d08e4145f1b3b5b03",
"9b3557f1ab4111c8607a4f2ea3c1e53c6992916c",
"9c20da07ed14dc4fcd3ca2b055af99b2598d8bdd",
"c20ceebd6ec6f7a19b5c3aebc512a12fbdc9234b",
"e89e55a12def4cd54d5bff58378a3b5119878eb7",
"e8c0654fe2d75ecd7e0b01bee8a8fc60a130097e",
"eb6595e559a1d34a2b41e8d4835e0e4f98a5d2b5",
],
"symbol_name": "ABS",
}
@pytest.fixture(scope="function")
def directory(tests_data):
"""Fixture returning a random directory ingested into the test archive.
"""
return random.choice(_known_swh_objects(tests_data, "directories"))
def _directory_with_entry_type(tests_data, type_):
return random.choice(
list(
filter(
lambda d: any(
[
e["type"] == type_
for e in list(
tests_data["storage"].directory_ls(hash_to_bytes(d))
)
]
),
_known_swh_objects(tests_data, "directories"),
)
)
)
@pytest.fixture(scope="function")
def directory_with_subdirs(tests_data):
"""Fixture returning a random directory containing sub directories ingested
into the test archive.
"""
return _directory_with_entry_type(tests_data, "dir")
@pytest.fixture(scope="function")
def directory_with_files(tests_data):
"""Fixture returning a random directory containing at least one regular file.
"""
return _directory_with_entry_type(tests_data, "file")
@pytest.fixture(scope="function")
def empty_directory():
"""Fixture returning the empty directory ingested into the test archive.
"""
return Directory(entries=()).id.hex()
@pytest.fixture(scope="function")
def revision(tests_data):
"""Fixturereturning a random revision ingested into the test archive.
"""
return random.choice(_known_swh_objects(tests_data, "revisions"))
@pytest.fixture(scope="function")
def revisions(tests_data):
"""Fixture returning random revisions ingested into the test archive.
"""
return random.choices(
_known_swh_objects(tests_data, "revisions"), k=random.randint(2, 8),
)
@pytest.fixture(scope="function")
def revisions_list(tests_data):
"""Fixture returning random revisions ingested into the test archive.
"""
def gen_revisions_list(size):
return random.choices(_known_swh_objects(tests_data, "revisions"), k=size,)
return gen_revisions_list
def _get_origin_dfs_revisions_walker(tests_data):
storage = tests_data["storage"]
origin = random.choice(tests_data["origins"][:-1])
snapshot = snapshot_get_latest(storage, origin["url"])
if snapshot.branches[b"HEAD"].target_type.value == "alias":
target = snapshot.branches[b"HEAD"].target
head = snapshot.branches[target].target
else:
head = snapshot.branches[b"HEAD"].target
return get_revisions_walker("dfs", storage, head)
@pytest.fixture(scope="function")
def ancestor_revisions(tests_data):
"""Fixture returning a pair of revisions ingested into the test archive
with an ancestor relation.
"""
# get a dfs revisions walker for one of the origins
# loaded into the test archive
revisions_walker = _get_origin_dfs_revisions_walker(tests_data)
master_revisions = []
children = defaultdict(list)
init_rev_found = False
# get revisions only authored in the master branch
for rev in revisions_walker:
for rev_p in rev["parents"]:
children[rev_p].append(rev["id"])
if not init_rev_found:
master_revisions.append(rev)
if not rev["parents"]:
init_rev_found = True
# head revision
root_rev = master_revisions[0]
# pick a random revision, different from head, only authored
# in the master branch
ancestor_rev_idx = random.choice(list(range(1, len(master_revisions) - 1)))
ancestor_rev = master_revisions[ancestor_rev_idx]
ancestor_child_revs = children[ancestor_rev["id"]]
return {
"sha1_git_root": hash_to_hex(root_rev["id"]),
"sha1_git": hash_to_hex(ancestor_rev["id"]),
"children": [hash_to_hex(r) for r in ancestor_child_revs],
}
@pytest.fixture(scope="function")
def non_ancestor_revisions(tests_data):
"""Fixture returning a pair of revisions ingested into the test archive
with no ancestor relation.
"""
# get a dfs revisions walker for one of the origins
# loaded into the test archive
revisions_walker = _get_origin_dfs_revisions_walker(tests_data)
merge_revs = []
children = defaultdict(list)
# get all merge revisions
for rev in revisions_walker:
if len(rev["parents"]) > 1:
merge_revs.append(rev)
for rev_p in rev["parents"]:
children[rev_p].append(rev["id"])
# find a merge revisions whose parents have a unique child revision
random.shuffle(merge_revs)
selected_revs = None
for merge_rev in merge_revs:
if all(len(children[rev_p]) == 1 for rev_p in merge_rev["parents"]):
selected_revs = merge_rev["parents"]
return {
"sha1_git_root": hash_to_hex(selected_revs[0]),
"sha1_git": hash_to_hex(selected_revs[1]),
}
@pytest.fixture(scope="function")
def revision_with_submodules():
"""Fixture returning a revision that is known to
point to a directory with revision entries (aka git submodules)
"""
return {
"rev_sha1_git": "ffcb69001f3f6745dfd5b48f72ab6addb560e234",
"rev_dir_sha1_git": "d92a21446387fa28410e5a74379c934298f39ae2",
"rev_dir_rev_path": "libtess2",
}
@pytest.fixture(scope="function")
def release(tests_data):
"""Fixture returning a random release ingested into the test archive.
"""
return random.choice(_known_swh_objects(tests_data, "releases"))
@pytest.fixture(scope="function")
def releases(tests_data):
"""Fixture returning random releases ingested into the test archive.
"""
return random.choices(
_known_swh_objects(tests_data, "releases"), k=random.randint(2, 8)
)
+@pytest.fixture(scope="function")
+def snapshot(tests_data):
+ """Fixture returning a random snapshot ingested into the test archive.
+ """
+ return random.choice(_known_swh_objects(tests_data, "snapshots"))
+
+
@pytest.fixture(scope="function")
def origin(tests_data):
- """Fixturee returning a random origin ingested into the test archive.
+ """Fixture returning a random origin ingested into the test archive.
"""
return random.choice(_known_swh_objects(tests_data, "origins"))
@pytest.fixture(scope="function")
def origin_with_multiple_visits(tests_data):
"""Fixture returning a random origin with multiple visits ingested
into the test archive.
"""
origins = []
storage = tests_data["storage"]
for origin in tests_data["origins"]:
visit_page = storage.origin_visit_get(origin["url"])
if len(visit_page.results) > 1:
origins.append(origin)
return random.choice(origins)
@pytest.fixture(scope="function")
def origin_with_releases(tests_data):
"""Fixture returning a random origin with releases ingested into the test archive.
"""
origins = []
for origin in tests_data["origins"]:
snapshot = snapshot_get_latest(tests_data["storage"], origin["url"])
if any([b.target_type.value == "release" for b in snapshot.branches.values()]):
origins.append(origin)
return random.choice(origins)
@pytest.fixture(scope="function")
def origin_with_pull_request_branches(tests_data):
"""Fixture returning a random origin with pull request branches ingested
into the test archive.
"""
origins = []
storage = tests_data["storage"]
for origin in storage.origin_list(limit=1000).results:
snapshot = snapshot_get_latest(storage, origin.url)
if any([b"refs/pull/" in b for b in snapshot.branches]):
origins.append(origin)
return random.choice(origins)
def _object_type_swhid(tests_data, object_type):
return random.choice(
list(
filter(
lambda swhid: swhid.object_type == object_type,
_known_swh_objects(tests_data, "swhids"),
)
)
)
@pytest.fixture(scope="function")
def content_swhid(tests_data):
"""Fixture returning a qualified SWHID for a random content object
ingested into the test archive.
"""
return _object_type_swhid(tests_data, ObjectType.CONTENT)
@pytest.fixture(scope="function")
def directory_swhid(tests_data):
"""Fixture returning a qualified SWHID for a random directory object
ingested into the test archive.
"""
return _object_type_swhid(tests_data, ObjectType.DIRECTORY)
@pytest.fixture(scope="function")
def release_swhid(tests_data):
"""Fixture returning a qualified SWHID for a random release object
ingested into the test archive.
"""
return _object_type_swhid(tests_data, ObjectType.RELEASE)
@pytest.fixture(scope="function")
def revision_swhid(tests_data):
"""Fixture returning a qualified SWHID for a random revision object
ingested into the test archive.
"""
return _object_type_swhid(tests_data, ObjectType.REVISION)
+@pytest.fixture(scope="function")
+def snapshot_swhid(tests_data):
+ """Fixture returning a qualified SWHID for a snapshot object
+ ingested into the test archive.
+ """
+ return _object_type_swhid(tests_data, ObjectType.SNAPSHOT)
+
+
# Fixture to manipulate data from a sample archive used in the tests
@pytest.fixture(scope="function")
def archive_data(tests_data):
return _ArchiveData(tests_data)
# Fixture to manipulate indexer data from a sample archive used in the tests
@pytest.fixture(scope="function")
def indexer_data(tests_data):
return _IndexerData(tests_data)
# Custom data directory for requests_mock
@pytest.fixture
def datadir():
return os.path.join(os.path.abspath(os.path.dirname(__file__)), "resources")
class _ArchiveData:
"""
Helper class to manage data from a sample test archive.
It is initialized with a reference to an in-memory storage
containing raw tests data.
It is basically a proxy to Storage interface but it overrides some methods
to retrieve those tests data in a json serializable format in order to ease
tests implementation.
"""
def __init__(self, tests_data):
self.storage = tests_data["storage"]
def __getattr__(self, key):
if key == "storage":
raise AttributeError(key)
# Forward calls to non overridden Storage methods to wrapped
# storage instance
return getattr(self.storage, key)
def content_find(self, content: Dict[str, Any]) -> Dict[str, Any]:
cnt_ids_bytes = {
algo_hash: hash_to_bytes(content[algo_hash])
for algo_hash in ALGORITHMS
if content.get(algo_hash)
}
cnt = self.storage.content_find(cnt_ids_bytes)
return converters.from_content(cnt[0].to_dict()) if cnt else cnt
def content_get(self, cnt_id: str) -> Dict[str, Any]:
cnt_id_bytes = hash_to_bytes(cnt_id)
content = self.storage.content_get([cnt_id_bytes])[0]
if content:
content_d = content.to_dict()
content_d.pop("ctime", None)
else:
content_d = None
return converters.from_swh(
content_d, hashess={"sha1", "sha1_git", "sha256", "blake2s256"}
)
def content_get_data(self, cnt_id: str) -> Optional[Dict[str, Any]]:
cnt_id_bytes = hash_to_bytes(cnt_id)
cnt_data = self.storage.content_get_data(cnt_id_bytes)
if cnt_data is None:
return None
return converters.from_content({"data": cnt_data, "sha1": cnt_id_bytes})
def directory_get(self, dir_id):
return {"id": dir_id, "content": self.directory_ls(dir_id)}
def directory_ls(self, dir_id):
cnt_id_bytes = hash_to_bytes(dir_id)
dir_content = map(
converters.from_directory_entry, self.storage.directory_ls(cnt_id_bytes)
)
return list(dir_content)
def release_get(self, rel_id: str) -> Optional[Dict[str, Any]]:
rel_id_bytes = hash_to_bytes(rel_id)
rel_data = self.storage.release_get([rel_id_bytes])[0]
return converters.from_release(rel_data) if rel_data else None
def revision_get(self, rev_id: str) -> Optional[Dict[str, Any]]:
rev_id_bytes = hash_to_bytes(rev_id)
rev_data = self.storage.revision_get([rev_id_bytes])[0]
return converters.from_revision(rev_data) if rev_data else None
def revision_log(self, rev_id, limit=None):
rev_id_bytes = hash_to_bytes(rev_id)
return list(
map(
converters.from_revision,
self.storage.revision_log([rev_id_bytes], limit=limit),
)
)
def snapshot_get_latest(self, origin_url):
snp = snapshot_get_latest(self.storage, origin_url)
return converters.from_snapshot(snp.to_dict())
def origin_get(self, origin_urls):
origins = self.storage.origin_get(origin_urls)
return [converters.from_origin(o.to_dict()) for o in origins]
def origin_visit_get(self, origin_url):
next_page_token = None
visits = []
while True:
visit_page = self.storage.origin_visit_get(
origin_url, page_token=next_page_token
)
next_page_token = visit_page.next_page_token
for visit in visit_page.results:
visit_status = self.storage.origin_visit_status_get_latest(
origin_url, visit.visit
)
visits.append(
converters.from_origin_visit(
{**visit_status.to_dict(), "type": visit.type}
)
)
if not next_page_token:
break
return visits
def origin_visit_get_by(self, origin_url: str, visit_id: int) -> OriginVisitInfo:
visit = self.storage.origin_visit_get_by(origin_url, visit_id)
assert visit is not None
visit_status = self.storage.origin_visit_status_get_latest(origin_url, visit_id)
assert visit_status is not None
return converters.from_origin_visit(
{**visit_status.to_dict(), "type": visit.type}
)
def origin_visit_status_get_latest(
self,
origin_url,
type: Optional[str] = None,
allowed_statuses: Optional[List[str]] = None,
require_snapshot: bool = False,
):
visit_status = origin_get_latest_visit_status(
self.storage,
origin_url,
type=type,
allowed_statuses=allowed_statuses,
require_snapshot=require_snapshot,
)
return (
converters.from_origin_visit(visit_status.to_dict())
if visit_status
else None
)
def snapshot_get(self, snapshot_id):
snp = snapshot_get_all_branches(self.storage, hash_to_bytes(snapshot_id))
return converters.from_snapshot(snp.to_dict())
def snapshot_get_branches(
self, snapshot_id, branches_from="", branches_count=1000, target_types=None
):
partial_branches = self.storage.snapshot_get_branches(
hash_to_bytes(snapshot_id),
branches_from.encode(),
branches_count,
target_types,
)
return converters.from_partial_branches(partial_branches)
def snapshot_get_head(self, snapshot):
if snapshot["branches"]["HEAD"]["target_type"] == "alias":
target = snapshot["branches"]["HEAD"]["target"]
head = snapshot["branches"][target]["target"]
else:
head = snapshot["branches"]["HEAD"]["target"]
return head
def snapshot_count_branches(self, snapshot_id):
counts = dict.fromkeys(("alias", "release", "revision"), 0)
counts.update(self.storage.snapshot_count_branches(hash_to_bytes(snapshot_id)))
counts.pop(None, None)
return counts
class _IndexerData:
"""
Helper class to manage indexer tests data
It is initialized with a reference to an in-memory indexer storage
containing raw tests data.
It also defines class methods to retrieve those tests data in
a json serializable format in order to ease tests implementation.
"""
def __init__(self, tests_data):
self.idx_storage = tests_data["idx_storage"]
self.mimetype_indexer = tests_data["mimetype_indexer"]
self.license_indexer = tests_data["license_indexer"]
self.ctags_indexer = tests_data["ctags_indexer"]
def content_add_mimetype(self, cnt_id):
self.mimetype_indexer.run([hash_to_bytes(cnt_id)])
def content_get_mimetype(self, cnt_id):
mimetype = self.idx_storage.content_mimetype_get([hash_to_bytes(cnt_id)])[
0
].to_dict()
return converters.from_filetype(mimetype)
def content_add_license(self, cnt_id):
self.license_indexer.run([hash_to_bytes(cnt_id)])
def content_get_license(self, cnt_id):
cnt_id_bytes = hash_to_bytes(cnt_id)
licenses = self.idx_storage.content_fossology_license_get([cnt_id_bytes])
for license in licenses:
yield converters.from_swh(license.to_dict(), hashess={"id"})
def content_add_ctags(self, cnt_id):
self.ctags_indexer.run([hash_to_bytes(cnt_id)])
def content_get_ctags(self, cnt_id):
cnt_id_bytes = hash_to_bytes(cnt_id)
ctags = self.idx_storage.content_ctags_get([cnt_id_bytes])
for ctag in ctags:
yield converters.from_swh(ctag, hashess={"id"})
@pytest.fixture
def keycloak_oidc(keycloak_oidc, mocker):
keycloak_config = get_config()["keycloak"]
keycloak_oidc.server_url = keycloak_config["server_url"]
keycloak_oidc.realm_name = keycloak_config["realm_name"]
keycloak_oidc.client_id = OIDC_SWH_WEB_CLIENT_ID
keycloak_oidc_client = mocker.patch("swh.web.auth.views.keycloak_oidc_client")
keycloak_oidc_client.return_value = keycloak_oidc
return keycloak_oidc
@pytest.fixture
def subtest(request):
"""A hack to explicitly set up and tear down fixtures.
This fixture allows you to set up and tear down fixtures within the test
function itself. This is useful (necessary!) for using Hypothesis inside
pytest, as hypothesis will call the test function multiple times, without
setting up or tearing down fixture state as it is normally the case.
Copied from the pytest-subtesthack project, public domain license
(https://github.com/untitaker/pytest-subtesthack).
"""
parent_test = request.node
def inner(func):
if hasattr(Function, "from_parent"):
item = Function.from_parent(
parent_test,
name=request.function.__name__ + "[]",
originalname=request.function.__name__,
callobj=func,
)
else:
item = Function(
name=request.function.__name__ + "[]", parent=parent_test, callobj=func
)
nextitem = parent_test # prevents pytest from tearing down module fixtures
item.ihook.pytest_runtest_setup(item=item)
item.ihook.pytest_runtest_call(item=item)
item.ihook.pytest_runtest_teardown(item=item, nextitem=nextitem)
return inner
@pytest.fixture
def swh_scheduler(swh_scheduler):
config = get_config()
scheduler = config["scheduler"]
config["scheduler"] = swh_scheduler
# create load-git and load-hg task types
for task_type in TASK_TYPES.values():
swh_scheduler.create_task_type(task_type)
# create load-svn task type
swh_scheduler.create_task_type(
{
"type": "load-svn",
"description": "Update a Subversion repository",
"backend_name": "swh.loader.svn.tasks.DumpMountAndLoadSvnRepository",
"default_interval": timedelta(days=64),
"min_interval": timedelta(hours=12),
"max_interval": timedelta(days=64),
"backoff_factor": 2,
"max_queue_length": None,
"num_retries": 7,
"retry_delay": timedelta(hours=2),
}
)
# create load-cvs task type
swh_scheduler.create_task_type(
{
"type": "load-cvs",
"description": "Update a CVS repository",
"backend_name": "swh.loader.cvs.tasks.DumpMountAndLoadSvnRepository",
"default_interval": timedelta(days=64),
"min_interval": timedelta(hours=12),
"max_interval": timedelta(days=64),
"backoff_factor": 2,
"max_queue_length": None,
"num_retries": 7,
"retry_delay": timedelta(hours=2),
}
)
# add method to add load-archive-files task type during tests
def add_load_archive_task_type():
swh_scheduler.create_task_type(
{
"type": "load-archive-files",
"description": "Load tarballs",
"backend_name": "swh.loader.package.archive.tasks.LoadArchive",
"default_interval": timedelta(days=64),
"min_interval": timedelta(hours=12),
"max_interval": timedelta(days=64),
"backoff_factor": 2,
"max_queue_length": None,
"num_retries": 7,
"retry_delay": timedelta(hours=2),
}
)
swh_scheduler.add_load_archive_task_type = add_load_archive_task_type
yield swh_scheduler
config["scheduler"] = scheduler
get_scheduler_load_task_types.cache_clear()
@pytest.fixture(scope="session")
def django_db_setup(request, django_db_blocker, postgresql_proc):
from django.conf import settings
settings.DATABASES["default"].update(
{
("ENGINE", "django.db.backends.postgresql"),
("NAME", get_config()["test_db"]["name"]),
("USER", postgresql_proc.user),
("HOST", postgresql_proc.host),
("PORT", postgresql_proc.port),
}
)
with django_db_blocker.unblock():
setup_databases(
verbosity=request.config.option.verbose, interactive=False, keepdb=False
)
@pytest.fixture
def staff_user():
return User.objects.create_user(username="admin", password="", is_staff=True)
@pytest.fixture
def regular_user():
return User.objects.create_user(username="johndoe", password="")
@pytest.fixture
def regular_user2():
return User.objects.create_user(username="janedoe", password="")
diff --git a/swh/web/tests/misc/test_badges.py b/swh/web/tests/misc/test_badges.py
index 9dad11d1..02793d62 100644
--- a/swh/web/tests/misc/test_badges.py
+++ b/swh/web/tests/misc/test_badges.py
@@ -1,197 +1,195 @@
# Copyright (C) 2019-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
from corsheaders.middleware import ACCESS_CONTROL_ALLOW_ORIGIN
from hypothesis import given
from swh.model.hashutil import hash_to_bytes
from swh.model.swhids import ObjectType, QualifiedSWHID
from swh.web.common import archive
from swh.web.common.identifiers import resolve_swhid
from swh.web.common.utils import reverse
from swh.web.misc.badges import _badge_config, _get_logo_data
from swh.web.tests.django_asserts import assert_contains
from swh.web.tests.strategies import (
invalid_sha1,
new_origin,
- snapshot,
unknown_content,
unknown_directory,
unknown_release,
unknown_revision,
unknown_snapshot,
)
from swh.web.tests.utils import check_http_get_response
def test_content_badge(client, content):
_test_badge_endpoints(client, "content", content["sha1_git"])
def test_directory_badge(client, directory):
_test_badge_endpoints(client, "directory", directory)
def test_origin_badge(client, origin):
_test_badge_endpoints(client, "origin", origin["url"])
def test_release_badge(client, release):
_test_badge_endpoints(client, "release", release)
def test_revision_badge(client, revision):
_test_badge_endpoints(client, "revision", revision)
-@given(snapshot())
def test_snapshot_badge(client, snapshot):
_test_badge_endpoints(client, "snapshot", snapshot)
@given(
unknown_content(),
unknown_directory(),
new_origin(),
unknown_release(),
unknown_revision(),
unknown_snapshot(),
invalid_sha1(),
)
def test_badge_errors(
client,
unknown_content,
unknown_directory,
new_origin,
unknown_release,
unknown_revision,
unknown_snapshot,
invalid_sha1,
):
for object_type, object_id in (
("content", unknown_content["sha1_git"]),
("directory", unknown_directory),
("origin", new_origin),
("release", unknown_release),
("revision", unknown_revision),
("snapshot", unknown_snapshot),
):
url_args = {"object_type": object_type, "object_id": object_id}
url = reverse("swh-badge", url_args=url_args)
resp = check_http_get_response(
client, url, status_code=200, content_type="image/svg+xml"
)
_check_generated_badge(resp, **url_args, error="not found")
for object_type, object_id in (
(ObjectType.CONTENT, invalid_sha1),
(ObjectType.DIRECTORY, invalid_sha1),
(ObjectType.RELEASE, invalid_sha1),
(ObjectType.REVISION, invalid_sha1),
(ObjectType.SNAPSHOT, invalid_sha1),
):
url_args = {"object_type": object_type.name.lower(), "object_id": object_id}
url = reverse("swh-badge", url_args=url_args)
resp = check_http_get_response(
client, url, status_code=200, content_type="image/svg+xml"
)
_check_generated_badge(resp, **url_args, error="invalid id")
object_swhid = f"swh:1:{object_type.value}:{object_id}"
url = reverse("swh-badge-swhid", url_args={"object_swhid": object_swhid})
resp = check_http_get_response(
client, url, status_code=200, content_type="image/svg+xml"
)
_check_generated_badge(resp, "", "", error="invalid id")
def test_badge_endpoints_have_cors_header(client, origin, release):
url = reverse(
"swh-badge", url_args={"object_type": "origin", "object_id": origin["url"]}
)
resp = check_http_get_response(
client,
url,
status_code=200,
content_type="image/svg+xml",
http_origin="https://example.org",
)
assert ACCESS_CONTROL_ALLOW_ORIGIN in resp
release_swhid = str(
QualifiedSWHID(object_type=ObjectType.RELEASE, object_id=hash_to_bytes(release))
)
url = reverse("swh-badge-swhid", url_args={"object_swhid": release_swhid})
resp = check_http_get_response(
client,
url,
status_code=200,
content_type="image/svg+xml",
http_origin="https://example.org",
)
assert ACCESS_CONTROL_ALLOW_ORIGIN in resp
def _test_badge_endpoints(client, object_type: str, object_id: str):
url_args = {"object_type": object_type, "object_id": object_id}
url = reverse("swh-badge", url_args=url_args)
resp = check_http_get_response(
client, url, status_code=200, content_type="image/svg+xml"
)
_check_generated_badge(resp, **url_args)
if object_type != "origin":
obj_swhid = str(
QualifiedSWHID(
object_type=ObjectType[object_type.upper()],
object_id=hash_to_bytes(object_id),
)
)
url = reverse("swh-badge-swhid", url_args={"object_swhid": obj_swhid})
resp = check_http_get_response(
client, url, status_code=200, content_type="image/svg+xml"
)
_check_generated_badge(resp, **url_args)
def _check_generated_badge(response, object_type, object_id, error=None):
assert response.status_code == 200, response.content
assert response["Content-Type"] == "image/svg+xml"
if not object_type:
object_type = "object"
if object_type == "origin" and error is None:
link = reverse("browse-origin", query_params={"origin_url": object_id})
text = "repository"
elif error is None:
text = str(
QualifiedSWHID(
object_type=ObjectType[object_type.upper()],
object_id=hash_to_bytes(object_id),
)
)
link = resolve_swhid(text)["browse_url"]
if object_type == "release":
release = archive.lookup_release(object_id)
text = release["name"]
elif error == "invalid id":
text = "error"
link = f"invalid {object_type} id"
object_type = "error"
elif error == "not found":
text = "error"
link = f"{object_type} not found"
object_type = "error"
assert_contains(response, "<svg ")
assert_contains(response, "</svg>")
assert_contains(response, _get_logo_data())
assert_contains(response, _badge_config[object_type]["color"])
assert_contains(response, _badge_config[object_type]["title"])
assert_contains(response, text)
assert_contains(response, link)
diff --git a/swh/web/tests/strategies.py b/swh/web/tests/strategies.py
index 38c9d0eb..2cf82e14 100644
--- a/swh/web/tests/strategies.py
+++ b/swh/web/tests/strategies.py
@@ -1,285 +1,245 @@
# Copyright (C) 2018-2021 The Software Heritage developers
# See the AUTHORS file at the top-level directory of this distribution
# License: GNU Affero General Public License version 3, or any later version
# See top-level LICENSE file for more information
from datetime import datetime
import random
from hypothesis import assume, settings
from hypothesis.extra.dateutil import timezones
-from hypothesis.strategies import (
- binary,
- characters,
- composite,
- datetimes,
- lists,
- sampled_from,
- text,
-)
+from hypothesis.strategies import binary, characters, composite, datetimes, lists, text
from swh.model.hashutil import hash_to_bytes, hash_to_hex
from swh.model.hypothesis_strategies import origins as new_origin_strategy
from swh.model.hypothesis_strategies import snapshots as new_snapshot
from swh.model.model import Person, Revision, RevisionType, TimestampWithTimezone
-from swh.model.swhids import ObjectType
from swh.web.tests.data import get_tests_data
# Module dedicated to the generation of input data for tests through
# the use of hypothesis.
# Some of these data are sampled from a test archive created and populated
# in the swh.web.tests.data module.
# Set the swh-web hypothesis profile if none has been explicitly set
hypothesis_default_settings = settings.get_profile("default")
if repr(settings()) == repr(hypothesis_default_settings):
settings.load_profile("swh-web")
-# The following strategies exploit the hypothesis capabilities
-
-
-def _known_swh_object(object_type):
- return sampled_from(get_tests_data()[object_type])
-
-
def sha1():
"""
Hypothesis strategy returning a valid hexadecimal sha1 value.
"""
return binary(min_size=20, max_size=20).map(hash_to_hex)
def invalid_sha1():
"""
Hypothesis strategy returning an invalid sha1 representation.
"""
return binary(min_size=50, max_size=50).map(hash_to_hex)
def sha256():
"""
Hypothesis strategy returning a valid hexadecimal sha256 value.
"""
return binary(min_size=32, max_size=32).map(hash_to_hex)
@composite
def new_content(draw):
blake2s256_hex = draw(sha256())
sha1_hex = draw(sha1())
sha1_git_hex = draw(sha1())
sha256_hex = draw(sha256())
assume(sha1_hex != sha1_git_hex)
assume(blake2s256_hex != sha256_hex)
return {
"blake2S256": blake2s256_hex,
"sha1": sha1_hex,
"sha1_git": sha1_git_hex,
"sha256": sha256_hex,
}
def unknown_content():
"""
Hypothesis strategy returning a random content not ingested
into the test archive.
"""
return new_content().filter(
lambda c: get_tests_data()["storage"].content_get_data(hash_to_bytes(c["sha1"]))
is None
)
def unknown_contents():
"""
Hypothesis strategy returning random contents not ingested
into the test archive.
"""
return lists(unknown_content(), min_size=2, max_size=8)
def unknown_directory():
"""
Hypothesis strategy returning a random directory not ingested
into the test archive.
"""
return sha1().filter(
lambda s: len(
list(get_tests_data()["storage"].directory_missing([hash_to_bytes(s)]))
)
> 0
)
def new_origin():
"""
Hypothesis strategy returning a random origin not ingested
into the test archive.
"""
return new_origin_strategy()
def new_origins(nb_origins=None):
"""
Hypothesis strategy returning random origins not ingested
into the test archive.
"""
min_size = nb_origins if nb_origins is not None else 2
max_size = nb_origins if nb_origins is not None else 8
size = random.randint(min_size, max_size)
return lists(
new_origin(),
min_size=size,
max_size=size,
unique_by=lambda o: tuple(sorted(o.items())),
)
def visit_dates(nb_dates=None):
"""
Hypothesis strategy returning a list of visit dates.
"""
min_size = nb_dates if nb_dates else 2
max_size = nb_dates if nb_dates else 8
return lists(
datetimes(
min_value=datetime(2015, 1, 1, 0, 0),
max_value=datetime(2018, 12, 31, 0, 0),
timezones=timezones(),
),
min_size=min_size,
max_size=max_size,
unique=True,
).map(sorted)
def unknown_release():
"""
Hypothesis strategy returning a random revision not ingested
into the test archive.
"""
return sha1().filter(
lambda s: get_tests_data()["storage"].release_get([s])[0] is None
)
def unknown_revision():
"""
Hypothesis strategy returning a random revision not ingested
into the test archive.
"""
return sha1().filter(
lambda s: get_tests_data()["storage"].revision_get([hash_to_bytes(s)])[0]
is None
)
@composite
def new_person(draw):
"""
Hypothesis strategy returning random raw swh person data.
"""
name = draw(
text(
min_size=5,
max_size=30,
alphabet=characters(min_codepoint=0, max_codepoint=255),
)
)
email = "%s@company.org" % name
return Person(
name=name.encode(),
email=email.encode(),
fullname=("%s <%s>" % (name, email)).encode(),
)
@composite
def new_swh_date(draw):
"""
Hypothesis strategy returning random raw swh date data.
"""
timestamp = draw(
datetimes(
min_value=datetime(2015, 1, 1, 0, 0), max_value=datetime(2018, 12, 31, 0, 0)
).map(lambda d: int(d.timestamp()))
)
return {
"timestamp": timestamp,
"offset": 0,
"negative_utc": False,
}
@composite
def new_revision(draw):
"""
Hypothesis strategy returning random raw swh revision data
not ingested into the test archive.
"""
return Revision(
directory=draw(sha1().map(hash_to_bytes)),
author=draw(new_person()),
committer=draw(new_person()),
message=draw(text(min_size=20, max_size=100).map(lambda t: t.encode())),
date=TimestampWithTimezone.from_datetime(draw(new_swh_date())),
committer_date=TimestampWithTimezone.from_datetime(draw(new_swh_date())),
synthetic=False,
type=RevisionType.GIT,
)
def unknown_revisions(min_size=2, max_size=8):
"""
Hypothesis strategy returning random revisions not ingested
into the test archive.
"""
return lists(unknown_revision(), min_size=min_size, max_size=max_size)
-def snapshot():
- """
- Hypothesis strategy returning a random snapshot ingested
- into the test archive.
- """
- return _known_swh_object("snapshots")
-
-
def new_snapshots(nb_snapshots=None):
min_size = nb_snapshots if nb_snapshots else 2
max_size = nb_snapshots if nb_snapshots else 8
return lists(
new_snapshot(min_size=2, max_size=10, only_objects=True),
min_size=min_size,
max_size=max_size,
)
def unknown_snapshot():
"""
Hypothesis strategy returning a random revision not ingested
into the test archive.
"""
return sha1().filter(
lambda s: get_tests_data()["storage"].snapshot_get_branches(hash_to_bytes(s))
is None
)
-
-
-def swhid():
- """
- Hypothesis strategy returning a qualified SWHID for any object
- ingested into the test archive.
- """
- return _known_swh_object("swhids")
-
-
-def snapshot_swhid():
- """
- Hypothesis strategy returning a qualified SWHID for a snapshot object
- ingested into the test archive.
- """
- return swhid().filter(lambda swhid: swhid.object_type == ObjectType.SNAPSHOT)
File Metadata
Details
Attached
Mime Type
text/x-diff
Expires
Fri, Jul 4, 3:21 PM (6 d, 6 h ago)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
3275622
Attached To
rDWAPPS Web applications
Event Timeline
Log In to Comment