mirror of https://github.com/go-gitea/gitea.git
Browse Source
Add endpoint deleting workflow run Resolves #26219 /claim #26219 --------- Co-authored-by: Lunny Xiao <xiaolunwen@gmail.com> Co-authored-by: wxiaoguang <wxiaoguang@gmail.com>pull/34459/head
22 changed files with 691 additions and 43 deletions
@ -0,0 +1,181 @@ |
|||||||
|
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package integration |
||||||
|
|
||||||
|
import ( |
||||||
|
"fmt" |
||||||
|
"net/http" |
||||||
|
"net/url" |
||||||
|
"testing" |
||||||
|
"time" |
||||||
|
|
||||||
|
actions_model "code.gitea.io/gitea/models/actions" |
||||||
|
auth_model "code.gitea.io/gitea/models/auth" |
||||||
|
"code.gitea.io/gitea/models/unittest" |
||||||
|
user_model "code.gitea.io/gitea/models/user" |
||||||
|
"code.gitea.io/gitea/modules/json" |
||||||
|
"code.gitea.io/gitea/routers/web/repo/actions" |
||||||
|
|
||||||
|
runnerv1 "code.gitea.io/actions-proto-go/runner/v1" |
||||||
|
"github.com/stretchr/testify/assert" |
||||||
|
"google.golang.org/protobuf/types/known/timestamppb" |
||||||
|
) |
||||||
|
|
||||||
|
func TestActionsDeleteRun(t *testing.T) { |
||||||
|
now := time.Now() |
||||||
|
testCase := struct { |
||||||
|
treePath string |
||||||
|
fileContent string |
||||||
|
outcomes map[string]*mockTaskOutcome |
||||||
|
expectedStatuses map[string]string |
||||||
|
}{ |
||||||
|
treePath: ".gitea/workflows/test1.yml", |
||||||
|
fileContent: `name: test1 |
||||||
|
on: |
||||||
|
push: |
||||||
|
paths: |
||||||
|
- .gitea/workflows/test1.yml |
||||||
|
jobs: |
||||||
|
job1: |
||||||
|
runs-on: ubuntu-latest |
||||||
|
steps: |
||||||
|
- run: echo job1 |
||||||
|
job2: |
||||||
|
runs-on: ubuntu-latest |
||||||
|
steps: |
||||||
|
- run: echo job2 |
||||||
|
job3: |
||||||
|
runs-on: ubuntu-latest |
||||||
|
steps: |
||||||
|
- run: echo job3 |
||||||
|
`, |
||||||
|
outcomes: map[string]*mockTaskOutcome{ |
||||||
|
"job1": { |
||||||
|
result: runnerv1.Result_RESULT_SUCCESS, |
||||||
|
logRows: []*runnerv1.LogRow{ |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(4 * time.Second)), |
||||||
|
Content: " \U0001F433 docker create image", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(5 * time.Second)), |
||||||
|
Content: "job1", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(6 * time.Second)), |
||||||
|
Content: "\U0001F3C1 Job succeeded", |
||||||
|
}, |
||||||
|
}, |
||||||
|
}, |
||||||
|
"job2": { |
||||||
|
result: runnerv1.Result_RESULT_SUCCESS, |
||||||
|
logRows: []*runnerv1.LogRow{ |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(4 * time.Second)), |
||||||
|
Content: " \U0001F433 docker create image", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(5 * time.Second)), |
||||||
|
Content: "job2", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(6 * time.Second)), |
||||||
|
Content: "\U0001F3C1 Job succeeded", |
||||||
|
}, |
||||||
|
}, |
||||||
|
}, |
||||||
|
"job3": { |
||||||
|
result: runnerv1.Result_RESULT_SUCCESS, |
||||||
|
logRows: []*runnerv1.LogRow{ |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(4 * time.Second)), |
||||||
|
Content: " \U0001F433 docker create image", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(5 * time.Second)), |
||||||
|
Content: "job3", |
||||||
|
}, |
||||||
|
{ |
||||||
|
Time: timestamppb.New(now.Add(6 * time.Second)), |
||||||
|
Content: "\U0001F3C1 Job succeeded", |
||||||
|
}, |
||||||
|
}, |
||||||
|
}, |
||||||
|
}, |
||||||
|
expectedStatuses: map[string]string{ |
||||||
|
"job1": actions_model.StatusSuccess.String(), |
||||||
|
"job2": actions_model.StatusSuccess.String(), |
||||||
|
"job3": actions_model.StatusSuccess.String(), |
||||||
|
}, |
||||||
|
} |
||||||
|
onGiteaRun(t, func(t *testing.T, u *url.URL) { |
||||||
|
user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2}) |
||||||
|
session := loginUser(t, user2.Name) |
||||||
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository, auth_model.AccessTokenScopeWriteUser) |
||||||
|
|
||||||
|
apiRepo := createActionsTestRepo(t, token, "actions-delete-run-test", false) |
||||||
|
runner := newMockRunner() |
||||||
|
runner.registerAsRepoRunner(t, user2.Name, apiRepo.Name, "mock-runner", []string{"ubuntu-latest"}, false) |
||||||
|
|
||||||
|
opts := getWorkflowCreateFileOptions(user2, apiRepo.DefaultBranch, "create "+testCase.treePath, testCase.fileContent) |
||||||
|
createWorkflowFile(t, token, user2.Name, apiRepo.Name, testCase.treePath, opts) |
||||||
|
|
||||||
|
runIndex := "" |
||||||
|
for i := 0; i < len(testCase.outcomes); i++ { |
||||||
|
task := runner.fetchTask(t) |
||||||
|
jobName := getTaskJobNameByTaskID(t, token, user2.Name, apiRepo.Name, task.Id) |
||||||
|
outcome := testCase.outcomes[jobName] |
||||||
|
assert.NotNil(t, outcome) |
||||||
|
runner.execTask(t, task, outcome) |
||||||
|
runIndex = task.Context.GetFields()["run_number"].GetStringValue() |
||||||
|
assert.Equal(t, "1", runIndex) |
||||||
|
} |
||||||
|
|
||||||
|
for i := 0; i < len(testCase.outcomes); i++ { |
||||||
|
req := NewRequestWithValues(t, "POST", fmt.Sprintf("/%s/%s/actions/runs/%s/jobs/%d", user2.Name, apiRepo.Name, runIndex, i), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
resp := session.MakeRequest(t, req, http.StatusOK) |
||||||
|
var listResp actions.ViewResponse |
||||||
|
err := json.Unmarshal(resp.Body.Bytes(), &listResp) |
||||||
|
assert.NoError(t, err) |
||||||
|
assert.Len(t, listResp.State.Run.Jobs, 3) |
||||||
|
|
||||||
|
req = NewRequest(t, "GET", fmt.Sprintf("/%s/%s/actions/runs/%s/jobs/%d/logs", user2.Name, apiRepo.Name, runIndex, i)). |
||||||
|
AddTokenAuth(token) |
||||||
|
MakeRequest(t, req, http.StatusOK) |
||||||
|
} |
||||||
|
|
||||||
|
req := NewRequestWithValues(t, "GET", fmt.Sprintf("/%s/%s/actions/runs/%s", user2.Name, apiRepo.Name, runIndex), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
session.MakeRequest(t, req, http.StatusOK) |
||||||
|
|
||||||
|
req = NewRequestWithValues(t, "POST", fmt.Sprintf("/%s/%s/actions/runs/%s/delete", user2.Name, apiRepo.Name, runIndex), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
session.MakeRequest(t, req, http.StatusOK) |
||||||
|
|
||||||
|
req = NewRequestWithValues(t, "POST", fmt.Sprintf("/%s/%s/actions/runs/%s/delete", user2.Name, apiRepo.Name, runIndex), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
session.MakeRequest(t, req, http.StatusNotFound) |
||||||
|
|
||||||
|
req = NewRequestWithValues(t, "GET", fmt.Sprintf("/%s/%s/actions/runs/%s", user2.Name, apiRepo.Name, runIndex), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
session.MakeRequest(t, req, http.StatusNotFound) |
||||||
|
|
||||||
|
for i := 0; i < len(testCase.outcomes); i++ { |
||||||
|
req := NewRequestWithValues(t, "POST", fmt.Sprintf("/%s/%s/actions/runs/%s/jobs/%d", user2.Name, apiRepo.Name, runIndex, i), map[string]string{ |
||||||
|
"_csrf": GetUserCSRFToken(t, session), |
||||||
|
}) |
||||||
|
session.MakeRequest(t, req, http.StatusNotFound) |
||||||
|
|
||||||
|
req = NewRequest(t, "GET", fmt.Sprintf("/%s/%s/actions/runs/%s/jobs/%d/logs", user2.Name, apiRepo.Name, runIndex, i)). |
||||||
|
AddTokenAuth(token) |
||||||
|
MakeRequest(t, req, http.StatusNotFound) |
||||||
|
} |
||||||
|
}) |
||||||
|
} |
||||||
@ -0,0 +1,98 @@ |
|||||||
|
// Copyright 2025 The Gitea Authors. All rights reserved.
|
||||||
|
// SPDX-License-Identifier: MIT
|
||||||
|
|
||||||
|
package integration |
||||||
|
|
||||||
|
import ( |
||||||
|
"fmt" |
||||||
|
"net/http" |
||||||
|
"testing" |
||||||
|
|
||||||
|
auth_model "code.gitea.io/gitea/models/auth" |
||||||
|
repo_model "code.gitea.io/gitea/models/repo" |
||||||
|
"code.gitea.io/gitea/models/unittest" |
||||||
|
user_model "code.gitea.io/gitea/models/user" |
||||||
|
"code.gitea.io/gitea/modules/json" |
||||||
|
api "code.gitea.io/gitea/modules/structs" |
||||||
|
|
||||||
|
"github.com/stretchr/testify/assert" |
||||||
|
) |
||||||
|
|
||||||
|
func TestAPIActionsDeleteRunCheckPermission(t *testing.T) { |
||||||
|
defer prepareTestEnvActionsArtifacts(t)() |
||||||
|
|
||||||
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 4}) |
||||||
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) |
||||||
|
session := loginUser(t, user.Name) |
||||||
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) |
||||||
|
testAPIActionsDeleteRun(t, repo, token, http.StatusNotFound) |
||||||
|
} |
||||||
|
|
||||||
|
func TestAPIActionsDeleteRun(t *testing.T) { |
||||||
|
defer prepareTestEnvActionsArtifacts(t)() |
||||||
|
|
||||||
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 2}) |
||||||
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) |
||||||
|
session := loginUser(t, user.Name) |
||||||
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) |
||||||
|
|
||||||
|
testAPIActionsDeleteRunListArtifacts(t, repo, token, 2) |
||||||
|
testAPIActionsDeleteRunListTasks(t, repo, token, true) |
||||||
|
testAPIActionsDeleteRun(t, repo, token, http.StatusNoContent) |
||||||
|
|
||||||
|
testAPIActionsDeleteRunListArtifacts(t, repo, token, 0) |
||||||
|
testAPIActionsDeleteRunListTasks(t, repo, token, false) |
||||||
|
testAPIActionsDeleteRun(t, repo, token, http.StatusNotFound) |
||||||
|
} |
||||||
|
|
||||||
|
func TestAPIActionsDeleteRunRunning(t *testing.T) { |
||||||
|
defer prepareTestEnvActionsArtifacts(t)() |
||||||
|
|
||||||
|
repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: 4}) |
||||||
|
user := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: repo.OwnerID}) |
||||||
|
session := loginUser(t, user.Name) |
||||||
|
token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository) |
||||||
|
|
||||||
|
req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/%s/actions/runs/793", repo.FullName())). |
||||||
|
AddTokenAuth(token) |
||||||
|
MakeRequest(t, req, http.StatusBadRequest) |
||||||
|
} |
||||||
|
|
||||||
|
func testAPIActionsDeleteRun(t *testing.T, repo *repo_model.Repository, token string, expected int) { |
||||||
|
req := NewRequest(t, "DELETE", fmt.Sprintf("/api/v1/repos/%s/actions/runs/795", repo.FullName())). |
||||||
|
AddTokenAuth(token) |
||||||
|
MakeRequest(t, req, expected) |
||||||
|
} |
||||||
|
|
||||||
|
func testAPIActionsDeleteRunListArtifacts(t *testing.T, repo *repo_model.Repository, token string, artifacts int) { |
||||||
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/%s/actions/runs/795/artifacts", repo.FullName())). |
||||||
|
AddTokenAuth(token) |
||||||
|
resp := MakeRequest(t, req, http.StatusOK) |
||||||
|
var listResp api.ActionArtifactsResponse |
||||||
|
err := json.Unmarshal(resp.Body.Bytes(), &listResp) |
||||||
|
assert.NoError(t, err) |
||||||
|
assert.Len(t, listResp.Entries, artifacts) |
||||||
|
} |
||||||
|
|
||||||
|
func testAPIActionsDeleteRunListTasks(t *testing.T, repo *repo_model.Repository, token string, expected bool) { |
||||||
|
req := NewRequest(t, "GET", fmt.Sprintf("/api/v1/repos/%s/actions/tasks", repo.FullName())). |
||||||
|
AddTokenAuth(token) |
||||||
|
resp := MakeRequest(t, req, http.StatusOK) |
||||||
|
var listResp api.ActionTaskResponse |
||||||
|
err := json.Unmarshal(resp.Body.Bytes(), &listResp) |
||||||
|
assert.NoError(t, err) |
||||||
|
findTask1 := false |
||||||
|
findTask2 := false |
||||||
|
for _, entry := range listResp.Entries { |
||||||
|
if entry.ID == 53 { |
||||||
|
findTask1 = true |
||||||
|
continue |
||||||
|
} |
||||||
|
if entry.ID == 54 { |
||||||
|
findTask2 = true |
||||||
|
continue |
||||||
|
} |
||||||
|
} |
||||||
|
assert.Equal(t, expected, findTask1) |
||||||
|
assert.Equal(t, expected, findTask2) |
||||||
|
} |
||||||
Loading…
Reference in new issue