mirror of
https://github.com/actions/checkout
synced 2024-12-18 09:41:37 +00:00
d106d4669b
* Add support for sparse checkouts * sparse-checkout: optionally turn off cone mode While it _is_ true that cone mode is the default nowadays (mainly for performance reasons: code mode is much faster than non-cone mode), there _are_ legitimate use cases where non-cone mode is really useful. Let's add a flag to optionally disable cone mode. Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> * Verify minimum Git version for sparse checkout The `git sparse-checkout` command is available only since Git version v2.25.0. The `actions/checkout` Action actually supports older Git versions than that; As of time of writing, the minimum version is v2.18.0. Instead of raising this minimum version even for users who do not require a sparse checkout, only check for this minimum version specifically when a sparse checkout was asked for. Suggested-by: Tingluo Huang <tingluohuang@github.com> Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> * Support sparse checkout/LFS better Instead of fetching all the LFS objects present in the current revision in a sparse checkout, whether they are needed inside the sparse cone or not, let's instead only pull the ones that are actually needed. To do that, let's avoid running that preemptive `git lfs fetch` call in case of a sparse checkout. An alternative that was considered during the development of this patch (and ultimately rejected) was to use `git lfs pull --include <path>...`, but it turned out to be too inflexible because it requires exact paths, not the patterns that are available via the sparse checkout definition, and that risks running into command-line length limitations. Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> --------- Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de> Co-authored-by: Daniel <daniel.fernandez@feverup.com>
851 lines
28 KiB
TypeScript
851 lines
28 KiB
TypeScript
import * as core from '@actions/core'
|
|
import * as fs from 'fs'
|
|
import * as gitAuthHelper from '../lib/git-auth-helper'
|
|
import * as io from '@actions/io'
|
|
import * as os from 'os'
|
|
import * as path from 'path'
|
|
import * as stateHelper from '../lib/state-helper'
|
|
import {IGitCommandManager} from '../lib/git-command-manager'
|
|
import {IGitSourceSettings} from '../lib/git-source-settings'
|
|
|
|
const isWindows = process.platform === 'win32'
|
|
const testWorkspace = path.join(__dirname, '_temp', 'git-auth-helper')
|
|
const originalRunnerTemp = process.env['RUNNER_TEMP']
|
|
const originalHome = process.env['HOME']
|
|
let workspace: string
|
|
let localGitConfigPath: string
|
|
let globalGitConfigPath: string
|
|
let runnerTemp: string
|
|
let tempHomedir: string
|
|
let git: IGitCommandManager & {env: {[key: string]: string}}
|
|
let settings: IGitSourceSettings
|
|
let sshPath: string
|
|
let githubServerUrl: string
|
|
|
|
describe('git-auth-helper tests', () => {
|
|
beforeAll(async () => {
|
|
// SSH
|
|
sshPath = await io.which('ssh')
|
|
|
|
// Clear test workspace
|
|
await io.rmRF(testWorkspace)
|
|
})
|
|
|
|
beforeEach(() => {
|
|
// Mock setSecret
|
|
jest.spyOn(core, 'setSecret').mockImplementation((secret: string) => {})
|
|
|
|
// Mock error/warning/info/debug
|
|
jest.spyOn(core, 'error').mockImplementation(jest.fn())
|
|
jest.spyOn(core, 'warning').mockImplementation(jest.fn())
|
|
jest.spyOn(core, 'info').mockImplementation(jest.fn())
|
|
jest.spyOn(core, 'debug').mockImplementation(jest.fn())
|
|
|
|
// Mock state helper
|
|
jest.spyOn(stateHelper, 'setSshKeyPath').mockImplementation(jest.fn())
|
|
jest
|
|
.spyOn(stateHelper, 'setSshKnownHostsPath')
|
|
.mockImplementation(jest.fn())
|
|
})
|
|
|
|
afterEach(() => {
|
|
// Unregister mocks
|
|
jest.restoreAllMocks()
|
|
|
|
// Restore HOME
|
|
if (originalHome) {
|
|
process.env['HOME'] = originalHome
|
|
} else {
|
|
delete process.env['HOME']
|
|
}
|
|
})
|
|
|
|
afterAll(() => {
|
|
// Restore RUNNER_TEMP
|
|
delete process.env['RUNNER_TEMP']
|
|
if (originalRunnerTemp) {
|
|
process.env['RUNNER_TEMP'] = originalRunnerTemp
|
|
}
|
|
})
|
|
|
|
async function testAuthHeader(
|
|
testName: string,
|
|
serverUrl: string | undefined = undefined
|
|
) {
|
|
// Arrange
|
|
let expectedServerUrl = 'https://github.com'
|
|
if (serverUrl) {
|
|
githubServerUrl = serverUrl
|
|
expectedServerUrl = githubServerUrl
|
|
}
|
|
|
|
await setup(testName)
|
|
expect(settings.authToken).toBeTruthy() // sanity check
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert config
|
|
const configContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
const basicCredential = Buffer.from(
|
|
`x-access-token:${settings.authToken}`,
|
|
'utf8'
|
|
).toString('base64')
|
|
expect(
|
|
configContent.indexOf(
|
|
`http.${expectedServerUrl}/.extraheader AUTHORIZATION: basic ${basicCredential}`
|
|
)
|
|
).toBeGreaterThanOrEqual(0)
|
|
}
|
|
|
|
const configureAuth_configuresAuthHeader =
|
|
'configureAuth configures auth header'
|
|
it(configureAuth_configuresAuthHeader, async () => {
|
|
await testAuthHeader(configureAuth_configuresAuthHeader)
|
|
})
|
|
|
|
const configureAuth_AcceptsGitHubServerUrl =
|
|
'inject https://my-ghes-server.com as github server url'
|
|
it(configureAuth_AcceptsGitHubServerUrl, async () => {
|
|
await testAuthHeader(
|
|
configureAuth_AcceptsGitHubServerUrl,
|
|
'https://my-ghes-server.com'
|
|
)
|
|
})
|
|
|
|
const configureAuth_AcceptsGitHubServerUrlSetToGHEC =
|
|
'inject https://github.com as github server url'
|
|
it(configureAuth_AcceptsGitHubServerUrlSetToGHEC, async () => {
|
|
await testAuthHeader(
|
|
configureAuth_AcceptsGitHubServerUrl,
|
|
'https://github.com'
|
|
)
|
|
})
|
|
|
|
const configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse =
|
|
'configureAuth configures auth header even when persist credentials false'
|
|
it(
|
|
configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse,
|
|
async () => {
|
|
// Arrange
|
|
await setup(
|
|
configureAuth_configuresAuthHeaderEvenWhenPersistCredentialsFalse
|
|
)
|
|
expect(settings.authToken).toBeTruthy() // sanity check
|
|
settings.persistCredentials = false
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert config
|
|
const configContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
expect(
|
|
configContent.indexOf(
|
|
`http.https://github.com/.extraheader AUTHORIZATION`
|
|
)
|
|
).toBeGreaterThanOrEqual(0)
|
|
}
|
|
)
|
|
|
|
const configureAuth_copiesUserKnownHosts =
|
|
'configureAuth copies user known hosts'
|
|
it(configureAuth_copiesUserKnownHosts, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureAuth_copiesUserKnownHosts}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arange
|
|
await setup(configureAuth_copiesUserKnownHosts)
|
|
expect(settings.sshKey).toBeTruthy() // sanity check
|
|
|
|
// Mock fs.promises.readFile
|
|
const realReadFile = fs.promises.readFile
|
|
jest.spyOn(fs.promises, 'readFile').mockImplementation(
|
|
async (file: any, options: any): Promise<Buffer> => {
|
|
const userKnownHostsPath = path.join(
|
|
os.homedir(),
|
|
'.ssh',
|
|
'known_hosts'
|
|
)
|
|
if (file === userKnownHostsPath) {
|
|
return Buffer.from('some-domain.com ssh-rsa ABCDEF')
|
|
}
|
|
|
|
return await realReadFile(file, options)
|
|
}
|
|
)
|
|
|
|
// Act
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert known hosts
|
|
const actualSshKnownHostsPath = await getActualSshKnownHostsPath()
|
|
const actualSshKnownHostsContent = (
|
|
await fs.promises.readFile(actualSshKnownHostsPath)
|
|
).toString()
|
|
expect(actualSshKnownHostsContent).toMatch(
|
|
/some-domain\.com ssh-rsa ABCDEF/
|
|
)
|
|
expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/)
|
|
})
|
|
|
|
const configureAuth_registersBasicCredentialAsSecret =
|
|
'configureAuth registers basic credential as secret'
|
|
it(configureAuth_registersBasicCredentialAsSecret, async () => {
|
|
// Arrange
|
|
await setup(configureAuth_registersBasicCredentialAsSecret)
|
|
expect(settings.authToken).toBeTruthy() // sanity check
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert secret
|
|
const setSecretSpy = core.setSecret as jest.Mock<any, any>
|
|
expect(setSecretSpy).toHaveBeenCalledTimes(1)
|
|
const expectedSecret = Buffer.from(
|
|
`x-access-token:${settings.authToken}`,
|
|
'utf8'
|
|
).toString('base64')
|
|
expect(setSecretSpy).toHaveBeenCalledWith(expectedSecret)
|
|
})
|
|
|
|
const setsSshCommandEnvVarWhenPersistCredentialsFalse =
|
|
'sets SSH command env var when persist-credentials false'
|
|
it(setsSshCommandEnvVarWhenPersistCredentialsFalse, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${setsSshCommandEnvVarWhenPersistCredentialsFalse}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(setsSshCommandEnvVarWhenPersistCredentialsFalse)
|
|
settings.persistCredentials = false
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert git env var
|
|
const actualKeyPath = await getActualSshKeyPath()
|
|
const actualKnownHostsPath = await getActualSshKnownHostsPath()
|
|
const expectedSshCommand = `"${sshPath}" -i "$RUNNER_TEMP/${path.basename(
|
|
actualKeyPath
|
|
)}" -o StrictHostKeyChecking=yes -o CheckHostIP=no -o "UserKnownHostsFile=$RUNNER_TEMP/${path.basename(
|
|
actualKnownHostsPath
|
|
)}"`
|
|
expect(git.setEnvironmentVariable).toHaveBeenCalledWith(
|
|
'GIT_SSH_COMMAND',
|
|
expectedSshCommand
|
|
)
|
|
|
|
// Asserty git config
|
|
const gitConfigLines = (await fs.promises.readFile(localGitConfigPath))
|
|
.toString()
|
|
.split('\n')
|
|
.filter(x => x)
|
|
expect(gitConfigLines).toHaveLength(1)
|
|
expect(gitConfigLines[0]).toMatch(/^http\./)
|
|
})
|
|
|
|
const configureAuth_setsSshCommandWhenPersistCredentialsTrue =
|
|
'sets SSH command when persist-credentials true'
|
|
it(configureAuth_setsSshCommandWhenPersistCredentialsTrue, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureAuth_setsSshCommandWhenPersistCredentialsTrue}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(configureAuth_setsSshCommandWhenPersistCredentialsTrue)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert git env var
|
|
const actualKeyPath = await getActualSshKeyPath()
|
|
const actualKnownHostsPath = await getActualSshKnownHostsPath()
|
|
const expectedSshCommand = `"${sshPath}" -i "$RUNNER_TEMP/${path.basename(
|
|
actualKeyPath
|
|
)}" -o StrictHostKeyChecking=yes -o CheckHostIP=no -o "UserKnownHostsFile=$RUNNER_TEMP/${path.basename(
|
|
actualKnownHostsPath
|
|
)}"`
|
|
expect(git.setEnvironmentVariable).toHaveBeenCalledWith(
|
|
'GIT_SSH_COMMAND',
|
|
expectedSshCommand
|
|
)
|
|
|
|
// Asserty git config
|
|
expect(git.config).toHaveBeenCalledWith(
|
|
'core.sshCommand',
|
|
expectedSshCommand
|
|
)
|
|
})
|
|
|
|
const configureAuth_writesExplicitKnownHosts = 'writes explicit known hosts'
|
|
it(configureAuth_writesExplicitKnownHosts, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureAuth_writesExplicitKnownHosts}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(configureAuth_writesExplicitKnownHosts)
|
|
expect(settings.sshKey).toBeTruthy() // sanity check
|
|
settings.sshKnownHosts = 'my-custom-host.com ssh-rsa ABC123'
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert known hosts
|
|
const actualSshKnownHostsPath = await getActualSshKnownHostsPath()
|
|
const actualSshKnownHostsContent = (
|
|
await fs.promises.readFile(actualSshKnownHostsPath)
|
|
).toString()
|
|
expect(actualSshKnownHostsContent).toMatch(
|
|
/my-custom-host\.com ssh-rsa ABC123/
|
|
)
|
|
expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/)
|
|
})
|
|
|
|
const configureAuth_writesSshKeyAndImplicitKnownHosts =
|
|
'writes SSH key and implicit known hosts'
|
|
it(configureAuth_writesSshKeyAndImplicitKnownHosts, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureAuth_writesSshKeyAndImplicitKnownHosts}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(configureAuth_writesSshKeyAndImplicitKnownHosts)
|
|
expect(settings.sshKey).toBeTruthy() // sanity check
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
|
|
// Assert SSH key
|
|
const actualSshKeyPath = await getActualSshKeyPath()
|
|
expect(actualSshKeyPath).toBeTruthy()
|
|
const actualSshKeyContent = (
|
|
await fs.promises.readFile(actualSshKeyPath)
|
|
).toString()
|
|
expect(actualSshKeyContent).toBe(settings.sshKey + '\n')
|
|
if (!isWindows) {
|
|
// Assert read/write for user, not group or others.
|
|
// Otherwise SSH client will error.
|
|
expect((await fs.promises.stat(actualSshKeyPath)).mode & 0o777).toBe(
|
|
0o600
|
|
)
|
|
}
|
|
|
|
// Assert known hosts
|
|
const actualSshKnownHostsPath = await getActualSshKnownHostsPath()
|
|
const actualSshKnownHostsContent = (
|
|
await fs.promises.readFile(actualSshKnownHostsPath)
|
|
).toString()
|
|
expect(actualSshKnownHostsContent).toMatch(/github\.com ssh-rsa AAAAB3N/)
|
|
})
|
|
|
|
const configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet =
|
|
'configureGlobalAuth configures URL insteadOf when SSH key not set'
|
|
it(configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet, async () => {
|
|
// Arrange
|
|
await setup(configureGlobalAuth_configuresUrlInsteadOfWhenSshKeyNotSet)
|
|
settings.sshKey = ''
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
await authHelper.configureGlobalAuth()
|
|
|
|
// Assert temporary global config
|
|
expect(git.env['HOME']).toBeTruthy()
|
|
const configContent = (
|
|
await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig'))
|
|
).toString()
|
|
expect(
|
|
configContent.indexOf(`url.https://github.com/.insteadOf git@github.com`)
|
|
).toBeGreaterThanOrEqual(0)
|
|
})
|
|
|
|
const configureGlobalAuth_copiesGlobalGitConfig =
|
|
'configureGlobalAuth copies global git config'
|
|
it(configureGlobalAuth_copiesGlobalGitConfig, async () => {
|
|
// Arrange
|
|
await setup(configureGlobalAuth_copiesGlobalGitConfig)
|
|
await fs.promises.writeFile(globalGitConfigPath, 'value-from-global-config')
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
await authHelper.configureGlobalAuth()
|
|
|
|
// Assert original global config not altered
|
|
let configContent = (
|
|
await fs.promises.readFile(globalGitConfigPath)
|
|
).toString()
|
|
expect(configContent).toBe('value-from-global-config')
|
|
|
|
// Assert temporary global config
|
|
expect(git.env['HOME']).toBeTruthy()
|
|
const basicCredential = Buffer.from(
|
|
`x-access-token:${settings.authToken}`,
|
|
'utf8'
|
|
).toString('base64')
|
|
configContent = (
|
|
await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig'))
|
|
).toString()
|
|
expect(
|
|
configContent.indexOf('value-from-global-config')
|
|
).toBeGreaterThanOrEqual(0)
|
|
expect(
|
|
configContent.indexOf(
|
|
`http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}`
|
|
)
|
|
).toBeGreaterThanOrEqual(0)
|
|
})
|
|
|
|
const configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist =
|
|
'configureGlobalAuth creates new git config when global does not exist'
|
|
it(
|
|
configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist,
|
|
async () => {
|
|
// Arrange
|
|
await setup(
|
|
configureGlobalAuth_createsNewGlobalGitConfigWhenGlobalDoesNotExist
|
|
)
|
|
await io.rmRF(globalGitConfigPath)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
|
|
// Act
|
|
await authHelper.configureAuth()
|
|
await authHelper.configureGlobalAuth()
|
|
|
|
// Assert original global config not recreated
|
|
try {
|
|
await fs.promises.stat(globalGitConfigPath)
|
|
throw new Error(
|
|
`Did not expect file to exist: '${globalGitConfigPath}'`
|
|
)
|
|
} catch (err) {
|
|
if ((err as any)?.code !== 'ENOENT') {
|
|
throw err
|
|
}
|
|
}
|
|
|
|
// Assert temporary global config
|
|
expect(git.env['HOME']).toBeTruthy()
|
|
const basicCredential = Buffer.from(
|
|
`x-access-token:${settings.authToken}`,
|
|
'utf8'
|
|
).toString('base64')
|
|
const configContent = (
|
|
await fs.promises.readFile(path.join(git.env['HOME'], '.gitconfig'))
|
|
).toString()
|
|
expect(
|
|
configContent.indexOf(
|
|
`http.https://github.com/.extraheader AUTHORIZATION: basic ${basicCredential}`
|
|
)
|
|
).toBeGreaterThanOrEqual(0)
|
|
}
|
|
)
|
|
|
|
const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet =
|
|
'configureSubmoduleAuth configures submodules when persist credentials false and SSH key not set'
|
|
it(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet,
|
|
async () => {
|
|
// Arrange
|
|
await setup(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeyNotSet
|
|
)
|
|
settings.persistCredentials = false
|
|
settings.sshKey = ''
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
const mockSubmoduleForeach = git.submoduleForeach as jest.Mock<any, any>
|
|
mockSubmoduleForeach.mockClear() // reset calls
|
|
|
|
// Act
|
|
await authHelper.configureSubmoduleAuth()
|
|
|
|
// Assert
|
|
expect(mockSubmoduleForeach).toBeCalledTimes(1)
|
|
expect(mockSubmoduleForeach.mock.calls[0][0] as string).toMatch(
|
|
/unset-all.*insteadOf/
|
|
)
|
|
}
|
|
)
|
|
|
|
const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet =
|
|
'configureSubmoduleAuth configures submodules when persist credentials false and SSH key set'
|
|
it(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet,
|
|
async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsFalseAndSshKeySet
|
|
)
|
|
settings.persistCredentials = false
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
const mockSubmoduleForeach = git.submoduleForeach as jest.Mock<any, any>
|
|
mockSubmoduleForeach.mockClear() // reset calls
|
|
|
|
// Act
|
|
await authHelper.configureSubmoduleAuth()
|
|
|
|
// Assert
|
|
expect(mockSubmoduleForeach).toHaveBeenCalledTimes(1)
|
|
expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch(
|
|
/unset-all.*insteadOf/
|
|
)
|
|
}
|
|
)
|
|
|
|
const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet =
|
|
'configureSubmoduleAuth configures submodules when persist credentials true and SSH key not set'
|
|
it(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet,
|
|
async () => {
|
|
// Arrange
|
|
await setup(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeyNotSet
|
|
)
|
|
settings.sshKey = ''
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
const mockSubmoduleForeach = git.submoduleForeach as jest.Mock<any, any>
|
|
mockSubmoduleForeach.mockClear() // reset calls
|
|
|
|
// Act
|
|
await authHelper.configureSubmoduleAuth()
|
|
|
|
// Assert
|
|
expect(mockSubmoduleForeach).toHaveBeenCalledTimes(4)
|
|
expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch(
|
|
/unset-all.*insteadOf/
|
|
)
|
|
expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/)
|
|
expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(
|
|
/url.*insteadOf.*git@github.com:/
|
|
)
|
|
expect(mockSubmoduleForeach.mock.calls[3][0]).toMatch(
|
|
/url.*insteadOf.*org-123456@github.com:/
|
|
)
|
|
}
|
|
)
|
|
|
|
const configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet =
|
|
'configureSubmoduleAuth configures submodules when persist credentials true and SSH key set'
|
|
it(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet,
|
|
async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(
|
|
configureSubmoduleAuth_configuresSubmodulesWhenPersistCredentialsTrueAndSshKeySet
|
|
)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
const mockSubmoduleForeach = git.submoduleForeach as jest.Mock<any, any>
|
|
mockSubmoduleForeach.mockClear() // reset calls
|
|
|
|
// Act
|
|
await authHelper.configureSubmoduleAuth()
|
|
|
|
// Assert
|
|
expect(mockSubmoduleForeach).toHaveBeenCalledTimes(3)
|
|
expect(mockSubmoduleForeach.mock.calls[0][0]).toMatch(
|
|
/unset-all.*insteadOf/
|
|
)
|
|
expect(mockSubmoduleForeach.mock.calls[1][0]).toMatch(/http.*extraheader/)
|
|
expect(mockSubmoduleForeach.mock.calls[2][0]).toMatch(/core\.sshCommand/)
|
|
}
|
|
)
|
|
|
|
const removeAuth_removesSshCommand = 'removeAuth removes SSH command'
|
|
it(removeAuth_removesSshCommand, async () => {
|
|
if (!sshPath) {
|
|
process.stdout.write(
|
|
`Skipped test "${removeAuth_removesSshCommand}". Executable 'ssh' not found in the PATH.\n`
|
|
)
|
|
return
|
|
}
|
|
|
|
// Arrange
|
|
await setup(removeAuth_removesSshCommand)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
let gitConfigContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
expect(gitConfigContent.indexOf('core.sshCommand')).toBeGreaterThanOrEqual(
|
|
0
|
|
) // sanity check
|
|
const actualKeyPath = await getActualSshKeyPath()
|
|
expect(actualKeyPath).toBeTruthy()
|
|
await fs.promises.stat(actualKeyPath)
|
|
const actualKnownHostsPath = await getActualSshKnownHostsPath()
|
|
expect(actualKnownHostsPath).toBeTruthy()
|
|
await fs.promises.stat(actualKnownHostsPath)
|
|
|
|
// Act
|
|
await authHelper.removeAuth()
|
|
|
|
// Assert git config
|
|
gitConfigContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
expect(gitConfigContent.indexOf('core.sshCommand')).toBeLessThan(0)
|
|
|
|
// Assert SSH key file
|
|
try {
|
|
await fs.promises.stat(actualKeyPath)
|
|
throw new Error('SSH key should have been deleted')
|
|
} catch (err) {
|
|
if ((err as any)?.code !== 'ENOENT') {
|
|
throw err
|
|
}
|
|
}
|
|
|
|
// Assert known hosts file
|
|
try {
|
|
await fs.promises.stat(actualKnownHostsPath)
|
|
throw new Error('SSH known hosts should have been deleted')
|
|
} catch (err) {
|
|
if ((err as any)?.code !== 'ENOENT') {
|
|
throw err
|
|
}
|
|
}
|
|
})
|
|
|
|
const removeAuth_removesToken = 'removeAuth removes token'
|
|
it(removeAuth_removesToken, async () => {
|
|
// Arrange
|
|
await setup(removeAuth_removesToken)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
let gitConfigContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
expect(gitConfigContent.indexOf('http.')).toBeGreaterThanOrEqual(0) // sanity check
|
|
|
|
// Act
|
|
await authHelper.removeAuth()
|
|
|
|
// Assert git config
|
|
gitConfigContent = (
|
|
await fs.promises.readFile(localGitConfigPath)
|
|
).toString()
|
|
expect(gitConfigContent.indexOf('http.')).toBeLessThan(0)
|
|
})
|
|
|
|
const removeGlobalConfig_removesOverride =
|
|
'removeGlobalConfig removes override'
|
|
it(removeGlobalConfig_removesOverride, async () => {
|
|
// Arrange
|
|
await setup(removeGlobalConfig_removesOverride)
|
|
const authHelper = gitAuthHelper.createAuthHelper(git, settings)
|
|
await authHelper.configureAuth()
|
|
await authHelper.configureGlobalAuth()
|
|
const homeOverride = git.env['HOME'] // Sanity check
|
|
expect(homeOverride).toBeTruthy()
|
|
await fs.promises.stat(path.join(git.env['HOME'], '.gitconfig'))
|
|
|
|
// Act
|
|
await authHelper.removeGlobalConfig()
|
|
|
|
// Assert
|
|
expect(git.env['HOME']).toBeUndefined()
|
|
try {
|
|
await fs.promises.stat(homeOverride)
|
|
throw new Error(`Should have been deleted '${homeOverride}'`)
|
|
} catch (err) {
|
|
if ((err as any)?.code !== 'ENOENT') {
|
|
throw err
|
|
}
|
|
}
|
|
})
|
|
})
|
|
|
|
async function setup(testName: string): Promise<void> {
|
|
testName = testName.replace(/[^a-zA-Z0-9_]+/g, '-')
|
|
|
|
// Directories
|
|
workspace = path.join(testWorkspace, testName, 'workspace')
|
|
runnerTemp = path.join(testWorkspace, testName, 'runner-temp')
|
|
tempHomedir = path.join(testWorkspace, testName, 'home-dir')
|
|
await fs.promises.mkdir(workspace, {recursive: true})
|
|
await fs.promises.mkdir(runnerTemp, {recursive: true})
|
|
await fs.promises.mkdir(tempHomedir, {recursive: true})
|
|
process.env['RUNNER_TEMP'] = runnerTemp
|
|
process.env['HOME'] = tempHomedir
|
|
|
|
// Create git config
|
|
globalGitConfigPath = path.join(tempHomedir, '.gitconfig')
|
|
await fs.promises.writeFile(globalGitConfigPath, '')
|
|
localGitConfigPath = path.join(workspace, '.git', 'config')
|
|
await fs.promises.mkdir(path.dirname(localGitConfigPath), {recursive: true})
|
|
await fs.promises.writeFile(localGitConfigPath, '')
|
|
|
|
git = {
|
|
branchDelete: jest.fn(),
|
|
branchExists: jest.fn(),
|
|
branchList: jest.fn(),
|
|
sparseCheckout: jest.fn(),
|
|
sparseCheckoutNonConeMode: jest.fn(),
|
|
checkout: jest.fn(),
|
|
checkoutDetach: jest.fn(),
|
|
config: jest.fn(
|
|
async (key: string, value: string, globalConfig?: boolean) => {
|
|
const configPath = globalConfig
|
|
? path.join(git.env['HOME'] || tempHomedir, '.gitconfig')
|
|
: localGitConfigPath
|
|
await fs.promises.appendFile(configPath, `\n${key} ${value}`)
|
|
}
|
|
),
|
|
configExists: jest.fn(
|
|
async (key: string, globalConfig?: boolean): Promise<boolean> => {
|
|
const configPath = globalConfig
|
|
? path.join(git.env['HOME'] || tempHomedir, '.gitconfig')
|
|
: localGitConfigPath
|
|
const content = await fs.promises.readFile(configPath)
|
|
const lines = content
|
|
.toString()
|
|
.split('\n')
|
|
.filter(x => x)
|
|
return lines.some(x => x.startsWith(key))
|
|
}
|
|
),
|
|
env: {},
|
|
fetch: jest.fn(),
|
|
getDefaultBranch: jest.fn(),
|
|
getWorkingDirectory: jest.fn(() => workspace),
|
|
init: jest.fn(),
|
|
isDetached: jest.fn(),
|
|
lfsFetch: jest.fn(),
|
|
lfsInstall: jest.fn(),
|
|
log1: jest.fn(),
|
|
remoteAdd: jest.fn(),
|
|
removeEnvironmentVariable: jest.fn((name: string) => delete git.env[name]),
|
|
revParse: jest.fn(),
|
|
setEnvironmentVariable: jest.fn((name: string, value: string) => {
|
|
git.env[name] = value
|
|
}),
|
|
shaExists: jest.fn(),
|
|
submoduleForeach: jest.fn(async () => {
|
|
return ''
|
|
}),
|
|
submoduleSync: jest.fn(),
|
|
submoduleStatus: jest.fn(async () => {
|
|
return true
|
|
}),
|
|
submoduleUpdate: jest.fn(),
|
|
tagExists: jest.fn(),
|
|
tryClean: jest.fn(),
|
|
tryConfigUnset: jest.fn(
|
|
async (key: string, globalConfig?: boolean): Promise<boolean> => {
|
|
const configPath = globalConfig
|
|
? path.join(git.env['HOME'] || tempHomedir, '.gitconfig')
|
|
: localGitConfigPath
|
|
let content = await fs.promises.readFile(configPath)
|
|
let lines = content
|
|
.toString()
|
|
.split('\n')
|
|
.filter(x => x)
|
|
.filter(x => !x.startsWith(key))
|
|
await fs.promises.writeFile(configPath, lines.join('\n'))
|
|
return true
|
|
}
|
|
),
|
|
tryDisableAutomaticGarbageCollection: jest.fn(),
|
|
tryGetFetchUrl: jest.fn(),
|
|
tryReset: jest.fn()
|
|
}
|
|
|
|
settings = {
|
|
authToken: 'some auth token',
|
|
clean: true,
|
|
commit: '',
|
|
sparseCheckout: [],
|
|
sparseCheckoutConeMode: true,
|
|
fetchDepth: 1,
|
|
lfs: false,
|
|
submodules: false,
|
|
nestedSubmodules: false,
|
|
persistCredentials: true,
|
|
ref: 'refs/heads/main',
|
|
repositoryName: 'my-repo',
|
|
repositoryOwner: 'my-org',
|
|
repositoryPath: '',
|
|
sshKey: sshPath ? 'some ssh private key' : '',
|
|
sshKnownHosts: '',
|
|
sshStrict: true,
|
|
workflowOrganizationId: 123456,
|
|
setSafeDirectory: true,
|
|
githubServerUrl: githubServerUrl
|
|
}
|
|
}
|
|
|
|
async function getActualSshKeyPath(): Promise<string> {
|
|
let actualTempFiles = (await fs.promises.readdir(runnerTemp))
|
|
.sort()
|
|
.map(x => path.join(runnerTemp, x))
|
|
if (actualTempFiles.length === 0) {
|
|
return ''
|
|
}
|
|
|
|
expect(actualTempFiles).toHaveLength(2)
|
|
expect(actualTempFiles[0].endsWith('_known_hosts')).toBeFalsy()
|
|
return actualTempFiles[0]
|
|
}
|
|
|
|
async function getActualSshKnownHostsPath(): Promise<string> {
|
|
let actualTempFiles = (await fs.promises.readdir(runnerTemp))
|
|
.sort()
|
|
.map(x => path.join(runnerTemp, x))
|
|
if (actualTempFiles.length === 0) {
|
|
return ''
|
|
}
|
|
|
|
expect(actualTempFiles).toHaveLength(2)
|
|
expect(actualTempFiles[1].endsWith('_known_hosts')).toBeTruthy()
|
|
expect(actualTempFiles[1].startsWith(actualTempFiles[0])).toBeTruthy()
|
|
return actualTempFiles[1]
|
|
}
|