2017-02-06 13:40:28 -05:00
|
|
|
// Imports
|
|
|
|
import * as fs from 'fs';
|
|
|
|
import * as path from 'path';
|
|
|
|
import {CmdResult, helper as h} from './helper';
|
|
|
|
|
|
|
|
// Tests
|
|
|
|
describe('upload-server (on HTTP)', () => {
|
|
|
|
const hostname = h.uploadHostname;
|
|
|
|
const port = h.uploadPort;
|
|
|
|
const host = `${hostname}:${port}`;
|
|
|
|
const pr = '9';
|
|
|
|
const sha9 = '9'.repeat(40);
|
|
|
|
const sha0 = '0'.repeat(40);
|
|
|
|
|
|
|
|
beforeEach(() => jasmine.DEFAULT_TIMEOUT_INTERVAL = 10000);
|
|
|
|
afterEach(() => h.cleanUp());
|
|
|
|
|
|
|
|
|
|
|
|
describe(`${host}/create-build/<pr>/<sha>`, () => {
|
2017-03-05 09:42:04 -05:00
|
|
|
const authorizationHeader = `--header "Authorization: Token FOO"`;
|
|
|
|
const xFileHeader = `--header "X-File: ${h.buildsDir}/snapshot.tar.gz"`;
|
2017-06-20 13:22:32 -04:00
|
|
|
const defaultHeaders = `${authorizationHeader} ${xFileHeader}`;
|
|
|
|
const curl = (url: string, headers = defaultHeaders) => `curl -iL ${headers} ${url}`;
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
|
|
|
|
it('should disallow non-GET requests', done => {
|
|
|
|
const url = `http://${host}/create-build/${pr}/${sha9}`;
|
|
|
|
const bodyRegex = /^Unsupported method/;
|
|
|
|
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`curl -iLX PUT ${url}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX POST ${url}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX PATCH ${url}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX DELETE ${url}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-03-05 09:42:04 -05:00
|
|
|
it('should reject requests without an \'AUTHORIZATION\' header', done => {
|
|
|
|
const headers1 = '';
|
|
|
|
const headers2 = '--header "AUTHORIXATION: "';
|
|
|
|
const url = `http://${host}/create-build/${pr}/${sha9}`;
|
|
|
|
const bodyRegex = /^Missing or empty 'AUTHORIZATION' header/;
|
|
|
|
|
|
|
|
Promise.all([
|
2017-06-20 13:22:32 -04:00
|
|
|
h.runCmd(curl(url, headers1)).then(h.verifyResponse(401, bodyRegex)),
|
|
|
|
h.runCmd(curl(url, headers2)).then(h.verifyResponse(401, bodyRegex)),
|
2017-03-05 09:42:04 -05:00
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-02-06 13:40:28 -05:00
|
|
|
it('should reject requests without an \'X-FILE\' header', done => {
|
2017-03-05 09:42:04 -05:00
|
|
|
const headers1 = authorizationHeader;
|
|
|
|
const headers2 = `${authorizationHeader} --header "X-FILE: "`;
|
2017-02-06 13:40:28 -05:00
|
|
|
const url = `http://${host}/create-build/${pr}/${sha9}`;
|
|
|
|
const bodyRegex = /^Missing or empty 'X-FILE' header/;
|
|
|
|
|
|
|
|
Promise.all([
|
2017-06-20 13:22:32 -04:00
|
|
|
h.runCmd(curl(url, headers1)).then(h.verifyResponse(400, bodyRegex)),
|
|
|
|
h.runCmd(curl(url, headers2)).then(h.verifyResponse(400, bodyRegex)),
|
2017-02-06 13:40:28 -05:00
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
it('should reject requests for which the PR verification fails', done => {
|
|
|
|
const headers = `--header "Authorization: FAKE_VERIFICATION_ERROR" ${xFileHeader}`;
|
|
|
|
const url = `http://${host}/create-build/${pr}/${sha9}`;
|
|
|
|
const bodyRegex = new RegExp(`Error while verifying upload for PR ${pr}: Test`);
|
|
|
|
|
|
|
|
h.runCmd(curl(url, headers)).
|
|
|
|
then(h.verifyResponse(403, bodyRegex)).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-02-06 13:40:28 -05:00
|
|
|
it('should respond with 404 for unknown paths', done => {
|
2017-06-20 13:22:32 -04:00
|
|
|
const cmdPrefix = curl(`http://${host}`);
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`${cmdPrefix}/foo/create-build/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/foo-create-build/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/fooncreate-build/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/create-build/foo/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/create-build-foo/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/create-buildnfoo/${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/create-build/pr${pr}/${sha9}`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`${cmdPrefix}/create-build/${pr}/${sha9}42`).then(h.verifyResponse(404)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should reject PRs with leading zeros', done => {
|
2017-06-20 13:22:32 -04:00
|
|
|
h.runCmd(curl(`http://${host}/create-build/0${pr}/${sha9}`)).
|
2017-02-06 13:40:28 -05:00
|
|
|
then(h.verifyResponse(404)).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-03-12 03:41:04 -04:00
|
|
|
it('should accept SHAs with leading zeros (but not trim the zeros)', done => {
|
2017-02-06 13:40:28 -05:00
|
|
|
Promise.all([
|
2017-06-20 13:22:32 -04:00
|
|
|
h.runCmd(curl(`http://${host}/create-build/${pr}/0${sha9}`)).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(curl(`http://${host}/create-build/${pr}/${sha9}`)).then(h.verifyResponse(500)),
|
|
|
|
h.runCmd(curl(`http://${host}/create-build/${pr}/${sha0}`)).then(h.verifyResponse(500)),
|
2017-02-06 13:40:28 -05:00
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
[true, false].forEach(isPublic => describe(`(for ${isPublic ? 'public' : 'hidden'} builds)`, () => {
|
|
|
|
const authorizationHeader2 = isPublic ?
|
|
|
|
authorizationHeader : '--header "Authorization: FAKE_VERIFIED_NOT_TRUSTED"';
|
|
|
|
const cmdPrefix = curl('', `${authorizationHeader2} ${xFileHeader}`);
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
it('should not overwrite existing builds', done => {
|
|
|
|
h.createDummyBuild(pr, sha9, isPublic);
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toContain('index.html');
|
2017-02-06 13:40:28 -05:00
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
h.writeBuildFile(pr, sha9, 'index.html', 'My content', isPublic);
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toBe('My content');
|
2017-02-06 13:40:28 -05:00
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
h.runCmd(`${cmdPrefix} http://${host}/create-build/${pr}/${sha9}`).
|
|
|
|
then(h.verifyResponse(409, /^Request to overwrite existing directory/)).
|
|
|
|
then(() => expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toBe('My content')).
|
|
|
|
then(done);
|
2017-02-06 13:40:28 -05:00
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
it('should delete the PR directory on error (for new PR)', done => {
|
|
|
|
h.runCmd(`${cmdPrefix} http://${host}/create-build/${pr}/${sha9}`).
|
|
|
|
then(h.verifyResponse(500)).
|
|
|
|
then(() => expect(h.buildExists(pr, '', isPublic)).toBe(false)).
|
|
|
|
then(done);
|
2017-02-06 13:40:28 -05:00
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
it('should only delete the SHA directory on error (for existing PR)', done => {
|
|
|
|
h.createDummyBuild(pr, sha0, isPublic);
|
|
|
|
|
|
|
|
h.runCmd(`${cmdPrefix} http://${host}/create-build/${pr}/${sha9}`).
|
|
|
|
then(h.verifyResponse(500)).
|
2017-02-06 13:40:28 -05:00
|
|
|
then(() => {
|
2017-06-20 13:22:32 -04:00
|
|
|
expect(h.buildExists(pr, sha9, isPublic)).toBe(false);
|
|
|
|
expect(h.buildExists(pr, '', isPublic)).toBe(true);
|
2017-02-06 13:40:28 -05:00
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
describe('on successful upload', () => {
|
|
|
|
const archivePath = path.join(h.buildsDir, 'snapshot.tar.gz');
|
|
|
|
const statusCode = isPublic ? 201 : 202;
|
|
|
|
let uploadPromise: Promise<CmdResult>;
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
h.createDummyArchive(pr, sha9, archivePath);
|
|
|
|
uploadPromise = h.runCmd(`${cmdPrefix} http://${host}/create-build/${pr}/${sha9}`);
|
|
|
|
});
|
|
|
|
afterEach(() => h.deletePrDir(pr, isPublic));
|
|
|
|
|
|
|
|
|
|
|
|
it(`should respond with ${statusCode}`, done => {
|
|
|
|
uploadPromise.then(h.verifyResponse(statusCode)).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should extract the contents of the uploaded file', done => {
|
|
|
|
uploadPromise.
|
|
|
|
then(() => {
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toContain(`uploaded/${pr}`);
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'foo/bar.js', isPublic)).toContain(`uploaded/${pr}`);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it(`should create files/directories owned by '${h.wwwUser}'`, done => {
|
|
|
|
const prDir = h.getPrDir(pr, isPublic);
|
|
|
|
const shaDir = path.join(prDir, sha9);
|
|
|
|
const idxPath = path.join(shaDir, 'index.html');
|
|
|
|
const barPath = path.join(shaDir, 'foo', 'bar.js');
|
|
|
|
|
|
|
|
uploadPromise.
|
|
|
|
then(() => Promise.all([
|
|
|
|
h.runCmd(`find ${shaDir}`),
|
|
|
|
h.runCmd(`find ${shaDir} -user ${h.wwwUser}`),
|
|
|
|
])).
|
|
|
|
then(([{stdout: allFiles}, {stdout: userFiles}]) => {
|
|
|
|
expect(userFiles).toBe(allFiles);
|
|
|
|
expect(userFiles).toContain(shaDir);
|
|
|
|
expect(userFiles).toContain(idxPath);
|
|
|
|
expect(userFiles).toContain(barPath);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should delete the uploaded file', done => {
|
|
|
|
expect(fs.existsSync(archivePath)).toBe(true);
|
|
|
|
uploadPromise.
|
|
|
|
then(() => expect(fs.existsSync(archivePath)).toBe(false)).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should make the build directory non-writable', done => {
|
|
|
|
const prDir = h.getPrDir(pr, isPublic);
|
|
|
|
const shaDir = path.join(prDir, sha9);
|
|
|
|
const idxPath = path.join(shaDir, 'index.html');
|
|
|
|
const barPath = path.join(shaDir, 'foo', 'bar.js');
|
|
|
|
|
|
|
|
// See https://github.com/nodejs/node-v0.x-archive/issues/3045#issuecomment-4862588.
|
|
|
|
const isNotWritable = (fileOrDir: string) => {
|
|
|
|
const mode = fs.statSync(fileOrDir).mode;
|
|
|
|
// tslint:disable-next-line: no-bitwise
|
|
|
|
return !(mode & parseInt('222', 8));
|
|
|
|
};
|
|
|
|
|
|
|
|
uploadPromise.
|
|
|
|
then(() => {
|
|
|
|
expect(isNotWritable(shaDir)).toBe(true);
|
|
|
|
expect(isNotWritable(idxPath)).toBe(true);
|
|
|
|
expect(isNotWritable(barPath)).toBe(true);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
describe('when the PR\'s visibility has changed', () => {
|
|
|
|
const archivePath = path.join(h.buildsDir, 'snapshot.tar.gz');
|
|
|
|
const statusCode = isPublic ? 201 : 202;
|
2017-02-06 13:40:28 -05:00
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
const checkPrVisibility = (isPublic2: boolean) => {
|
|
|
|
expect(h.buildExists(pr, '', isPublic2)).toBe(true);
|
|
|
|
expect(h.buildExists(pr, '', !isPublic2)).toBe(false);
|
|
|
|
expect(h.buildExists(pr, sha0, isPublic2)).toBe(true);
|
|
|
|
expect(h.buildExists(pr, sha0, !isPublic2)).toBe(false);
|
2017-02-06 13:40:28 -05:00
|
|
|
};
|
2017-06-20 13:22:32 -04:00
|
|
|
const uploadBuild = (sha: string) => h.runCmd(`${cmdPrefix} http://${host}/create-build/${pr}/${sha}`);
|
|
|
|
|
|
|
|
beforeEach(() => {
|
|
|
|
h.createDummyBuild(pr, sha0, !isPublic);
|
|
|
|
h.createDummyArchive(pr, sha9, archivePath);
|
|
|
|
checkPrVisibility(!isPublic);
|
|
|
|
});
|
|
|
|
afterEach(() => h.deletePrDir(pr, isPublic));
|
|
|
|
|
|
|
|
|
|
|
|
it('should update the PR\'s visibility', done => {
|
|
|
|
uploadBuild(sha9).
|
|
|
|
then(h.verifyResponse(statusCode)).
|
|
|
|
then(() => {
|
|
|
|
checkPrVisibility(isPublic);
|
|
|
|
expect(h.buildExists(pr, sha9, isPublic)).toBe(true);
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toContain(`uploaded/${pr}`);
|
|
|
|
expect(h.readBuildFile(pr, sha9, 'index.html', isPublic)).toContain(sha9);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should not overwrite existing builds (but keep the updated visibility)', done => {
|
|
|
|
expect(h.buildExists(pr, sha0, isPublic)).toBe(false);
|
|
|
|
|
|
|
|
uploadBuild(sha0).
|
|
|
|
then(h.verifyResponse(409, /^Request to overwrite existing directory/)).
|
|
|
|
then(() => {
|
|
|
|
checkPrVisibility(isPublic);
|
|
|
|
expect(h.readBuildFile(pr, sha0, 'index.html', isPublic)).toContain(pr);
|
|
|
|
expect(h.readBuildFile(pr, sha0, 'index.html', isPublic)).not.toContain(`uploaded/${pr}`);
|
|
|
|
expect(h.readBuildFile(pr, sha0, 'index.html', isPublic)).toContain(sha0);
|
|
|
|
expect(h.readBuildFile(pr, sha0, 'index.html', isPublic)).not.toContain(sha9);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should reject the request if it fails to update the PR\'s visibility', done => {
|
|
|
|
// One way to cause an error is to have both a public and a hidden directory for the sme PR.
|
|
|
|
h.createDummyBuild(pr, sha0, isPublic);
|
|
|
|
|
|
|
|
expect(h.buildExists(pr, sha0, isPublic)).toBe(true);
|
|
|
|
expect(h.buildExists(pr, sha0, !isPublic)).toBe(true);
|
|
|
|
|
|
|
|
const errorRegex = new RegExp(`^Request to move '${h.getPrDir(pr, !isPublic)}' ` +
|
|
|
|
`to existing directory '${h.getPrDir(pr, isPublic)}'.`);
|
|
|
|
|
|
|
|
uploadBuild(sha9).
|
|
|
|
then(h.verifyResponse(409, errorRegex)).
|
|
|
|
then(() => {
|
|
|
|
expect(h.buildExists(pr, sha0, isPublic)).toBe(true);
|
|
|
|
expect(h.buildExists(pr, sha0, !isPublic)).toBe(true);
|
|
|
|
expect(h.buildExists(pr, sha9, isPublic)).toBe(false);
|
|
|
|
expect(h.buildExists(pr, sha9, !isPublic)).toBe(false);
|
|
|
|
}).
|
|
|
|
then(done);
|
|
|
|
});
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
});
|
|
|
|
|
2017-06-20 13:22:32 -04:00
|
|
|
}));
|
2017-02-06 13:40:28 -05:00
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
describe(`${host}/health-check`, () => {
|
|
|
|
|
|
|
|
it('should respond with 200', done => {
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`curl -iL http://${host}/health-check`).then(h.verifyResponse(200)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/health-check/`).then(h.verifyResponse(200)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should respond with 404 if the path does not match exactly', done => {
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`curl -iL http://${host}/health-check/foo`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/health-check-foo`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/health-checknfoo`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/foo/health-check`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/foo-health-check`).then(h.verifyResponse(404)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/foonhealth-check`).then(h.verifyResponse(404)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
describe(`${host}/*`, () => {
|
|
|
|
|
|
|
|
it('should respond with 404 for GET requests to unknown URLs', done => {
|
|
|
|
const bodyRegex = /^Unknown resource/;
|
|
|
|
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`curl -iL http://${host}/index.html`).then(h.verifyResponse(404, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iL http://${host}/`).then(h.verifyResponse(404, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iL http://${host}`).then(h.verifyResponse(404, bodyRegex)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
|
|
|
|
it('should respond with 405 for non-GET requests to any URL', done => {
|
|
|
|
const bodyRegex = /^Unsupported method/;
|
|
|
|
|
|
|
|
Promise.all([
|
|
|
|
h.runCmd(`curl -iLX PUT http://${host}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX POST http://${host}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX PATCH http://${host}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
h.runCmd(`curl -iLX DELETE http://${host}`).then(h.verifyResponse(405, bodyRegex)),
|
|
|
|
]).then(done);
|
|
|
|
});
|
|
|
|
|
|
|
|
});
|
|
|
|
|
|
|
|
});
|