gitea源码

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489
  1. // Copyright 2020 The Gitea Authors. All rights reserved.
  2. // SPDX-License-Identifier: MIT
  3. package integration
  4. import (
  5. "fmt"
  6. "net/http"
  7. "testing"
  8. auth_model "code.gitea.io/gitea/models/auth"
  9. "code.gitea.io/gitea/models/db"
  10. issues_model "code.gitea.io/gitea/models/issues"
  11. access_model "code.gitea.io/gitea/models/perm/access"
  12. repo_model "code.gitea.io/gitea/models/repo"
  13. "code.gitea.io/gitea/models/unittest"
  14. user_model "code.gitea.io/gitea/models/user"
  15. "code.gitea.io/gitea/modules/json"
  16. api "code.gitea.io/gitea/modules/structs"
  17. issue_service "code.gitea.io/gitea/services/issue"
  18. "code.gitea.io/gitea/tests"
  19. "github.com/stretchr/testify/assert"
  20. "github.com/stretchr/testify/require"
  21. "xorm.io/builder"
  22. )
  23. func TestAPIPullReview(t *testing.T) {
  24. defer tests.PrepareTestEnv(t)()
  25. pullIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 3})
  26. assert.NoError(t, pullIssue.LoadAttributes(t.Context()))
  27. repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue.RepoID})
  28. // test ListPullReviews
  29. session := loginUser(t, "user2")
  30. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
  31. req := NewRequestf(t, http.MethodGet, "/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index).
  32. AddTokenAuth(token)
  33. resp := MakeRequest(t, req, http.StatusOK)
  34. var reviews []*api.PullReview
  35. DecodeJSON(t, resp, &reviews)
  36. require.Len(t, reviews, 8)
  37. for _, r := range reviews {
  38. assert.Equal(t, pullIssue.HTMLURL(t.Context()), r.HTMLPullURL)
  39. }
  40. assert.EqualValues(t, 8, reviews[3].ID)
  41. assert.EqualValues(t, "APPROVED", reviews[3].State)
  42. assert.Equal(t, 0, reviews[3].CodeCommentsCount)
  43. assert.True(t, reviews[3].Stale)
  44. assert.False(t, reviews[3].Official)
  45. assert.EqualValues(t, 10, reviews[5].ID)
  46. assert.EqualValues(t, "REQUEST_CHANGES", reviews[5].State)
  47. assert.Equal(t, 1, reviews[5].CodeCommentsCount)
  48. assert.EqualValues(t, -1, reviews[5].Reviewer.ID) // ghost user
  49. assert.False(t, reviews[5].Stale)
  50. assert.True(t, reviews[5].Official)
  51. // test GetPullReview
  52. req = NewRequestf(t, http.MethodGet, "/api/v1/repos/%s/%s/pulls/%d/reviews/%d", repo.OwnerName, repo.Name, pullIssue.Index, reviews[3].ID).
  53. AddTokenAuth(token)
  54. resp = MakeRequest(t, req, http.StatusOK)
  55. var review api.PullReview
  56. DecodeJSON(t, resp, &review)
  57. assert.Equal(t, *reviews[3], review)
  58. req = NewRequestf(t, "GET", "/api/v1/repos/%s/%s/pulls/%d/reviews/%d", repo.OwnerName, repo.Name, pullIssue.Index, reviews[5].ID).
  59. AddTokenAuth(token)
  60. resp = MakeRequest(t, req, http.StatusOK)
  61. DecodeJSON(t, resp, &review)
  62. assert.Equal(t, *reviews[5], review)
  63. // test GetPullReviewComments
  64. comment := unittest.AssertExistsAndLoadBean(t, &issues_model.Comment{ID: 7})
  65. req = NewRequestf(t, http.MethodGet, "/api/v1/repos/%s/%s/pulls/%d/reviews/%d/comments", repo.OwnerName, repo.Name, pullIssue.Index, 10).
  66. AddTokenAuth(token)
  67. resp = MakeRequest(t, req, http.StatusOK)
  68. var reviewComments []*api.PullReviewComment
  69. DecodeJSON(t, resp, &reviewComments)
  70. assert.Len(t, reviewComments, 1)
  71. assert.Equal(t, "Ghost", reviewComments[0].Poster.UserName)
  72. assert.Equal(t, "a review from a deleted user", reviewComments[0].Body)
  73. assert.Equal(t, comment.ID, reviewComments[0].ID)
  74. assert.EqualValues(t, comment.UpdatedUnix, reviewComments[0].Updated.Unix())
  75. assert.Equal(t, comment.HTMLURL(t.Context()), reviewComments[0].HTMLURL)
  76. // test CreatePullReview
  77. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  78. Body: "body1",
  79. // Event: "" # will result in PENDING
  80. Comments: []api.CreatePullReviewComment{
  81. {
  82. Path: "README.md",
  83. Body: "first new line",
  84. OldLineNum: 0,
  85. NewLineNum: 1,
  86. }, {
  87. Path: "README.md",
  88. Body: "first old line",
  89. OldLineNum: 1,
  90. NewLineNum: 0,
  91. }, {
  92. Path: "iso-8859-1.txt",
  93. Body: "this line contains a non-utf-8 character",
  94. OldLineNum: 0,
  95. NewLineNum: 1,
  96. },
  97. },
  98. }).AddTokenAuth(token)
  99. resp = MakeRequest(t, req, http.StatusOK)
  100. DecodeJSON(t, resp, &review)
  101. assert.EqualValues(t, 6, review.ID)
  102. assert.EqualValues(t, "PENDING", review.State)
  103. assert.Equal(t, 3, review.CodeCommentsCount)
  104. // test SubmitPullReview
  105. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews/%d", repo.OwnerName, repo.Name, pullIssue.Index, review.ID), &api.SubmitPullReviewOptions{
  106. Event: "APPROVED",
  107. Body: "just two nits",
  108. }).AddTokenAuth(token)
  109. resp = MakeRequest(t, req, http.StatusOK)
  110. DecodeJSON(t, resp, &review)
  111. assert.EqualValues(t, 6, review.ID)
  112. assert.EqualValues(t, "APPROVED", review.State)
  113. assert.Equal(t, 3, review.CodeCommentsCount)
  114. // test dismiss review
  115. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews/%d/dismissals", repo.OwnerName, repo.Name, pullIssue.Index, review.ID), &api.DismissPullReviewOptions{
  116. Message: "test",
  117. }).AddTokenAuth(token)
  118. resp = MakeRequest(t, req, http.StatusOK)
  119. DecodeJSON(t, resp, &review)
  120. assert.EqualValues(t, 6, review.ID)
  121. assert.True(t, review.Dismissed)
  122. // test dismiss review
  123. req = NewRequest(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews/%d/undismissals", repo.OwnerName, repo.Name, pullIssue.Index, review.ID)).
  124. AddTokenAuth(token)
  125. resp = MakeRequest(t, req, http.StatusOK)
  126. DecodeJSON(t, resp, &review)
  127. assert.EqualValues(t, 6, review.ID)
  128. assert.False(t, review.Dismissed)
  129. // test DeletePullReview
  130. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  131. Body: "just a comment",
  132. Event: "COMMENT",
  133. }).AddTokenAuth(token)
  134. resp = MakeRequest(t, req, http.StatusOK)
  135. DecodeJSON(t, resp, &review)
  136. assert.EqualValues(t, "COMMENT", review.State)
  137. assert.Equal(t, 0, review.CodeCommentsCount)
  138. req = NewRequestf(t, http.MethodDelete, "/api/v1/repos/%s/%s/pulls/%d/reviews/%d", repo.OwnerName, repo.Name, pullIssue.Index, review.ID).
  139. AddTokenAuth(token)
  140. MakeRequest(t, req, http.StatusNoContent)
  141. // test CreatePullReview Comment without body but with comments
  142. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  143. // Body: "",
  144. Event: "COMMENT",
  145. Comments: []api.CreatePullReviewComment{
  146. {
  147. Path: "README.md",
  148. Body: "first new line",
  149. OldLineNum: 0,
  150. NewLineNum: 1,
  151. }, {
  152. Path: "README.md",
  153. Body: "first old line",
  154. OldLineNum: 1,
  155. NewLineNum: 0,
  156. },
  157. },
  158. }).AddTokenAuth(token)
  159. var commentReview api.PullReview
  160. resp = MakeRequest(t, req, http.StatusOK)
  161. DecodeJSON(t, resp, &commentReview)
  162. assert.EqualValues(t, "COMMENT", commentReview.State)
  163. assert.Equal(t, 2, commentReview.CodeCommentsCount)
  164. assert.Empty(t, commentReview.Body)
  165. assert.False(t, commentReview.Dismissed)
  166. // test CreatePullReview Comment with body but without comments
  167. commentBody := "This is a body of the comment."
  168. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  169. Body: commentBody,
  170. Event: "COMMENT",
  171. Comments: []api.CreatePullReviewComment{},
  172. }).AddTokenAuth(token)
  173. resp = MakeRequest(t, req, http.StatusOK)
  174. DecodeJSON(t, resp, &commentReview)
  175. assert.EqualValues(t, "COMMENT", commentReview.State)
  176. assert.Equal(t, 0, commentReview.CodeCommentsCount)
  177. assert.Equal(t, commentBody, commentReview.Body)
  178. assert.False(t, commentReview.Dismissed)
  179. // test CreatePullReview Comment without body and no comments
  180. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  181. Body: "",
  182. Event: "COMMENT",
  183. Comments: []api.CreatePullReviewComment{},
  184. }).AddTokenAuth(token)
  185. resp = MakeRequest(t, req, http.StatusUnprocessableEntity)
  186. errMap := make(map[string]any)
  187. json.Unmarshal(resp.Body.Bytes(), &errMap)
  188. assert.Equal(t, "review event COMMENT requires a body or a comment", errMap["message"].(string))
  189. // test get review requests
  190. // to make it simple, use same api with get review
  191. pullIssue12 := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 12})
  192. assert.NoError(t, pullIssue12.LoadAttributes(t.Context()))
  193. repo3 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue12.RepoID})
  194. req = NewRequestf(t, http.MethodGet, "/api/v1/repos/%s/%s/pulls/%d/reviews", repo3.OwnerName, repo3.Name, pullIssue12.Index).
  195. AddTokenAuth(token)
  196. resp = MakeRequest(t, req, http.StatusOK)
  197. DecodeJSON(t, resp, &reviews)
  198. assert.EqualValues(t, 11, reviews[0].ID)
  199. assert.EqualValues(t, "REQUEST_REVIEW", reviews[0].State)
  200. assert.Equal(t, 0, reviews[0].CodeCommentsCount)
  201. assert.False(t, reviews[0].Stale)
  202. assert.True(t, reviews[0].Official)
  203. assert.Equal(t, "test_team", reviews[0].ReviewerTeam.Name)
  204. assert.EqualValues(t, 12, reviews[1].ID)
  205. assert.EqualValues(t, "REQUEST_REVIEW", reviews[1].State)
  206. assert.Equal(t, 0, reviews[0].CodeCommentsCount)
  207. assert.False(t, reviews[1].Stale)
  208. assert.True(t, reviews[1].Official)
  209. assert.EqualValues(t, 1, reviews[1].Reviewer.ID)
  210. }
  211. func TestAPIPullReviewRequest(t *testing.T) {
  212. defer tests.PrepareTestEnv(t)()
  213. pullIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 3})
  214. assert.NoError(t, pullIssue.LoadAttributes(t.Context()))
  215. repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue.RepoID})
  216. // Test add Review Request
  217. session := loginUser(t, "user2")
  218. token := getTokenForLoggedInUser(t, session, auth_model.AccessTokenScopeWriteRepository)
  219. req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  220. Reviewers: []string{"user4@example.com", "user8"},
  221. }).AddTokenAuth(token)
  222. MakeRequest(t, req, http.StatusCreated)
  223. // poster of pr can't be reviewer
  224. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  225. Reviewers: []string{"user1"},
  226. }).AddTokenAuth(token)
  227. MakeRequest(t, req, http.StatusUnprocessableEntity)
  228. // test user not exist
  229. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  230. Reviewers: []string{"testOther"},
  231. }).AddTokenAuth(token)
  232. MakeRequest(t, req, http.StatusNotFound)
  233. // Test Remove Review Request
  234. session2 := loginUser(t, "user4")
  235. token2 := getTokenForLoggedInUser(t, session2, auth_model.AccessTokenScopeWriteRepository)
  236. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  237. Reviewers: []string{"user4"},
  238. }).AddTokenAuth(token2)
  239. MakeRequest(t, req, http.StatusNoContent)
  240. // doer is not admin
  241. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  242. Reviewers: []string{"user8"},
  243. }).AddTokenAuth(token2)
  244. MakeRequest(t, req, http.StatusUnprocessableEntity)
  245. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  246. Reviewers: []string{"user8"},
  247. }).AddTokenAuth(token)
  248. MakeRequest(t, req, http.StatusNoContent)
  249. // a collaborator can add/remove a review request
  250. pullIssue21 := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 21})
  251. assert.NoError(t, pullIssue21.LoadAttributes(t.Context()))
  252. pull21Repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue21.RepoID}) // repo60
  253. user38Session := loginUser(t, "user38")
  254. user38Token := getTokenForLoggedInUser(t, user38Session, auth_model.AccessTokenScopeWriteRepository)
  255. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull21Repo.OwnerName, pull21Repo.Name, pullIssue21.Index), &api.PullReviewRequestOptions{
  256. Reviewers: []string{"user4@example.com"},
  257. }).AddTokenAuth(user38Token)
  258. MakeRequest(t, req, http.StatusCreated)
  259. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull21Repo.OwnerName, pull21Repo.Name, pullIssue21.Index), &api.PullReviewRequestOptions{
  260. Reviewers: []string{"user4@example.com"},
  261. }).AddTokenAuth(user38Token)
  262. MakeRequest(t, req, http.StatusNoContent)
  263. // the poster of the PR can add/remove a review request
  264. user39Session := loginUser(t, "user39")
  265. user39Token := getTokenForLoggedInUser(t, user39Session, auth_model.AccessTokenScopeWriteRepository)
  266. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull21Repo.OwnerName, pull21Repo.Name, pullIssue21.Index), &api.PullReviewRequestOptions{
  267. Reviewers: []string{"user8"},
  268. }).AddTokenAuth(user39Token)
  269. MakeRequest(t, req, http.StatusCreated)
  270. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull21Repo.OwnerName, pull21Repo.Name, pullIssue21.Index), &api.PullReviewRequestOptions{
  271. Reviewers: []string{"user8"},
  272. }).AddTokenAuth(user39Token)
  273. MakeRequest(t, req, http.StatusNoContent)
  274. // user with read permission on pull requests unit can add/remove a review request
  275. pullIssue22 := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 22})
  276. assert.NoError(t, pullIssue22.LoadAttributes(t.Context()))
  277. pull22Repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue22.RepoID}) // repo61
  278. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull22Repo.OwnerName, pull22Repo.Name, pullIssue22.Index), &api.PullReviewRequestOptions{
  279. Reviewers: []string{"user38"},
  280. }).AddTokenAuth(user39Token) // user39 is from a team with read permission on pull requests unit
  281. MakeRequest(t, req, http.StatusCreated)
  282. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", pull22Repo.OwnerName, pull22Repo.Name, pullIssue22.Index), &api.PullReviewRequestOptions{
  283. Reviewers: []string{"user38"},
  284. }).AddTokenAuth(user39Token) // user39 is from a team with read permission on pull requests unit
  285. MakeRequest(t, req, http.StatusNoContent)
  286. // Test team review request
  287. pullIssue12 := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 12})
  288. assert.NoError(t, pullIssue12.LoadAttributes(t.Context()))
  289. repo3 := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue12.RepoID})
  290. // Test add Team Review Request
  291. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{
  292. TeamReviewers: []string{"team1", "owners"},
  293. }).AddTokenAuth(token)
  294. MakeRequest(t, req, http.StatusCreated)
  295. // Test add Team Review Request to not allowned
  296. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{
  297. TeamReviewers: []string{"test_team"},
  298. }).AddTokenAuth(token)
  299. MakeRequest(t, req, http.StatusUnprocessableEntity)
  300. // Test add Team Review Request to not exist
  301. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{
  302. TeamReviewers: []string{"not_exist_team"},
  303. }).AddTokenAuth(token)
  304. MakeRequest(t, req, http.StatusNotFound)
  305. // Test Remove team Review Request
  306. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{
  307. TeamReviewers: []string{"team1"},
  308. }).AddTokenAuth(token)
  309. MakeRequest(t, req, http.StatusNoContent)
  310. // empty request test
  311. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{}).
  312. AddTokenAuth(token)
  313. MakeRequest(t, req, http.StatusCreated)
  314. req = NewRequestWithJSON(t, http.MethodDelete, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo3.OwnerName, repo3.Name, pullIssue12.Index), &api.PullReviewRequestOptions{}).
  315. AddTokenAuth(token)
  316. MakeRequest(t, req, http.StatusNoContent)
  317. }
  318. func TestAPIPullReviewStayDismissed(t *testing.T) {
  319. // This test against issue https://github.com/go-gitea/gitea/issues/28542
  320. // where old reviews surface after a review request got dismissed.
  321. defer tests.PrepareTestEnv(t)()
  322. pullIssue := unittest.AssertExistsAndLoadBean(t, &issues_model.Issue{ID: 3})
  323. assert.NoError(t, pullIssue.LoadAttributes(t.Context()))
  324. repo := unittest.AssertExistsAndLoadBean(t, &repo_model.Repository{ID: pullIssue.RepoID})
  325. user2 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 2})
  326. session2 := loginUser(t, user2.LoginName)
  327. token2 := getTokenForLoggedInUser(t, session2, auth_model.AccessTokenScopeWriteRepository)
  328. user8 := unittest.AssertExistsAndLoadBean(t, &user_model.User{ID: 8})
  329. session8 := loginUser(t, user8.LoginName)
  330. token8 := getTokenForLoggedInUser(t, session8, auth_model.AccessTokenScopeWriteRepository)
  331. // user2 request user8
  332. req := NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  333. Reviewers: []string{user8.LoginName},
  334. }).AddTokenAuth(token2)
  335. MakeRequest(t, req, http.StatusCreated)
  336. reviewsCountCheck(t,
  337. "check we have only one review request",
  338. pullIssue.ID, user8.ID, 0, 1, 1, false)
  339. // user2 request user8 again, it is expected to be ignored
  340. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  341. Reviewers: []string{user8.LoginName},
  342. }).AddTokenAuth(token2)
  343. MakeRequest(t, req, http.StatusCreated)
  344. reviewsCountCheck(t,
  345. "check we have only one review request, even after re-request it again",
  346. pullIssue.ID, user8.ID, 0, 1, 1, false)
  347. // user8 reviews it as accept
  348. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  349. Event: "APPROVED",
  350. Body: "lgtm",
  351. }).AddTokenAuth(token8)
  352. MakeRequest(t, req, http.StatusOK)
  353. reviewsCountCheck(t,
  354. "check we have one valid approval",
  355. pullIssue.ID, user8.ID, 0, 0, 1, true)
  356. // emulate of auto-dismiss lgtm on a protected branch that where a pull just got an update
  357. _, err := db.GetEngine(t.Context()).Where("issue_id = ? AND reviewer_id = ?", pullIssue.ID, user8.ID).
  358. Cols("dismissed").Update(&issues_model.Review{Dismissed: true})
  359. assert.NoError(t, err)
  360. // user2 request user8 again
  361. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/requested_reviewers", repo.OwnerName, repo.Name, pullIssue.Index), &api.PullReviewRequestOptions{
  362. Reviewers: []string{user8.LoginName},
  363. }).AddTokenAuth(token2)
  364. MakeRequest(t, req, http.StatusCreated)
  365. reviewsCountCheck(t,
  366. "check we have no valid approval and one review request",
  367. pullIssue.ID, user8.ID, 1, 1, 2, false)
  368. // user8 dismiss review
  369. permUser8, err := access_model.GetUserRepoPermission(t.Context(), pullIssue.Repo, user8)
  370. assert.NoError(t, err)
  371. _, err = issue_service.ReviewRequest(t.Context(), pullIssue, user8, &permUser8, user8, false)
  372. assert.NoError(t, err)
  373. reviewsCountCheck(t,
  374. "check new review request is now dismissed",
  375. pullIssue.ID, user8.ID, 1, 0, 1, false)
  376. // add a new valid approval
  377. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  378. Event: "APPROVED",
  379. Body: "lgtm",
  380. }).AddTokenAuth(token8)
  381. MakeRequest(t, req, http.StatusOK)
  382. reviewsCountCheck(t,
  383. "check that old reviews requests are deleted",
  384. pullIssue.ID, user8.ID, 1, 0, 2, true)
  385. // now add a change request witch should dismiss the approval
  386. req = NewRequestWithJSON(t, http.MethodPost, fmt.Sprintf("/api/v1/repos/%s/%s/pulls/%d/reviews", repo.OwnerName, repo.Name, pullIssue.Index), &api.CreatePullReviewOptions{
  387. Event: "REQUEST_CHANGES",
  388. Body: "please change XYZ",
  389. }).AddTokenAuth(token8)
  390. MakeRequest(t, req, http.StatusOK)
  391. reviewsCountCheck(t,
  392. "check that old reviews are dismissed",
  393. pullIssue.ID, user8.ID, 2, 0, 3, false)
  394. }
  395. func reviewsCountCheck(t *testing.T, name string, issueID, reviewerID int64, expectedDismissed, expectedRequested, expectedTotal int, expectApproval bool) {
  396. t.Run(name, func(t *testing.T) {
  397. unittest.AssertCountByCond(t, "review", builder.Eq{
  398. "issue_id": issueID,
  399. "reviewer_id": reviewerID,
  400. "dismissed": true,
  401. }, expectedDismissed)
  402. unittest.AssertCountByCond(t, "review", builder.Eq{
  403. "issue_id": issueID,
  404. "reviewer_id": reviewerID,
  405. }, expectedTotal)
  406. unittest.AssertCountByCond(t, "review", builder.Eq{
  407. "issue_id": issueID,
  408. "reviewer_id": reviewerID,
  409. "type": issues_model.ReviewTypeRequest,
  410. }, expectedRequested)
  411. approvalCount := 0
  412. if expectApproval {
  413. approvalCount = 1
  414. }
  415. unittest.AssertCountByCond(t, "review", builder.Eq{
  416. "issue_id": issueID,
  417. "reviewer_id": reviewerID,
  418. "type": issues_model.ReviewTypeApprove,
  419. "dismissed": false,
  420. }, approvalCount)
  421. })
  422. }